See https://github.com/adil192/SamsungAppsPatcher for the updated version of this guide. This gist is now unmaintained, but may work on other operating systems.
(Same as the above link.)
See https://github.com/adil192/SamsungAppsPatcher for the updated version of this guide. This gist is now unmaintained, but may work on other operating systems.
(Same as the above link.)
| # Title: StevenBlack/hosts | |
| # | |
| # This hosts file is a merged collection of hosts from reputable sources, | |
| # with a dash of crowd sourcing via GitHub | |
| # | |
| # Date: 24 January 2021 21:02:05 (UTC) | |
| # Number of unique domains: 59,895 | |
| # | |
| # Fetch the latest version of this file: https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts |
| 127.0.0.1 localhost | |
| #Lucky Patcher block Ads start# | |
| 127.0.0.1 adad.ir | |
| 127.0.0.1 dgad.ir | |
| 127.0.0.1 cs07.trafmag.com | |
| 127.0.0.1 cs06.trafmag.com | |
| 127.0.0.1 cs05.trafmag.com | |
| 127.0.0.1 cs04.trafmag.com | |
| 127.0.0.1 cs03.trafmag.com |
Credits and thanks: Home Assistant Forum users & Github users: @ocso, @wiphye, @teachingbirds, @tboyce1, @simbesh, @JeffLIrion @ff12 @rebmemer @siaox @DiederikvandenB @Thebuz @clapbr @Finsterclown
Starts Youtube App
entity_id: media_player.shield
command: >-
| # built application files | |
| *.apk | |
| *.ap_ | |
| # files for the dex VM | |
| *.dex | |
| # Java class files | |
| *.class |
| 683f889c34515af2726abfc090eb507ab7701bd4: AlpcCreateSecurityContext | |
| 6b60ac0ab67d8bf3314257a29856e43e397ef750: AlpcGetHeaderSize | |
| 477dc8c5043accad6c8ec9a356adca89a1a1b99a: AlpcGetMessageAttribute | |
| 063dde4c943d030aa4af62134315f06bf1b0ad1e: AlpcInitializeMessageAttribute | |
| c35970c10ba3b48d4a545cee1ae2919d6c15c409: BgkDisplayCharacter | |
| 4b45128eebc53f2dbfb9e94fc50612ba1275e722: BgkGetConsoleState | |
| 8c76044c69e10410d8cae2fcbe19bd33b0b022e6: BgkGetCursorState | |
| c4103488c6cdc127c8d316d1ed55121a677e6438: BgkSetCursor | |
| 21c98a2c36bb4ffb44e91fbf0dfff37fd6b12044: CcAddDirtyPagesToExternalCache | |
| 339ecf72400c8439496387b1e180448ea82ccfb6: CcAsyncCopyRead |
| #include <string> | |
| #include <vector> | |
| #include <fstream> | |
| #include <iostream> | |
| #include <filesystem> | |
| #include <Windows.h> | |
| #include <winternl.h> | |
| static_assert( sizeof( void* ) == 8 ); |
| # EXT-REMOVER | |
| This is a curated list of exploits for ChromeOS. It started with LTBEEF, and now there is more! | |
| Many of these exploits can destory your computer if used inproperly. So PLEASE PLEASE make sure you follow these instructions very carefully! | |
| If you need help ask it <a href="https://github.com/3kh0/ext-remover/discussions">here</a> | |
| **ATTENTION ALL SYS ADMINS!!!** | |
| Hello, I am Echo and I created this repo in order to give exploits for the masses and to prove one thing, chromebooks are literal trash, and a poor excuse for a computer. They are full of exploits, you might think you blocked/patched them all but then 3 more pop up. It is a endless game of wack-a-mole. Treat your students to a windows computer, they will thank you. And don't you dare start to think "My school district does not have that kind of money", it most likely does! How much are you paying the blocker companies? Think about that. | |
| <img width="250px" src="https://user-images.githubusercontent.com/58097612/191354621-bf7ff072-b9d7-46 |
While messing with a CF-U1 handheld PC that I bought off ebay I managed to mess up the BIOS and it
seems it reverted to previous settings which included an unknown BIOS password, it would however still
boot into windows. Since I could still boot windows I was able to dump the bios flash using
AFUWINGUI.EXE the version I used was 3.09.03.1462 which is available here:
https://www.ami.com/support-other/
Click on Aptio 4 AMI Firmware Update Utility