Skip to content

Instantly share code, notes, and snippets.

View UlyssesWu's full-sized avatar
💤
Learn C++

Ulysses UlyssesWu

💤
Learn C++
View GitHub Profile
@albertbori
albertbori / MyDB.cs
Last active March 18, 2026 15:21
.NET EntityFramework Encryption Example (C#)
public class MyDB : IdentityDbContext<User>
{
//DBSet properties go here
public MyDB()
{
((IObjectContextAdapter)this).ObjectContext.ObjectMaterialized += new ObjectMaterializedEventHandler(ObjectMaterialized);
}
#region Encryption
About Locale Emulator and the concept of locale emulation itself

I came across this program a while ago myself, and was just as amazed by its premise. I looked at the source code, and saw lots of involved low-level NT kernel voodoo I don't understand, instead of the code I tend to use to solve this kind of problem. Truly, this must be an amazing piece of software, I thought... until I tested it with th135 and noticed that it rendered the Music Room text as exactly the same garbage you see when running the game without any locale emulation. Yeah, it did display 東方心綺楼 in the title bar and correctly referenced the 御首頂戴帳 folder, but overall I'd consider this to be a worse alternative to AppLocale.

So I did some research, and it turns out that this thing merely implements the bare minimum of functionality necessary (namely, changing the system ANSI code page in memory) to purportedly keep games from crashing. Anything just a bit more involved

@piyipaya
piyipaya / util.java
Created March 18, 2015 13:22
android get sdcard free size (from miui.fileexplorer)
//https://github.com/MiCode/FileExplorer/blob/master/src/net/micode/fileexplorer/Util.java
public static SDCardInfo getSDCardInfo() {
String sDcString = android.os.Environment.getExternalStorageState();
if (sDcString.equals(android.os.Environment.MEDIA_MOUNTED)) {
File pathFile = android.os.Environment.getExternalStorageDirectory();
try {
android.os.StatFs statfs = new android.os.StatFs(pathFile.getPath());
@anaisbetts
anaisbetts / TrayStateChanger.cs
Created September 15, 2015 04:19
Call secret Explorer API to change tray state
using System;
using System.Collections.Generic;
using System.Linq;
using System.Runtime.InteropServices;
using System.Text;
using System.Threading.Tasks;
using System.Windows.Interop;
namespace SlackNotifier
{
@JonDouglas
JonDouglas / xamarinandroidbindings.md
Last active January 1, 2025 13:18
Xamarin Android Bindings Troubleshooting

Approaching a Xamarin.Android Bindings Case

1. Investigation

One of the best ways to investigate a problematic Xamarin.Android Binding is to first ensure you have the proper tooling available:

@martin31821
martin31821 / crc32.cs
Last active November 13, 2023 02:27
C# port of the crc32 algorithm
// inspired by http://opensource.apple.com//source/xnu/xnu-1456.1.26/bsd/libkern/crc32.c
// You may use this program, or
// code or tables extracted from it, as desired without restriction.
namespace CRC32
{
public static class CRC32
{
static readonly uint[] crc32_tab = {
0x00000000, 0x77073096, 0xee0e612c, 0x990951ba, 0x076dc419, 0x706af48f,
@FergusInLondon
FergusInLondon / snoopy.c
Created March 28, 2017 07:02
snoopy.c - process_vm_readv() demonstration.
/**
* snoopy.c - Snoop on another tasks memory.
* Fergus In London <fergus@fergus.london>
*
* This is a pretty basic demo of the process_vm_readv syscall, a syscall which
* provides a nicer interface than ptrace for accessing memory used by another
* task.
*
* To play with simply use `ps` to get a PID for the process you'd like to snoop
* on, and `pmap` for the relevant memory address.
@aopell
aopell / RotN.cs
Created April 27, 2017 18:52
C# Rot-N one-liner
static string rot(string s, int n) => return string.Concat(s.Select(x => (char)(x >= 'A' && x <= 'Z' ? (x + n > 'Z' ? x - 26 + n : x + n) : x >= 'a' && x <= 'z' ? (x + n > 'z' ? x - 26 + n : x + n) : x)));
@worawit
worawit / eternalblue7_exploit.py
Last active January 26, 2026 15:44
Eternalblue exploit for Windows 7/2008
#!/usr/bin/python
# This file has no update anymore. Please see https://github.com/worawit/MS17-010
from impacket import smb
from struct import pack
import sys
import socket
'''
EternalBlue exploit for Windows 7/2008 by sleepya
The exploit might FAIL and CRASH a target system (depended on what is overwritten)
@worawit
worawit / eternalblue8_exploit.py
Last active March 16, 2024 18:38
Eternalblue exploit for Windows 8/2012
#!/usr/bin/python
# This file has no update anymore. Please see https://github.com/worawit/MS17-010
from impacket import smb, ntlm
from struct import pack
import sys
import socket
'''
EternalBlue exploit for Windows 8 and 2012 by sleepya
The exploit might FAIL and CRASH a target system (depended on what is overwritten)