added qutebrowser

This commit is contained in:
whackx 2023-08-07 22:14:01 +02:00
parent 2f5eb260f7
commit e0b8f6678a
4 changed files with 100 additions and 0 deletions

3
.gitmodules vendored
View File

@ -40,3 +40,6 @@
[submodule "alacritty/.config/alacritty/colorschemes/catppuccin"]
path = alacritty/.config/alacritty/colorschemes/catppuccin
url = https://github.com/catppuccin/alacritty.git
[submodule "qutebrowser/.config/qutebrowser/catppuccin"]
path = qutebrowser/.config/qutebrowser/catppuccin
url = https://github.com/catppuccin/qutebrowser.git

View File

@ -0,0 +1,67 @@
https://regexr.com/ RegExr: Learn, Build, & Test RegEx
https://github.com/Sma-Das/TryHackMe/tree/main/Intro%20to%20Pwntools#shellcraft TryHackMe/Intro to Pwntools at main · Sma-Das/TryHackMe · GitHub
https://github.com/guyinatuxedo/nightmare/tree/master/modules nightmare/modules at master · guyinatuxedo/nightmare · GitHub
https://requestbin.com/ RequestBin.com — A modern request bin to collect, inspect and debug HTTP requests and webhooks
https://attackerkb.com/?referrer=thm Topics | AttackerKB
https://dogoodu.com/2020/04/22/life-after-covid-19-the-new-new-normal/ Life After COVID-19: The New New Normal - Do Good U
https://www.boxentriq.com/code-breaking/cipher-identifier Cipher Identifier (online tool) | Boxentriq
https://whatsmyname.app/ WhatsMyName Web
https://hashes.com/en/decrypt/hash Decrypt MD5, SHA1, MySQL, NTLM, SHA256, SHA512, Wordpress, Bcrypt hashes for free online
https://md5hashing.net/ Ultimate Hashing and Anonymity toolkit
https://viewdns.info/ ViewDNS.info - Your one source for DNS related tools!
https://crypto.stackexchange.com/questions/88430/how-to-decrypt-two-images-encrypted-using-xor-with-the-same-key one time pad - How to decrypt two images encrypted using XOR with the same key? - Cryptography Stack Exchange
https://wigle.net/ WiGLE: Wireless Network Mapping
https://discover.digitalglobe.com/ Maxar - Archive Search & Discovery
https://cryptii.com/ Modular conversion, encoding and encryption online — Cryptii
https://threatcrowd.org/ip.php?ip=23.22.63.114 IP > 23.22.63.114 | Threatcrowd.org Open Source Threat Intelligence
https://www.virustotal.com/gui/home/upload VirusTotal - Home
https://attack.mitre.org/ MITRE ATT&CK®
https://www.threatminer.org/ ThreatMiner.org | Data Mining for Threat Intelligence
https://dnsdumpster.com/ DNSdumpster.com - dns recon and research, find and lookup dns records
https://www.linuxkernelcves.com/cves Linux Kernel CVEs | All CVEs
https://hybrid-analysis.com/ Free Automated Malware Analysis Service - powered by Falcon Sandbox
https://www.hackerone.com/ethical-hacker/100-hacking-tools-and-resources 100 Hacking Tools and Resources | HackerOne
http://10.10.237.65/login.php Login
https://urlhaus.abuse.ch/ URLhaus | Malware URL exchange
https://www.arin.net/ American Registry for Internet Numbers
https://mailheader.org/ Analyze my mail header
https://talosintelligence.com/talos_file_reputation Talos File Reputation Lookup || Cisco Talos Intelligence Group - Comprehensive Threat Intelligence
https://app.any.run/ Interactive Online Malware Analysis Sandbox - ANY.RUN
https://www.phishtool.com/ PhishTool
https://www.exploit-db.com/google-hacking-database Google Hacking Database (GHDB) - Google Dorks, OSINT, Recon
https://threatintelligenceplatform.com/ Threat Intelligence Platform (TIP) | Integrate #1 Cyber Threat Intel APIs
https://cli.shodan.io/ Shodan Command-Line Interface
https://10.10.47.61/ Simple Slide Show
https://tdm.socprime.com/login SOC Prime Platform
http://10.200.53.232/src/login.php Throwback Hacks - Login
https://www.xmodulo.com/how-to-capture-and-replay-network-traffic-on-linux.html How to capture and replay network traffic on Linux
https://www.robtex.com/ Welcome to Robtex!
https://www.threatcrowd.org/ Threat Crowd | Threatcrowd.org Open Source Threat Intelligence
https://fluidattacks.com/advisories/ Advisories | Fluid Attacks
https://www.revshells.com/ Online - Reverse Shell Generator
https://ir0nstone.gitbook.io/notes/ Binary Exploitation Notes - Binary Exploitation
https://libc.blukat.me/?q=__libc_start_main_ret%3Ae81%2C_IO_2_1_stdin_%3A5c0 libc database search
https://libc.rip/ libc-database
https://ir0nstone.gitbook.io/notes/types/stack Stack - Binary Exploitation
https://www.thehacker.recipes/ad/movement/credentials/dumping/dpapi-protected-secrets DPAPI secrets - The Hacker Recipes
https://tryhackme.com/room/credharvesting TryHackMe | Credentials Harvesting
https://tryhackme.com/room/crypted TryHackMe | Crypted
https://remote-eu-08.tryhackme.tech/#/client/MTIzMjUzNgBjAG15c3Fs?token=0B787242B8910B1501344F982F347AE916B280C2E9CDC4BD3634221A2231FB3B TryHackMe | Remote
https://remote-eu-01.tryhackme.tech/#/client/MTI2MjE5NABjAG15c3Fs?token=4EF86ED7A15462BEDB35460F086457A039F343342013500AF45DE750BD578BF4 TryHackMe | Remote
https://forum.hackthebox.com/ Hack The Box :: Forums
https://app.hackthebox.com/starting-point Hack The Box :: Starting Point
http://10.10.239.158/ SigHunt
https://start.duckduckgo.com/ DuckDuckGo — Privacy, simplified.
http://shell-storm.org/ Shell-Storm
https://www.hackingarticles.in/abusing-kerberos-using-impacket/ Abusing Kerberos Using Impacket - Hacking Articles
https://www.hackthebox.com/badge/image/378375 378375 (220×50)
https://ropemporium.com/ ROP Emporium
https://weakpass.com/ Weakpass
https://rouvin.gitbook.io/ibreakstuff/writeups/hackthebox/easy/topology Topology - Journal
https://yu8pentest.blogspot.com/ Dryu8 Pentester
https://hyperbeast.es/ Últimas entradas - HyperBeast
https://zaidanr.medium.com/exploiting-exposed-git-directory-without-gittools-7d3764dd3af6 Exploiting Exposed .git Directory Without GitTools | by Zaidan Rizaki | Medium
https://osintframework.com/ OSINT Framework
https://packetstormsecurity.com/ Packet Storm
https://tryhackme.com/mnemonicdaemon/badges/redteamcapstone TryHackMe | User Badge
https://writeup.raw.pm/ Write-up Factory

@ -0,0 +1 @@
Subproject commit 78bb72b4c60b421c8ea64dd7c960add6add92f83

View File

@ -0,0 +1,29 @@
import catppuccin
# load your autoconfig, use this, if the rest of your config is empty!
config.load_autoconfig()
# set the flavor you'd like to use
# valid options are 'mocha', 'macchiato', 'frappe', and 'latte'
# last argument (optional, default is False):
# enable the plain look for the menu rows
catppuccin.setup(c, 'mocha', True)
# config.set("colors.webpage.darkmode.enabled", True)
# config.set("colors.webpage.preferred_color_scheme", "dark")
config.set("auto_save.session", True)
c.statusbar.widgets = ["keypress", "progress", "url", "scroll"]
# privacy
c.content.cookies.accept = "no-3rdparty"
c.content.webrtc_ip_handling_policy = "default-public-interface-only"
# Adblock
c.content.blocking.enabled = True
c.content.blocking.method = 'auto'
c.content.blocking.adblock.lists = ['https://easylist.to/easylist/easylist.txt',
'https://easylist.to/easylist/easyprivacy.txt']
# Autoplay
c.content.autoplay = False