Skip to content

Instantly share code, notes, and snippets.

View skinzor's full-sized avatar
🎯
Focusing

Robert skinzor

🎯
Focusing
  • Bucharest, Romania
View GitHub Profile
@bgauduch
bgauduch / multiple-repository-and-identities-git-configuration.md
Last active May 2, 2025 13:16
Git config with multiple identities and multiple repositories

Setup multiple git identities & git user informations

/!\ Be very carrefull in your setup : any misconfiguration make all the git config to fail silently ! Go trought this guide step by step and it should be fine 😉

Setup multiple git ssh identities for git

  • Generate your SSH keys as per your git provider documentation.
  • Add each public SSH keys to your git providers acounts.
  • In your ~/.ssh/config, set each ssh key for each repository as in this exemple:
@thewisenerd
thewisenerd / extract.py
Created September 29, 2018 23:32
extract kernel builtin_fw
#!/usr/bin/env python3
import argparse
import mmap
import os
parser = argparse.ArgumentParser(description='extract builtin_fw')
parser.add_argument('image', metavar='IMAGE', type=str,
help='kernel image file')
parser.add_argument('kallsyms', metavar='KALLSYMS', type=str,
@ericzolf
ericzolf / filter_lineageos_devices.py
Created June 30, 2018 11:28
Python script to filter Android devices supported by LineageOS
#!/usr/bin/python
# This crude script allows to filter Android devices supported by LineageOS
# You need to be in the directory where the YAML files are present, which
# are used to create the list seen at https://wiki.lineageos.org/devices/
# You need first to edit the conditions used in the last 'if' statement to
# adapt this script (named $0 below) to your needs. Then usage could look
# like this:
# git clone https://github.com/LineageOS/lineage_wiki.git
# cd lineage_wiki/_data/devices
# (edit $0 and adapt the if-statement at the end of the script)
package com.demotxt.myapp.myapplication.model;
/**
* Created by Aws on 22/02/2018.
*/
public class Anime {
private String name ;
private String description;
#!/usr/bin/env python3
# -*- coding: utf-8 -*-
"""
Created on Mon Feb 19 13:34:45 2018
@author: tomin
"""
import os
import re
#!/bin/sh
# Copyright 2012 The Android Open Source Project
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
@jarun
jarun / disassemble.md
Last active July 11, 2025 06:20
Guide to disassemble

prerequisites

  • Compile the program in gcc with debug symbols enabled (-g)
  • Do NOT strip the binary
  • To generate assembly code using gcc use the -S option: gcc -S hello.c

utilities

objdump

@Pulimet
Pulimet / AdbCommands
Last active July 12, 2025 12:52
Adb useful commands list
Hi All!
I've recently launched a tool that wraps many of the commands here with a user interface. This desktop application is currently available for macOS. There's a roadmap outlining planned features for the near future.
Feel free to request any features you'd like to see, and I'll prioritize them accordingly.
One of the most important aspects of this application is that every command executed behind the scenes is displayed in a special log section. This allows you to see exactly what’s happening and learn from it.
Here's the link to the repository: https://github.com/Pulimet/ADBugger
App Description:
ADBugger is a desktop tool designed for debugging and QA of Android devices and emulators. It simplifies testing, debugging, and performance analysis by offering device management, automated testing, log analysis, and remote control capabilities. This ensures smooth app performance across various setups.
@Nihhaar
Nihhaar / audit2allow-sepolicy-android
Created August 22, 2017 20:50
Addressing selinux denials using audit2allow for android using logcat
# Goto android source code root and then execute following commands
# Keep the logcat.log in the root
export ANDROID_BUILD_TOP=$(pwd)
./external/selinux/prebuilts/bin/audit2allow -p out/target/product/{devicename}/root/sepolicy < logcat.log
# Copy the generated rules in respective files in the device tree