asteroza + bypass   121

iamadamdev/bypass-paywalls-firefox: Bypass Paywalls for Firefox
formerly a paywall bypass for firefox and chrome, but now firefox dropped it from the add-on marketplace so you can only install on nightly (unsigned addons won't install on release/beta). chrome is still okay
chrome  firefox  browser  paywall  bypass  addon  plugin  extension  software 
november 2018 by asteroza
How to run Nested ESXi on top of a VSAN datastore?
Trick to make nested vSAN work. Need to fake out a SCSI reservation that the lower vSAN can't support.
VMware  ESXi  nested  vSAN  SCSI  reservation  bypass  sysadmin  tips  tricks 
october 2018 by asteroza
asp.net - Downloading exe files from database - Stack Overflow
Possible workaround for not getting a warning download rare exe's
chrome  download  warning  bypass  security 
september 2018 by asteroza
VMWare Workstation cannot run on Windows 10 after recent update to Windows 10 - Stack Overflow
So the correct way to get VMware workstation running on Windows 10 1803 is disabling credential guard/device guard and the hyper-v role
VMware  workstation  windows  host  10  1803  HVCI  credential  device  guard  bypass 
june 2018 by asteroza
Firefox Send
One time file send service. File lives on server for 24hrs or one download, whichever comes first. Uses clientside encryption so network DLP with SSL stripping won't easily catch it.
mozilla  firefox  selfdestruct  link  file  upload  sharing  service  encryption  DLP  bypass  security  hacking  pentesting 
may 2018 by asteroza
Register
Registration page for ROM's/devices that Google doesn't manage/certify. Need to do this is you throw a custom ROM on a device, as otherwise google play services craps itself. Uses an ID specific to the ROM instance, so if you reflash/wipe, you loose the ID. Max 100 ID registrations per google account.
android  custom  ROM  device  unknown  uncertified  exception  registration  google  play  services  bypass 
april 2018 by asteroza
Mikko Hypponen on Twitter: "… "
Making a batch file, by hand, using MSpaint and BMP output. Commonly used to break out of Citrix sessions...
security  hacking  pentesting  humor  bypass  MSpaint  BMP  batch  file  windows 
april 2018 by asteroza
Privacy Pass – Add-ons for Firefox
Cloudflare's CAPTCHA bypass solution, using blinded tokens. Basically, you do one captcha, and you are afforded a certain number of accesses based on that token, so Cloudflare harasses VPN/tor users less.
firefox  plugin  addon  extension  cloudflare  CAPTCHA  bypass  crytographic  blind  blinded  token  security  VPN  tor  access  block  browser  privacy 
february 2018 by asteroza
marcosscriven/galeforce: GaleForce is a project to customise the Google Wifi router
Tools to root/customize a Google WiFi router, which is running ChromeOS under the hood.
google  wifi  ChromeOS  root  hack  bypass  opensource  software  networking  router 
july 2017 by asteroza
windows-itpro-docs/deploy-code-integrity-policies-steps.md at master · Microsoft/windows-itpro-docs
Protection script/guidelines for windows 10 device guard to try to hold off/block bypass methods
windows  10  device  guard  bypass  block  script  code  integrity  policy  security  pentesting  hacking 
june 2017 by asteroza
remote.exe - a useful, MS signed SMB shell
remote.exe is a signed SMB shell, which will only end in tears...
security  pentesting  hacking  whitelist  bypass  signed  binary  SMB  shell  Delicious 
november 2016 by asteroza
The Superjet: Engineers at GE Aviation Are Building the Ultimate Jet Engine | GE Reports
Thing is, the tech path for this leads to a similar family of engines, like the J58 that powers the SR-71 (two path engine with outer duct not behind a compressor and used as a ramjet), and SERJ (technically a two path where you have part of the compressor flow go to a combustor and turbine segment, while the rest flows to a ramjet combustor only). Probably the basic difference between ADVENT and SERJ is a lack of subsonic ramjet combustor and an air bleed path.
ratio  bypass  research  technology  propulsion  aerospace  aviation  engine  turbojet  cycle  variable  military  ADVENT  GE  Delicious 
january 2013 by asteroza
クラスターファンVTOL技術の研究:航空プログラムグループ
Interesting research by the japanese to use a gas generator/ultra high bypass ratio turbine to drive clusters of multi stage recycling tip turbine driven lift fans for VTOL lift.
JAXA  japan  aerospace  aircraft  airplane  research  VTOL  cluster  fan  lift  jet  bypass  air  tip  rotor  multi  stage  multistage  turbine  Delicious 
august 2010 by asteroza
UltraSurf
Apparently high school kids use this for bypassing websense...
UltraSurf  firewall  content  filter  proxy  bypass  VPN  software  windows  security  privacy  tools  utilities  Delicious 
may 2010 by asteroza
Tor: Bridges
So Tor has a way of directly connecting to relays not listed on directory lists/servers, called Bridges. So when the Great Firewall of China or the Berlin Firewall decide to block access to normal Tor entry point information, you can use a side channel such as IM or twitter to get bridge connection details. Since there is no convenient list of Tor Bridge relays, it becomes a game of whack-a-mole or cutting the head off a hydra; it's a losing proposition most of the time.
Tor  bridge  bypass  anonymity  security  privacy  Hydra  whack-a-mole  Delicious 
october 2009 by asteroza
« earlier      
per page:    204080120160

related tags

0.5  2.0  2FA  2K3  abuse  academic  accelerator  access  account  activism  addon  address  adobe  ADVENT  aerodynamics  aerospace  agriculture  air  aircraft  airplane  ajax  alternative  AN.ON  analysis  android  animated  anon  anonimizer  anonymity  anonymizer  anonymizing  anonymous  antiproxy  antispam  antivirus  apache  API  app  AppGuard  applet  application  AppLocker  ASLR  attack  AV  averaging  aviation  batch  bear  binary  biology  biometric  biometrics  BIOT  bitlocker  bittorrent  blind  blinded  block  blocking  bluetooth  BMP  boot  bridge  browser  browser-in-browser  browsing  buffer  burst  bypass  C#  C3  call  captcha  card  cascade  censor  censorship  censorware  certificate  certutil  CGI  cgiproxy  chain  check  china  chrome  ChromeOS  circumventer  circumvention  client  clipboard  cloudflare  cluster  code  COM  command  communication  compatibility  compendium  concept  connection  constrained  content  converter  copy  core  credential  CrowdStrike  cryotgraphic  crytographic  CSP  currency  custom  cycle  cylance  DAM  deb  Debian  debug  debugger  debugging  defender  defense  Delicious  design  detection  device  DeviceGuard  devices  devil  disable  disabling  disk  DLL  DLP  DMA  DNS  domain  door  download  downloader  drive  driver  DRM  Edge  EDR  eEye  electric  electronic  electronics  elevated  email  encryption  energy  engine  engineering  escalation  escape  ESXi  EU  europe  exception  executable  exploit  extension  extensions  external  extraction  fake  fan  file  filess  filter  filtering  fingerprint  firefox  firewall  firewire  flash  format  freedom  freeware  fusion  gas  gateway  GE  geared  generator  genetic  gif  GIFC  gigabit  Glype  gmail  gmail-lite  gmail-mobile  GMO  google  GP  Gpdisable  GPO  graphic  green  group  guard  guide  gummy  hack  hacking  hacks  hardware  header  high  hijack  hijacking  hole  hollowing  hook  host  hosting  hotspot  howto  HP  HTA  HTS  http  https  humor  HVCI  hybrid  Hydra  HyperMach  hypersonic  ICMP  ID  image  incomplete  information  inlet  inline  install  installutil  integrity  internet  IP  iPhone  iSCSI  ISP  JAP  japan  java  javascript  JAXA  JDownloader  jet  JonDo  JonDonym  journal  JPEG  kernel  key  keylogger  kiosk  KON-BOOT  language  last  lifehacks  lift  limit  limited  line  link  linux  list  liveCD  lock  lockpicking  logging  login  mac  machine  macro  magnetic  maldoc  malicious  malware  mapped  McAfee  megaupload  metasploit  meterpreter  method  methods  MHD  military  mimikatz  mitigation  MitM  mix  mobile  money  monitoring  motor  mozilla  MSI  MSIexec  MSpaint  multi  multistage  name  nested  network  networking  Nginx  NIC  node  node.js  nstx  NTFS  Nvidia  obfuscation  object  OCR  onion  open  opensource  operation  orca  OS  OSX  outbound  overflow  p2p  paper  passthrough  password  paste  PatchGuard  paywall  PDF  penetration  pentest  pentesting  performance  permission  Perspectives  phishing  phone  photo  photoshop  photosynthesis  php  phpproxy  PHProxy  Phweet  picture  ping  pivacy  plasma  play  plugin  policy  polygot  powerplant  powershell  privacy  private  priviledge  privledge  process  program  proof-of-concept  propulsion  protection  protocol  proxy  psiphon  ptunnel  punching  python  Quora  rapid  rapidshare  ratio  recognition  recuperator  redhat  redteam  reference  region  regional  registration  registry  regsvr32  relay  release  remote  repository  research  reservation  restriction  rice  RIM  ring  ROM  root  rotor  router  routing  RPM  RS5  S-MAGJET  safety  SCMS-T  script  SCSI  security  self  selfdestruct  server  service  services  settings  setup  shaftless  sharing  shell  shield  sideload  signature  signed  signin  Silicom  simultaneous  SIP  site  SMB  social  software  SonicBlue  Sonicstar  space  spam  speed  SRP  SSBJ  ssh  ssl  SSL3  stack  stage  storage  store  strips  superconducting  superconductor  supersonic  sysadmin  sysinternals  system  tab  tap  target  TCP  tcpoverudp  techniques  technology  telex  testing  ThePirateBay  thin  ThinPro  timestamp  tip  tips  TLS  TLS1.0  token  tools  tor  toshiba  TPM  transparency  transportation  trick  tricks  trusted  tunnel  tunneler  tunneling  turbine  turbofan  turbojet  tutorial  tweak  twitter  UAC  UDP  ultrafan  UltraSurf  Ultrasurf  uncertified  unknown  upload  URL  user  utilites  utilities  variable  VBA  vehicle  verification  virtual  VMware  VoIP  VPN  vSAN  VTOL  vtunnel  WAP  warning  WDAG  web  webdev  whack-a-mole  whitelist  whitelisting  wif  wifi  windows  winlockpwn  wireless  workstation  write  WUDSS  XP  xterm 

Copy this bookmark:



description:


tags: