-
### Prerequisites
* [X] Put an X between the brackets on this line if you have done all of the following:
* Reproduced the problem in Safe Mode:
* Followed all applicable steps in the de…
-
### Prerequisites
* [x] Put an X between the brackets on this line if you have done all of the following:
* Reproduced the problem in Safe Mode: http://flight-manual.atom.io/hacking-atom/secti…
-
Pretty much exactly what is says in the title. I figured it should be on the issue tracker as an enhancement so it'll be a bit more obvious if/when it's fixed :-)
-
# Hacker Tools (Updated 2019) Sn1per, Wireshark, Metasploit, Hydra..
##### UPDATED FOR 2019
HACKER TOOLS TOP TEN
--------------------
Since 2014 we’ve listed the web’s…
-
Mega says:
> This link is unavailable as the user's account has been closed for gross violation of MEGA's Terms of Service
And the "Terms of Service" part is a link to, I'm assuming, the terms o…
-
## Form to fill out
Do we want this internal to org, customer or pair with fellows?
How many hours? 2-4
How many participants? _We typically recommend 1 maintainer to 5 participants_
What are p…
-
We would like an easy way of persisting AWS `SECRET_ACCESS_KEY` / `ACCESS_KEY_ID` / `REGION` information in Metasploit's database. We would need similar mechanism for GCP/Azure.
This would integrat…
-
[Enter steps to reproduce:]
1. ...
2. ...
**Atom**: 1.57.0 x64
**Electron**: 9.4.4
**OS**: macOS 11.3.1
**Thrown From**: [auto-close-html2](https://github.com/yubaoquan/auto-close-html2) pac…
-
### Prerequisites
* [x] Put an X between the brackets on this line if you have done all of the following:
* Reproduced the problem in Safe Mode:
* Followed all applicable steps in th…
-
### Prerequisites
* [ ] Put an X between the brackets on this line if you have done all of the following:
* Reproduced the problem in Safe Mode: http://flight-manual.atom.io/hacking-atom/secti…