Skip to content

Instantly share code, notes, and snippets.

Apr 10 18:45:01 zeph kernel: hid-generic 0003:1038:1838.014C: hiddev98,hidraw8: USB HID v1.11 Device [SteelSeries SteelSeries Aerox 3 Wireless] on usb-0000:07:00.4-2.1/input3
Apr 10 18:45:13 zeph cosmic-session[275482]: [2024-04-11T00:45:13Z WARN cosmic_text::font::system] failed to load font 'PowerlineSymbols'
Apr 10 18:45:25 zeph cosmic-session[275482]: process ' DISPLAY=:0 WAYLAND_DISPLAY=wayland-1 XDG_SESSION_TYPE=wayland WAYLAND_SOCKET=54 cosmic-greeter ' terminated with signal 15
Apr 10 18:45:25 zeph cosmic-session[275482]: draining stdin receiver before restarting process
Apr 10 18:45:25 zeph cosmic-session[275482]: sleeping for 12ms before restarting process cosmic-greeter (restart 1)
Apr 10 18:45:25 zeph cosmic-session[275482]: sending 1 fds
Apr 10 18:45:25 zeph cosmic-session[275482]: restarted process ' DISPLAY=:0 WAYLAND_DISPLAY=wayland-1 XDG_SESSION_TYPE=wayland WAYLAND_SOCKET=51 cosmic-greeter ', now at 2 restarts
Apr 10 18:45:25 zeph cosmic-session[275482]: [2024-04-11T00:45:25Z WARN cosmic_g
@colemickens
colemickens / amiibo-emulation-with-linux-vm.md
Last active March 23, 2024 03:37
amiibo-emulation-with-linux-vm.md

Easy Amiibo Emulation - https://bit.ly/2z0m09k

(^ that's a short-link to this page, so you can open it in Linux)

Some users are discussing this guide in #hacking on the JoyConDroid Discord: https://discord.gg/SQNEx9v.

DO NOT ask for, or share links to, Amiibo bins in the comments! They will be removed. Thank you for understanding.

(Windows|Linux PC) + JoyControl + Bluetooth = AMIIBO EMULATION

#!/usr/bin/env bash
set -x
set -euo pipefail
# TODO: maybe we need to upload our own AMI or something?
REGION="us-west-2"
AMI_ID="ami-073449580ff8e82b5" #NixOS-20.03.2351.f8248ab6d9e-aarch64-linux
#AMI_ID="ami-053c71bfc2f2ae88d" # NixOS-20.09alpha417.a780c60f9f7-aarch64-linux
@colemickens
colemickens / AuthyToOtherAuthenticator.md
Last active February 16, 2021 18:33 — forked from louiszuckerman/AuthyToOtherAuthenticator.md
Export TOTP tokens from Authy

Generating Authy passwords on other authenticators


There is an increasing count of applications which use Authy for two-factor authentication. However many users who aren't using Authy, have their own authenticator setup up already and do not wish to use two applications for generating passwords.

Since I use 1Password for all of my password storing/generating needs, I was looking for a solution to use Authy passwords on that. I couldn't find any completely working solutions, however I stumbled upon a gist by Brian Hartvigsen. His post had a neat code with it to generate QR codes (beware, through Google) for you to use on your favorite authenticator.

His method is to extract the secret keys using Authy's Google Chrome app via Developer Tools. If this was not possible, I guess people would be reverse engineering the Android app or something like that. But when I tried that code, nothing appeared on the screen. My gues

Dec 08 16:44:23 slynux kernel: usb 1-5.4: new full-speed USB device number 28 using xhci_hcd
Dec 08 16:44:23 slynux kernel: usb 1-5.4: New USB device found, idVendor=1050, idProduct=0407, bcdDevice= 4.37
Dec 08 16:44:23 slynux kernel: usb 1-5.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Dec 08 16:44:23 slynux kernel: usb 1-5.4: Product: Yubikey 4 OTP+U2F+CCID
Dec 08 16:44:23 slynux kernel: usb 1-5.4: Manufacturer: Yubico
Dec 08 16:44:23 slynux kernel: input: Yubico Yubikey 4 OTP+U2F+CCID as /devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.4/1-5.4:1.0/0003:1050:0407.0035/input/input61
Dec 08 16:44:23 slynux kernel: hid-generic 0003:1050:0407.0035: input,hidraw10: USB HID v1.10 Keyboard [Yubico Yubikey 4 OTP+U2F+CCID] on usb-0000:00:14.0-5.4/input0
Dec 08 16:44:23 slynux kernel: hid-generic 0003:1050:0407.0036: hiddev98,hidraw11: USB HID v1.10 Device [Yubico Yubikey 4 OTP+U2F+CCID] on usb-0000:00:14.0-5.4/input1
Dec 08 16:44:23 slynux pcscd[30419]: 11477515 ifdhandler.c:150:CreateChannelByNameOrChan
#!/usr/bin/env bash
set -x
set -euo pipefail
# TODO: maybe we need to upload our own AMI or something?
REGION="us-west-2"
#AMI_ID="ami-073449580ff8e82b5" #NixOS-20.03.2351.f8248ab6d9e-aarch64-linux
#AMI_ID="ami-09d0dda914bed4052" # Amazon Linux 2
AMI_ID="ami-053c71bfc2f2ae88d" # NixOS-20.09alpha417.a780c60f9f7-aarch64-linux
[accounts]
[accounts.test_gcal_api__gmail_com]
format = "imap"
identity = "test.gcal.api@gmail.com"
root_mailbox = "$HOME/.local/share/meli/test_gcal_api__gmail_com"
server_hostname = "imap.gmail.com"
server_password_command = "/nix/store/w9wc0d31p4z93cbgxijws03j5s2c4gyf-coreutils-8.31/bin/cat /run/secrets/gmail-meli-pw.txt"
server_port = 993
server_username = "test.gcal.api@gmail.com"
/dts-v1/;
/ {
compatible = "google,b1c1-sdm845\0qcom,sdm845";
qcom,board-id = <0x21505 0x00>;
model = "Google Inc. MSM sdm845 B1 DVT1.1";
interrupt-parent = <0x01>;
#address-cells = <0x02>;
#size-cells = <0x02>;
qcom,msm-id = <0x141 0x20001>;
source> trying https://github.com/swaywm/sway/archive/657587964e5d8e444ac64829a0aab309c25ff50f.tar.gz
source> % Total % Received % Xferd Average Speed Time Time Time Current
source> Dload Upload Total Spent Left Speed
source> trying https://github.com/swaywm/wlroots/archive/45c1a3621cc6874e5b5d9694015241668980df5d.tar.gz
source> % Total % Received % Xferd Average Speed Time Time Time Current
source> Dload Upload Total Spent Left Speed
source> 100 156 100 156 0 0 1026 0 --:--:-- --:--:-- --:--:-- 1033
source> 100 153 100 153 0 0 421 0 --:--:-- --:--:-- --:--:-- 421
source> 100 462k 0 462k 0 0 1142k 0 --:--:-- --:--:-- --:--:-- 5777k
source> unpacking source archive /build/45c1a3621cc6874e5b5d9694015241668980df5d.tar.gz
(bootloader) product:blueline
(bootloader) serialno:94HX1ZAW9
(bootloader) variant:SDM UFS
(bootloader) max-download-size:0x10000000
(bootloader) slot-suffixes:_a,_b
(bootloader) version-bootloader:b1c1-0.2-6374987
(bootloader) version-baseband:g845-00107-200409-B-6382632
(bootloader) secure-boot:PRODUCTION
(bootloader) secure:yes
(bootloader) hw-revision:MP1.0