diff --git a/.gitmodules b/.gitmodules index 64d38fc..b31f245 100644 --- a/.gitmodules +++ b/.gitmodules @@ -40,3 +40,6 @@ [submodule "alacritty/.config/alacritty/colorschemes/catppuccin"] path = alacritty/.config/alacritty/colorschemes/catppuccin url = https://github.com/catppuccin/alacritty.git +[submodule "qutebrowser/.config/qutebrowser/catppuccin"] + path = qutebrowser/.config/qutebrowser/catppuccin + url = https://github.com/catppuccin/qutebrowser.git diff --git a/qutebrowser/.config/qutebrowser/bookmarks/urls b/qutebrowser/.config/qutebrowser/bookmarks/urls new file mode 100644 index 0000000..c0d947e --- /dev/null +++ b/qutebrowser/.config/qutebrowser/bookmarks/urls @@ -0,0 +1,67 @@ +https://regexr.com/ RegExr: Learn, Build, & Test RegEx +https://github.com/Sma-Das/TryHackMe/tree/main/Intro%20to%20Pwntools#shellcraft TryHackMe/Intro to Pwntools at main · Sma-Das/TryHackMe · GitHub +https://github.com/guyinatuxedo/nightmare/tree/master/modules nightmare/modules at master · guyinatuxedo/nightmare · GitHub +https://requestbin.com/ RequestBin.com — A modern request bin to collect, inspect and debug HTTP requests and webhooks +https://attackerkb.com/?referrer=thm Topics | AttackerKB +https://dogoodu.com/2020/04/22/life-after-covid-19-the-new-new-normal/ Life After COVID-19: The New New Normal - Do Good U +https://www.boxentriq.com/code-breaking/cipher-identifier Cipher Identifier (online tool) | Boxentriq +https://whatsmyname.app/ WhatsMyName Web +https://hashes.com/en/decrypt/hash Decrypt MD5, SHA1, MySQL, NTLM, SHA256, SHA512, Wordpress, Bcrypt hashes for free online +https://md5hashing.net/ Ultimate Hashing and Anonymity toolkit +https://viewdns.info/ ViewDNS.info - Your one source for DNS related tools! +https://crypto.stackexchange.com/questions/88430/how-to-decrypt-two-images-encrypted-using-xor-with-the-same-key one time pad - How to decrypt two images encrypted using XOR with the same key? - Cryptography Stack Exchange +https://wigle.net/ WiGLE: Wireless Network Mapping +https://discover.digitalglobe.com/ Maxar - Archive Search & Discovery +https://cryptii.com/ Modular conversion, encoding and encryption online — Cryptii +https://threatcrowd.org/ip.php?ip=23.22.63.114 IP > 23.22.63.114 | Threatcrowd.org Open Source Threat Intelligence +https://www.virustotal.com/gui/home/upload VirusTotal - Home +https://attack.mitre.org/ MITRE ATT&CK® +https://www.threatminer.org/ ThreatMiner.org | Data Mining for Threat Intelligence +https://dnsdumpster.com/ DNSdumpster.com - dns recon and research, find and lookup dns records +https://www.linuxkernelcves.com/cves Linux Kernel CVEs | All CVEs +https://hybrid-analysis.com/ Free Automated Malware Analysis Service - powered by Falcon Sandbox +https://www.hackerone.com/ethical-hacker/100-hacking-tools-and-resources 100 Hacking Tools and Resources | HackerOne +http://10.10.237.65/login.php Login +https://urlhaus.abuse.ch/ URLhaus | Malware URL exchange +https://www.arin.net/ American Registry for Internet Numbers +https://mailheader.org/ Analyze my mail header +https://talosintelligence.com/talos_file_reputation Talos File Reputation Lookup || Cisco Talos Intelligence Group - Comprehensive Threat Intelligence +https://app.any.run/ Interactive Online Malware Analysis Sandbox - ANY.RUN +https://www.phishtool.com/ PhishTool +https://www.exploit-db.com/google-hacking-database Google Hacking Database (GHDB) - Google Dorks, OSINT, Recon +https://threatintelligenceplatform.com/ Threat Intelligence Platform (TIP) | Integrate #1 Cyber Threat Intel APIs +https://cli.shodan.io/ Shodan Command-Line Interface +https://10.10.47.61/ Simple Slide Show +https://tdm.socprime.com/login SOC Prime Platform +http://10.200.53.232/src/login.php Throwback Hacks - Login +https://www.xmodulo.com/how-to-capture-and-replay-network-traffic-on-linux.html How to capture and replay network traffic on Linux +https://www.robtex.com/ Welcome to Robtex! +https://www.threatcrowd.org/ Threat Crowd | Threatcrowd.org Open Source Threat Intelligence +https://fluidattacks.com/advisories/ Advisories | Fluid Attacks +https://www.revshells.com/ Online - Reverse Shell Generator +https://ir0nstone.gitbook.io/notes/ Binary Exploitation Notes - Binary Exploitation +https://libc.blukat.me/?q=__libc_start_main_ret%3Ae81%2C_IO_2_1_stdin_%3A5c0 libc database search +https://libc.rip/ libc-database +https://ir0nstone.gitbook.io/notes/types/stack Stack - Binary Exploitation +https://www.thehacker.recipes/ad/movement/credentials/dumping/dpapi-protected-secrets DPAPI secrets - The Hacker Recipes +https://tryhackme.com/room/credharvesting TryHackMe | Credentials Harvesting +https://tryhackme.com/room/crypted TryHackMe | Crypted +https://remote-eu-08.tryhackme.tech/#/client/MTIzMjUzNgBjAG15c3Fs?token=0B787242B8910B1501344F982F347AE916B280C2E9CDC4BD3634221A2231FB3B TryHackMe | Remote +https://remote-eu-01.tryhackme.tech/#/client/MTI2MjE5NABjAG15c3Fs?token=4EF86ED7A15462BEDB35460F086457A039F343342013500AF45DE750BD578BF4 TryHackMe | Remote +https://forum.hackthebox.com/ Hack The Box :: Forums +https://app.hackthebox.com/starting-point Hack The Box :: Starting Point +http://10.10.239.158/ SigHunt +https://start.duckduckgo.com/ DuckDuckGo — Privacy, simplified. +http://shell-storm.org/ Shell-Storm +https://www.hackingarticles.in/abusing-kerberos-using-impacket/ Abusing Kerberos Using Impacket - Hacking Articles +https://www.hackthebox.com/badge/image/378375 378375 (220×50) +https://ropemporium.com/ ROP Emporium +https://weakpass.com/ Weakpass +https://rouvin.gitbook.io/ibreakstuff/writeups/hackthebox/easy/topology Topology - Journal +https://yu8pentest.blogspot.com/ Dryu8 Pentester +https://hyperbeast.es/ Últimas entradas - HyperBeast +https://zaidanr.medium.com/exploiting-exposed-git-directory-without-gittools-7d3764dd3af6 Exploiting Exposed .git Directory Without GitTools | by Zaidan Rizaki | Medium +https://osintframework.com/ OSINT Framework +https://packetstormsecurity.com/ Packet Storm +https://tryhackme.com/mnemonicdaemon/badges/redteamcapstone TryHackMe | User Badge +https://writeup.raw.pm/ Write-up Factory diff --git a/qutebrowser/.config/qutebrowser/catppuccin b/qutebrowser/.config/qutebrowser/catppuccin new file mode 160000 index 0000000..78bb72b --- /dev/null +++ b/qutebrowser/.config/qutebrowser/catppuccin @@ -0,0 +1 @@ +Subproject commit 78bb72b4c60b421c8ea64dd7c960add6add92f83 diff --git a/qutebrowser/.config/qutebrowser/config.py b/qutebrowser/.config/qutebrowser/config.py new file mode 100644 index 0000000..7be26d8 --- /dev/null +++ b/qutebrowser/.config/qutebrowser/config.py @@ -0,0 +1,29 @@ +import catppuccin + + +# load your autoconfig, use this, if the rest of your config is empty! +config.load_autoconfig() + +# set the flavor you'd like to use +# valid options are 'mocha', 'macchiato', 'frappe', and 'latte' +# last argument (optional, default is False): +# enable the plain look for the menu rows +catppuccin.setup(c, 'mocha', True) + +# config.set("colors.webpage.darkmode.enabled", True) +# config.set("colors.webpage.preferred_color_scheme", "dark") +config.set("auto_save.session", True) + +c.statusbar.widgets = ["keypress", "progress", "url", "scroll"] + +# privacy +c.content.cookies.accept = "no-3rdparty" +c.content.webrtc_ip_handling_policy = "default-public-interface-only" + +# Adblock +c.content.blocking.enabled = True +c.content.blocking.method = 'auto' +c.content.blocking.adblock.lists = ['https://easylist.to/easylist/easylist.txt', + 'https://easylist.to/easylist/easyprivacy.txt'] +# Autoplay +c.content.autoplay = False