About:

Trickster Dev explores web scraping, automation, and growth hacking, drawing from diverse tech communities for a subversive take on wealth and freedom.

Website:

Specializations:

Interests:

Web Scraping Automation Growth Hacking Bounty Hunting OSINT Software Development Cybersecurity Internet Marketing Hacktivism Cypherpunk Movement
Subscribe to RSS:
The text discusses the importance of JSON in modern RESTful APIs and automation tools, and introduces jq as a CLI tool and domain-specific language for JSON processing. It explains the syntax and features of jq, and provides examp...
Katana is a CLI tool and Go library for automatically traversing across all pages of given website(s) to map them out. It can work in two main modes - requests-based and through browser automation. It can do passive crawling by le...
The article explores lesser known parts of the Python standard library, including the collection module, context managers, decimal module, fractions module, dis module, statistics module, webbrowser module, and zipapp module. It a...
The text discusses the problem of sensitive data exposure and provides examples of how to find exposed sensitive information using search engine dorking, Github, PublicWWW, and other methods. It also highlights real examples of se...
The text explains the SOCKS protocol, a widely used protocol for proxy servers. It describes the two major versions of the protocol, the structure of the wire format, and the process of establishing a connection to the remote via ...
The text discusses the process of scraping Clutch.co for B2B company data, despite the site's anti-scraping measures. It provides detailed code snippets and explanations for how to bypass the anti-bot measures and scrape the data ...

0SSH tips and tricks

2024-02-04

The text provides tips and tricks for using SSH, including escape sequences, running single commands, setting up 2FA, tunneling, using SSH as a local SOCKS proxy, setting up an SSH server behind NAT via Tor Onion Service, and moun...
The text discusses the process of scraping historical data from Internet Archive snapshots for data science purposes. It provides a step-by-step guide on how to gather historical data from the Iowa Department of Corrections inmate...
The text discusses various obscure features of a standard macOS installation, including Apache httpd, text-to-speech capabilities, GNU screen, Grapher, Digital Colour Meter, Font Book, and other technical details from BSD systems....
The text discusses scraping data from Google Places API for lead generation, real estate OSINT, and academic research. It provides examples of how to scrape the data with Python and explains the limitations of the Place Search fun...
The text discusses the use of Elasticsearch API for web scraping, specifically focusing on the website of Carnegie Museum of Art. It explains the process of using the API to gather data and provides code examples for scraping. The...
The text is a guide on setting up mitmproxy with iOS 17.1. It explains the process of installing mitmproxy and setting it up with iOS 17.1. It also provides detailed instructions on how to configure the proxy on the iPhone side an...
Beautiful Soup is a Python module for parsing HTML and XML documents. It is used in web scraper development and provides flexibility in choosing the underlying parser. The text provides examples of using Beautiful Soup for web scr...
The text discusses solving client-side JavaScript challenges using sandboxing, which creates an isolated environment to run the challenge code. It provides an example of a JS challenge code and demonstrates how to sandbox it. The ...
The text discusses the process of scraping data from the GOAT mobile API, including the challenges posed by anti-automation security measures and the use of proxies to bypass them. It also provides code snippets for implementing t...
The text is about web scraping company data from Yelp using Scrapy. It provides a step-by-step guide on how to extract data from Yelp web pages, including planning, strategy work, and running XPath queries. It also discusses the u...
The text discusses the resurgence of CLI and TUI software due to the bloated nature of GUI apps. It highlights modern software meant to be used via the terminal, such as Carbonyl, ag, ripgrep, bottom, btop, glances, Terminal Image...
Restringer is a modular Javascript deobfuscation tool developed by PerimeterX for malware analysis purposes. It uses a library called flAST to parse the code into flattened form of AST, modify it and regenerate the code. The tool ...
The text discusses the use of Scrapy-playwright, a Scrapy plugin that connects Scrapy with MS Playwright browser automation software. It explains the steps required to enable Scrapy-playwright in a Scrapy project and provides a si...
The text discusses self-defending JavaScript code and debugger traps to hinder code modifications and dynamic analysis. It explores obfuscation techniques and debugger traps, and how they can be used to hinder adversaries from dis...
The text discusses the importance of backlinks to search engine ranking and how to scrape backlinks from a SEO tool. It provides a detailed example of abusing a free Ahrefs Backlink Checker and the technical details of the process...