Skip to content

Instantly share code, notes, and snippets.

View CodeAsm's full-sized avatar
🌏
Doing my coding thingies

CodeAsm CodeAsm

🌏
Doing my coding thingies
View GitHub Profile
@pdp7
pdp7 / MAIX Bit Linux.md
Last active May 1, 2025 03:14
MAIX Bit Linux

The prebuild linux-5.6.0-rc1 image for Maix Boards https://twitter.com/SipeedIO/status/1228594799675990016

[    0.000000] Linux version 5.6.0-rc1-g9dbcd412b (vowstar@ryzen) (gcc version 9.2.0 (Buildroot 2020.02-git-g2ceb6f4a3f)) #5 SMP Sat Feb 15 13:02:55 CST 2020
[    0.000000] earlycon: sifive0 at MMIO 0x0000000038000000 (options '')
[    0.000000] printk: bootconsole [sifive0] enabled
[    0.000000] initrd not found or empty - disabling initrd
[    0.000000] Zone ranges:
[    0.000000]   DMA32    [mem 0x0000000080000000-0x00000000807fffff]
@vfsoraki
vfsoraki / svgtodxf.sh
Created January 20, 2020 10:42
Convert SVG to DXF in Linux using Inkscape and pstoedit
#! /bin/bash
# Install required applications
# Ubuntu:
# apt-get install inkscape pstoedit
# Arch:
# pacman -S inkscape pstoedit
function svgToEps()
{

Removing a Mac's Firmware Password By Reflashing EFI ROM

According to Apple, the only way to remove an unknown firmware password from a MacBook (2011 and later) is to take it to the Apple Store with the original proof-of-purchase. However, I've found that there is another way, which I've been successful with for the unibody MacBook Pro--it's essentially just modifying a couple bytes in the EFI ROM, which should be simple. What's not simple, however, is figuring out how to read and write to the EFI chip. In this post, I'll talk about the process that I figured out and what worked for me.

The Official Method

Apple's method of resetting the firmware password is not reproducible, as Apple generates an SCBO file that unlocks the EFI using their private key. You can read more about this process here. The problem with this system is that, if you are in the unfortunate situation of neither having the firmware unlock pass

@orangecms
orangecms / coreboot-p34v2.md
Last active September 22, 2025 17:04
Porting guide for coreboot: GIGABYTE P34G v2 / Schenker XMG C404

Porting coreboot to a Haswell / Lynx Point laptop: GIGABYTE P34G v2

This mainboard was sold by Schenker XMG as C404, while the original model name by GIGABYTE is P34G v2.

The board schematics are not publicly available. However, from another laptop board's schematics, we can learn a bit about the components it should have: laptop mainboard schematics

autoport

@snorey
snorey / mozlz4.py
Last active January 7, 2024 02:04
Simple tool to decode Firefox jsonlz4, baklz4 files
#!/usr/bin/python
# Command-line tool to decompress mozLz4 files used for example by Firefox to store various kinds of session backup information.
# Works in both Python 2.7.15 and 3.6.7, as of version 2.1.6 of the LZ4 Python bindings at pypi.org/project/lz4.
# To use in another script, simply cut and paste the import statement and the mozlz4_to_text() function (lines 8 to 17).
import lz4.block # pip install lz4 --user
def mozlz4_to_text(filepath):
# Given the path to a "mozlz4", "jsonlz4", "baklz4" etc. file,
@kazkansouh
kazkansouh / sendRawEth.c
Last active May 1, 2021 15:57 — forked from austinmarton/sendRawEth.c
Send a raw Ethernet frame in Linux
/*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* Based off code from:
* https://gist.github.com/austinmarton/1922600
*
* Modified to send hand crafted IPv6 NDP Neighbor
@phracker
phracker / unpackxip.md
Created August 5, 2018 20:40
Unpack XIP on Linux

Unpacking XIP files on Linux:

  1. Install xar from https://mackyle.github.io/xar/
  2. Install pbzx from https://github.com/NiklasRosenstein/pbzx (use gcc -llzma -lxar -I /usr/local/include pbzx.c -o pbzx and copy the binary into your PATH)
  3. use xar -xf XIP_FILE -C /path/to/extract/to
  4. Change to the directory where you extracted the file.
  5. Use pbzx -n Content | cpio -i to extract the contents.
@yellowbyte
yellowbyte / compiling_asm.md
Last active November 3, 2025 02:54
how to assemble assembly with NASM assembler to 32-bit or 64-bit ELF binary with or without libc

32-bit ELF binary

how to assemble and link:

nasm -f elf32 -o <filename>.o <filename>.asm
ld -m elf_i386 -o <filename> <filename>.o

template code (hello world):

section .text
global _start
@extremecoders-re
extremecoders-re / qemu-networking.md
Last active September 3, 2025 00:10
Setting up Qemu with a tap interface

Setting up Qemu with a tap interface

There are two parts to networking within QEMU:

  • The virtual network device that is provided to the guest (e.g. a PCI network card).
  • The network backend that interacts with the emulated NIC (e.g. puts packets onto the host's network).

Example: User mode network

@chrisdone
chrisdone / init
Created January 1, 2018 23:57
init file for qemu + linux + net
#!/bin/sh
mount -t devtmpfs devtmpfs /dev
mount -t proc none /proc
mount -t sysfs none /sys
mkdir -p /var/run/
mkdir -p /etc/network/if-down.d
mkdir -p /etc/network/if-post-down.d
mkdir -p /etc/network/if-post-up.d