Skip to content

Instantly share code, notes, and snippets.

View symm's full-sized avatar
🦄

Gareth Jones symm

🦄
View GitHub Profile
#!/bin/bash
if [ ! -f /root/slic_table ]; then
cat /sys/firmware/acpi/tables/SLIC > /root/slic_table
echo "Wrote SLIC to /root/slic_table"
fi
UUID=$(dmidecode | grep -A8 'System Information' | grep -i UUID | awk '{print $2}')
SERIAL=$(dmidecode | grep -A8 'System Information' | grep -i 'serial number' | awk '{print$3}')
PRODUCT=$(dmidecode | grep -A8 'System Information' | grep -i "Product Name" | sed "s/^.*Product Name: //")
@symm
symm / proxmox-mikrotik-template.sh
Last active March 28, 2024 19:18
Installing Mikrotik RouterOS on Proxmox VE easily
#!/bin/bash
# Adapted from https://www.apalrd.net/posts/2023/tip_routeros/
set -e
# https://mikrotik.com/download
VERSION="7.14.2"
VM_ID="940"
wget --no-clobber "https://download.mikrotik.com/routeros/$VERSION/chr-$VERSION.img.zip"
for x in ./*.chd; do
mkdir "${x%.*}"
mv "$x" "${x%.*}"
done
@symm
symm / nfc.ini
Last active September 5, 2023 12:11
dmesg log:
[ 273.098663] usb 1-1.2: new full-speed USB device number 6 using dwc2
[ 273.187435] usb 1-1.2: New USB device found, idVendor=1a86, idProduct=5523, bcdDevice= 3.04
[ 273.187472] usb 1-1.2: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[ 273.190084] ch341 1-1.2:1.0: ch341-uart converter detected
[ 273.192037] usb 1-1.2: ch341-uart converter now attached to ttyUSB0
[AVision]
preset_default=Core Specific/Adventure Vision
[AtariLynx]
preset_default=Core Specific/Lynx
[GBA]
preset_default=Core Specific/Game Boy Advance
[GameGear]
#/etc/apt/apt.conf.d/50unattended-upgrades
Unattended-Upgrade::Origins-Pattern { "site=downloads.plex.tv"; };
@symm
symm / pmr-446.csv
Created May 2, 2023 17:27
PMR 446 channels
Location Name Frequency Duplex Offset Tone rToneFreq cToneFreq DtcsCode DtcsPolarity Mode TStep Skip Comment URCALL RPT1CALL RPT2CALL DVCODE
0 P1 446.006250 0.000000 88.5 88.5 023 NN NFM 5.00
1 P1 446.006250 0.000000 88.5 88.5 023 NN NFM 5.00
2 P2 446.018750 0.000000 88.5 88.5 023 NN NFM 5.00
3 P3 446.031250 0.000000 88.5 88.5 023 NN NFM 5.00
4 P4 446.043750 0.000000 88.5 88.5 023 NN NFM 5.00
5 P5 446.056250 0.000000 88.5 88.5 023 NN NFM 5.00
6 P6 446.068750 0.000000 88.5 88.5 023 NN NFM 5.00
7 P7 446.081250 0.000000 88.5 88.5 023 NN NFM 5.00
8 P8 446.093750 0.000000 88.5 88.5 023 NN NFM 5.00 s
@symm
symm / instructions.txt
Created July 23, 2022 17:33
Guncon flash removal
Original:
https://github.com/mirror/nuvee/blob/master/ps1%20-%20gun%20flash%20removal/pec_hacks.txt
Crypt Killer (USA)
80059458 0000
8005945a 0000
Elemental Gearbolt (USA)
curl https://raw.githubusercontent.com/danmons/retronas/main/ansible/retronas_systems.yml | yq "(.[].[].mister | select(length!=0))" - | sort | uniq > folder.txt
while read p; do
mkdir "$p"
done <list.txt
@symm
symm / extract-archive-org-hashes.py
Last active December 17, 2021 00:35
Get SHA1 hashes from archive.org metadata
#!/usr/bin/env python
###############################
# Extract SHA1 file hashes from archive.org metadata files
#
# Usage: place archive.org {item_name}_files.xml in ./xml/
# Run ./extract-hashes.py
# sha1 files get written to ./sha1
###############################