-
# Trap Ideas!
## Why
- To annoy the living hell out of BRC players.
- Make the BRC AP world fun/interesting.
- "Bees".
## How does it trigger/work?
- When someone in the AP instance pulls the …
-
HaxBall is a closed source project. Reverse engineering and distributing modified versions of HaxBall is not allowed. Doing so is not only illegal under copyright law but also, in my opinion, unethica…
basro updated
3 months ago
-
One of the issues with Python testing, is that it's easy for students to read directories and figure out what files to potentially read. Although one could argue that a student who has figured this o…
-
I found very few details on how the authorization part of the protocol works, so I decided to investigate.
I read the ADE Engineering docs, but they were vague.
So I installed MITMProxy to begin exa…
-
At the moment I've only tested the two values I've seen used in the MS Dashboard and Tenchu: Return from Darkness. It'd be good to further test values as 0xFFFF0000/0xFFFF0001 would appear to imply th…
-
I have looked through the entire code and cannot find out how to set the table's overall width, not the column width. It limits the table based off the margins, but I am needing it to extend past the …
-
*Created by: chenz*
The knowledge how the device database came to be seem to be lost in the ether. It was clearly extracted from the Windows software somehow.
I have [here](https://github.com/chen…
-
It has come to my attention that the REST API authentication token is actually base64 encoded data.
When a token expires, Pandora sends the following message back, implying that the token stores some…
-
### Expected Behavior
I ran the Reverse engineering tool for oracle database v12.1.0.2.0. The tool created a script that has editionable synonym. I created two schemas the onboarding and the depende…
-
Денис, здравствуйте! Меня зовут Денис. Перед тем как задам вопрос, хотелось бы в нескольких приложениях рассказать о себе.
В теме IT около 14 лет; последнее время фанатею (или наверное уже на гране о…