This is a quick guide to mounting a qcow2 disk images on your host server. This is useful to reset passwords, edit files, or recover something without the virtual machine running.
Step 1 - Enable NBD on the Host
modprobe nbd max_part=8
REGEDIT4 | |
[HKEY_CURRENT_USER\Control Panel\Desktop] | |
"FontSmoothing"="2" | |
"FontSmoothingType"=dword:00000002 | |
"FontSmoothingGamma"=dword:00000578 | |
"FontSmoothingOrientation"=dword:00000001 |
Movement: | |
j, k down, up | |
h, l left, right (in some contexts) | |
space page down | |
pg up/down page up/down | |
arrows up, down, left, right |
@define ENDIAN "big" | |
@define T_VARIANT "" | |
@define VERSION_5 "" | |
@define VERSION_5E "" | |
@include "ARM.sinc" | |
# Hacky because we can't define a new token for bits 5-15 since sleigh doesn't | |
# allow adding new fields to the instrArm token | |
ioscallnum: value is c0507 & c0811 & c1212 & c1313 & c1414=0 & c1515=0 |
This is a mini-tutorial of sorts for getting started with gdb on the Switch, with the target audience being people who want to mod and/or reverse games, with no prerequisite knowledge of gdb. The goal will be to walk you through some of the basic workflows needed to use a debugger on the Switch, while being brief enough for skimming for when you forget things.
If some part is unclear, your OS doesn't have install instructions, or you feel part of your workflow should be added here, feel free to comment any additions.
(If you only need a quick reference Jump to the Appendix)
First off you'll need a version of GDB compatible with aarch64. This can be obtained via either a distribution of
The documentation has been moved to this gist in order to reduce lag.
hi, i'm daniel. i'm a 15-year-old high school junior. in my free time, i hack billion dollar companies and build cool stuff.
3 months ago, I discovered a unique 0-click deanonymization attack that allows an attacker to grab the location of any target within a 250 mile radius. With a vulnerable app installed on a target's phone (or as a background application on their laptop), an attacker can send a malicious payload and deanonymize you within seconds--and you wouldn't even know.
I'm publishing this writeup and research as a warning, especially for journalists, activists, and hackers, about this type of undetectable attack. Hundreds of applications are vulnerable, including some of the most popular apps in the world: Signal, Discord, Twitter/X, and others. Here's how it works:
By the numbers, Cloudflare is easily the most popular CDN on the market. It beats out competitors such as Sucuri, Amazon CloudFront, Akamai, and Fastly. In 2019, a major Cloudflare outage k