Skip to content

Instantly share code, notes, and snippets.

@nextgenhacker
nextgenhacker / - instructions
Created March 15, 2018 04:08 — forked from joeljacobs/- instructions
Rico SP C250DN Toner Reset on Raspberry Pi
Below are single-line commands to run in BASH on a Raspberry Pi to rewrite the toner chips to "full" for a Ricoh SP C250DN Printer.
You will need to have the 4 files below in the same directory: "black" "cyan" "magenta" and "yellow".
The chip is near one edge of the cartridge. The pad closest to the edge is GND, followed by VCC, DATA, and Clock.
On the Pi, connect VCC and GND to +3.3V and GND. Connect Data to (physical numbering) 3 and 5. They are the I2C Data and Clock pins.
Be sure i2c is enabled and installed.
modprobe -r i2c_bcm2708 ;modprobe i2c_bcm2708 baudrate=9600
/* Done by Rajandran R */
/* Author of www.marketcalls.in */
/* Date : 05th Apr 2016 */
function GetSecondNum()
{
Time = Now( 4 );
Seconds = int( Time % 100 );
Minutes = int( Time / 100 % 100 );
Hours = int( Time / 10000 % 100 );
@nextgenhacker
nextgenhacker / Supertrend V4.0
Created May 23, 2018 02:26 — forked from marketcalls/Supertrend V4.0
Supertrend V4.0 - Amibroker AFL Code
/* Done by Rajandran R */
/* Author of www.marketcalls.in */
function GetSecondNum()
{
Time = Now( 4 );
Seconds = int( Time % 100 );
Minutes = int( Time / 100 % 100 );
Hours = int( Time / 10000 % 100 );
SecondNum = int( Hours * 60 * 60 + Minutes * 60 + Seconds );
@nextgenhacker
nextgenhacker / debloatNox.md
Created February 17, 2021 04:54 — forked from thepwrtank18/debloatNox.md
Debloating & Optimizing Nox

Debloating Nox

Nox, despite being the most feature-filled Android emulator, has a lot of negativity surrounding it due to their antics when it comes to making income off of their program. It is known for running repeated advertisments in the background, calling home and passing along system information (outside of your Android instance) as well as a vast amount of potentially sensitive data in an encrypted payload back to their multitude of servers. With the following preventitive measures, we can stop a majority of this happening as well as greatly improve the overall performance.

  1. Download and Install a fresh copy of Nox. The latest version is fine (for now). If you already have it installed, that is fine too. No need to reinstall.

  2. Enable Root Mode on Nox by clicking the gear icon and then checking the Root Startup box.

  3. Install a new Launcher from the Play Store. ANYTHING but Nox's default. I suggest [Nova Launcher](https://play.google.com/s

@nextgenhacker
nextgenhacker / pc.md
Created February 17, 2021 04:57 — forked from thepwrtank18/pc.md
ios 12

Jailbreaking iOS 12: The Complete Guide

Prerequisites

@nextgenhacker
nextgenhacker / how-to-download-from-pan-baidu.md
Created August 9, 2021 21:17
How to download from pan.baidu without account

How to download from pan.baidu.com

Disclaimer:

  • This methods uses a 3rd party website: https://baidu.kinh.cc/.
  • I don't know chinese and after one day of searching for a method I finally found this. I don't know how safe this website is but it does the job.
  • Do it on your own responsibility. I have no idea about possible copyright (if there is such a thing in China) and other stuff regarding to this.

Steps

1. Open the website mentioned above and fill out fields as following:

@nextgenhacker
nextgenhacker / fridascript.js
Created October 13, 2023 20:29 — forked from rootsec1/fridascript.js
Bypass SSL certificate pinning and evade root detection on Android (Frida script)
Java.perform(function () {
console.log("\nRoot detection bypass with Frida");
var CommonUtils = Java.use("io.fabric.sdk.android.services.common.CommonUtils");
console.log("\nHijacking isRooted function in CommonUtils class");
CommonUtils.isRooted.implementation = function () {
console.log("\nInside the isRooted function");
return false;
};
console.log("\nRoot detection bypassed");
console.log("\n");
@nextgenhacker
nextgenhacker / release-android-debuggable.md
Created October 17, 2023 15:44 — forked from nstarke/release-android-debuggable.md
How to make a Release Android App debuggable

How to make a Release Android App debuggable

Let's say you want to access the application shared preferences in /data/data/com.mypackage.
You could try to run adb shell and then run-as com.mypackage ( or adb shell run-as com.mypackge ls /data/data/com.mypackage/shared_prefs), but on a production release app downloaded from an app store you're most likely to see:

run-as: Package 'com.mypackage' is not debuggable
@nextgenhacker
nextgenhacker / release-android-debuggable.md
Created October 17, 2023 15:45 — forked from amahdy/release-android-debuggable.md
How to make a Release Android App debuggable (Android R+)

How to make a Release Android App debuggable (Android R+)

This is a newer version with a bit more details and workarounds from this gist. Especially for Android R+.

I recommend to read the previous gist to get an idea about what I'm trying to achieve. This note will be straight forward on commands to perform. Some commands use zipalign and apksigner which are located in the build-tools of your Android SDK installation folder. Mine are located in: ~/Library/Android/sdk/build-tools/34.0.0/.

@nextgenhacker
nextgenhacker / symantec-vip-access-totp.md
Created February 16, 2024 02:11 — forked from jarbro/symantec-vip-access-totp.md
Generate Symantec VIP Access Token as TOTP

Generate Symantec VIP Access Token as OTP

Recently I came across a web service that required two-factor authentication using the Symantec VIP Access App. I already manage all of my OTP tokens in a different app (If you are on iOS I highly recommend using OTP Auth by Roland Moers.) and did not want to have to use yet another app to generate the TOTP.

There is a way to generate a Symantec VIP Access compatible token very easily if you have access to an environment which can run Python PIP. I happen to have Ubuntu Windows Subsystem Linux running on my machine. (If you are running Windows 10 and don't have this you should really check it out.) Let's get started...

hello

Instructions

Here we install python3-pip and qrencode so we can generate our secret, I