Skip to content

Instantly share code, notes, and snippets.

@ishad0w
ishad0w / aveyo_edge_removal.bat
Last active February 23, 2026 22:44
AveYo (Microsoft Edge Removal)
@(set "0=%~f0"^)#) & powershell -nop -c iex([io.file]::ReadAllText($env:0)) & exit /b
#:: just copy-paste into powershell - it's a standalone hybrid script
sp 'HKCU:\Volatile Environment' 'Edge_Removal' @'
$also_remove_webview = 1
## why also remove webview? because it is 2 copies of edge, not a slimmed down CEF, and is driving bloated web apps
$also_remove_widgets = 1
## why also remove widgets? because it is a webview glorified ad portal on msn and bing news cathering to stupid people
$also_remove_xsocial = 1
## why also remove xsocial? because it starts webview setup every boot - xbox gamebar will still work without the social crap
@oncebot
oncebot / Galaxy_S8_Debloat.sh
Created November 18, 2020 10:23 — forked from gsurrel/Galaxy_S8_Debloat.sh
Samsung Galaxy S8 debloat list
###########################
# Phone apps and services #
###########################
adb shell "cmd package install-existing com.android.stk" # SIM toolkit
adb shell "cmd package install-existing com.android.stk2" # SIM toolkit (maybe for dual-sim devices)
adb shell "cmd package install-existing com.sec.android.app.simsettingmgr" # SIM card manager, maybe required, contains configuration and settings for handling dual SIM (give a SIM an icon, a name, and so on)
adb shell "pm uninstall -k --user 0 com.samsung.android.smartcallprovider" # The 4th tab in the Phone app for 'local places'
adb shell "pm uninstall -k --user 0 com.sec.vsim.ericssonnsds.webapp" # NSDSWebApp. The Non Sim Device Solution (NSDS) is linked to VoLTE and VoWifi (Wifi Calling). NSDS allows connecting non sim devices to IMS core: https://uk.linkedin.com/in/hemant-kumar-dewnarain-2b779679
adb shell "pm uninstall -k --user 0 com.android.cts.ctsshim" # Probably linked to accessibility feature "Captioned Telephone Service. No internet access requi
@RedToor
RedToor / btDVR.py
Last active November 8, 2023 19:41
BruteForce IP CAMERA H.264 DVR - Exploit
# Exploit Title: BruteForce IP CAMERA H.264 DVR
# Google Dork: intext:Any time & Any where IP Surveillance for Your Life
# Date: 10/2/15
# Exploit Author: RedToor
# Source: https://gist.github.com/RedToor/71a109a7732884714e8ee07f61cfda59
# Version: ALL
# Tested on: Windows and Linux
# USE:
# python btDVR.py -h 127.0.0.1 -p 3000 -l passwords.txt -u admin
#
@Lewiscowles1986
Lewiscowles1986 / rPi3-ap-setup.sh
Last active March 31, 2025 15:46
Raspberry Pi 3 access-point-setup
#!/bin/bash
#
# This version uses September 2017 august stretch image, please use this image
#
if [ "$EUID" -ne 0 ]
then echo "Must be root"
exit
fi
@ffflorian
ffflorian / dislocker.sh
Last active November 1, 2020 03:31
Mount BitLocker drive with DisLocker
#!/bin/bash
HARDDRIVE=/dev/sdb2
BITLOCK_MOUNT=/media/bitlocker
DECRYPTED_MOUNT=/media/mount
USAGE="Usage: dislock [options]
Options:
-k, --recoverykey KEY The BitLocker recovery key to use for mounting
-u, --umount Unmount the mounted BitLocker volume
@hdo
hdo / dahua_squashfs_extract.py
Last active December 30, 2016 19:59
Extract Dahua uImage squashfs files
#!/usr/bin/env python
import os
import sys
def main(argv):
fname = ""
if len(argv) > 0:
fname = argv[0]
@axtl
axtl / scanconv.py
Created March 14, 2014 18:32
convert masscan/nmap xml output into lists of hosts per open port found
#!/usr/bin/env python
# coding: utf-8
from __future__ import print_function
import os
import sys
from collections import defaultdict as ddict
try:
from defusedxml.ElementTree import parse
except ImportError: