jq is useful to slice, filter, map and transform structured json data.
brew install jq
#!/bin/sh | |
# block torrent traffic by iptable/firewall for VPN/Proxy server | |
# me@tartan.pro | |
# Delete all existing rules | |
iptables -F | |
# Set default chain policies | |
iptables -P INPUT DROP | |
iptables -P FORWARD DROP |
package main | |
// http://play.golang.org/p/jZ5pa944O1 <- will not display the colors | |
import "fmt" | |
const ( | |
InfoColor = "\033[1;34m%s\033[0m" | |
NoticeColor = "\033[1;36m%s\033[0m" | |
WarningColor = "\033[1;33m%s\033[0m" | |
ErrorColor = "\033[1;31m%s\033[0m" | |
DebugColor = "\033[0;36m%s\033[0m" |
You need to install ARMv5 gcc cross compiler: apt-get install gcc-arm-linux-gnueabi
You have to define a directory (via --prefix) where all of your binaries will be installed (copied). In the guide I use the following: /home/user/vpn_compile
wget https://www.openssl.org/source/openssl-1.0.2j.tar.gz
### 1: Drop invalid packets ### | |
/sbin/iptables -t mangle -A PREROUTING -m conntrack --ctstate INVALID -j DROP | |
### 2: Drop TCP packets that are new and are not SYN ### | |
/sbin/iptables -t mangle -A PREROUTING -p tcp ! --syn -m conntrack --ctstate NEW -j DROP | |
### 3: Drop SYN packets with suspicious MSS value ### | |
/sbin/iptables -t mangle -A PREROUTING -p tcp -m conntrack --ctstate NEW -m tcpmss ! --mss 536:65535 -j DROP | |
### 4: Block packets with bogus TCP flags ### |
========================================================================== | |
DO NOT WRITE ANY QUESTIONS IN COMMENTS | |
========================================================================== | |
This is not appropriate place for discussions. Keep this list FW-only. | |
I do NOT have any firmware files apart from published here or on 4pda. Please do not contact me for firmware files requests. | |
This is a list of files found on Huawei update server by brute-forcing URL parameters. | |
Some firmware files have changelogs. Just change file name to "changelog.xml" in the end of the URL. |
/system/busybox
and enable telnetd on your device (will add additional line into /system/autorun.sh
). Use it only on E5885, not on other device!telnet 192.168.8.1 2323
/system/busybox sh
#!/bin/sh | |
# Download binutils, gcc, the linux kernel, glibc | |
# define the prefix | |
export PREFIX=/opt/armhf | |
# change PATH to include the target directory | |
export PATH=$PREFIX/bin:$PATH |
Install WireGuard via whatever package manager you use. For me, I use apt. | |
$ sudo add-apt-repository ppa:wireguard/wireguard | |
$ sudo apt-get update | |
$ sudo apt-get install wireguard | |
MacOS | |
$ brew install wireguard-tools | |
Generate key your key pairs. The key pairs are just that, key pairs. They can be |