Skip to content

Instantly share code, notes, and snippets.

DrWhax DrWhax

Block or report user

Report or block DrWhax

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
DrWhax / asus
Created May 22, 2016 — forked from jcs/asus
Disabling SPI write protection, reflashing, and unbricking an Asus Chromebook C201
View asus

####Disabling SPI write protection

Put the Chromebook in developer-mode:

  • With machine powered off, hold down Esc and Refresh(F3) while hitting power button
  • At warning prompt, hit Control+D, then Enter at prompt about enabling developer mode
  • Machine will format itself

Now remove the write-protect screw to enable flashrom to flash new Coreboot/Libreboot.

Flip powered-off machine over and remove 8 philips-head screws. 2 are located under rubber feet.

DrWhax / after crypttab update
Created Apr 24, 2016 — forked from v6ak/after crypttab update
Encrypting swap and largetmp with a random key; see!topic/qubes-users/X0BBZ-kfix0 for the context
View after crypttab update
$ sudo /usr/lib/systemd/system-generators/systemd-cryptsetup-generator
$ sudo systemctl daemon-reload
$ sudo systemctl restart

Keybase proof

I hereby claim:

  • I am DrWhax on github.
  • I am drwhax ( on keybase.
  • I have a public key whose fingerprint is EBDD 1240 CBC8 91C2 6C48 75D0 9586 D84B 70DC AE8C

To claim this, I am signing this object:

# This is a hack I wrote to overwrite $1 with the 4th Amendment.
# It's not pretty, it's not fast, but it works.
# If $1 is a device, when it's full, errors will be thrown and not handled.
# If $1 is not a device, the block device that it resides on will eventually
# fill up, if this script is left running.
# The next line will cause the script to exit on any errors, like
# when the device is full. Hey, I said it was a hack.
set -e
DrWhax / gist:7871636
Created Dec 9, 2013
resolve tor onion stuff without leaking data.
View gist:7871636
Enable the DNS and transparent proxy ports for Tor:
DNSPort 9053
TransPort 9040
AutomapHostsOnResolve 1
View gist:7503360
Relating to , I think it is actually a very good opportunity to work on a development/release process that would strenghten the security and reliability of cryptocat software.
The mains goals of these suggestions are:
- More stability of the security-critical code during the development and latest release.
- Better beta testing and less bugs/flaws in stable releases.
- Overall better documentation and making it easier for people to review our choices.
- Make it easier for the community to contribute. Many are willing, let's lower the barrier even more.
View rc.d
update-rc.d logstash-shipper defaults
update-rc.d logstash-reader defaults
View torrc
## Configuration file for a typical Tor user
## Last updated 16 July 2009 for Tor
## (May or may not work for much older or much newer versions of Tor.)
## Lines that begin with "## " try to explain what's going on. Lines
## that begin with just "#" are disabled commands: you can enable them
## by removing the "#" symbol.
## See 'man tor', or,
## for more options you can use in this file.
DrWhax /
Created Sep 11, 2012 — forked from koto/
It's not a crime to build a CRIME
# This is supposedly what CRIME by Juliano Rizzo and Thai Duong will do
# Algorithm by Thomas Pornin, coding by xorninja, improved by @kkotowicz
import string
import zlib
import sys
import random
charset = string.letters + string.digits + "%/+="
function print_help() {
echo "Easy 4-step NAT tool"
echo "Usage: $0 internal-dev external-dev ip-range"
echo ""
echo "internal-dev e.g. eth0"
echo "external-dev e.g. wlan0"
echo "ip-range e.g."
You can’t perform that action at this time.