I hereby claim:
- I am saltwaterc on github.
- I am saltwaterc (https://keybase.io/saltwaterc) on keybase.
- I have a public key ASCrlOu9ONut6sKtBTDLJllny4JCht2syriwmeras4Y-NQo
To claim this, I am signing this object:
// $ frida -l antiroot.js -U -f com.example.app --no-pause | |
// CHANGELOG by Pichaya Morimoto ([email protected]): | |
// - I added extra whitelisted items to deal with the latest versions | |
// of RootBeer/Cordova iRoot as of August 6, 2019 | |
// - The original one just fucked up (kill itself) if Magisk is installed lol | |
// Credit & Originally written by: https://codeshare.frida.re/@dzonerzy/fridantiroot/ | |
// If this isn't working in the future, check console logs, rootbeer src, or libtool-checker.so | |
Java.perform(function() { | |
var RootPackages = ["com.noshufou.android.su", "com.noshufou.android.su.elite", "eu.chainfire.supersu", |
I hereby claim:
To claim this, I am signing this object:
############################################################################### | |
# The MIT License | |
# | |
# Copyright 2012-2014 Jakub Jirutka <[email protected]>. | |
# | |
# Permission is hereby granted, free of charge, to any person obtaining a copy | |
# of this software and associated documentation files (the "Software"), to deal | |
# in the Software without restriction, including without limitation the rights | |
# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell | |
# copies of the Software, and to permit persons to whom the Software is |
Taken from:
On CentOS 7.3 with docker cookbook 2.15.18.
.kitchen/ | |
recipes/ |
As usual, use it at your own risk. I am not to be held responsible for your actions.
Supported devices: WNR1000v2 (tested by me), WNR1000v2-VC (provided by Comcast for free; tested by Douglas Fraser)
Notice: Upgrade WNR1000v2 to the latest factory firmware: 1.1.2.58. Otherwise, the power LED may not behave properly.
You need to place the device into failsafe mode. For booting into failsafe mode, you need to power up the device while holding the reset button with a pin. The power LED should have an amber colour. Hold the button until it is starting to flash green. It starts to flash green after it flashes the amber LED for six times. After that, the device is in failsafe mode, accepting a firmware via its TFTP server. The device should respond to pings at 192.168.1.1, although the responses may be malformed.
#!/bin/bash | |
rm -rf bash-92 | |
curl -s https://opensource.apple.com/tarballs/bash/bash-92.tar.gz -o bash-92.tar.gz | |
curl -s https://ftp.gnu.org/pub/gnu/bash/bash-3.2-patches/bash32-052 -o bash32-052 | |
curl -s https://ftp.gnu.org/pub/gnu/bash/bash-3.2-patches/bash32-053 -o bash32-053 | |
curl -s https://ftp.gnu.org/pub/gnu/bash/bash-3.2-patches/bash32-054 -o bash32-054 |
.PHONY: all | |
.DEFAULT: all | |
all: | |
node roulette.js entropy10000-v1.json black > black-v1.txt | |
node roulette.js entropy10000-v1.json red > red-v1.txt | |
node roulette.js entropy10000-v2.json black > black-v2.txt | |
node roulette.js entropy10000-v2.json red > red-v2.txt |
function get_cert() | |
{ | |
local host="$1" | |
local port="$2" | |
if [ -z "$port" ] | |
then | |
port="443" | |
fi | |
openssl s_client -showcerts -connect $host:$port -servername $host </dev/null 2>/dev/null | openssl x509 -text -noout |