Skip to content

Instantly share code, notes, and snippets.

@DrWhax
DrWhax / asus c201.md
Created May 22, 2016 — forked from jcs/asus c201.md
Disabling SPI write protection, reflashing, and unbricking an Asus Chromebook C201
View asus c201.md

####Disabling SPI write protection

Put the Chromebook in developer-mode:

  • With machine powered off, hold down Esc and Refresh(F3) while hitting power button
  • At warning prompt, hit Control+D, then Enter at prompt about enabling developer mode
  • Machine will format itself

Now remove the write-protect screw to enable flashrom to flash new Coreboot/Libreboot.

Flip powered-off machine over and remove 8 philips-head screws. 2 are located under rubber feet.

@DrWhax
DrWhax / after crypttab update
Created Apr 24, 2016 — forked from v6ak/after crypttab update
Encrypting swap and largetmp with a random key; see https://groups.google.com/forum/#!topic/qubes-users/X0BBZ-kfix0 for the context
View after crypttab update
$ sudo /usr/lib/systemd/system-generators/systemd-cryptsetup-generator
$ sudo systemctl daemon-reload
$ sudo systemctl restart cryptsetup.target
View keybase.md

Keybase proof

I hereby claim:

  • I am DrWhax on github.
  • I am drwhax (https://keybase.io/drwhax) on keybase.
  • I have a public key whose fingerprint is EBDD 1240 CBC8 91C2 6C48 75D0 9586 D84B 70DC AE8C

To claim this, I am signing this object:

View fourth_amendment.sh
#!/bin/bash
# This is a hack I wrote to overwrite $1 with the 4th Amendment.
# It's not pretty, it's not fast, but it works.
# If $1 is a device, when it's full, errors will be thrown and not handled.
# If $1 is not a device, the block device that it resides on will eventually
# fill up, if this script is left running.
# The next line will cause the script to exit on any errors, like
# when the device is full. Hey, I said it was a hack.
set -e
@DrWhax
DrWhax / gist:7871636
Created Dec 9, 2013
resolve tor onion stuff without leaking data.
View gist:7871636
Enable the DNS and transparent proxy ports for Tor:
torrc:
------
DNSPort 9053
TransPort 9040
AutomapHostsOnResolve 1
View gist:7503360
Relating to https://github.com/cryptocat/cryptocat/issues/502 , I think it is actually a very good opportunity to work on a development/release process that would strenghten the security and reliability of cryptocat software.
------------
The mains goals of these suggestions are:
- More stability of the security-critical code during the development and latest release.
- Better beta testing and less bugs/flaws in stable releases.
- Overall better documentation and making it easier for people to review our choices.
- Make it easier for the community to contribute. Many are willing, let's lower the barrier even more.
View rc.d
update-rc.d logstash-shipper defaults
update-rc.d logstash-reader defaults
View torrc
## Configuration file for a typical Tor user
## Last updated 16 July 2009 for Tor 0.2.2.1-alpha.
## (May or may not work for much older or much newer versions of Tor.)
##
## Lines that begin with "## " try to explain what's going on. Lines
## that begin with just "#" are disabled commands: you can enable them
## by removing the "#" symbol.
##
## See 'man tor', or https://www.torproject.org/tor-manual.html,
## for more options you can use in this file.
@DrWhax
DrWhax / crime.py
Created Sep 11, 2012 — forked from koto/crime.py
It's not a crime to build a CRIME
View crime.py
# This is supposedly what CRIME by Juliano Rizzo and Thai Duong will do
# Algorithm by Thomas Pornin, coding by xorninja, improved by @kkotowicz
# http://security.blogoverflow.com/2012/09/how-can-you-protect-yourself-from-crime-beasts-successor/
import string
import zlib
import sys
import random
charset = string.letters + string.digits + "%/+="
View nat.sh
#!/bin/sh
function print_help() {
echo "Easy 4-step NAT tool"
echo "Usage: $0 internal-dev external-dev ip-range"
echo ""
echo "internal-dev e.g. eth0"
echo "external-dev e.g. wlan0"
echo "ip-range e.g. 192.168.0.1/24"
}
You can’t perform that action at this time.