Skip to content

Instantly share code, notes, and snippets.

@choco-bot
choco-bot / 1.RegistrySnapshot.xml
Created December 16, 2025 09:43
trackchecker v1.0.13.455 - Passed - Package Tests Results
<?xml version="1.0" encoding="utf-8"?>
<registrySnapshot xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<user>S-1-5-21-2764370232-1897661950-3179576210-1000</user>
<keys>
<key installerType="InnoSetup" displayName="TrackChecker version 1.0.13.455" displayVersion="1.0.13.455">
<RegistryView>Registry32</RegistryView>
<KeyPath>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{73C4CE23-8D4C-4B67-B1DC-30533208DC3F}_is1</KeyPath>
<DefaultValue />
<InstallLocation><![CDATA[C:\Program Files (x86)\TrackChecker\]]></InstallLocation>
<UninstallString><![CDATA["C:\Program Files (x86)\TrackChecker\unins000.exe" /SILENT]]></UninstallString>
@Darkcrai86
Darkcrai86 / 16-12-25-wordpress-leaky-paywall-plugin-vulnerability-broke.md
Created December 16, 2025 09:43
Analisi della vulnerabilità: WordPress Leaky Paywall plugin <= 4.22.5 - Broken Access Control vulnerabilit...

WordPress Leaky Paywall Plugin Vulnerability: Broken Access Control Exploit in Versions <= 4.22.5

Autore: Redazione Cyber Monitor
Ultimo aggiornamento: 16 December 2025
Categoria: Threat Monitor – Exploited Vulnerabilities
TLP: GREEN

Introduzione

La recente scoperta di una vulnerabilità critica nel plugin Leaky Paywall di WordPress, fino alla versione 4.22.5, ha messo in allerta la comunità della cybersecurity. Questa falla di sicurezza permette a malintenzionati di aggirare i controlli di accesso, accedendo a contenuti riservati senza necessità di autenticazione. La rilevanza di questa minaccia è amplificata dall'ampio utilizzo di WordPress come piattaforma di gestione dei contenuti.

@bguiz
bguiz / nano-banana-open-router-generate-image.js
Created December 16, 2025 09:42
Generate images using Nano Banana using an OpenRouter API key.
#!/usr/bin/env node
import fs from 'node:fs/promises';
// extract inputs
const OPENROUTER_API_KEY = process.env.OPENROUTER_API_KEY;
const IMAGE_NAME = process.env.IMAGE_NAME;
const AI_MODEL = process.env.AI_MODEL || 'google/gemini-3-pro-image-preview';
const ASPECT_RATIO = process.env.ASPECT_RATIO || '1:1';
const IMAGE_SIZE = process.env.IMAGE_SIZE || '1K';
@Darkcrai86
Darkcrai86 / 16-12-25-markdown.md
Created December 16, 2025 09:42
Analisi della vulnerabilità: WordPress Essential Real Estate plugin <= 5.2.2 - Broken Access Control vulne...
# Vulnerabilità di Accesso Non Autorizzato nel Plugin Essential Real Estate per WordPress
**Autore:** Redazione Cyber Monitor  
**Ultimo aggiornamento:** 16 December 2025  
**Categoria:** Threat Monitor – Exploited Vulnerabilities  
**TLP:** GREEN  

### Introduzione
La sicurezza dei siti web basati su WordPress è una preoccupazione crescente, data la popolarità della piattaforma. Recentemente, è stata identificata una vulnerabilità di accesso non autorizzato nel plugin Essential Real Estate, che potrebbe compromettere la riservatezza e l'integrità dei dati degli utenti. Questa scoperta sottolinea l'importanza di una gestione rigorosa della sicurezza per i plugin di WordPress.
@Crivella
Crivella / easybuild_test_report_20262_easybuilders_preasybuild-easyconfigs_20254216-UTC-09-42-02.md
Created December 16, 2025 09:42
EasyBuild test report for easybuilders/easybuild-easyconfigs PR(s) #20262

Test report for PR(s) easybuilders/easybuild-easyconfigs#20262

Test result

Build succeeded for 1 out of 1 (total: 24 mins 52 secs) (1 easyconfigs in total)

Overview of tested easyconfigs (in order)

  • SUCCESS SciPy-bundle-2023.12-iimkl-2023b.eb

Time info

@HugsLibRecordKeeper
HugsLibRecordKeeper / output_log.txt
Created December 16, 2025 09:41
Rimworld output log published using HugsLib
Log uploaded on Tuesday, December 16, 2025, 5:43:07 PM
Loaded mods:
Harmony(brrainz.harmony)[mv:2.4.2.0]: 0Harmony(2.4.1), HarmonyMod(2.4.2)
Core(Ludeon.RimWorld): (no assemblies)
Royalty(Ludeon.RimWorld.Royalty): (no assemblies)
Ideology(Ludeon.RimWorld.Ideology): (no assemblies)
Biotech(Ludeon.RimWorld.Biotech): (no assemblies)
Anomaly(Ludeon.RimWorld.Anomaly): (no assemblies)
Odyssey(Ludeon.RimWorld.Odyssey): (no assemblies)
HugsLib(UnlimitedHugs.HugsLib)[ov:12.0.0]: 0Harmony(av:2.4.1,fv:1.2.0.1), HugsLib(av:1.0.0,fv:12.0.0)
@groupdocs-cloud-kb
groupdocs-cloud-kb / convert-jpg-to-docx-using-nodejs-rest-api.js
Created December 16, 2025 09:41
Convert JPG to DOCX using Node.js REST API
// Step 1: Import the GroupDocs.Conversion.Cloud module
const conversion_cloud = require("groupdocs-conversion-cloud");
// Step 2: Define your API credentials
const MyAppID = "your-app-id";
const MyAppSecret = "your-app-secret";
// Step 3: Initialize the ConvertApi with API credentials
const convertApi = conversion_cloud.ConvertApi.fromKeys(MyAppID, MyAppSecret);
@HugsLibRecordKeeper
HugsLibRecordKeeper / output_log.txt
Created December 16, 2025 09:41
Rimworld output log published using HugsLib
Log uploaded on Tuesday, December 16, 2025, 5:43:03 PM
Loaded mods:
Harmony(brrainz.harmony)[mv:2.4.2.0]: 0Harmony(2.4.1), HarmonyMod(2.4.2)
Core(Ludeon.RimWorld): (no assemblies)
Royalty(Ludeon.RimWorld.Royalty): (no assemblies)
Ideology(Ludeon.RimWorld.Ideology): (no assemblies)
Biotech(Ludeon.RimWorld.Biotech): (no assemblies)
Anomaly(Ludeon.RimWorld.Anomaly): (no assemblies)
Odyssey(Ludeon.RimWorld.Odyssey): (no assemblies)
HugsLib(UnlimitedHugs.HugsLib)[ov:12.0.0]: 0Harmony(av:2.4.1,fv:1.2.0.1), HugsLib(av:1.0.0,fv:12.0.0)
@Aziz87
Aziz87 / w33.md
Last active December 16, 2025 09:46

Технический Intro проекта W33

Общее описание

W33 — система криптовалютного эквайринга, состоящая из двух основных компонентов:

  • Backend (w33-server): NestJS REST API для обработки криптовалютных транзакций
  • Frontend (w33-client): Vue 3 веб-приложение для управления проектами и кошельками

Архитектура Backend (w33-server)

@yannbf
yannbf / cloudSettings
Created December 16, 2025 09:41
Visual Studio Code Settings Sync Gist
// Empty