This is a package for eopkg
for the Hopper Disassembler.
sudo eopkg bi https://gist.githubusercontent.com/bmwalters/d453feb913492c23df06d78820fee4d7/raw/pspec.xml
sudo eopkg it hopper-disassembler-*.eopkg;sudo rm hopper-disassembler-*.eopkg
// ==UserScript== | |
// @name Vimeo Embed Playback Rate Control | |
// @namespace zerf | |
// @match *://player.vimeo.com/* | |
// @grant none | |
// @run-at document-end | |
// ==/UserScript== | |
const log = (...args) => console.log("[ZERFVIMEO]", ...args) |
#!/usr/bin/env python3 | |
import os | |
import xml.etree.ElementTree as ElementTree | |
tree = ElementTree.parse("Resources.resx") | |
datas = sorted(map(lambda x: (x, len(x.find("value").text)), tree.getroot().findall("data")), key=lambda x: x[1]) | |
if not os.path.isdir("Split_out/"): |
# Maintainer: Bradley Walters <[email protected]> | |
pkgname=openhexagon-git | |
pkgver=r1733.4791b23 | |
pkgrel=1 | |
pkgdesc='C++14 FOSS clone of "Super Hexagon"' | |
arch=('i686' 'x86_64' 'armv6h') # TODO: check these | |
url="https://vittorioromeo.info/projects.html" | |
license=('custom:AFL-3.0') | |
depends=('sfml' 'lua') |
<?xml version="1.0" encoding="UTF-8"?> | |
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
<plist version="1.0"> | |
<dict> | |
<key>ANSIBlackColor</key> | |
<data> | |
YnBsaXN0MDDUAQIDBAUGIiNYJHZlcnNpb25YJG9iamVjdHNZJGFyY2hpdmVyVCR0b3AS | |
AAGGoKYHCBMXGB9VJG51bGzVCQoLDA0ODxARElxOU0NvbXBvbmVudHNVTlNSR0JcTlND | |
b2xvclNwYWNlXxASTlNDdXN0b21Db2xvclNwYWNlViRjbGFzc08QJzAuMjMxMzcyNTQ5 | |
IDAuMjU4ODIzNTI5NCAwLjMxNzY0NzA1ODggMU8QJzAuMTc1MzU2OTg0MSAwLjE5NTk5 |
mkdir mounted-iso mounted-root root live
sudo mount -o loop archlinux-2020.06.01-i686.iso mounted-iso/
sudo mount -t squashfs mounted-iso/arch/i686/airootfs.sfs mounted-root/
sudo cp -av mounted-root/. root/
sudo umount mounted-root
sudo umount mounted-iso
sudo mount -o bind root live/
sudo arch-chroot live bash
from typing import List, Optional | |
import random | |
class Node: | |
value: str | |
timestamp: int | |
next: Optional['Node'] | |
lower: Optional['Node'] |
The iphone-dataprotection project (GiHub mirror) includes a tool to determine an iOS device's 4-digit passcode using a brute force technique. That project only claims support for devices <= iOS 8 and < A5. It turns out the code also supports A5 devices on iOS 9.
However the brute force utility also requires a companion kernel patch to enable access to keys such as 0x835 in calls to the AES accelerator from userland. This doc confirms the value of said patches for 32-bit iOS 9.
This writeup also describes the various st