Skip to content

Instantly share code, notes, and snippets.

Avatar
🐔

Gareth Jones symm

🐔
View GitHub Profile
View gist:25644aacfe9c41aa76724c61facdb61b
#!/usr/bin/env bash
# Author: tleish from https://github.com/kubernetes/kubernetes/issues/72597#issuecomment-693149447
set -e
TEMP_POD_NAME=mysql-jump-server
LOCAL_PORT=3307
REMOTE_HOST=prod.abc123.region-1.rds.amazonaws.com
REMOTE_PORT=3306
View sus.txt
⠀⠀ ⣠⣴⣶⣿⠿⢿⣶⣶⣦⣄⠀⠀⠀⠀
⠀⠀⠀⠀⠀⣼⡿⠋⠁⠀⠀⠀⢀⣈⠙⢿⣷⡄⠀⠀
⠀⠀⠀⠀⢸⣿⠁⠀⢀⣴⣿⠿⠿⠿⠿⠿⢿⣷⣄⠀
⠀⢀⣀⣠⣾⣿⡇⠀⣾⣿⡄⠀⠀⠀⠀⠀⠀⠀⠹⣧
⣾⡿⠉⠉⣿⠀⡇⠀⠸⣿⡌⠓⠶⠤⣤⡤⠶⢚⣻⡟
⣿⣧⠖⠒⣿⡄⡇⠀⠀⠙⢿⣷⣶⣶⣶⣶⣶⢿⣿⠀
⣿⡇⠀⠀⣿⡇⢰⠀⠀⠀⠀⠈⠉⠉⠉⠁⠀ ⠀⣿⠀
⣿⡇⠀⠀⣿⡇⠈⡄⠀⠀⠀⠀⠀⠀⠀⠀ ⢀⣿⣿⠀
⣿⣷⠀⠀⣿⡇⠀⠘⠦⣄⣀⣀⣀⣀⣀⡤⠊⠀⣿⠀
⢿⣿⣤⣀⣿⡇⠀⠀⠀⢀⣀⣉⡉⠁⣀⡀⠀⣾⡟⠀
View baofeng-t1.markdown

Baofeng bf-t1 default frequency

Channel Frequency DCS /CTCSS
ch1 437.150 ct 69.3
ch2 439.250 ct 100.0
ch3 441.750 ct 151.4
ch4 443.450 ct 203.5
ch5 445.550 ct 241.8
@symm
symm / gist:6e8a8dfd9f312dd4b94e942025048ba9
Created Feb 8, 2019
Disable LED on Alfa AWUS036NHA with AR9271 chipset
View gist:6e8a8dfd9f312dd4b94e942025048ba9
echo "none" > /sys/class/leds/ath9k_htc-phy1/trigger
View rtlsdr.service
[Unit]
Description=RTL-SDR Server
Wants=network-online.target
After=network-online.target
[Service]
ExecStartPre=/bin/sleep 15
ExecStart=/bin/sh -c '/usr/bin/rtl_tcp -a 0.0.0.0 -s 1024000'
@symm
symm / settings.md
Last active Jan 22, 2019
PMR446.txt
View settings.md
CH Frequency
1 446.00625
2 446.01875
3 446.03125
4 446.04375
5 446.05625
6 446.06875
7 446.08125
8 446.09375
9 446.10625
@symm
symm / Syscan2015Badge.md
Created Jan 10, 2019 — forked from egirault/Syscan2015Badge.md
Dumping the flash memory of the Syscan 2015 badge
View Syscan2015Badge.md

Dumping the flash of the Syscan 2015 badge

The badge of the Syscan 2015 conference included an ARM-based STM32F030R8 processor running some challenges. Although SWD pins are accessible on the badge, some have noted that the STM32 is readout-protected, meaning that it will refuse to dump its flash memory.

Fortunately, two researchers (Johannes Obermaier and Stefan Tatschner) recently published a paper at the WOOT '17 conference, in which they reveal a vulnerability allowing to bypass the readout protection. Their technique allows to dump the flash one DWORD at a time, rebooting the CPU between each access.

I implemented this attack using a BusPirate and the PySWD module. Here is a quick'n dirty PoC to

@symm
symm / now.js
Last active Jul 3, 2018
JS date mock
View now.js
export default () => new Date()
View gist:d653e6374c8d834aa9407eea10ebac36
https://www.abilitynet.org.uk/news-blogs/how-changing-settings-your-ipad-and-iphone-can-help-people-tremors-and-other-dexterity