Skip to content

Instantly share code, notes, and snippets.

View fathonix's full-sized avatar
💭
I may be slow to respond.

Aldo Adirajasa Fathoni fathonix

💭
I may be slow to respond.
View GitHub Profile
@robertkirkman
robertkirkman / README.md
Last active December 11, 2024 19:37
How to build Turnip for SurfaceFlinger on-device without a PC and without zhiyong/termux-ndk

How to build Mesa Turnip with -Dplatforms=android but without cross-compilation

Small warning: This will "mess up" your Termux installation's zlib.pc file, but if you do other compilations with really similar settings to this one, you're probably going to need it again before you "fix" it by reinstalling Termux's official zlib anyway.

  1. Install Termux

termux-setup-storage
pkg install git make clang binutils
git clone https://github.com/madler/zlib.git
@lupoDharkael
lupoDharkael / README.md
Created April 5, 2024 23:01 — forked from Moondarker/README.md
Fixing device UUIDs in BCD under Linux

Fixing device UUIDs in BCD under Linux

Please note, it's easier to just use a recovery flash drive/dvd disk!

I just wanted a new challenge, and I found it:

Info on target system

My friend has switched from Windows to Fedora. Somehow in the process, Windows Bootloader went missing from EFI partition (I would love to know how did that happen as much as you do or don't, but I wasn't supervising at the moment, so... no idea)

@Chubukov-Aleksey
Chubukov-Aleksey / debug_from_qr.py
Last active October 28, 2024 04:04 — forked from benigumocom/debug_from_qr.py
Connect Wireless Debug from Terminal on Android11
#!/usr/bin/env python3
"""
Android11
Pair and connect devices for wireless debug on terminal
python-zeroconf: A pure python implementation of multicast DNS service discovery
https://github.com/jstasiak/python-zeroconf
"""
(* Follower Control Algorithm
This function implements a control algorithm for a follower system,
possibly used in robotics or autonomous vehicles. *)
let node follower_control (
leader_position: float,
leader_velocity: float,
follower_position: float,
follower_velocity: float
):
@hackermondev
hackermondev / research.md
Last active May 8, 2025 17:41
Unique 0-click deanonymization attack targeting Signal, Discord and hundreds of platform

hi, i'm daniel. i'm a 15-year-old high school junior. in my free time, i hack billion dollar companies and build cool stuff.

3 months ago, I discovered a unique 0-click deanonymization attack that allows an attacker to grab the location of any target within a 250 mile radius. With a vulnerable app installed on a target's phone (or as a background application on their laptop), an attacker can send a malicious payload and deanonymize you within seconds--and you wouldn't even know.

I'm publishing this writeup and research as a warning, especially for journalists, activists, and hackers, about this type of undetectable attack. Hundreds of applications are vulnerable, including some of the most popular apps in the world: Signal, Discord, Twitter/X, and others. Here's how it works:

Cloudflare

By the numbers, Cloudflare is easily the most popular CDN on the market. It beats out competitors such as Sucuri, Amazon CloudFront, Akamai, and Fastly. In 2019, a major Cloudflare outage k