Skip to content

Instantly share code, notes, and snippets.

View Geofferey's full-sized avatar
🤓
OnePlus 8T time

Geofferey Eakins Geofferey

🤓
OnePlus 8T time
  • NETLABWORK
  • USA
View GitHub Profile
#!/bin/sh
PRIMARY_USER=geofferey
sleep 1
waydroid session stop
weston --socket=waydroid-0 &
[Unit]
Description=Weston Wayland Compositor (on tty7)
RequiresMountsFor=/run
Conflicts=getty@tty7.service plymouth-quit.service
After=systemd-user-sessions.service getty@tty7.service plymouth-quit-wait.service gdm3.service waydroid-container.service
[Service]
User=geofferey
WorkingDirectory=/home/geofferey
PermissionsStartOnly=true
Restart=always
@Geofferey
Geofferey / flex_seq_5052.sub
Created April 24, 2023 01:22
RAW Recording of FLEX pager signal test sequence from flipper
Filetype: Flipper SubGhz RAW File
Version: 1
Frequency: 927985500
Preset: FuriHalSubGhzPresetCustom
Custom_preset_module: CC1101
Custom_preset_data: 02 0D 0B 06 08 32 07 04 14 00 13 02 12 04 11 83 10 67 15 24 18 18 19 16 1D 91 1C 00 1B 07 20 FB 22 10 21 56 00 00 C0 00 00 00 00 00 00 00
Protocol: RAW
RAW_Data: 623 -624 623 -624 625 -622 625 -628 623 -626 623 -624 621 -626 627 -626 623 -23780 417 -836 415 -834 413 -834 467 -730 519 -756 493 -730 519 -728 523 -730 519 -728 519 -730 545 -704 519 -730 545 -676 571 -676 573 -676 573 -676 573 -700 545 -702 547 -680 599 -650 599 -652 573 -674 599 -652 599 -650 597 -652 599 -624 623 -652 597 -652 597 -626 623 -652 597 -652 597 -652 599 -626 625 -626 623 -624 625 -626 625 -624 623 -626 623 -624 625 -624 623 -626 625 -622 625 -626 623 -626 623 -626 623 -626 625 -626 625 -626 625 -624 623 -624 625 -624 623 -626 625 -624 623 -626 623 -622 625 -624 623 -626 625 -624 627 -626 623 -622 625 -626 625 -624 623 -624 625 -626 625 -624 623 -624 621 -626 651 -602 625 -626 625 -626
@Geofferey
Geofferey / coachz_cmdline
Created March 7, 2023 09:59
cmdline opts to provide when building kernel (5.19.1) from source
cros_secure cros_secure console=tty1 console=ttyMSM0,115200 root=PARTUUID=9e70a548-30f5-df4c-abb0-6cee1fb0fd12/PARTNROFF=3 rootwait ro fsck.fix=yes fsck.repair=yes net.ifnames=0 fw_devlink=off deferred_probe_timeout=30 clk_ignore_unused=1 noresume psi=1 apparmor=0 selinux=0 mitigations=off preempt=full
#!/bin/sh
## Designed by:
# Geofferey for OmniHax0r ROM
# Run in chroot to bypass carrier + androids builtin resolver
SCRIPTDIR=${0%/*}
CONF=/reserve/.conf/dnsmasq/dnsmasq.conf
DNSMASQ_CONF=/etc/dnsmasq.conf
INSTALLED=/opt/.bootdebi/.dnsmasq
@Geofferey
Geofferey / bitlocker-activator-wrapper.bat
Last active March 5, 2024 14:13
A powershell script and wrapper for initializing BitLocker and storing keys via GPO
@ECHO OFF
REM Original thread detailing solution and requirement for this wrapper can be found below:
REM https://social.technet.microsoft.com/Forums/en-US/9e56a51c-42fa-4f17-afe2-78b8c5e90fcf/error-0x80070522?forum=mdopmbam
SET DomainName=netlabwork.us
\\%DomainName%\SYSVOL\%DomainName%\bin\psexec.exe -accepteula -s cmd /C PowerShell -NoProfile -NonInteractive -ExecutionPolicy ByPass \\%DomainName%\SYSVOL\%DomainName%\scripts\bitlocker-activator.ps1 > "%TEMP%\BitLockerEnablerWrapper.log" 2>&1
--- arch/arm64/boot/dts/qcom/sc7180-trogdor.dtsi 2022-04-27 05:41:17.000000000 -0700
+++ arch/arm64/boot/dts/qcom/sc7180-trogdor.dtsi 2022-05-03 23:07:40.851897877 -0700
@@ -276,18 +276,6 @@
#address-cells = <1>;
#size-cells = <0>;
- dai-link@0 {
- link-name = "MultiMedia0";
- reg = <MI2S_PRIMARY>;
- cpu {
#!/bin/sh
export ARCH=arm64
if [ $(whoami) != root ]; then
echo "You should probably be running me as root!"
export RUN_AS_ROOT=sudo
#!/bin/bash
## This up script only serves as an example and
# will need to be customized to ones needs.
## Sets up an internet capable OpenVPN tunnel
# from within a debian chroot running under
# android.
## For more info on APP UIDs for
###
### ejabberd configuration file
###
### The parameters used in this configuration file are explained at
###
### https://docs.ejabberd.im/admin/configuration
###
### The configuration file is written in YAML.
### *******************************************************
### ******* !!! WARNING !!! *******