Skip to content

Instantly share code, notes, and snippets.

@royki
royki / grub.md
Last active July 11, 2023 03:40
GRUB Command or Recovery
  • In legacy GRUB the default is /boot/grub/menu.list
  • In GRUB2 the default is /boot/grub/grub.cfg
  • We mainly edit /etc/default/grub, which controls mainly the appearance of the GRUB menu.
  • We may also edit the scripts in /etc/grub.d/
  • These are the scripts that boot your operating systems, control external applications such as memtest & os_prober
  • theming./boot/grub/grub.cfg is built from /etc/default/grub & /etc/grub.d/*
  • update-grub
  • grub> prompt, that is the full GRUB 2 command shell.
  • GRUB2 started normally and loaded the normal.mod module other modules which are located in /boot/grub/[arch]/
  • If GRUB2 didn’t find grub.cfg file then, grub rescue> is prompted that means it couldn’t find normal.mod, so it probably couldn’t find any of the boot files.
@marco79cgn
marco79cgn / top_500_albums_widget.js
Last active March 10, 2025 23:16
A scriptable widget that shows a random Top 500 album and opens it in Spotify
// insert your Spotify client id and secret here
let clientId = "xxx"
let clientSecret = "xxx"
// use your spotify country iso code to optimize search results
let spotifyCountry = "DE"
// optional: the ip of your node-sonos-http-api and room name; use "sonos" as parameter in your widget settings to activate it
let sonosUrl = "http://192.168.178.10:5005/Kitchen"
@mark05e
mark05e / RemoveWebroot.ps1
Last active October 29, 2025 23:27
PowerShell script to forcefully remove Webroot SecureAnywhere. It is recommended to run the script twice, with a reboot after the first run. Maintenance Note - https://gist.github.com/mark05e/0a04a54c1e8489c770bd91e4910d7df9
# Removes Webroot SecureAnywhere by force
# Run the script once, reboot, then run again
# Webroot SecureAnywhere registry keys
$RegKeys = @(
"HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\WRUNINST",
"HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\WRUNINST",
"HKLM:\SOFTWARE\WOW6432Node\WRData",
"HKLM:\SOFTWARE\WOW6432Node\WRCore",
"HKLM:\SOFTWARE\WOW6432Node\WRMIDData",
@SwitHak
SwitHak / 20211210-TLP-WHITE_LOG4J.md
Last active October 14, 2025 08:35
BlueTeam CheatSheet * Log4Shell* | Last updated: 2021-12-20 2238 UTC

Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-2021-44228)

Errors, typos, something to say ?

  • If you want to add a link, comment or send it to me
  • Feel free to report any mistake directly below in the comment or in DM on Twitter @SwitHak

Other great resources

  • Royce Williams list sorted by vendors responses Royce List
  • Very detailed list NCSC-NL
  • The list maintained by U.S. Cybersecurity and Infrastructure Security Agency: CISA List
@chrismooredev
chrismooredev / update_mtu.sh
Last active November 12, 2024 00:53
Script to set WSL eth0 MTU to the same as a (lower) Pulse Secure Juniper Networks adapter MTU
#!/bin/bash
# Sets the WSL eth0 adapter to the same MTU as a Juniper Networks Virtual Adapter, from the Windows side.
# This can help make certain connections (SSH/HTTPS specifically) more stable/reliable, as they can use
# larger packets when initiating connections or sending large chunks of data.
# Recommended to run in ~/.profile to persist across reboots. Remember to make this script executable.
# Add to sudoers file if running in ~/.profile
# %sudo ALL=(ALL) NOPASSWD: /usr/sbin/ip link set mtu * dev *
@ebelliveau
ebelliveau / WSL-Networking.ps1
Created December 21, 2022 04:49
Port forwarding to WSL2 guest on Windows host IP (PowerShell)
# WSL2 network port forwarding script v1
# for enable script, 'Set-ExecutionPolicy -ExecutionPolicy Bypass -Scope CurrentUser' in Powershell,
# for delete exist rules and ports use 'delete' as parameter, for show ports use 'list' as parameter.
# written by Daehyuk Ahn, Aug-1-2020
# Display all portproxy information
If ($Args[0] -eq "list") {
netsh interface portproxy show v4tov4;
exit;
}
@Computer-Tsu
Computer-Tsu / tattle.md
Last active October 22, 2025 19:18
Report Malware, Website
@Computer-Tsu
Computer-Tsu / #Protection
Last active August 30, 2023 11:56
Protection from Internet, malware, websites, URLs
Collection of DNS service IPs and URLs for blocking malware
@Computer-Tsu
Computer-Tsu / Prompt.txt
Last active June 27, 2023 03:09
Command prompt SET PROMPT for Microsoft Windows CMD
set prompt=$T$H$H$H$H$H$H$S%computername%\%username%$S$M$P$+$G
22:14 DESKTOP\User C:\Users\User>
set prompt=$T$H$H$H$H$H$H$S%UserName%@%ComputerName%$B$M$P$+$G
@Computer-Tsu
Computer-Tsu / Windows Safe Mode Install Uninstall.cmd
Created June 27, 2023 02:22
How to Run Windows Installer in Safe Mode Windows 10 with Command Prompt
REM How to Run Windows Installer in Safe Mode Windows 10 with Command Prompt
REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MSIServer" /VE /T REG_SZ /F /D "Service"
REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\MSIServer" /VE /T REG_SZ /F /D "Service"
net start msiserver