added qutebrowser
This commit is contained in:
parent
2f5eb260f7
commit
e0b8f6678a
|
@ -40,3 +40,6 @@
|
|||
[submodule "alacritty/.config/alacritty/colorschemes/catppuccin"]
|
||||
path = alacritty/.config/alacritty/colorschemes/catppuccin
|
||||
url = https://github.com/catppuccin/alacritty.git
|
||||
[submodule "qutebrowser/.config/qutebrowser/catppuccin"]
|
||||
path = qutebrowser/.config/qutebrowser/catppuccin
|
||||
url = https://github.com/catppuccin/qutebrowser.git
|
||||
|
|
|
@ -0,0 +1,67 @@
|
|||
https://regexr.com/ RegExr: Learn, Build, & Test RegEx
|
||||
https://github.com/Sma-Das/TryHackMe/tree/main/Intro%20to%20Pwntools#shellcraft TryHackMe/Intro to Pwntools at main · Sma-Das/TryHackMe · GitHub
|
||||
https://github.com/guyinatuxedo/nightmare/tree/master/modules nightmare/modules at master · guyinatuxedo/nightmare · GitHub
|
||||
https://requestbin.com/ RequestBin.com — A modern request bin to collect, inspect and debug HTTP requests and webhooks
|
||||
https://attackerkb.com/?referrer=thm Topics | AttackerKB
|
||||
https://dogoodu.com/2020/04/22/life-after-covid-19-the-new-new-normal/ Life After COVID-19: The New New Normal - Do Good U
|
||||
https://www.boxentriq.com/code-breaking/cipher-identifier Cipher Identifier (online tool) | Boxentriq
|
||||
https://whatsmyname.app/ WhatsMyName Web
|
||||
https://hashes.com/en/decrypt/hash Decrypt MD5, SHA1, MySQL, NTLM, SHA256, SHA512, Wordpress, Bcrypt hashes for free online
|
||||
https://md5hashing.net/ Ultimate Hashing and Anonymity toolkit
|
||||
https://viewdns.info/ ViewDNS.info - Your one source for DNS related tools!
|
||||
https://crypto.stackexchange.com/questions/88430/how-to-decrypt-two-images-encrypted-using-xor-with-the-same-key one time pad - How to decrypt two images encrypted using XOR with the same key? - Cryptography Stack Exchange
|
||||
https://wigle.net/ WiGLE: Wireless Network Mapping
|
||||
https://discover.digitalglobe.com/ Maxar - Archive Search & Discovery
|
||||
https://cryptii.com/ Modular conversion, encoding and encryption online — Cryptii
|
||||
https://threatcrowd.org/ip.php?ip=23.22.63.114 IP > 23.22.63.114 | Threatcrowd.org Open Source Threat Intelligence
|
||||
https://www.virustotal.com/gui/home/upload VirusTotal - Home
|
||||
https://attack.mitre.org/ MITRE ATT&CK®
|
||||
https://www.threatminer.org/ ThreatMiner.org | Data Mining for Threat Intelligence
|
||||
https://dnsdumpster.com/ DNSdumpster.com - dns recon and research, find and lookup dns records
|
||||
https://www.linuxkernelcves.com/cves Linux Kernel CVEs | All CVEs
|
||||
https://hybrid-analysis.com/ Free Automated Malware Analysis Service - powered by Falcon Sandbox
|
||||
https://www.hackerone.com/ethical-hacker/100-hacking-tools-and-resources 100 Hacking Tools and Resources | HackerOne
|
||||
http://10.10.237.65/login.php Login
|
||||
https://urlhaus.abuse.ch/ URLhaus | Malware URL exchange
|
||||
https://www.arin.net/ American Registry for Internet Numbers
|
||||
https://mailheader.org/ Analyze my mail header
|
||||
https://talosintelligence.com/talos_file_reputation Talos File Reputation Lookup || Cisco Talos Intelligence Group - Comprehensive Threat Intelligence
|
||||
https://app.any.run/ Interactive Online Malware Analysis Sandbox - ANY.RUN
|
||||
https://www.phishtool.com/ PhishTool
|
||||
https://www.exploit-db.com/google-hacking-database Google Hacking Database (GHDB) - Google Dorks, OSINT, Recon
|
||||
https://threatintelligenceplatform.com/ Threat Intelligence Platform (TIP) | Integrate #1 Cyber Threat Intel APIs
|
||||
https://cli.shodan.io/ Shodan Command-Line Interface
|
||||
https://10.10.47.61/ Simple Slide Show
|
||||
https://tdm.socprime.com/login SOC Prime Platform
|
||||
http://10.200.53.232/src/login.php Throwback Hacks - Login
|
||||
https://www.xmodulo.com/how-to-capture-and-replay-network-traffic-on-linux.html How to capture and replay network traffic on Linux
|
||||
https://www.robtex.com/ Welcome to Robtex!
|
||||
https://www.threatcrowd.org/ Threat Crowd | Threatcrowd.org Open Source Threat Intelligence
|
||||
https://fluidattacks.com/advisories/ Advisories | Fluid Attacks
|
||||
https://www.revshells.com/ Online - Reverse Shell Generator
|
||||
https://ir0nstone.gitbook.io/notes/ Binary Exploitation Notes - Binary Exploitation
|
||||
https://libc.blukat.me/?q=__libc_start_main_ret%3Ae81%2C_IO_2_1_stdin_%3A5c0 libc database search
|
||||
https://libc.rip/ libc-database
|
||||
https://ir0nstone.gitbook.io/notes/types/stack Stack - Binary Exploitation
|
||||
https://www.thehacker.recipes/ad/movement/credentials/dumping/dpapi-protected-secrets DPAPI secrets - The Hacker Recipes
|
||||
https://tryhackme.com/room/credharvesting TryHackMe | Credentials Harvesting
|
||||
https://tryhackme.com/room/crypted TryHackMe | Crypted
|
||||
https://remote-eu-08.tryhackme.tech/#/client/MTIzMjUzNgBjAG15c3Fs?token=0B787242B8910B1501344F982F347AE916B280C2E9CDC4BD3634221A2231FB3B TryHackMe | Remote
|
||||
https://remote-eu-01.tryhackme.tech/#/client/MTI2MjE5NABjAG15c3Fs?token=4EF86ED7A15462BEDB35460F086457A039F343342013500AF45DE750BD578BF4 TryHackMe | Remote
|
||||
https://forum.hackthebox.com/ Hack The Box :: Forums
|
||||
https://app.hackthebox.com/starting-point Hack The Box :: Starting Point
|
||||
http://10.10.239.158/ SigHunt
|
||||
https://start.duckduckgo.com/ DuckDuckGo — Privacy, simplified.
|
||||
http://shell-storm.org/ Shell-Storm
|
||||
https://www.hackingarticles.in/abusing-kerberos-using-impacket/ Abusing Kerberos Using Impacket - Hacking Articles
|
||||
https://www.hackthebox.com/badge/image/378375 378375 (220×50)
|
||||
https://ropemporium.com/ ROP Emporium
|
||||
https://weakpass.com/ Weakpass
|
||||
https://rouvin.gitbook.io/ibreakstuff/writeups/hackthebox/easy/topology Topology - Journal
|
||||
https://yu8pentest.blogspot.com/ Dryu8 Pentester
|
||||
https://hyperbeast.es/ Últimas entradas - HyperBeast
|
||||
https://zaidanr.medium.com/exploiting-exposed-git-directory-without-gittools-7d3764dd3af6 Exploiting Exposed .git Directory Without GitTools | by Zaidan Rizaki | Medium
|
||||
https://osintframework.com/ OSINT Framework
|
||||
https://packetstormsecurity.com/ Packet Storm
|
||||
https://tryhackme.com/mnemonicdaemon/badges/redteamcapstone TryHackMe | User Badge
|
||||
https://writeup.raw.pm/ Write-up Factory
|
|
@ -0,0 +1 @@
|
|||
Subproject commit 78bb72b4c60b421c8ea64dd7c960add6add92f83
|
|
@ -0,0 +1,29 @@
|
|||
import catppuccin
|
||||
|
||||
|
||||
# load your autoconfig, use this, if the rest of your config is empty!
|
||||
config.load_autoconfig()
|
||||
|
||||
# set the flavor you'd like to use
|
||||
# valid options are 'mocha', 'macchiato', 'frappe', and 'latte'
|
||||
# last argument (optional, default is False):
|
||||
# enable the plain look for the menu rows
|
||||
catppuccin.setup(c, 'mocha', True)
|
||||
|
||||
# config.set("colors.webpage.darkmode.enabled", True)
|
||||
# config.set("colors.webpage.preferred_color_scheme", "dark")
|
||||
config.set("auto_save.session", True)
|
||||
|
||||
c.statusbar.widgets = ["keypress", "progress", "url", "scroll"]
|
||||
|
||||
# privacy
|
||||
c.content.cookies.accept = "no-3rdparty"
|
||||
c.content.webrtc_ip_handling_policy = "default-public-interface-only"
|
||||
|
||||
# Adblock
|
||||
c.content.blocking.enabled = True
|
||||
c.content.blocking.method = 'auto'
|
||||
c.content.blocking.adblock.lists = ['https://easylist.to/easylist/easylist.txt',
|
||||
'https://easylist.to/easylist/easyprivacy.txt']
|
||||
# Autoplay
|
||||
c.content.autoplay = False
|
Loading…
Reference in New Issue