Skip to content

Instantly share code, notes, and snippets.

View WuskyDingo's full-sized avatar

Dingo WuskyDingo

View GitHub Profile

Keybase proof

I hereby claim:

  • I am wuskydingo on github.
  • I am gaytrash (https://keybase.io/gaytrash) on keybase.
  • I have a public key ASCtPTHrPpk4g4Rk87MXsrXgZBLT_78JOtp9SGjGk_jLXAo

To claim this, I am signing this object:

Alfonsos-iMac:ipwndfu dingo$ sudo ./ipwndfu -p
Password:
*** checkm8 exploit by axi0mX ***
Found: CPID:8015 CPRV:11 CPFM:03 SCEP:01 BDID:0E ECID:001949100484483A IBFL:3C SRTG:[iBoot-3332.0.0.1.23]
Device is now in pwned DFU Mode.
(0.87 seconds)
Alfonsos-iMac:ipwndfu dingo$ python ./rmsigchks.py
*** SecureROM Signature check remover by Linus Henze ***
*** Fake CA patch by L0W_P1X3L ***
Found: CPID:8015 CPRV:11 CPFM:03 SCEP:01 BDID:0E ECID:001949100484483A IBFL:3C SRTG:[iBoot-3332.0.0.1.23] PWND:[checkm8]
@WuskyDingo
WuskyDingo / log.txt
Created September 5, 2019 18:11
[Douglas] Kindle Fire HD 8 CM Boot Test (Stuck on Gray Amazon Logo)
--------- beginning of main
I/lowmemorykiller( 188): Using in-kernel low memory killer interface
W/auditd ( 186): type=2000 audit(0.0:1): initialized
I/auditd ( 186): type=1403 audit(0.0:2): policy loaded auid=4294967295 ses=4294967295
W/auditd ( 186): type=1404 audit(0.0:3): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295
W/init ( 1): type=1400 audit(0.0:4): avc: denied { relabelfrom } for name="modules" dev="mmcblk0p16" ino=1120115 scontext=u:r:init:s0 tcontext=u:object_r:system_file:s0 tclass=dir permissive=0
W/init ( 1): type=1400 audit(0.0:5): avc: denied { relabelfrom } for name="xbin" dev="mmcblk0p16" ino=1120138 scontext=u:r:init:s0 tcontext=u:object_r:system_file:s0 tclass=dir permissive=0
W/init ( 1): type=1400 audit(0.0:6): avc: denied { relabelfrom } for name="systemless-unicode9-ios10-Emoji" dev="mmcblk0p16" ino=1120183 scontext=u:r:init:s0 tcontext=u:object_r:system_file:s0 tclass=dir permissive=0
W/init ( 1): type=1400 audit(0.0:7): avc: denied { relabe
@WuskyDingo
WuskyDingo / gist:d47eb596a95b947c93de3dc708f69738
Created July 21, 2019 23:33
Unlock Verizon Google Pixel Bootloader
1. Remove sim from phone
2. Factory reset phone
3. Go through setup, leave everything as default
- Don't add any fingerprints or screen locking
- Don't connect to WiFi (yet)
4. Enable developer options, and enable usb debugging