Skip to content

Instantly share code, notes, and snippets.

DrWhax / asus
Created May 22, 2016 — forked from jcs/asus
Disabling SPI write protection, reflashing, and unbricking an Asus Chromebook C201
View asus

####Disabling SPI write protection

Put the Chromebook in developer-mode:

  • With machine powered off, hold down Esc and Refresh(F3) while hitting power button
  • At warning prompt, hit Control+D, then Enter at prompt about enabling developer mode
  • Machine will format itself

Now remove the write-protect screw to enable flashrom to flash new Coreboot/Libreboot.

Flip powered-off machine over and remove 8 philips-head screws. 2 are located under rubber feet.

DrWhax / after crypttab update
Created Apr 24, 2016 — forked from v6ak/after crypttab update
Encrypting swap and largetmp with a random key; see!topic/qubes-users/X0BBZ-kfix0 for the context
View after crypttab update
$ sudo /usr/lib/systemd/system-generators/systemd-cryptsetup-generator
$ sudo systemctl daemon-reload
$ sudo systemctl restart

Keybase proof

I hereby claim:

  • I am DrWhax on github.
  • I am drwhax ( on keybase.
  • I have a public key whose fingerprint is EBDD 1240 CBC8 91C2 6C48 75D0 9586 D84B 70DC AE8C

To claim this, I am signing this object:

# This is a hack I wrote to overwrite $1 with the 4th Amendment.
# It's not pretty, it's not fast, but it works.
# If $1 is a device, when it's full, errors will be thrown and not handled.
# If $1 is not a device, the block device that it resides on will eventually
# fill up, if this script is left running.
# The next line will cause the script to exit on any errors, like
# when the device is full. Hey, I said it was a hack.
set -e
DrWhax / gist:7871636
Created Dec 9, 2013
resolve tor onion stuff without leaking data.
View gist:7871636
Enable the DNS and transparent proxy ports for Tor:
DNSPort 9053
TransPort 9040
AutomapHostsOnResolve 1
View gist:7503360
Relating to , I think it is actually a very good opportunity to work on a development/release process that would strenghten the security and reliability of cryptocat software.
The mains goals of these suggestions are:
- More stability of the security-critical code during the development and latest release.
- Better beta testing and less bugs/flaws in stable releases.
- Overall better documentation and making it easier for people to review our choices.
- Make it easier for the community to contribute. Many are willing, let's lower the barrier even more.
View rc.d
update-rc.d logstash-shipper defaults
update-rc.d logstash-reader defaults
View torrc
## Configuration file for a typical Tor user
## Last updated 16 July 2009 for Tor
## (May or may not work for much older or much newer versions of Tor.)
## Lines that begin with "## " try to explain what's going on. Lines
## that begin with just "#" are disabled commands: you can enable them
## by removing the "#" symbol.
## See 'man tor', or,
## for more options you can use in this file.
DrWhax /
Created Sep 11, 2012 — forked from koto/
It's not a crime to build a CRIME
# This is supposedly what CRIME by Juliano Rizzo and Thai Duong will do
# Algorithm by Thomas Pornin, coding by xorninja, improved by @kkotowicz
import string
import zlib
import sys
import random
charset = string.letters + string.digits + "%/+="
function print_help() {
echo "Easy 4-step NAT tool"
echo "Usage: $0 internal-dev external-dev ip-range"
echo ""
echo "internal-dev e.g. eth0"
echo "external-dev e.g. wlan0"
echo "ip-range e.g."
You can’t perform that action at this time.