Taken from:
- /etc/systemd/system/docker.socket
- /etc/systemd/system/docker.service
On CentOS 7.3 with docker cookbook 2.15.18.
#!/bin/bash | |
rm -rf bash-92 | |
curl -s https://opensource.apple.com/tarballs/bash/bash-92.tar.gz -o bash-92.tar.gz | |
curl -s https://ftp.gnu.org/pub/gnu/bash/bash-3.2-patches/bash32-052 -o bash32-052 | |
curl -s https://ftp.gnu.org/pub/gnu/bash/bash-3.2-patches/bash32-053 -o bash32-053 | |
curl -s https://ftp.gnu.org/pub/gnu/bash/bash-3.2-patches/bash32-054 -o bash32-054 |
Taken from:
On CentOS 7.3 with docker cookbook 2.15.18.
############################################################################### | |
# The MIT License | |
# | |
# Copyright 2012-2014 Jakub Jirutka <jakub@jirutka.cz>. | |
# | |
# Permission is hereby granted, free of charge, to any person obtaining a copy | |
# of this software and associated documentation files (the "Software"), to deal | |
# in the Software without restriction, including without limitation the rights | |
# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell | |
# copies of the Software, and to permit persons to whom the Software is |
function get_cert() | |
{ | |
local host="$1" | |
local port="$2" | |
if [ -z "$port" ] | |
then | |
port="443" | |
fi | |
openssl s_client -showcerts -connect $host:$port -servername $host </dev/null 2>/dev/null | openssl x509 -text -noout |
I hereby claim:
To claim this, I am signing this object:
// $ frida -l antiroot.js -U -f com.example.app --no-pause | |
// CHANGELOG by Pichaya Morimoto (p.morimoto@sth.sh): | |
// - I added extra whitelisted items to deal with the latest versions | |
// of RootBeer/Cordova iRoot as of August 6, 2019 | |
// - The original one just fucked up (kill itself) if Magisk is installed lol | |
// Credit & Originally written by: https://codeshare.frida.re/@dzonerzy/fridantiroot/ | |
// If this isn't working in the future, check console logs, rootbeer src, or libtool-checker.so | |
Java.perform(function() { | |
var RootPackages = ["com.noshufou.android.su", "com.noshufou.android.su.elite", "eu.chainfire.supersu", |
/cache/ |
As usual, use it at your own risk. I am not to be held responsible for your actions.
Supported devices: WNR1000v2 (tested by me), WNR1000v2-VC (provided by Comcast for free; tested by Douglas Fraser)
Notice: Upgrade WNR1000v2 to the latest factory firmware: 1.1.2.58. Otherwise, the power LED may not behave properly.
You need to place the device into failsafe mode. For booting into failsafe mode, you need to power up the device while holding the reset button with a pin. The power LED should have an amber colour. Hold the button until it is starting to flash green. It starts to flash green after it flashes the amber LED for six times. After that, the device is in failsafe mode, accepting a firmware via its TFTP server. The device should respond to pings at 192.168.1.1, although the responses may be malformed.