Skip to content

Instantly share code, notes, and snippets.

@radjah
radjah / boot.ipxe
Last active Apr 11, 2021
Моё меню iPXE
View boot.ipxe
#!ipxe
set http-server 192.168.1.30
set boot-url http://${http-server}/tftp
:start
menu iPXE boot menu
item winpe1064 Windows 10 PE 64-bit
item winpe1032 Windows 10 PE 32-bit
item sysresccd SystemRescueCd 6.0.3
@radjah
radjah / swapzram.sh
Last active Dec 17, 2019
Statistic for zswap
View swapzram.sh
#!/bin/bash
if [ $UID -ne 0 ]
then
echo You are not ROOT!
exit 1
fi
iszram=$(lsmod|grep zram|wc -l)
if [ $iszram -eq 0 ]
View F670F668A_V1.0.10P6T5_UPGRADE_BOOTLDR.bin.txt
$ binwalk F670F668A_V1.0.10P6T5_UPGRADE_BOOTLDR.bin
DECIMAL HEXADECIMAL DESCRIPTION
--------------------------------------------------------------------------------
256 0x100 uImage header, header size: 64 bytes, header CRC: 0xBFD1C014, created: 2018-11-26 06:46:55, image size: 1960692 bytes, Data Address: 0x40008000, Entry Point: 0x40008000, data CRC: 0x8CCF377, OS: Linux, CPU: ARM, image type: OS Kernel Image, compression type: gzip, image name: "Linux Kernel Image"
320 0x140 gzip compressed data, maximum compression, has original file name: "Image", from Unix, last modified: 2018-11-26 06:46:54
1961024 0x1DEC40 Squashfs filesystem, little endian, non-standard signature, version 4.0, compression:gzip, size: 12080350 bytes, 1720 inodes, blocksize: 65536 bytes, created: 2018-11-26 07:00:59
14045977 0xD65319 Certificate in DER format (x509 v3), header length: 4, sequence length: 5396
14212220 0xD8DC7C CRC32 polynomial table,
View keybase.md

Keybase proof

I hereby claim:

  • I am radjah on github.
  • I am radjah (https://keybase.io/radjah) on keybase.
  • I have a public key ASB7cu24oLY4m_EXyV7Jo2ZAPu7MRzNQbt2mNT4oZqLU7wo

To claim this, I am signing this object:

@radjah
radjah / eggdrop.service
Created Mar 29, 2016
Юнит eggdrop для systemd. Не получается отработать остановку без FAIL.
View eggdrop.service
[Unit]
Description=eggdrop IRC bot
After=local-fs.target remote-fs.target network.target
[Service]
Type=forking
User=share
PIDFile=/opt/eggdrop/eggdrop.pid
WorkingDirectory=/opt/eggdrop
ExecStart=/opt/eggdrop/eggdrop /opt/eggdrop/eggdrop.conf
View Point_Extension.user.js
// ==UserScript==
// @name Point Extension
// @namespace PointExtension
// @description Подгрузка картинок с бурятников
// @include http*://*point.im*
// @exclude http*://point.im/statistics
// @run-at document-end
// @version 0.0.6.4
// @updateURL https://gist.github.com/radjah/eb07a5732c7bed014235/raw/73f33fb3aa529308d1f3f2f4fc253c4abed95374/jquery.js
// @grant none