How to root and flash samsung galaxy s5 mini (SM-G800F)
- XDA thread refers to work from
aykevl
- TWRP for Samsung Galaxy S5 Mini Exynos
- Unofficial LineageOS ROMs for the Samsung Galaxy S5 Mini (G800F)
# IMPORTANT! | |
# This gist has been transformed into a github repo | |
# You can find the most recent version there: | |
# https://github.com/Neo23x0/auditd | |
# ___ ___ __ __ | |
# / | __ ______/ (_) /_____/ / | |
# / /| |/ / / / __ / / __/ __ / | |
# / ___ / /_/ / /_/ / / /_/ /_/ / | |
# /_/ |_\__,_/\__,_/_/\__/\__,_/ |
How to root and flash samsung galaxy s5 mini (SM-G800F)
aykevl
{ | |
"syncToken": "1615344252", | |
"createDate": "2021-03-10-02-44-12", | |
"prefixes": [ | |
{ | |
"ip_prefix": "3.5.140.0/22", | |
"region": "ap-northeast-2", | |
"service": "AMAZON", | |
"network_border_group": "ap-northeast-2" | |
}, |
:: Windows 10 Hardening Script | |
:: This is based mostly on my own personal research and testing. My objective is to secure/harden Windows 10 as much as possible while not impacting usability at all. (Think being able to run on this computer's of family members so secure them but not increase the chances of them having to call you to troubleshoot something related to it later on). References for virtually all settings can be found at the bottom. Just before the references section, you will always find several security settings commented out as they could lead to compatibility issues in common consumer setups but they're worth considering. | |
:: Obligatory 'views are my own'. :) | |
:: Thank you @jaredhaight for the Win Firewall config recommendations! | |
:: Thank you @ricardojba for the DLL Safe Order Search reg key! | |
:: Thank you @jessicaknotts for the help on testing Exploit Guard configs and checking privacy settings! | |
:: Best script I've found for Debloating Windows 10: https://github.com/Sycnex/Windows10Debloater | |
: |
Rough summary of developing BadRabbit info | |
------------------------------------------ | |
BadRabbit is locally-self-propagating ransomware (ransom: 0.05 BTC), spreading via SMB once inside. | |
Requires user interaction. | |
Mostly targeting Russia and Ukraine so far, with a few others (Germany, Turkey, Bulgaria, Montenegro ...) | |
Not globally self-propagating, but could be inflicted on selected targets on purpose. | |
May be part of same group targeting Ukraine generally (BACKSWING) (per FireEye) | |
Confirmed to use ETERNALROMANCE exploit, and same source code and build chain as NotPetya (per Talos) | |
Mitigations are similar to Petya/NotPetya resistance. An inoculation is also available (see below). |
# ALWAYS make sure "127.0.0.1 localhost" is the first line in your /hosts file | |
# or your system or browser may malfunction! | |
# See https://en.wikipedia.org/wiki/Hosts_file to find the standard locations | |
# of the HOSTS file for your particular OS. In Linux (and probably BSD), it's | |
# usually under /etc/hosts | |
# Yes, I know there are some redundant entries in this block--you can grep it | |
# and remove them yourself if it really matters. I'm too lazy to do it myself. |
################################################################################ | |
# PRIVACY RULES # | |
# * OSX EL CAPITAN - NO CONNECTIONS TO CUPPERTINO * # | |
# MIX OF DIFFERENT /etc/hosts FILES I'VE FOUND. 80% OF THE ENTRIES CAME FROM # | |
# MY OWN. OSX SENDS HUGE AMMOUNT OF REQUESTS TO CUPPERTINO EVENT WHEN # | |
# SPOTLIGHT SUGGESTIONS, ICLOUD, AND OTHER SERVICES ARE DISABLED # | |
# USE IT IF YOU DON'T LIKE OSX CALLING HOME WHEN YOU DON'T WANT IT TO HAPPEN # | |
# NO CONNECTIONS TO APPLE SERVERS REPORTED BY MY FIREWALL FOR 2 MONTHS # | |
################################################################################ | |
# SAVED FROM: http://pastebin.com/GfaXGL4r |
# One liner | |
wget --recursive --page-requisites --adjust-extension --span-hosts --convert-links --restrict-file-names=windows --domains yoursite.com --no-parent yoursite.com | |
# Explained | |
wget \ | |
--recursive \ # Download the whole site. | |
--page-requisites \ # Get all assets/elements (CSS/JS/images). | |
--adjust-extension \ # Save files with .html on the end. | |
--span-hosts \ # Include necessary assets from offsite as well. | |
--convert-links \ # Update links to still work in the static version. |
Lost in Translation - A repository of the leaked tools
MS17-010 - Port of some of the exploits to Windows 10
I am moving this gist to a github repo so more people can contribute to it. Also, it makes it easier for me to version control.
Please go to - https://github.com/praveenpuglia/shadow-dom-in-depth for latest version of this document. Also, if you find the document useful, please shower your love, go ⭐️ it. :)
Heads Up! It's all about the V1 Spec.
In a nutshell, Shadow DOM enables local scoping for HTML & CSS.