Skip to content

Instantly share code, notes, and snippets.

View KernelAtom's full-sized avatar
🏠
Working from home

Stephan Burgos KernelAtom

🏠
Working from home
View GitHub Profile
@PaulCreusy
PaulCreusy / SelfSignWindowsExecutable.md
Last active October 9, 2025 16:05
How to self-sign a Windows executable created with Pyinstaller

How to self-sign a Windows package created with Pyinstaller

This document aims to explain all the necessary steps to self-sign a Windows executable.

⚠️ Warning
Some of the commands provided need to be completed. The fields to complete are indicated by the characters < and >.

Prerequisites

Please make sure to match all the prerequisite before starting the process of signing the package.

@darwin
darwin / readme.md
Created November 16, 2020 21:59
APFS Container cloning/replicating under macOS 11.0 (Big Sur) - with a bootable system

It is the year 2020 and replicating APFS containers still sucks. One would expect it would be a simple copy and paste in the Disk Utility app but this is still far from reality.

Last year I wrote how I managed to clone my macOS system under Catalina. The main trick was to create a DMG file with multiple volumes, mount it on target machine and drop to command-line to do asr restore from synthetised disk while avoiding possible pitfalls.

The good news is that Apple devs definitely worked on improving this under Big Sur and added some documentation (see man asr). But I didn't understand it fully on first read. Maybe someone could explain how is this supposed to work?

@darwin
darwin / readme.md
Last active April 9, 2024 22:30
APFS Container cloning/replicating under Catalina (with a bootable system)

Today I wanted to move existing APFS-resident macOS Catalina installation to a new disk. I upgraded my late 2014 Mac Mini with a shiny new 1TB SSD. This took way too many hours of my life I will never get back. Hope this saves some time to you.

Good news:

  1. it is possible to create a DMG image from existing APFS container with macOS Catalina installation including metadata needed for complete restore (the DMG contains OS, OS Data, Preboot, Recovery and VM volumes)
  2. it is possible to restore this DMG image into empty APFS container and get a bootable copy of the original system

This information is relevant for Catalina (I'm currently running macOS 10.15.1).

@Ashok-Varma
Ashok-Varma / install_android_sdk_tools_in_linux_for_custom_ci.md
Last active September 5, 2025 16:37
Install Android SDK tools in linux. Can be used for custom CI (Continuous Integration)
@kayqueteixeira
kayqueteixeira / android-sdk-ndk-installer.sh
Last active July 9, 2025 07:53
Android SDK and NDK installer for Linux.
#!/bin/bash
# Installing Android SDK
cd /opt
echo "Downloading Android SDK..."
wget https://dl.google.com/android/repository/sdk-tools-linux-3859397.zip
unzip sdk-tools-linux-3859397.zip -d android-sdk
rm sdk-tools-linux-3859397.zip
@nealdav
nealdav / marketing.py
Created August 26, 2016 12:33 — forked from pudquick/marketing.py
Using PrivateFrameworks to get marketing model information for Apple Macs without hitting their internet API (where possible) via python and pyobjc
# Tested on 10.11
# Note:
# The marketing information embedded in the ServerInformation.framework is not the same as what
# About This Mac displays - there are differences.
#
# For example:
# ServerInformation: 15" MacBook Pro with Retina display (Mid 2015)
# About This Mac: MacBook Pro (Retina, 15-inch, Mid 2015)
#
@herrcore
herrcore / quick_ioctl_decoder.py
Created August 14, 2016 02:53
IDA Python plugin - Decode IOCTL Codes
############################################################################################
##
## Quick IOCTL Decoder!
##
## All credit for actual IOCTL decode logic:
## http://www.osronline.com/article.cfm?article=229
##
##
## To install:
## Copy script into plugins directory, i.e: C:\Program Files\IDA 6.8\plugins
@Cr4sh
Cr4sh / ami_smi_dump.py
Last active August 9, 2024 13:41
Extract SW SMI handlers information from SMRAM dump of Skylake based AMI Aptio V firmware
'''
###########################################################################
Extract SW SMI handlers information from SMRAM dump of Skylake based
AMI Aptio V firmware.
To use full capabilities of this tool you need to install UEFIDump
(https://github.com/LongSoft/UEFITool/releases/tag/A32), ida-efiutils
(https://github.com/snare/ida-efiutils) and edit corresponding variables
below.
@muzizongheng
muzizongheng / AccessCSDN.py
Last active August 22, 2025 13:45
login CSDN by using urllib
#Use this utility to access CSDN blog.
#Author: jiangong li
#Email: Jgli_2008@sina.com
import base64
from http import cookiejar
import urllib.request, urllib.parse, urllib.error
#url for accessing
csdnLoginUrl = r"http://passport.csdn.net/ajax/accounthandler.ashx?"
@ayosec
ayosec / Makefile
Created January 27, 2012 12:37
Wrap ioctls
all: fakeioctl.so
CFLAGS=-D_GNU_SOURCE -g -Wall
fakeioctl.so: fakeioctl.c
gcc $(CFLAGS) -fPIC -shared -ldl -o fakeioctl.so fakeioctl.c
.PHONY: all clean