View DisableUpdateAutoReboot.reg
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Windows Registry Editor Version 5.00 | |
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU] | |
"NoAutoRebootWithLoggedOnUsers"=dword:00000001 |
View UACPromptAdminPassword.reg
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Windows Registry Editor Version 5.00 | |
;Force ask password on UAC for admin and users | |
;https://msdn.microsoft.com/en-us/library/cc232761.aspx | |
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System] | |
"ConsentPromptBehaviorAdmin"=dword:00000003 | |
"ConsentPromptBehaviorUser"=dword:00000003 |
View RestartWifiAdapter.ps1
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Get the network adapter object | |
$adapter = Get-WmiObject -Class Win32_NetworkAdapter | Where-Object {$_.Name -eq "Intel(R) Wireless-N 7260"} | |
# Disable it | |
Write-Host -nonew "Disabling Network Adapter $($adapter.Name) ... "; | |
$result = $adapter.Disable() | |
if ($result.ReturnValue -eq -0) { | |
Write-Host "Success."; | |
} else { | |
Write-Host "Failed."; |
View DisableAeroShake.reg
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Windows Registry Editor Version 5.00 | |
[HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Explorer] | |
"NoWindowMinimizingShortcuts"=dword:00000001 |
View TakeOwnership.reg
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Windows Registry Editor Version 5.00 | |
[HKEY_CLASSES_ROOT\*\shell\runas] | |
@="Take Ownership" | |
"NoWorkingDirectory"="" | |
[HKEY_CLASSES_ROOT\*\shell\runas\command] | |
@="cmd.exe /c takeown /f \"%1\" && icacls \"%1\" /grant administrators:F" | |
"IsolatedCommand"="cmd.exe /c takeown /f \"%1\" && icacls \"%1\" /grant administrators:F" |
View backup.bat
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
::robocopy C:\source M:\destination /MIR /FFT /R:3 /W:10 | |
::/MIR option (equivalent to /E /PURGE) stands for "mirror" and is the most important option. | |
::It regards your source folder as the "master", causing it to overwrite any changes on the target side, which is a useful setting for a backup. | |
::/FFT is a very important option, as it allows a 2-second difference when comparing timestamps of files, such that minor clock differences between your computer and your backup device don't matter. This will ensure that only modified files are copied over, even if file modification times are not exactly synchronized. | |
::/R:3 specifies the number of retries, if the connection should fail, and /W:10 specifies a wait time of 10 seconds between retries. These are useful options when doing the backup over a network. | |
::/Z copies files in "restart mode", so partially copied files can be continued after an interruption. | |
::credit: superuser.com/a/831868 | |
robocopy D:\ G:\ /MIR /FFT /R:3 /W:10 /Z /XJD |
View disableGPU.sh
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
cd / | |
umount /sys/firmware/efi/efivars/ | |
mount -t efivarfs rw /sys/firmware/efi/efivars/ | |
cd /sys/firmware/efi/efivars/ | |
printf "\x07\x00\x00\x00\x01\x00\x00\x00" > /sys/firmware/efi/efivars/gpu-power-prefs-fa4ce28d-b62f-4c99-9cc3-6815686e30f9 | |
chattr +i "/sys/firmware/efi/efivars/gpu-power-prefs-fa4ce28d-b62f-4c99-9cc3-6815686e30f9" | |
cd / | |
umount /sys/firmware/efi/efivars/ |
View gdb register search
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
define find | |
dont-repeat | |
set $_count=0 | |
while ($_count < $arg1) | |
if (($r0 == $arg0) || ($r1 == $arg0) || ($r2 == $arg0) || ($r3 == $arg0) || ($r4 == $arg0) || ($r5 == $arg0) || ($r6 == $arg0) || ($r7 == $arg0) || ($r8 == $arg0) || ($r9 == $arg0) || ($r10 == $arg0) || ($r11 == $arg0) || ($r12 == $arg0)) | |
break | |
set $_count=$arg1 | |
else | |
si | |
set $_count++ |
View gist:1f6945affdf9c14ecf93d2a48663e967
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
list applications: | |
adb shell 'pm list packages -f' | sed -e 's/.*=//' | sort | |
get path for app: | |
adb shell pm path com.app.name | |
extract app: | |
adb pull /path/to/app.apk |
View start pnkbstr(run as admin).bat
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
@ECHO OFF | |
::Flush DNS cache before starting anti-cheat software. | |
::I don't think punkbuster checks the DNS but VAC does: https://www.reddit.com/r/GlobalOffensive/comments/1y0kc1/ | |
::This is just a precaution. pnkbstr is still a joke ;) | |
ECHO Flushing DNS... | |
ipconfig /flushdns | |
::Start A so we can play the game without being kicked. | |
ECHO Starting Punkbuster... | |
NET START "PnkBstrA" |
OlderNewer