Skip to content

Instantly share code, notes, and snippets.

@SaltwaterC
SaltwaterC / root_bypass.js
Created August 9, 2021 16:23 — forked from pich4ya/root_bypass.js
Bypass Android Root Detection / Bypass RootBeer - August 2019
// $ frida -l antiroot.js -U -f com.example.app --no-pause
// CHANGELOG by Pichaya Morimoto ([email protected]):
// - I added extra whitelisted items to deal with the latest versions
// of RootBeer/Cordova iRoot as of August 6, 2019
// - The original one just fucked up (kill itself) if Magisk is installed lol
// Credit & Originally written by: https://codeshare.frida.re/@dzonerzy/fridantiroot/
// If this isn't working in the future, check console logs, rootbeer src, or libtool-checker.so
Java.perform(function() {
var RootPackages = ["com.noshufou.android.su", "com.noshufou.android.su.elite", "eu.chainfire.supersu",

Keybase proof

I hereby claim:

  • I am saltwaterc on github.
  • I am saltwaterc (https://keybase.io/saltwaterc) on keybase.
  • I have a public key ASCrlOu9ONut6sKtBTDLJllny4JCht2syriwmeras4Y-NQo

To claim this, I am signing this object:

@SaltwaterC
SaltwaterC / rules-both.iptables
Created April 4, 2018 11:10 — forked from jirutka/rules-both.iptables
Basic iptables template for ordinary servers (both IPv4 and IPv6)
###############################################################################
# The MIT License
#
# Copyright 2012-2014 Jakub Jirutka <[email protected]>.
#
# Permission is hereby granted, free of charge, to any person obtaining a copy
# of this software and associated documentation files (the "Software"), to deal
# in the Software without restriction, including without limitation the rights
# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
# copies of the Software, and to permit persons to whom the Software is
@SaltwaterC
SaltwaterC / README.md
Created July 28, 2017 17:45
Broken docker_service of docker cookbook

Taken from:

  • /etc/systemd/system/docker.socket
  • /etc/systemd/system/docker.service

On CentOS 7.3 with docker cookbook 2.15.18.

@SaltwaterC
SaltwaterC / keepass.kdbx
Last active April 12, 2017 09:01
KDBX 3.1 case sensitiveness
.kitchen/
recipes/
@SaltwaterC
SaltwaterC / README.md
Last active March 3, 2024 23:21
OpenWrt support for Netgear WNR1000v2

Install

As usual, use it at your own risk. I am not to be held responsible for your actions.

Supported devices: WNR1000v2 (tested by me), WNR1000v2-VC (provided by Comcast for free; tested by Douglas Fraser)

Notice: Upgrade WNR1000v2 to the latest factory firmware: 1.1.2.58. Otherwise, the power LED may not behave properly.

You need to place the device into failsafe mode. For booting into failsafe mode, you need to power up the device while holding the reset button with a pin. The power LED should have an amber colour. Hold the button until it is starting to flash green. It starts to flash green after it flashes the amber LED for six times. After that, the device is in failsafe mode, accepting a firmware via its TFTP server. The device should respond to pings at 192.168.1.1, although the responses may be malformed.

@SaltwaterC
SaltwaterC / patch-shellshock-osx.sh
Created September 29, 2014 07:58
OS X patch for Shellshock
#!/bin/bash
rm -rf bash-92
curl -s https://opensource.apple.com/tarballs/bash/bash-92.tar.gz -o bash-92.tar.gz
curl -s https://ftp.gnu.org/pub/gnu/bash/bash-3.2-patches/bash32-052 -o bash32-052
curl -s https://ftp.gnu.org/pub/gnu/bash/bash-3.2-patches/bash32-053 -o bash32-053
curl -s https://ftp.gnu.org/pub/gnu/bash/bash-3.2-patches/bash32-054 -o bash32-054
@SaltwaterC
SaltwaterC / Makefile
Last active August 29, 2015 14:04
Getting some stats for a french roulette game
.PHONY: all
.DEFAULT: all
all:
node roulette.js entropy10000-v1.json black > black-v1.txt
node roulette.js entropy10000-v1.json red > red-v1.txt
node roulette.js entropy10000-v2.json black > black-v2.txt
node roulette.js entropy10000-v2.json red > red-v2.txt
@SaltwaterC
SaltwaterC / get_cert.sh
Last active April 5, 2019 14:00
get_cert
function get_cert()
{
local host="$1"
local port="$2"
if [ -z "$port" ]
then
port="443"
fi
openssl s_client -showcerts -connect $host:$port -servername $host </dev/null 2>/dev/null | openssl x509 -text -noout