Skip to content

Instantly share code, notes, and snippets.

@sinceohsix
sinceohsix / Installing LiveContainer+Sidestore.md
Last active May 14, 2026 23:04
Installing LiveContainer+SideStore from start to finish.

✴️ How to sideload with SideStore and LiveContainer

Last Edited: Mar 30, 2026 @ 7:45AM PST · Supports iOS versions 15.0 - 26.3

Make sure you are always using up-to-date guides to ensure full compatibility. The official SideStore documentation can be found here in case anything changes. For additional information and credits, scroll to the bottom of this page.

Important • iOS 26.4 broke the method used by SideStore and this tutorial to refresh apps. A new guide will come soon for people on iOS 26.4 once the necessary tools are available.


👋 Hello again, r/sideloaded!

How to setup Plex with Sonarr, Radarr, Jackett, Overseerr and qBitTorrent using Docker

Before continuing: This guide is currently outdated but I'm working on a new one with upgrading steps included. I'll link it here once it's finished :)

This is a guide that will show you how to setup Plex Media Server with Sonarr, Radarr, Jackett, Overseerr and qBitTorrent with Docker. It is written for Ubuntu 20.04 but should work on other Linux distributions as well (considering supported distributions by Docker). It is also written for people who have some experience with Linux and Docker. If you are new to Docker, I recommend you to read the Docker documentation, and if you are new to Linux, I recommend you to read the Ubuntu documentation.

Now, let's get started!

Please note: This guide was written without considering hardlinking for Sonarr/Radarr. If you want to use hardlinking refer to #Hardlinking

@TheUnrealZaka
TheUnrealZaka / HidingRoot.md
Last active May 15, 2026 06:10
This guide is for all Android devices to hide properly all root detections and successfully run banking apps as expected :)

✨ Welcome to TheUnrealZaka's Guide for Hiding Root Detections!

Using KernelSU-Next + SuSFS

⚠️ Disclaimer: This guide is provided solely for educational purposes. The creator assumes no responsibility for any damage, data loss, or other adverse effects that may occur as a result of following these instructions. Proceed entirely at your own risk!


📖 Introduction

Many users who have rooted their devices finds issues where system or third-party applications detect the root status and refuse to operate. This guide outlines a procedure to hide root detection on the majority of Android devices, specifically the ones running Noble ROM for Samsung S9/S9+/N9. The approach detailed here leverages KernelSU-Next in conjunction with SuSFS.

@0xdevalias
0xdevalias / reverse-engineering-macos.md
Last active May 14, 2026 14:59
Some notes, tools, and techniques for reverse engineering macOS binaries
@rickklaasboer
rickklaasboer / how-to-setup-plex-with-sonarr-radarr-jackett-overseerr-and-qbittorrent-using-docker.md
Last active April 30, 2026 12:15
How to setup Plex with Sonarr, Radarr, Jackett, Overseerr and qBitTorrent using Docker

How to setup Plex with Sonarr, Radarr, Jackett, Overseerr and qBitTorrent using Docker

Before continuing: This guide is currently outdated but I'm working on a new one with upgrading steps included. I'll link it here once it's finished :)

This is a guide that will show you how to setup Plex Media Server with Sonarr, Radarr, Jackett, Overseerr and qBitTorrent with Docker. It is written for Ubuntu 20.04 but should work on other Linux distributions as well (considering supported distributions by Docker). It is also written for people who have some experience with Linux and Docker. If you are new to Docker, I recommend you to read the Docker documentation, and if you are new to Linux, I recommend you to read the Ubuntu documentation.

Now, let's get started!

Please note: This guide was written without considering hardlinking for Sonarr/Radarr. If you want to use hardlinking refer to #Hardlinking

@Sachinart
Sachinart / apple-recon-cidr-asn.txt
Last active May 19, 2025 07:52
Apple Recon data - CIDR & ASN based all IPs scanned | reverse DNS
144.178.16.10 ussjc1-client-vpn15.apple.com.
144.178.16.100 usdal2-corpclient-vpn.apple.com.
144.178.16.101 usdal2-corpclient-vpn11.apple.com.
144.178.16.102 usdal2-corpclient-vpn12.apple.com.
144.178.16.103 usdal2-corpclient-vpn13.apple.com.
144.178.16.104 usdal2-corpclient-vpn14.apple.com.
144.178.16.105 usdal2-corpclient-vpn15.apple.com.
144.178.16.106 usdal2-corpclient-vpn16.apple.com.
144.178.16.11 ussjc1-client-vpn16.apple.com.
144.178.16.12 ussjc1-dcvpnclient-vpn.apple.com.
@0xdevalias
0xdevalias / bypassing-cloudflare-akamai-etc.md
Last active May 11, 2026 16:14
Some notes/resources for bypassing anti-bot/scraping features on Cloudflare, Akamai, etc.
@kconner
kconner / macOS Internals.md
Last active May 12, 2026 11:58
macOS Internals

macOS Internals

Understand your Mac and iPhone more deeply by tracing the evolution of Mac OS X from prelease to Swift. John Siracusa delivers the details.

Starting Points

How to use this gist

You've got two main options:

@joshdholtz
joshdholtz / ATinySampleApp.swift
Last active February 12, 2025 13:48
Super basic SwiftUI app (70 lines of code) with paywall using RevenueCat
import SwiftUI
import RevenueCat
struct Constants {
static let apiKey = "<your_api_key>" // Will look like: appl_bunchofotherstuffhere
static let entitlementName = "<your_entitlement_name>" // I use something like "pro"
}
@main
struct ATinySampleApp: App {
@Alienmario
Alienmario / mi_home_external_automation.md
Last active January 1, 2026 06:43
Mi home external automation (Non rooted, Android 11)
  1. Create a manual scene in Mi Home for the device you'd like to control
  2. Use Http Toolkit to figure out the scene id.
    • Install the app on PC and Android, follow the instructions - install CA certificate and connect
    • Set to only intercept the Mi home app
    • While snooping, start the scene in Mi home, then you can disconnect http toolkit
    • Look for this request: https://de.api.io.mi.com/app/scene/start
    • The request body should look like this (actual values replaced with *) data=*&rc4_hash__=*&signature=*&_nonce=*&ssecurity=*
    • You will need the values for data, nonce and ssecurity. Run each one by https://www.urldecoder.org/.