Skip to content

Instantly share code, notes, and snippets.

@drewreece
drewreece / dvd recovery with ddrescue.sh
Last active Mar 8, 2020
dvd recovery with ddrescue
View dvd recovery with ddrescue.sh
#Run against the device
ddrescue -r 1 -b 2048 /dev/diskN diskname.iso diskname.log
#test the iso, if its borked try
#Re-run against the raw device
ddrescue -b 2048 /dev/rdiskN diskname.iso diskname.log
#SEE
#http://ask.metafilter.com/68265/But-its-just-a-little-scratch
#http://www.gentoo-wiki.info/HOWTO_Backup_a_DVD
@drewreece
drewreece / Find while hiding Permissions errors.sh
Created Mar 8, 2020
Find while hiding Permissions errors
View Find while hiding Permissions errors.sh
find / -iname "*.txt" 2>/dev/null
View patch.sh
patch < file.patch
@drewreece
drewreece / test-send.py
Last active Aug 31, 2016
Sends Pokémon stickers for testing pokealarm
View test-send.py
# -*- coding: utf-8 -*-
# drop into alarms/Telegram/ & run in that directory
import telepot
import json
import os
import sys
import time
target_chat = "TELEGRAM_CHAT-ID"
@drewreece
drewreece / get-spawns.py
Last active Apr 8, 2020
Get spawns from pogom.db & make spawns.json
View get-spawns.py
# place in PokemonGo-Map directory to use with
# https://github.com/PokemonGoMap/PokemonGo-Map
from pogom.app import Pogom
from pogom import models
import json
from pogom.models import Pokemon, init_database
import os.path
import sys
outputFile = 'spawns.json'
@drewreece
drewreece / AHT-my-disk.sh
Last active Feb 25, 2020
Install Apple Hardware Test to a volume and bless the AHT
View AHT-my-disk.sh
#!/bin/sh
#
# AHT My Disk
#
# Copy Apple Hardware Test to a volume and bless the hardware test to be bootable
#
# Useful list of AHT & models from upekkha - https://github.com/upekkha/AppleHardwareTest thx u :)
# find your model details & get the AHT disk image
## sysctl hw.model | awk '{ print $2 }'
## ioreg -l | grep board-id | awk -F\" '{ print $4 }'
@drewreece
drewreece / Backup-iOS-Apps.sh
Last active Mar 8, 2020
Find all iOS apps in a directory and remove duplicates with the same file name
View Backup-iOS-Apps.sh
#!/bin/sh
#
# NOTE: uses sudo to access the protected Time Machine data.
#
# Backup-iOS-Apps.sh
#
# Find all '.ipa' apps in a directory
# Copies found apps to a destination folder. The destination will contain a date stamped folder of Apps
# e.g. condenses iOS apps within Time Machine backups into individual app versions and copies in one folder.
#
@drewreece
drewreece / get-logs.sh
Last active Mar 8, 2020
Gather all the logs on a Mac.Gather copies in a folder next to this script…Logs/DateStamp/Hostname/
View get-logs.sh
#!/bin/sh
#
# get-logs.sh (rename to get-logs.command to make clickable version)
# Get all the logs on a Mac
#
# Requires Admin account & password.
# Results end up in directory next to the script
# Logs/Date/hostname/folders
#
echo `basename "$0"` "\nRequires Admin account & password.\t [ctrl+c to abort]"
@drewreece
drewreece / Arch-First-Update.sh
Created Jun 25, 2012
Update Arch Linux ARM on a Raspberry Pi
View Arch-First-Update.sh
#!/bin/sh
#
# Arch-First-Update.sh
# For Raspberry Pi
#
# Based on archlinuxarm-29-04-2012
# SHA-1 b84d1eaba2ec64982da40ccd7dba06b186f6954
#
# See http://www.raspberrypi.org/phpBB3/viewtopic.php?f=53&t=8512&p=107921#p107921
#
@drewreece
drewreece / flashback-test.sh
Created Apr 5, 2012
Check for flashback on Mac OSX
View flashback-test.sh
#!/bin/bash
# Flashback.k test -
# Quick check to see if the Mac has the signs that are mentined at f-secure.com
# http://www.f-secure.com/v-descs/trojan-downloader_osx_flashback_k.shtml for more info
#
# Steps From f-secure.com...
#1. Run the following command in Terminal:
#defaults read /Applications/Safari.app/Contents/Info LSEnvironment
#2. Take note of the value, DYLD_INSERT_LIBRARIES
#3. Proceed to step 8 if you got the following error message: