added qutebrowser
This commit is contained in:
		
							parent
							
								
									2f5eb260f7
								
							
						
					
					
						commit
						e0b8f6678a
					
				| 
						 | 
					@ -40,3 +40,6 @@
 | 
				
			||||||
[submodule "alacritty/.config/alacritty/colorschemes/catppuccin"]
 | 
					[submodule "alacritty/.config/alacritty/colorschemes/catppuccin"]
 | 
				
			||||||
	path = alacritty/.config/alacritty/colorschemes/catppuccin
 | 
						path = alacritty/.config/alacritty/colorschemes/catppuccin
 | 
				
			||||||
	url = https://github.com/catppuccin/alacritty.git
 | 
						url = https://github.com/catppuccin/alacritty.git
 | 
				
			||||||
 | 
					[submodule "qutebrowser/.config/qutebrowser/catppuccin"]
 | 
				
			||||||
 | 
						path = qutebrowser/.config/qutebrowser/catppuccin
 | 
				
			||||||
 | 
						url = https://github.com/catppuccin/qutebrowser.git
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -0,0 +1,67 @@
 | 
				
			||||||
 | 
					https://regexr.com/ RegExr: Learn, Build, & Test RegEx
 | 
				
			||||||
 | 
					https://github.com/Sma-Das/TryHackMe/tree/main/Intro%20to%20Pwntools#shellcraft TryHackMe/Intro to Pwntools at main · Sma-Das/TryHackMe · GitHub
 | 
				
			||||||
 | 
					https://github.com/guyinatuxedo/nightmare/tree/master/modules nightmare/modules at master · guyinatuxedo/nightmare · GitHub
 | 
				
			||||||
 | 
					https://requestbin.com/ RequestBin.com — A modern request bin to collect, inspect and debug HTTP requests and webhooks
 | 
				
			||||||
 | 
					https://attackerkb.com/?referrer=thm Topics | AttackerKB
 | 
				
			||||||
 | 
					https://dogoodu.com/2020/04/22/life-after-covid-19-the-new-new-normal/ Life After COVID-19: The New New Normal - Do Good U
 | 
				
			||||||
 | 
					https://www.boxentriq.com/code-breaking/cipher-identifier Cipher Identifier (online tool) | Boxentriq
 | 
				
			||||||
 | 
					https://whatsmyname.app/ WhatsMyName Web
 | 
				
			||||||
 | 
					https://hashes.com/en/decrypt/hash Decrypt MD5, SHA1, MySQL, NTLM, SHA256, SHA512, Wordpress, Bcrypt hashes for free online
 | 
				
			||||||
 | 
					https://md5hashing.net/ Ultimate Hashing and Anonymity toolkit
 | 
				
			||||||
 | 
					https://viewdns.info/ ViewDNS.info - Your one source for DNS related tools!
 | 
				
			||||||
 | 
					https://crypto.stackexchange.com/questions/88430/how-to-decrypt-two-images-encrypted-using-xor-with-the-same-key one time pad - How to decrypt two images encrypted using XOR with the same key? - Cryptography Stack Exchange
 | 
				
			||||||
 | 
					https://wigle.net/ WiGLE: Wireless Network Mapping
 | 
				
			||||||
 | 
					https://discover.digitalglobe.com/ Maxar - Archive Search & Discovery
 | 
				
			||||||
 | 
					https://cryptii.com/ Modular conversion, encoding and encryption online — Cryptii
 | 
				
			||||||
 | 
					https://threatcrowd.org/ip.php?ip=23.22.63.114 IP > 23.22.63.114 | Threatcrowd.org Open Source Threat Intelligence
 | 
				
			||||||
 | 
					https://www.virustotal.com/gui/home/upload VirusTotal - Home
 | 
				
			||||||
 | 
					https://attack.mitre.org/ MITRE ATT&CK®
 | 
				
			||||||
 | 
					https://www.threatminer.org/ ThreatMiner.org | Data Mining for Threat Intelligence
 | 
				
			||||||
 | 
					https://dnsdumpster.com/ DNSdumpster.com - dns recon and research, find and lookup dns records
 | 
				
			||||||
 | 
					https://www.linuxkernelcves.com/cves Linux Kernel CVEs | All CVEs
 | 
				
			||||||
 | 
					https://hybrid-analysis.com/ Free Automated Malware Analysis Service - powered by Falcon Sandbox
 | 
				
			||||||
 | 
					https://www.hackerone.com/ethical-hacker/100-hacking-tools-and-resources 100 Hacking Tools and Resources | HackerOne
 | 
				
			||||||
 | 
					http://10.10.237.65/login.php Login
 | 
				
			||||||
 | 
					https://urlhaus.abuse.ch/ URLhaus | Malware URL exchange
 | 
				
			||||||
 | 
					https://www.arin.net/ American Registry for Internet Numbers
 | 
				
			||||||
 | 
					https://mailheader.org/ Analyze my mail header
 | 
				
			||||||
 | 
					https://talosintelligence.com/talos_file_reputation Talos File Reputation Lookup || Cisco Talos Intelligence Group - Comprehensive Threat Intelligence
 | 
				
			||||||
 | 
					https://app.any.run/ Interactive Online Malware Analysis Sandbox - ANY.RUN
 | 
				
			||||||
 | 
					https://www.phishtool.com/ PhishTool
 | 
				
			||||||
 | 
					https://www.exploit-db.com/google-hacking-database Google Hacking Database (GHDB) - Google Dorks, OSINT, Recon
 | 
				
			||||||
 | 
					https://threatintelligenceplatform.com/ Threat Intelligence Platform (TIP) | Integrate #1 Cyber Threat Intel APIs
 | 
				
			||||||
 | 
					https://cli.shodan.io/ Shodan Command-Line Interface
 | 
				
			||||||
 | 
					https://10.10.47.61/ Simple Slide Show
 | 
				
			||||||
 | 
					https://tdm.socprime.com/login SOC Prime Platform
 | 
				
			||||||
 | 
					http://10.200.53.232/src/login.php Throwback Hacks - Login
 | 
				
			||||||
 | 
					https://www.xmodulo.com/how-to-capture-and-replay-network-traffic-on-linux.html How to capture and replay network traffic on Linux
 | 
				
			||||||
 | 
					https://www.robtex.com/ Welcome to Robtex!
 | 
				
			||||||
 | 
					https://www.threatcrowd.org/ Threat Crowd | Threatcrowd.org Open Source Threat Intelligence
 | 
				
			||||||
 | 
					https://fluidattacks.com/advisories/ Advisories | Fluid Attacks
 | 
				
			||||||
 | 
					https://www.revshells.com/ Online - Reverse Shell Generator
 | 
				
			||||||
 | 
					https://ir0nstone.gitbook.io/notes/ Binary Exploitation Notes - Binary Exploitation
 | 
				
			||||||
 | 
					https://libc.blukat.me/?q=__libc_start_main_ret%3Ae81%2C_IO_2_1_stdin_%3A5c0 libc database search
 | 
				
			||||||
 | 
					https://libc.rip/ libc-database
 | 
				
			||||||
 | 
					https://ir0nstone.gitbook.io/notes/types/stack Stack - Binary Exploitation
 | 
				
			||||||
 | 
					https://www.thehacker.recipes/ad/movement/credentials/dumping/dpapi-protected-secrets DPAPI secrets - The Hacker Recipes
 | 
				
			||||||
 | 
					https://tryhackme.com/room/credharvesting TryHackMe | Credentials Harvesting
 | 
				
			||||||
 | 
					https://tryhackme.com/room/crypted TryHackMe | Crypted
 | 
				
			||||||
 | 
					https://remote-eu-08.tryhackme.tech/#/client/MTIzMjUzNgBjAG15c3Fs?token=0B787242B8910B1501344F982F347AE916B280C2E9CDC4BD3634221A2231FB3B TryHackMe | Remote
 | 
				
			||||||
 | 
					https://remote-eu-01.tryhackme.tech/#/client/MTI2MjE5NABjAG15c3Fs?token=4EF86ED7A15462BEDB35460F086457A039F343342013500AF45DE750BD578BF4 TryHackMe | Remote
 | 
				
			||||||
 | 
					https://forum.hackthebox.com/ Hack The Box :: Forums
 | 
				
			||||||
 | 
					https://app.hackthebox.com/starting-point Hack The Box :: Starting Point
 | 
				
			||||||
 | 
					http://10.10.239.158/ SigHunt
 | 
				
			||||||
 | 
					https://start.duckduckgo.com/ DuckDuckGo — Privacy, simplified.
 | 
				
			||||||
 | 
					http://shell-storm.org/ Shell-Storm
 | 
				
			||||||
 | 
					https://www.hackingarticles.in/abusing-kerberos-using-impacket/ Abusing Kerberos Using Impacket - Hacking Articles
 | 
				
			||||||
 | 
					https://www.hackthebox.com/badge/image/378375 378375 (220×50)
 | 
				
			||||||
 | 
					https://ropemporium.com/ ROP Emporium
 | 
				
			||||||
 | 
					https://weakpass.com/ Weakpass
 | 
				
			||||||
 | 
					https://rouvin.gitbook.io/ibreakstuff/writeups/hackthebox/easy/topology Topology - Journal
 | 
				
			||||||
 | 
					https://yu8pentest.blogspot.com/ Dryu8 Pentester
 | 
				
			||||||
 | 
					https://hyperbeast.es/ Últimas entradas - HyperBeast
 | 
				
			||||||
 | 
					https://zaidanr.medium.com/exploiting-exposed-git-directory-without-gittools-7d3764dd3af6 Exploiting Exposed .git Directory Without GitTools | by Zaidan Rizaki | Medium
 | 
				
			||||||
 | 
					https://osintframework.com/ OSINT Framework
 | 
				
			||||||
 | 
					https://packetstormsecurity.com/ Packet Storm
 | 
				
			||||||
 | 
					https://tryhackme.com/mnemonicdaemon/badges/redteamcapstone TryHackMe | User Badge
 | 
				
			||||||
 | 
					https://writeup.raw.pm/ Write-up Factory
 | 
				
			||||||
| 
						 | 
					@ -0,0 +1 @@
 | 
				
			||||||
 | 
					Subproject commit 78bb72b4c60b421c8ea64dd7c960add6add92f83
 | 
				
			||||||
| 
						 | 
					@ -0,0 +1,29 @@
 | 
				
			||||||
 | 
					import catppuccin
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# load your autoconfig, use this, if the rest of your config is empty!
 | 
				
			||||||
 | 
					config.load_autoconfig()
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# set the flavor you'd like to use
 | 
				
			||||||
 | 
					# valid options are 'mocha', 'macchiato', 'frappe', and 'latte'
 | 
				
			||||||
 | 
					# last argument (optional, default is False): 
 | 
				
			||||||
 | 
					# enable the plain look for the menu rows
 | 
				
			||||||
 | 
					catppuccin.setup(c, 'mocha', True)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# config.set("colors.webpage.darkmode.enabled", True)
 | 
				
			||||||
 | 
					# config.set("colors.webpage.preferred_color_scheme", "dark")
 | 
				
			||||||
 | 
					config.set("auto_save.session", True)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					c.statusbar.widgets = ["keypress", "progress", "url", "scroll"]
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# privacy
 | 
				
			||||||
 | 
					c.content.cookies.accept = "no-3rdparty"
 | 
				
			||||||
 | 
					c.content.webrtc_ip_handling_policy = "default-public-interface-only"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Adblock
 | 
				
			||||||
 | 
					c.content.blocking.enabled = True
 | 
				
			||||||
 | 
					c.content.blocking.method = 'auto'
 | 
				
			||||||
 | 
					c.content.blocking.adblock.lists = ['https://easylist.to/easylist/easylist.txt',
 | 
				
			||||||
 | 
					                                    'https://easylist.to/easylist/easyprivacy.txt']
 | 
				
			||||||
 | 
					# Autoplay
 | 
				
			||||||
 | 
					c.content.autoplay = False
 | 
				
			||||||
		Loading…
	
		Reference in New Issue