Skip to content

Instantly share code, notes, and snippets.

Avatar
🐶
🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶🐶

extremecoders-re

🐶
🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶 🐶🐶
View GitHub Profile
@extremecoders-re
extremecoders-re / ca_and_cert_golang_demo.go
Created May 20, 2020 — forked from shaneutt/LICENSE
Golang: Demonstrate creating a CA Certificate, and Creating and Signing Certs with the CA
View ca_and_cert_golang_demo.go
package main
import (
"bytes"
"crypto/rand"
"crypto/rsa"
"crypto/tls"
"crypto/x509"
"crypto/x509/pkix"
"encoding/pem"
@extremecoders-re
extremecoders-re / pyinstxtractor-notes.md
Last active Mar 26, 2020
PyInstaller Extractor notes
View pyinstxtractor-notes.md

List of typecodes

pyinstaller/bootloader/src/pyi_archive.h

/* Types of CArchive items. */
#define ARCHIVE_ITEM_BINARY           'b'  /* binary */
#define ARCHIVE_ITEM_DEPENDENCY       'd'  /* runtime option */
#define ARCHIVE_ITEM_PYZ              'z'  /* zlib (pyz) - frozen Python code */
#define ARCHIVE_ITEM_ZIPFILE 'Z' /* zlib (pyz) - frozen Python code */
@extremecoders-re
extremecoders-re / -finally-solving-the-weasel-keygenme.ipynb
Last active Feb 4, 2020
(Finally) Solving the Weasel keygenme.ipynb
View -finally-solving-the-weasel-keygenme.ipynb
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
@extremecoders-re
extremecoders-re / wifi-calling-android.md
Created Dec 23, 2019
Turn on WiFi calling using ADB
View wifi-calling-android.md

Some Android Phones support WiFi calling but there's no option in the UI to turn on this feature. For such phones, you can use one of following techniques

Show WiFI Calling Dialog using ADB

In Setting App

$ am start -a android.intent.action.MAIN -n com.android.settings/.Settings\$WifiCallingSettingsActivity
@extremecoders-re
extremecoders-re / genymotion-headless.md
Last active Sep 22, 2021
Run Genymotion on a Headless server
View genymotion-headless.md

As per the official documentation it's not possible to run Genymotion on a headless server. This is because Genymotion does the UI processing outside the VM on the host. If the host is headless, i.e. doesn't have hardware acceleration, Genymotion won't be able to render the Android OS display. As a result the VM will boot up in VirtualBox but there won't be any display.

(Note that getting a GUI via X11 Forwarding, XRDP, X2Go is not the same as a dedicated display. These are virtual displays. The Genymotion app will start but on booting an Android VM the player window will be blank.)

Quoting from https://stackoverflow.com/a/39448004/1833653

When you start a Genymotion device on the standard way from Genymotion Soft, the Android OS is starting inside a VirtualBox VM but all the UI processing (which uses OpenGL) is done outside the VM to make the rendering pipeline uses your computer's GPU. Using this hardware acceleration makes the Genymotion devices fairly smooth and fast.

> When you start the Genymoti

@extremecoders-re
extremecoders-re / ubuntu-remote-use.md
Last active Nov 13, 2019
Access Ubuntu Remotely from Windows
View ubuntu-remote-use.md

Four remote desktop tools tested

Before trying out any of these ensure the system can be accessed remotely over SSH.

View usb_modeswitch.c
/*
Mode switching tool for controlling mode of 'multi-state' USB devices
Version 2.5.2, 2017/12/31
Copyright (C) 2007 - 2017 Josua Dietze (mail to "usb_admin" at the domain
of the home page; or write a personal message through the forum to "Josh".
NO SUPPORT VIA E-MAIL - please use the forum for that)
Major contributions:
@extremecoders-re
extremecoders-re / decrypt-3gmodem.py
Last active Dec 27, 2019
Script to decrypt TP-Link 3g modem config file [https://www.tp-link.com/en/support/3g/]
View decrypt-3gmodem.py
from Crypto.Cipher import DES
import hashlib
modem_key = bytearray(b'\x47\x8d\xa5\x0b\xf9\xe3\xd2\xcf')
ct = open('/workspace/wr902ac/Huawei-K3771.bin','rb').read()
des = DES.new(modem_key, DES.MODE_ECB)
pt = des.decrypt(ct)
assert pt[0:16] == hashlib.md5(pt[16:]).hexdigest().decode('hex')
print pt[16:]