Skip to content

Instantly share code, notes, and snippets.

View ctrlaltkills's full-sized avatar
💀
Blue screened.

Jerry Isbell ctrlaltkills

💀
Blue screened.
  • Earth
  • 17:51 (UTC -05:00)
View GitHub Profile
@ctrlaltkills
ctrlaltkills / 1639393364.txt
Created December 13, 2021 11:03
Created with Copy to Gist
In fact, everything is not complicated! ( Too confuse you not to ) use ( also dancing with tambourines ), a program with playmarket NEXMON for perhvatov henshekov with built-in adapter ( there is in it plus and minus at the same time records only full hendsh ie 4 Pack ) , and for everything else, the NenHunter described above with an external USB WiFi adapter as a whistle from Tp-link and the vaunted ALFA until laziness won out and began to read the documentation in English ( with the help of the translator's hum, of course! ) The described technique works, as I understand it, only Nexus, because a moddriver was written for it, but maybe I'm wrong! Using a mobile phone with an external USB WiFi adapter, the list of models is wide, although not many models are officially supported, but there are quite a few assemblies for a specific model (google help ) The assemblies indicated in the links below may not correspond to what I have! from above, the elementax kernel was also rolled up, which I should note did n
@ctrlaltkills
ctrlaltkills / 1639344690.txt
Created December 12, 2021 21:32
Created with Copy to Gist
When trying to install some binaries (doesn't matter which one), I get this error:
mount: '/dev/block/platform/msm_sdcc.1/by-name/system' -> 'system': Device or resource busy
Im currently on Android N by fake nexus
I have root access and busybox installed
We currently do not support Android N as the toybox based mount command does not work to remount the system partition with write permissions. You might solve the issue by pointing the symlink of your mount binary under /system/bin/mount to your busybox installation.
Like Quote ReplyReport
C
@ctrlaltkills
ctrlaltkills / 1632364833.txt
Created September 23, 2021 02:40
Created with Copy to Gist
iwconfig
Появился интерфейс wlan1 в auto mode
 # 
 20% оригинала
1440 x 2560 (236,11 КБ)
@ctrlaltkills
ctrlaltkills / 1632357467.txt
Created September 23, 2021 00:37
Created with Copy to Gist
mount -o remount, rw /
cp /data/data/material.hunter/files/scripts/bootkali* / system / bin /
cp /data/data/material.hunter/files/scripts/killkali / system / bin /
cp / data / data / material.hunter / files / scripts / bin / busybox_nh / system / bin
chmod 755 / system / bin / * kali *
chmod 755 / system / bin / busybox_nh
@ctrlaltkills
ctrlaltkills / 1632267583.txt
Created September 21, 2021 23:39
Created with Copy to Gist
How to Bypass FRP LG Phoenix 3
Turn ON your LG Phoenix 3.
Now at the same time Press & hold an Emergency call then keep tapping on Start Arrow
Once the LG homepage appears don’t touch anything.
Wait until the factory reset ends, then your LG Phoenix 3 Restart automatically.
That’s how you can Bypass FRP LG Phoenix 3 Android 7.0 Nougat LG M150 Unlock FRP.
@ctrlaltkills
ctrlaltkills / 1632267513.txt
Created September 21, 2021 23:38
Created with Copy to Gist
Bypass code for calling while FRP locked
Code No.1: at+creg?\r\n
Code No.2: atd198;\r\n
@ctrlaltkills
ctrlaltkills / 1631926135.txt
Created September 18, 2021 00:48
Created with Copy to Gist
Running Debian binaries outside the chroot
If you need to run binaries from inside the chroot outside the chroot, you can use ld.so:
export SDCARD=/mnt/sdcard
export ROOT=$SDCARD/debian
export LD_LIBRARY_PATH=$ROOT/lib:$ROOT/lib/arm-linux-gnueabi:$ROOT/lib/arm-linux-gnueabihf:$ROOT/usr/lib:$ROOT/usr/lib/arm-linux-gnueabi:$ROOT/usr/lib/arm-linux-gnueabihf
cd $ROOT
./lib/ld-linux-*.so* bin/ls
@ctrlaltkills
ctrlaltkills / 1631916528.txt
Created September 17, 2021 22:08
Created with Copy to Gist
if the libnexmonkali is built with -s (stripped), it doesn't ask for the other libs. Anyway, fixed channel -1 is still there for all the time, so have give up for now
Can you please provide instructions on how you built kalilibnexmon.so? I have been able to build my own libnexmon.so from the nexmon sources just fine, but I can't find instructions on how to build it for the Kali chroot environment.
Reply With Quote
2020-10-24#8yesimxev
Member
Join Date
2016-Nov
Posts
32
@ctrlaltkills
ctrlaltkills / 1631845188.txt
Created September 17, 2021 02:19
Created with Copy to Gist
Android NDK standalone toolchains:
mkdir ~/build/ndk
mkdir ~/build/toolchain
cd ~/build/ndk
wget http://dl.google.com/android/ndk/android-ndk-r10e-linux-x86_64.bin
chmod +x android-ndk-r10e-linux-x86_64.bin
./android-ndk-r10e-linux-x86_64.bin
cd android-ndk-r10e
build/tools/make-standalone-toolchain.sh --platform=android-21 --toolchain=arm-linux-androideabi-4.9 --install-dir="$HOME/build/toolchain/android-armhf-4.9"
@ctrlaltkills
ctrlaltkills / chocoInstalll.txt
Created September 10, 2021 21:47
Created with Copy to Gist
Here's how I did it:
root the tablet by installing twrp, dm_verity and magisk
boot into Android
install root_checker and verify that the device is rooted
install Meefik's busybox but don't run the internal installer
From adb shell session or connectbot or other terminal application (log in and su)
cd /data/data/ru.meefik.busybox/files/scripts