Skip to content

Instantly share code, notes, and snippets.

🔰
Who teaches us to be normal when we’re one of a kind?

CHEF-KOCH

🔰
Who teaches us to be normal when we’re one of a kind?
Block or report user

Report or block CHEF-KOCH

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
@CHEF-KOCH
CHEF-KOCH / Proxy-list-2020-edition.txt
Last active May 13, 2020
Proxy List [2020 Edition]
View Proxy-list-2020-edition.txt
http://www.hidemyass.com/proxylist/
http://www.samair.ru/proxy/
http://www.proxy4free.com/page1.html
http://www.stayinvisible.com/
http://www.proxz.com/
@CHEF-KOCH
CHEF-KOCH / How to Setup & download from Usenet.md
Created Apr 27, 2020
How to Setup & download from Usenet
View How to Setup & download from Usenet.md
@CHEF-KOCH
CHEF-KOCH / How To Remove Pattern On Android Without Factory Resetting.txt
Created Apr 25, 2020
How To Remove Pattern On Android Without Factory Resetting
View How To Remove Pattern On Android Without Factory Resetting.txt
Unlock Locked Pattern Without Losing Data!
Requirements:
- Aroma File Manager
- A memory card for device.
- Your android device must be either locked by pattern lock or password lock.
How To?
1. After you download “Aroma File Manager” place it in your card [SD CARD] Insert card into your locked android device.
@CHEF-KOCH
CHEF-KOCH / Win10HometoPro.cmd
Last active May 19, 2020
Convert Windows 10 Home to Pro
View Win10HometoPro.cmd
cscript.exe %windir%\system32\slmgr.vbs /rilc
cscript.exe %windir%\system32\slmgr.vbs /upk
cscript.exe %windir%\system32\slmgr.vbs /ckms
cscript.exe %windir%\system32\slmgr.vbs /cpky
cscript.exe %windir%\system32\slmgr.vbs /ipk VK7JG-NPHTM-C97JM-9MPGT-3V66T
sc config LicenseManager start= auto & net start LicenseManager
sc config wuauserv start= auto & net start wuauserv
clipup -v -o -altto c:\
@CHEF-KOCH
CHEF-KOCH / blockallbutUSA.sh
Created Apr 21, 2020
Block all traffic except from a specific country
View blockallbutUSA.sh
#!/bin/bash
### BACKUP THE CURRENT RULESET FIRST
/sbin/iptables-save > /backup/iptables-last.txt
ISO="af au al dz aq br ar cn lb my ly lr la jp jm jo kz ke hk ml mx fm md mc mn ms ma mz mm nr na np nl an nc nz ni ne ng nu nf mp no om pk pw pa pg py pe ph pn pl pt pr qa re ro ru rw kn lc vc ws sm st sn sa sc sl sg sk si sb so za gs es lk sh pm sd sr sj sz se ch sy tw tj tz th tg tk to tt tn tr tm tc tv ug ua ae gb um uy uz vu ve vn vg vi wf eh ye yu zm zw ie in il ir hn"
# PATH
IPT=/sbin/iptables
WGET=/usr/bin/wget
EGREP=/bin/egrep
@CHEF-KOCH
CHEF-KOCH / How to get 36TB+ of free cloud storage.txt
Created Apr 17, 2020
How to get 36TB+ of free cloud storage
View How to get 36TB+ of free cloud storage.txt
Sign up at Yunpan.360.cn to get 360GB of free storage, it can be extended up to 36TB by downloading the PC and Android/iOS clients!
http://yunpan.360.cn/
Sign up at Ozibox.com to get 100GB of free storage.
http://ozibox.com/
Sign up at SurDoc.com to get 100GB of free storage.
http://surdoc.com/
Sign up at Shared.com to get 100GB of free storage.
@CHEF-KOCH
CHEF-KOCH / Signature Spoofing patching for Android Q.sh
Created Apr 9, 2020
Signature Spoofing patching for Android Q
View Signature Spoofing patching for Android Q.sh
#!/bin/sh
#
# Script to patch deodexed Android Q devices with sigspoof patches
urlpatcher="https://github.com/DexPatcher/dexpatcher-tool/releases/download/v1.8.0-alpha4/dexpatcher-1.8.0-alpha4.jar";
urlpatchhook="https://github.com/lanchon/haystack/raw/master/patches/sigspoof-hook-7.0-9.0/services.jar.dex";
urlpatchcore="https://github.com/lanchon/haystack/raw/master/patches/sigspoof-core/services.jar.dex";
error() {
echo;
@CHEF-KOCH
CHEF-KOCH / Method 1 - Windows Firewall
Created Mar 30, 2020
WireGuard/OpenVPN Killswitch for Windows
View Method 1 - Windows Firewall
No third party applications needed is needed! This solution works via Windows own Firewall.
1. Set default outgoing traffic policy to "enabled" for public networks
2. Set default outgoing traffic policy to "disabled" outgoing traffic for private networks
3. Enable tcp/udp connections to VPN port (1194 is default openvpn port)
4. Enable tcp/udp port 53 traffic for private networks (optional, only if you use DNS name to connect to VPN)
5. Ensure that your openvpn network adapter is public and wifi/ethernet adapter is private. This is done by toggling "discover devices on this network" switch somewhere in network settings.
So whenever the VPN is not connected you will be able to only query DNS names and connect to port 1194 which is openvpn.
@CHEF-KOCH
CHEF-KOCH / Allowed IPs range
Last active Mar 30, 2020
Allow LAN traffic on Windows via WireGuard
View Allowed IPs range
Allow IP ranges (not to mention that you need to change this based on your route print output and according to your own interface.
Example:
0.0.0.0/1, 128.0.0.0/2, 192.64.0.0/10, 192.128.0.0/11, 192.167.0.0/13, 192.169.0.0/16, 192.170.0.0/16, 192.171.0.0/16, 192.172.0.0/16, 192.173.0.0/16, 192.174.0.0/16, 192.175.0.0/16, 192.176.0.0/12, 192.192.0.0/10, 193.0.0.0/8, 194.0.0.0/8, 195.0.0.0/8, 196.0.0.0/8, 197.0.0.0/8, 198.0.0.0/8, 199.0.0.0/8, 200.0.0.0/8, 201.0.0.0/8, 202.0.0.0/8, 203.0.0.0/8, 204.0.0.0/8, 205.0.0.0/8, 206.0.0.0/8, 207.0.0.0/8, 208.0.0.0/4, 224.0.0.0/3, ::/0
Via .conf file:
AllowedIPs = 0.0.0.0/5, 8.0.0.0/7, 11.0.0.0/8, 12.0.0.0/6, 16.0.0.0/4, 32.0.0.0/3, 64.0.0.0/2, 128.0.0.0/3, 160.0.0.0/5, 168.0.0.0/6, 172.0.0.0/12, 172.32.0.0/11, 172.64.0.0/10, 172.128.0.0/9, 173.0.0.0/8, 174.0.0.0/7, 176.0.0.0/4, 192.0.0.0/9, 192.128.0.0/11, 192.160.0.0/13, 192.169.0.0/16, 192.170.0.0/15, 192.172.0.0/14, 192.176.0.0/12, 192.192.0.0/10, 193.0.0.0/8, 194.0.0.0/7, 196.0.0.0/6, 200.0.0.0/5, 208.0.0.0/4, 8.
@CHEF-KOCH
CHEF-KOCH / Killswitch.conf
Last active Mar 30, 2020
WireGuard Linux Killswitch
View Killswitch.conf
[Interface]
PrivateKey = <key>
Address = XXX,XXX
DNS = <dns>
PostUp = iptables -I OUTPUT ! -o %i -m mark ! --mark $(wg show %i fwmark) -m addrtype ! --dst-type LOCAL -j REJECT && ip6tables -I OUTPUT ! -o %i -m mark ! --mark $(wg show %i fwmark) -m addrtype ! --dst-type LOCAL -j REJECT
PreDown = iptables -D OUTPUT ! -o %i -m mark ! --mark $(wg show %i fwmark) -m addrtype ! --dst-type LOCAL -j REJECT && ip6tables -D OUTPUT ! -o %i -m mark ! --mark $(wg show %i fwmark) -m addrtype ! --dst-type LOCAL -j REJECT
PostUp = iptables -I OUTPUT -o %i -d 10.0.0.0/8 -j REJECT
PostUp = iptables -I INPUT -i %i -s 10.0.0.0/8 -j DROP
PreDown = iptables -D OUTPUT -o %i -d 10.0.0.0/8 -j REJECT
PreDown = iptables -D INPUT -i %i -s 10.0.0.0/8 -j DROP
You can’t perform that action at this time.