Github hacks

Github hacks DEFAULT

Hacks are up, but many are broken.

Website • Discord • Installation • Youtube

Chrome Web Store RatingExtension DownloadsExtension DownloadsWebsite StatusIssues

How to install

1.) Install the extension (also known as PHEx) from the Chrome Web Store.
2.) Visit
3.) Make a second account and log in. DO NOT USE HACKS ON YOUR PRIMARY ACCOUNT. Hacks can damage your account if used improperly or excessively, and most hacks can't be undone.
4.) A dropdown arrow will appear after 15-20 seconds.

For a visual tutorial, see our YouTube tutorial:



Current Collaborators

Retired Collaborators

Important Folders

  • ProdigyMathGameHacking
    • Our main repo, used as an issue tracker, things we're working on, documentation, and central hub. You're currently on it.
  • PHEx
    • The Prodigy Hacking Extension, used to inject our modified gamefiles into Prodigy.

---- ***All hacks and software are licensed under the Mozilla Public License (MPL) V2.0, unless stated otherwise with a separate license. Any violation of the policy of this licence may result in a DMCA takedown.***

Hackingtool Menu 🧰

After Following All Steps Just Type In Terminal [email protected]:~hackingtool

Thanks to original Author of the tools used in hackingtool

Please Don't Use for illegal Activity

To do

Social Media


Your Favourite Tool is not in hackingtool or Suggestions Please CLICK HERE

Z4nzu's github stats

Buy Me A Coffee

Don't Forgot to share with Your Friends

The new Update get will soon stay updated

Thank you..!!

  1. Lingo jam
  2. Southwest snipers
  3. Letter n stencil printable
  4. 1998 ford ranger battery walmart

Awesome Hacking -An Amazing Project Awesome

A curated list of awesome Hacking. Inspired by awesome-machine-learning

If you want to contribute to this list (please do), send me a pull request or contact me @carpedm20

For a list of free hacking books available for download, go here

Table of Contents



  • Metasploit A computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.
  • mimikatz - A little tool to play with Windows security
  • Hackers tools - Tutorial on tools.

Docker Images for Penetration Testing & Security




Disassemblers and debuggers

  • IDA - IDA is a Windows, Linux or Mac OS X hosted multi-processor disassembler and debugger
  • OllyDbg - A 32-bit assembler level analysing debugger for Windows
  • x64dbg - An open-source x64/x32 debugger for Windows
  • radare2 - A portable reversing framework
  • plasma - Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code.
  • ScratchABit - Easily retargetable and hackable interactive disassembler with IDAPython-compatible plugin API
  • Capstone
  • Ghidra - A software reverse engineering (SRE) suite of tools developed by NSA's Research Directorate in support of the Cybersecurity mission


  • JVM-based languages

  • Krakatau - the best decompiler I have used. Is able to decompile apps written in Scala and Kotlin into Java code. JD-GUI and Luyten have failed to do it fully.

  • JD-GUI

  • procyon

    • Luyten - one of the best, though a bit slow, hangs on some binaries and not very well maintained.
  • JAD - JAD Java Decompiler (closed-source, unmaintained)

  • JADX - a decompiler for Android apps. Not related to JAD.

  • .net-based languages

    • dotPeek - a free-of-charge .NET decompiler from JetBrains
    • ILSpy - an open-source .NET assembly browser and decompiler
    • dnSpy - .NET assembly editor, decompiler, and debugger
  • native code

  • Python

    • uncompyle6 - decompiler for the over 20 releases and 20 years of CPython.


  • de4dot - .NET deobfuscator and unpacker.
  • JS Beautifier
  • JS Nice - a web service guessing JS variables names and types based on the model derived from open source.


  • nudge4j - Java tool to let the browser talk to the JVM
  • dex2jar - Tools to work with Android .dex and Java .class files
  • androguard - Reverse engineering, malware and goodware analysis of Android applications
  • antinet - .NET anti-managed debugger and anti-profiler code
  • UPX - the Ultimate Packer (and unpacker) for eXecutables

Execution logging and tracing

  • Wireshark - A free and open-source packet analyzer
  • tcpdump - A powerful command-line packet analyzer; and libpcap, a portable C/C++ library for network traffic capture
  • mitmproxy - An interactive, SSL-capable man-in-the-middle proxy for HTTP with a console interface
  • Charles Proxy - A cross-platform GUI web debugging proxy to view intercepted HTTP and HTTPS/SSL live traffic
  • usbmon - USB capture for Linux.
  • USBPcap - USB capture for Windows.
  • dynStruct - structures recovery via dynamic instrumentation.
  • drltrace - shared library calls tracing.

Binary files examination and editing

Hex editors

  • HxD - A hex editor which, additionally to raw disk editing and modifying of main memory (RAM), handles files of any size
  • WinHex - A hexadecimal editor, helpful in the realm of computer forensics, data recovery, low-level data processing, and IT security
  • wxHexEditor
  • Synalize It/Hexinator -


  • Binwalk - Detects signatures, unpacks archives, visualizes entropy.
  • Veles - a visualizer for statistical properties of blobs.
  • Kaitai Struct - a DSL for creating parsers in a variety of programming languages. The Web IDE is particularly useful for reverse-engineering.
  • Protobuf inspector
  • DarunGrim - executable differ.
  • DBeaver - a DB editor.
  • Dependencies - a FOSS replacement to Dependency Walker.
  • PEview - A quick and easy way to view the structure and content of 32-bit Portable Executable (PE) and Component Object File Format (COFF) files
  • BinText - A small, very fast and powerful text extractor that will be of particular interest to programmers.



  • Spyse - Data gathering service that collects web info using OSINT. Provided info: IPv4 hosts, domains/whois, ports/banners/protocols, technologies, OS, AS, maintains huge SSL/TLS DB, and more... All the data is stored in its own database allowing get the data without scanning.
  • sqlmap - Automatic SQL injection and database takeover tool
  • NoSQLMap - Automated NoSQL database enumeration and web application exploitation tool.
  • - base64 base85 md4,5 hash, sha1 hash encoding/decoding
  • VHostScan - A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages.
  • SubFinder - SubFinder is a subdomain discovery tool that discovers valid subdomains for any target using passive online sources.
  • Findsubdomains - A subdomains discovery tool that collects all possible subdomains from open source internet and validates them through various tools to provide accurate results.
  • badtouch - Scriptable network authentication cracker
  • PhpSploit - Full-featured C2 framework which silently persists on webserver via evil PHP oneliner
  • Git-Scanner - A tool for bug hunting or pentesting for targeting websites that have open repositories available in public
  • CSP Scanner - Analyze a site's Content-Security-Policy (CSP) to find bypasses and missing directives.


  • Strong node.js - An exhaustive checklist to assist in the source code security analysis of a node.js web service.


  • NetworkMiner - A Network Forensic Analysis Tool (NFAT)
  • Paros - A Java-based HTTP/HTTPS proxy for assessing web application vulnerability
  • pig - A Linux packet crafting tool
  • findsubdomains - really fast subdomains scanning service that has much greater opportunities than simple subs finder(works using OSINT).
  • cirt-fuzzer - A simple TCP/UDP protocol fuzzer.
  • ASlookup - a useful tool for exploring autonomous systems and all related info (CIDR, ASN, Org...)
  • ZAP - The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications
  • mitmsocks4j - Man-in-the-middle SOCKS Proxy for Java
  • ssh-mitm - An SSH/SFTP man-in-the-middle tool that logs interactive sessions and passwords.
  • nmap - Nmap (Network Mapper) is a security scanner
  • Aircrack-ng - An 802.11 WEP and WPA-PSK keys cracking program
  • Nipe - A script to make Tor Network your default gateway.
  • Habu - Python Network Hacking Toolkit
  • Wifi Jammer - Free program to jam all wifi clients in range
  • Firesheep - Free program for HTTP session hijacking attacks.
  • Scapy - A Python tool and library for low level packet creation and manipulation
  • Amass - In-depth subdomain enumeration tool that performs scraping, recursive brute forcing, crawling of web archives, name altering and reverse DNS sweeping
  • sniffglue - Secure multithreaded packet sniffer
  • Netz - Discover internet-wide misconfigurations, using zgrab2 and others.
  • RustScan - Extremely fast port scanner built with Rust, designed to scan all ports in a couple of seconds and utilizes nmap to perform port enumeration in a fraction of the time.



  • xortool - A tool to analyze multi-byte XOR cipher
  • John the Ripper - A fast password cracker
  • Aircrack - Aircrack is 802.11 WEP and WPA-PSK keys cracking program.
  • Ciphey - Automated decryption tool using artificial intelligence & natural language processing.


Reverse Engineering

  • - This site tests your ability to Cracking & Reverse Code Engineering
  • CodeEngn - (Korean)
  • - (Korean)
  • - The world first and largest community website for crackmes and reversemes.


  • Hack This Site! - a free, safe and legal training ground for hackers to test and expand their hacking skills
  • Hack The Box - a free site to perform pentesting in a variety of different systems.
  • - a website without logins or ads where you can solve password-riddles (so called hackits).
  • - Website by an Austrian group. Lots of challenges taken from CTFs they participated in.
  • Gruyere
  • Others


Bug bounty

Bug bounty - Earn Some Money



Online resources


  • empire - A post exploitation framework for powershell and python.
  • silenttrinity - A post exploitation tool that uses iron python to get past powershell restrictions.
  • PowerSploit - A PowerShell post exploitation framework
  • ebowla - Framework for Making Environmental Keyed Payloads
  • SecTools - Top 125 Network Security Tools
  • Roppers Security Fundamentals - Free course that teaches a beginner how security works in the real world. Learn security theory and execute defensive measures so that you are better prepared against threats online and in the physical world. Full text available as a gitbook.
Hack Github Contribution Graph in 20 seconds 😎

GitHub denies getting hacked

GitHub hack

GitHub has denied rumors today of getting hacked after a mysterious entity shared what they claimed to be the source code of the and GitHub Enterprise portals.

The "supposed" source code was leaked via a commit to GitHub's DMCA section.

The commit was also faked to look like it originated from GitHub CEO Nat Friedman.

But in a message posted on YCombinator's Hacker News portal, Friedman denied that it was him and that GitHub got hacked in any way.

Friedman said the "leaked source code" didn't cover all of GitHub's code but only the GitHub Enterprise Server product. This is a version of GitHub Enterprise that companies can run on their own on-premise servers in case they need to store source code locally for security reasons but still want to benefit from GitHub Enterprise features.

Friedman said this source code had already leaked months before due to its own error when GitHub engineers accidentally "shipped an un-stripped/obfuscated tarball of our GitHub Enterprise Server source code to some customers."


Friedman promised that GitHub was going to fix the two bugs exploited by the leaker and prevent unauthorized parties from attaching their code to other people's projects via faked identities.

"In summary: everything is fine, situation normal, the lark is on the wing, the snail is on the thorn, and all's right with the world," Friedman said.

Not the first time

But this is not the first time that this happened on GitHub.

One of the two bugs was used just days earlier when a security researcher attached the source code of the youtube-dl library to GitHub's DMCA section.

The security researcher's gesture came as a form of protest after GitHub decided to honor a suspicious DMCA takedown request against the youtube-dl library from music recording industry group RIAA.


While the mystery leaker never explained their actions, it is believed that the person who leak the GitHub Enterprise Server code was also protesting against GitHub's decision to honor RIAA's DMCA request and take down youtube-dl, a project that lets users download raw audio and video files from YouTube and other services — which RIAA argued was heavily used to pirate its songs catalog.

For the past week, hundreds of other users have been re-uploading the youtube-dl code on their own accounts and daring RIAA to send them a DMCA request too. GitHub has warned users not to do so, as they risk getting banned by its automated systems.

Related Topics:

Microsoft Security TV Data Management CXO Data Centers Sours:

Hacks github

Cyber Security Resources

This repository includes thousands of cybersecurity-related references and resources and it is maintained by Omar Santos. This GitHub repository has been created to provide supplemental material to several books, video courses, and live training created by Omar Santos and other co-authors. It provides over 9,000 references, scripts, tools, code, and other resources that help offensive and defensive security professionals learn and develop new skills. This GitHub repository provides guidance on how build your own hacking environment, learn about offensive security (ethical hacking) techniques, vulnerability research, exploit development, reverse engineering, malware analysis, threat intelligence, threat hunting, digital forensics and incident response (DFIR), includes examples of real-life penetration testing reports, and more.

The Art of Hacking Series

The Art of Hacking Series is a series of video courses and live training that help you get up and running with your cybersecurity career. The following are the different video courses that are part of the Art of Hacking series:

These courses serve as comprehensive guide for any network and security professional who is starting a career in ethical hacking and penetration testing. It also can help individuals preparing for the Offensive Security Certified Professional (OSCP), the Certified Ethical Hacker (CEH), CompTIA PenTest+ and any other ethical hacking certification. This course helps any cyber security professional that want to learn the skills required to becoming a professional ethical hacker or that want to learn more about general hacking methodologies and concepts.

These video courses are published by Pearson, but this GitHub repository is maintained and supported by the lead author of the series Omar Santos.

Live Training

Other Live Training and Video Courses:

5 Github Hacks that you should know - for Coders

Have you ever been asked what GitHub really is? I’d say it is like Wikipedia and Facebook for programmers. Combined. You can access, view and even edit files. Companies mainly use it to build software and web applications, whereas individuals use it to browse, find and share projects.

Many developers breathe GitHub. And that’s great. It’s the software that helps us (developers) to build great software.

Today I’m presenting you our GitHub tutorial. Here are 10 helpful GitHub hacks you probably don’t know.

GitHub Tutorial

Basically, GitHub projects can be made public and every publicly shared code is freely readable. You can have private projects as well, however, they require a paid GitHub plan. Public repositories on GitHub are often used to share open source software.

I’m not digging into the basic of GitHub here. For further basic read, I’d recommend to check out this New Yorker article and these quorathreads here.

Clone like hell and learn

As mentioned GitHub offers a never-ending amount of free, open-source projects and code snippets. This basically means that you can use all that code for free.

Through cloning interesting projects, you can freely download the code to your local hard drive. Why? Because you may want to learn about coding styles and practices through looking at other people’s code. Especially when getting started in web development I’d recommend to check out other people’s code.

Who to follow on GitHub?

That brings me to the next tip which probably isn’t really a tip. GitHub is the largest community of developers in the world. This makes it really hard to decide on which one to follow and which one not. Here are a couple of ideas on how to find great/interesting people on GitHub:

Github Tutorial Search people

GitHub tutorial search stars

Also make sure to check out this quora thread with interesting people to follow on GitHub.

Keyboard shortcuts

We are using keyboard shortcuts for all different applications and use cases. So why not on as well? Press “?” on any GitHub page and get a list of shortcuts which can be applied to this particular page:

GitHub Tutorial Keyboard Shortcuts overview

I especially found the following GitHub shortcuts quite useful:

  • Press “s” for focusing on the search bar
  • Press “gc” for switching to your code
  • Press “gd” for switching to your dashboard
  • “gi” for going to your issues

Commit early and often

Ever heard of the release early, release often paradigm of software engineering? Commits are updates to a project which refers to changes in one or more files. Every completed task should therefore result in a commit on GitHub (even before testing which is an own task itself).

Every completed task should therefore result in a commit on GitHub (even before testing which is an own task itself).

Comment your commits

While working on a project with a couple of colleagues or friends you can easily make a mess by not commenting your commits. Make sure to comment every commit in order to keep your version control clean and easy-to-follow.

Especially if you’re working on public projects, which might be cloned by someone else, comments are key to get an overview.

Filter commits

The more people work on a project, the more complex it gets. Make use of the following filters to find certain commits easier:

  • Filter commits by certain authors by adding “?author=githubhandle” to the URL in the commit view.

How to search authors github tutorial

Compare view

You can also create a compare view for your repository by adding the “compare” to your URL:

github tutorial

You can – for example compare two branches – and also take time into consideration (if you’d like to compare the current state of the branch with the same one 7 days ago.

Trace changes in a file with Git blame

I’m not sure why they named this awesome feature “blame”. But despite it’s name, git blame is pretty cool. It’s an super easy way to display changes of any file. Simply click on the blame button in the code view in order to get an overview on all changes which have been made.

GitHub Tutorial Blame view

Send line links

Did you know that you share links to a certain code line (or multiple lines)? Simply select the line in the code view and you’ll see how the URL will change. You can even select multiple lines by pressing “SHIFT”.

send github links - github tutorial

Use GitHub for more than coding

Version control is great not only for coding, but also for other tasks too. Whether you’re working on some website project or just hosting some documentation. GitHub does a great job and makes life easier – for developers, designers and project managers.

  • Keep track of your design process
  • Keep track of your content history on any project

We’ve recently launched and used GitHub in combination with other great services like Codeship and DIVSHOT. Check out what we’ve learned from that.

Tracking issues

GitHub Issues is a great way for managing your tasks, issues and bugs on any project. GitHub Issues is a great bug tracker – especially if you’re already using GitHub for your very own projects. The awesome thing about GitHub Issues is that you can collaborate with colleagues and friends on your reported bugs in order to get them fixed.

A bug report in GitHub Issues basically consists of a title, description, milestone and assignee (who’s responsible for fixing the bug).

GitHub Issues Tutorial

Also make sure to check out this guide on how to use GitHub Issues.

Get more out of GitHub Issues with Usersnap

Another great thing about GitHub is it’s integration possibilities with other awesome services. I therefore recommend to take a look at and check out the available integration possibilities with tools (you might be already using).

By connecting Usersnap with GitHub Issues you can make your bug reporting and testing efforts much more pleasant. Screenshots created by your colleagues, testers, website visitors or clients are automatically (or manually if you want) sent to your GitHub Issues.

Github issues tutorial with usersnap


GitHub is not only the largest developer community available, but also a super-powerful tool for bringing your programming skills on the next level.

I hope you enjoyed our first GitHub tutorial. What are your favourite GitHub hacks? Any additional tips for being more productive?

PS: We’ve updated and published the presentation with these helpful GitHub tricks on Slideshare. You can view & download the presentation.

If you found this post interesting, follow us on twitter where we tweet about web development, web design and startups.

This article was brought to you by Usersnap – a visual bug tracking and screenshot tool for every web project.


Now discussing:

This is the second in a series of posts featuring protips from GitHubbers. This post highlights some great browser extensions, URL hacks, keyboard shortcuts, plus a few dad jokes.

I’ve been using GitHub as an engineering, business development, and marketing manager for over 10 years now—quite the career trajectory! Along the way, I’ve picked up a few tricks to manage my notifications, quickly locate content and create pull requests, push markdown to its limits, and personalize my experience with some third party extensions. I’m sharing a few of my favorites, and hopefully there’s something new and helpful for you.

1. Fuzzy file finder 🔎

I think I was working at GitHub for over a year before I discovered that we had a fuzzy file finder. Press in any repository to access it and start typing the name of the file you want to find. I used to find it invaluable jumping into new Rails projects and quickly looking for to get a feel for the app.

2. Browse files and directories with ease

Speaking of searching for files, this great browser extension called Octotree helps you navigate directories, and open files with a familiar tree-like structure.

Bonus points: It works with GitHub Enterprise 🙌

Fun fact: I reached out to the author about supporting GitHub Enterprise a few years ago. If you’re building a browser extension for GitHub, and want to make sure it works for GitHub Enterprise, you can get a developer license by joining the GitHub Developer Program.

3. Be alerted to new notifications

On the topic of browser extensions, this project from @sindresorhus tells you exactly how many GitHub notifications are waiting with an unobtrusive icon on your toolbar. You can enable Desktop notifications too if that’s your jam.

It also works with GitHub Enterprise. All you have to do is change the API endpoint to match your instance’s URL (for example, ).

4. Make your @mentions stand out 📝

No matter how many elaborate email or notification filters you set up, there’s always one that slips through the cracks. Mention Highlighter, created by my buddy @benbalter, highlights all references to my name and wow, do they jump out! Even in a wall of text or when I’m quickly skimming comments, I’m able to see any mentions directed to me.

5. Linking to code snippets

This isn’t so much of a secret, but it’s definitely not known by everyone, and occasionally blows minds. You can link to specific lines of code by clicking the line number when you’re viewing a file. By default, the line number (for example, ) is appended to the URL, which will always take you directly to that line.

If that file is edited, deleted, or renamed, unfortunately the link will no longer work as expected. You can press or  click to generate the canonical URL that will always work.

You can also link to a line number range by holding down and selecting the starting and ending lines.

Added bonus: If you add a code snippet link in a GitHub comment, a nice visualization of the code appears.

I recall that this feature was originally built by a few interns several years ago. If you like hacking on fun stuff like this, consider applying to our internship program!

6. Must-have Markdown formatting tips

GitHub Flavored Markdown is great for vanilla formatting of text and basic tables, but sometimes you need to get creative to make it do what you want.

Keyboard tags

You can use  tags to make text appear like a button, which is slightly different from regular backticked text. It’s perfect for documenting things like keyboard shortcuts or game controls in your READMEs/wikis.

Visualizing hex codes

Placing hex colors in backticks renders a tile in that color. I think it’s totally hexcellent!

Visualizing diffs 🧡💚

You can visualize a diff using backticks and which highlights lines red or green as appropriate.

In fact, if you add the language after the opening three backticks, the code is syntax highlighted accordingly.

The devil’s in the details

Adding lengthy error logs or verbose program output to an issue can be helpful in resolving a bug, but if it takes up pages of vertical space, consider using the and tags.

Centering text and images

It’s 2020 and I still struggle with centering anything in web pages. I find a combination of works wonders. Perfect for centering a logo in your repository’s README, for example.

Smaller text

Wrap text in or <sub> tags to make it a little smaller. Perfect for adding things like “Fig 1: description” under images, or making text smaller in tables so it doesn’t scroll horizontally.

At this point, we’re basically back in the 90s with good old-fashioned, hand-crafted HTML. As someone who did that using Notepad and Netscape Navigator back in the day, I’m okay with that.

Bonus Markdown Protip: My buddy @bitoiu had some great tips for working with Markdown tables in the last GitHub Protips post—definitely check it out!

7. URL-hacking topics

One of my guilty pleasures is looking for new projects on GitHub tagged with , and playing testing them, or cloning them to “change stuff and see what happens”. It’s a great activity for coffee breaks or boring Sunday afternoons.

Our UI exposes ways for you to filter by a single topic and language (for example, searching for all repositories categorized as written in JavaScript). The only way to view the search results for the combination of two topics is through a bit of URL hacking. Simply append a to the topic URL to combine the results of two topics. Some examples:

Did you know: Applying topics to your repositories helps people discover them, and even contribute to them? It’s as simple as clicking a button and typing a few keywords related to your project’s purpose and subject area:

8. Dark theme

For the l33t h4x0rs amongst you, the unofficial GitHub Dark Theme browser extension might be of interest. It works with Chrome, Firefox, Opera, and Safari, plus we finally fixed that favicon issue. Perfect for those late-night hacking sessions. 😎

Did you know: Most software engineers prefer to use dark mode because, wait for it… light attracts more bugs.

9. A numbers game

Sometimes it’s useful (or entertaining) to analyze a repository’s metadata and pull out metrics. Hopefully nobody’s judged on how many commits they make, but you can generate an ordered list of authors by commit count from the command line with .

You can also exclude merge commits with .

If it’s a public repository, GitHub High Scores gives you an old-school, 8-bit, arcade-like view of your repository’s contributors. Perfect for showboating your dominance and printing out to pin on the office bulletin board or fridge. 💪🏻

Anyone who squashes their commits is going to be lower on the table—everyone’s a winner.

That’s just the commits, but what about lines of code? Every good engineer knows that’s the most important metric. There are tons of neat CLI projects to help you analyze the Git data.

@arzzen’s git-quick-stats gives a nice overview of repository activity. You can even see contributions by day, hour, and month.

git-famefrom @casperdcl also summarizes contributions including lines of code.

@IonicaBizau’s git-stats includes all sorts of interesting data, including contributions and pie charts. Much like many of his projects, the CLI output is delightful. 👏🏻

Hopefully you and your team understand your value is measured by more than lines of code and number of commits. If those metrics are tied to your holiday bonus, it might be time to look for a new job. We’re hiring!

10. Morse code workout 💪🏻

Last, but not least… have you ever dreamt for a way to get your exercise in and practice your morse code?!? Wait no more! This ingenious app from @veggiedefender generates morse code by repeatedly slamming your laptop shut, and comes with the greatest feature list I’ve ever seen. It’s great exercise while you’re stuck in the house, and still paying for that gym membership. .-.. — .-..

Editor’s note: We honestly aren’t sure if Lee is joking, or serious with this one. Proceed with caution and at your own risk. 🤷

That’s enough tips and dad jokes for one blog post. Thanks for reading! <3

Do you have a GitHub Protip?

Do you have a tip, trick, or hack that makes your daily life easier on GitHub? Share it with us on social media with #GitHubProtips.


712 713 714 715 716