@fanta
Pues ojalá, aunque yo apostaría más por una versión de Alex de la Iglesia.
Por cierto has visto Dagon? Con el grandísimo Francisco Rabal y Macarena Gomez. (Basado en el relato de de H. P. Lovecraft de La sombra sobre Innsmouth)
@fanta
Pues ojalá, aunque yo apostaría más por una versión de Alex de la Iglesia.
Por cierto has visto Dagon? Con el grandísimo Francisco Rabal y Macarena Gomez. (Basado en el relato de de H. P. Lovecraft de La sombra sobre Innsmouth)
@aral I agree, I had the same thought, first of all an eval function is super suspicious; "eval is evil", on the other hand what the earth is the const s doing there. And in the name of love what is the reviewer thinking about when someone does a PR with this kind of "functionality". I will check but I think that a simple SAST is going to complain about this PR.
On a second thought maybe the snippet provided by the security researchers is just a non realistic example to illustrate the concept.
Just published: flipper0badusb_test
Test on Linux your Flipper Zero BadUSB Scripts without loading the payload onto the Flipper device.
After experimenting for a while and writing some BadUSB Ducky scripts on Flipper Zero, I felt a bit overwhelmed by the workflow every time I wanted to test a change in the script. I've been searching and testing some other solutions but I found lot of issues related with Linux graphical environment permissions and I decided to write something simple to test and write my FlipperZero's DuckyScripts.
Test your Flipper Zero BadUSB Scripts without uploading payload into device - carvilsi/flipper0-badUSB-linux-tester
GitHub (github.com)