Skip to content

Instantly share code, notes, and snippets.

View JJTech0130's full-sized avatar

JJTech JJTech0130

View GitHub Profile
@JJTech0130
JJTech0130 / unpin.js
Created September 5, 2022 13:09
Disable SSL pinning using Frida
// Disables SSL pinning by replacing functions with no-ops.
function unpin() {
var SecTrustEvaluate_handle = Module.findExportByName('Security', 'SecTrustEvaluate');
var SecTrustEvaluateWithError_handle = Module.findExportByName('Security', 'SecTrustEvaluateWithError');
var SSL_CTX_set_custom_verify_handle = Module.findExportByName('libboringssl.dylib', 'SSL_CTX_set_custom_verify');
var SSL_get_psk_identity_handle = Module.findExportByName('libboringssl.dylib', 'SSL_get_psk_identity');
var boringssl_context_set_verify_mode_handle = Module.findExportByName('libboringssl.dylib', 'boringssl_context_set_verify_mode');
if (SecTrustEvaluateWithError_handle) {
var SecTrustEvaluateWithError = new NativeFunction(SecTrustEvaluateWithError_handle, 'int', ['pointer', 'pointer']);
// ==UserScript==
// @name GitHub Project Issue Numbers
// @namespace https://jjtech.dev
// @description Appends issue numbers to issue titles
// @version 0.7
// @require https://code.jquery.com/jquery-3.6.0.slim.min.js
// @match https://github.com/*
// @icon https://github.githubassets.com/pinned-octocat.svg
// @inject-into content
// ==/UserScript==
@JJTech0130
JJTech0130 / UIApplication+VolumeButtons.swift
Created June 30, 2022 23:38
Extension for UIApplication that allows capturing Volume Button events in Swift
//
// UIApplication+VolumeButtons.swift
//
// Based on https://stackoverflow.com/a/70815088
//
import UIKit
// Stub protocol to allow us to call private methods
@objc private protocol UIApplicationPrivate {
@JJTech0130
JJTech0130 / GitHubLabelsFixup.user.js
Last active June 16, 2022 16:23
Greasemonkey script that moves labels on GitHub issues in front of the title
// ==UserScript==
// @name GitHub Labels Fixup
// @namespace https://jjtech.dev
// @description Moves labels on GitHub issues in front of the title
// @version 4.3
// @require https://code.jquery.com/jquery-3.6.0.slim.min.js
// @match https://github.com/*
// @icon https://github.githubassets.com/pinned-octocat.svg
// @inject-into content
// ==/UserScript==
panic(cpu 2 caller 0xffffff80061d38f3): Kernel trap at 0xffffff7f9effaaf6, type 14=page fault, registers:
CR0: 0x0000000080010033, CR2: 0x0000000000000000, CR3: 0x0000000399254041, CR4: 0x00000000003626e0
RAX: 0xffffff94eea9dc34, RBX: 0xffffff94ed936600, RCX: 0xffffff9021fc0d40, RDX: 0x0000000000000003
RSP: 0xffffffd040563840, RBP: 0xffffffd040563900, RSI: 0xffffff94eebc0e60, RDI: 0x0000000000000000
R8:  0xffffffd040563910, R9:  0xffffffff00000000, R10: 0x0000000000000001, R11: 0xffffff80070cce00
R12: 0x0000000000000000, R13: 0xffffff94eebc0e60, R14: 0xffffff94eea9dc00, R15: 0x0000000000000000
RFL: 0x0000000000010246, RIP: 0xffffff7f9effaaf6, CS:  0x0000000000000008, SS:  0x0000000000000010
Fault CR2: 0x0000000000000000, Error code: 0x0000000000000000, Fault CPU: 0x2, PL: 0, VF: 0
git clone -q --single-branch --branch msvc/master https://github.com/libimobiledevice-win32/libplist
git clone -q --single-branch --branch msvc/master https://github.com/libimobiledevice-win32/libusbmuxd
git clone -q --single-branch --branch msvc/master https://github.com/libimobiledevice-win32/libimobiledevice
git clone -q --single-branch --branch msvc/master https://github.com/libimobiledevice-win32/libideviceactivation
git clone -q --single-branch --branch msvc/master https://github.com/libimobiledevice-win32/ideviceinstaller
git clone -q --single-branch --branch msvc/master https://github.com/libimobiledevice-win32/libirecovery
git clone -q --single-branch --branch msvc/master https://github.com/libimobiledevice-win32/idevicerestore
git clone -q --single-branch --branch master-msvc https://github.com/libimobiledevice-win32/usbmuxd
git clone -q --single-branch --branch msvc/master https://github.com/libimobiledevice-win32/ios-webkit-debug-proxy
alert("hello 2");
<!DOCTYPE html>
<html>
<head>
</head>
<body>
<script>
alert(1);
</script>
</body>
</html>
@JJTech0130
JJTech0130 / dvmt-unlock.md
Last active May 12, 2022 17:32
Change DVMT pre-alloc. memory using RU.efi. Originally from Reddit.

WARNING: BIOS modding can be dangerous. You run the risk of bricking your device. I am not responsible for broken devices.

This tutorial was created for my HP Pavilion 15 laptop. I cannot confirm that this works on any other devices.


Finding variable

We need to find the offset, varstore, and possible values for the DVMT pre-alloc.

Extracting BIOS

Using the controllers on macOS

Download 360Controller