Skip to content

Instantly share code, notes, and snippets.

@sidmulajkar
sidmulajkar / enable-ech-in-browsers.md
Last active September 22, 2025 16:03
enable-ech-sni-in-chromium-browsers-like-brave-chrome-firefox
@theothernt
theothernt / apple-tv-screen-saver-feeds.txt
Last active October 6, 2025 10:46
A list of the feeds Apple uses for its video screensavers
tvOS 10: 1080p + H.264
http://a1.phobos.apple.com/us/r1000/000/Features/atv/AutumnResources/videos/entries.json
tvOS 11: 1080p/4K + SDR/HDR + HEVC
https://sylvan.apple.com/Aerials/2x/entries.json
https://t27q97zg19.execute-api.us-east-1.amazonaws.com/prod/aerialAltJSON/4kEntites.json
tvOS 12: 4K + SDR/HDR + HEVC, 1080p + H.264, localised descriptions
https://sylvan.apple.com/Aerials/resources.tar
@pzread
pzread / textile.md
Last active October 22, 2022 13:13

天衣無縫 ~ Fantastic Seamless Textile ~

When executing a ELF binary, Linux kernel will pass the memory address of PHDR(program header) to userspace by AT_PHDR entry of AUXV.

ld.so interpreter will parse the PHDR structure at memory addressAT_PHDR and resolve more ELF structures, such as dynamic section.

But Linux kernel wrongly calculate the PHDR address in memory.

NEW_AUX_ENT(AT_PHDR, load_addr + exec->e_phoff);
@einstein95
einstein95 / Project_EGG_shit.md
Last active March 17, 2025 04:41
Project EGG

Downloading

User-Agent: c384da2W9f73dz20403d

All files are in the format (P|)XXXYZZZa.bin

"X" is the company code, one of the following:

 'AGL', 'ARS', 'ART', 'ATN', 'BGT', 'BOT', 'BPS', 'CAR', 'COM', 'COS', 'DBS', 'DMB', 'EBS', 'FAL', 'FAM', 'FAS', 'FUG', 'GAR', 'GDA', 'GMD', 'GNX', 'HAM', 'HOK', 'HOT', 'HRZ', 'HUD', 'IMX', 'IPM', 'ISE', 'JLC', 'KNK', 'KNM', 'KSK', 'KUR', 'MCN', 'MEW', 'MIC', 'MIL', 'NCS', 'NIC', 'NTB', 'ONS', 'PHA', 'PON', 'POP', 'QSR', 'RDM', 'RIV', 'ROM', 'SAC', 'SKP', 'SNT', 'SPS', 'SQE', 'STW', 'SYS', 'TAE', 'TEL', 'THR', 'TZG', 'WIN', 'XTA', 'ZOM'
@peterk87
peterk87 / Python: Parse binary patterns from file and get unique patterns.py
Created April 19, 2013 18:01
Python: Parse binary patterns from file and get the unique binary patterns
# assuming that the file is tab-delimited ('\t')
delim = '\t'
# binary file path:
binary_patterns_filename = "binary_patterns.txt"
# get all of the lines in the binary patterns file
lines = [line.rstrip() for line in open(binary_patterns_filename, "r")]
# 1st line should contain the headers