Skip to content

Instantly share code, notes, and snippets.

View lumaaaaaa's full-sized avatar
🕵️
doing things

devin lumaaaaaa

🕵️
doing things
View GitHub Profile
@0xdevalias
0xdevalias / reverse-engineering-macos.md
Last active June 18, 2025 16:04
Some notes, tools, and techniques for reverse engineering macOS binaries
@xdavidhu
xdavidhu / wokplace-ssl-pinning-bypass.md
Last active April 26, 2025 16:53
Bypassing SSL Pinning in Facebook/Meta Workplace (Android)

Tested on Workplace for Android version 362.0.0.29.109. This approach might work in other Facebook/Meta applications. Thank you Imre Rad for helping me analyze the binary.

How does it work?

The Workplace Android app uses the Fizz open source TLS-1.3 library to communicate with the backend APIs. This library is written in C++, and is compiled to native code. It is running as a native library attached to the Android app.

The certificate verification is implemented in fizz/client/ClientProtocol.cpp, on line 1944. The easiest way to bypass this check is to patch the if (state.verifier()) { check on line 1942.

@umbernhard
umbernhard / arch-secure-install.md
Last active April 14, 2025 12:57
Building a Secure Arch Linux Device

Building a Secure Arch Linux Device

Locking down a linux machine is getting easier by the day. Recent advancements in systemd-boot have enabled a host of features to help users ensure that their machines have not been tampered with. This guide provides a walkthrough of how to turn on many of these features during installation, as well as reasoning for why certain features help improve security.

The steps laid out below draw on a wide variety of existing resources, and in places I'll point to them rather than attempt to regurgitate full explanations of the various security components. The most significant one, which I highly encourage everyone to read, is Rod Smith's site about secure boot, which is the most comprehensive and cogent explanation of UEFI, boot managers and boot loaders, and secure boot. Another incredibly useful resources is Safeboot, which encapsulates many of the setup steps below in a Debian application.

@brandonros
brandonros / gist:4aa6ae51d0f925671d034446947df555
Last active March 23, 2025 16:50
BMW UDS function descriptions
10 01;setDefaultSession
10 02;setProgrammingSession
10 03;setExtendedDiagnosticSession
11 01;hardReset
14 FF FF FF,31 01 0F 06,31 01 40 00 00,31 01 40 00 05,31 01 40 00 01;Clear all DTCs (clear DTC,clear Infospeicher,ZFS ***8211; DM_Lock,clear ZFS ***8211; DM_Clear,ZFS ***8211; DM_Unlock)
14 FF FF FF;Clear DTC
19 02 0C;ReadDTC(0C)
19 0A;ReadSupportedDTC
22 10 0A;readEnergyMode
22 10 0E;readExtendedMode
@LukeZGD
LukeZGD / ios-downgrade-dualboot.md
Last active June 19, 2025 04:33
Downgrade and dualboot status of almost all iOS devices

Downgrade and dualboot status of almost all iOS devices

UPDATED: 2025-04-04

@cnlohr
cnlohr / forgot_to_check_out_with_recurse_submodules.md
Last active June 18, 2025 16:46
Git forgot to clone recursively (forgot to check out with recurse submodules)
@JonnyJD
JonnyJD / Makefile
Created July 31, 2013 22:16
traversing the I/O registry on Mac OS X (iokit)
traverse_io_registry: traverse_io_registry.c
${CC} $^ -framework CoreFoundation -framework IOKit -o $@