Skip to content

Instantly share code, notes, and snippets.

View deckar01's full-sized avatar

Jared Deckard deckar01

View GitHub Profile
@deckar01
deckar01 / promiseMatchers.js
Last active March 7, 2016 22:00
Failed attempt at promise matchers wrapper for jasmine 2
beforeEach(function () {
jasmine.Matchers = {prototype: {}};
jasmine.Env = {prototype: {}};
require('promise-matchers');
Object.keys(jasmine.Matchers.prototype).forEach(function(key) {
var matcher = jasmine.Matchers.prototype[key];
jasmine.Matchers.prototype[key] = function() {
return {
compare: function(actual, done, expected) {
@deckar01
deckar01 / selenium-webdriver-2.48.2_firefox-43.0_debug
Last active January 6, 2016 17:19
Debugging issues with selenium-webdriver-2.48.2 and firefox-43.0 on Linux
10:05:47.619 INFO - Executing: [new session: Capabilities [{browserName=firefox}]])
10:05:47.620 INFO - Creating a new session for Capabilities [{browserName=firefox}]
org.openqa.selenium.firefox.NotConnectedException: Unable to connect to host localhost.localdomain on port 7055 after 45000 ms. Firefox console output:
Xlib: extension "RANDR" missing on display ":99".
process 6144: D-Bus library appears to be incorrectly set up; failed to read machine uuid: Failed to open "/var/lib/dbus/machine-id": No such file or directory
See the manual page for dbus-uuidgen to correct this issue.
D-Bus not built with -rdynamic so unable to print a backtrace
Redirecting call to abort() to mozalloc_abort
@deckar01
deckar01 / gist:beb96fc0afc0715f01bb
Created July 16, 2015 20:43
Two Buckets One Tap
function Bucket(capacity, level){
this.capacity = capacity;
this.level = level || 0;
}
Bucket.prototype.fill = function(){
this.level = this.capacity;
}
Bucket.prototype.discard = function(){
this.level = 0;
}
@deckar01
deckar01 / transcend_wifi_sd_channel_config_root.md
Last active May 3, 2024 20:28
Rooting the Transcend WiFi SD card by injecting commands into the wifi channel config

Other languages:

Rooting the Transcend WiFi SD card

by injecting commands into the wifi channel config

sd

This exploit requires opening the "Files" page of the card's web interface and escaping to the root of the file system.

Keybase proof

I hereby claim:

  • I am deckar01 on github.
  • I am mrj (https://keybase.io/mrj) on keybase.
  • I have a public key whose fingerprint is 3E4F B19C 3CA6 C5AD 1233 1ACE 2E86 5A94 CD49 692F

To claim this, I am signing this object: