Skip to content

Instantly share code, notes, and snippets.

View vadim-a-yegorov's full-sized avatar

Zev V. A. Yegorov vadim-a-yegorov

View GitHub Profile
@vadim-a-yegorov
vadim-a-yegorov / mixunpin.js
Created February 11, 2023 19:11 — forked from incogbyte/mixunpin.js
Frida script to bypass common methods of sslpining Android
console.log("[*] SSL Pinning Bypasses");
console.log(`[*] Your frida version: ${Frida.version}`);
console.log(`[*] Your script runtime: ${Script.runtime}`);
/**
* by incogbyte
* Common functions
* thx apkunpacker, NVISOsecurity, TheDauntless
* Remember that sslpinning can be custom, and sometimes u need to reversing using ghidra,IDA or something like that.
* !!! THIS SCRIPT IS NOT A SILVER BULLET !!
How Linux boots
As it turns out, there isn't much to the boot process:
1. A boot loader finds the kernel image on the disk, loads it into memory, and starts it.
2. The kernel initializes the devices and its drivers.
3. The kernel mounts the root filesystem.
4. The kernel starts a program called init.
5. init sets the rest of the processes in motion.
6. The last processes that init starts as part of the boot sequence allow you to log in.
FOR EDUCATIONAL PURPOSES ONLY!!!!!!!!!
How to Bypass BIOS Passwords
BIOS passwords can add an extra layer of security for desktop and laptop computers. They are used to either prevent a user from changing the BIOS settings or to prevent the PC from booting without a password. Unfortunately, BIOS passwords can also be a liability if a user forgets their password, or changes the password to intentionally lock out the corporate IT department. Sending the unit back to the manufacturer to have the BIOS reset can be expensive and is usually not covered in the warranty. Never fear, all is not lost. There are a few known backdoors and other tricks of the trade that can be used to bypass or reset the BIOS
DISCLAIMER
This article is intended for IT Professionals and systems administrators with experience servicing computer hardware. It is not intended for home users, hackers, or computer thieves attempting to crack the password on a stolen PC. Please do not attempt any of these procedures if you are unfamiliar with

DTrace: The Reverse Engineer’s Unexpected Swiss Army Knife

Abstract

This paper will examine how DTrace, a kernelbased dynamic scriptable tracer, can be effectively used for reverse engineering tasks. DTrace offers an unprecedented view of both user and kernel space, which has many interesting implications for security researchers. In this paper we will introduce DTrace, comparing it to existing debuggers and tracers.

@vadim-a-yegorov
vadim-a-yegorov / About SSLs
Created March 17, 2023 04:29 — forked from vadimszzz/About SSLs
About SSLs
Secure Sockets Layer or SSL is a secure protocol, which is the reason why secure E-Commerce and E-Banking is possible. It has become the de facto standard for secure and safe only transactions. When Netscape first developed SSL, the main aim or motive behind it was to ensure that the client and host can communicate or transfer data and information securely.
What SSL does in short would be, encrypt data at the sender’s end and decrypt data at the receiver’s end. This encrypted data cannot be picked up or hijacked in between and any tampering would not only be very difficult, it would easily be detected. Not only that, SSL also provides for two-way authentication i.e. verification of the client’s and the server’s identity.
The various functions or features of SSL can be divided into three main categories-:
@vadim-a-yegorov
vadim-a-yegorov / UNIX SEC.md
Created March 17, 2023 04:30 — forked from vadimszzz/UNIX SEC.md
An Architectural Overview of UNIX Network Security

An Architectural Overview of UNIX Network Security

February 18, 1993

Robert B. Reinhardt breinhar@access.digex.com

ARINC Research Corporation 2551 Riva Road Annapolis, MD 21401

How to run Android Studio Emulator (AVD) without lags

Running ARMv7/ARM64 image on x86_64 host with maximum emulation performance:

  1. Close all Google Chrome instances and shutdown your antivirus.

  2. Better create ARMv7 image without Google APIs.

  3. Fix "cannot add library /usr/local/android-sdk/emulator/qemu/darwin-x86_64/lib64/vulkan/libvulkan.dylib: failed":
    λ ln -s ${ANDROID_SDK_ROOT}/emulator/lib64 ${ANDROID_SDK_ROOT}/emulator/qemu/darwin-x86_64/lib64

git submodule update --init --recursive
set -e
# Determine shell profile
try_profile() {
if [ -z "${1-}" ] || [ ! -f "${1}" ]; then
return 1
fi
echo "${1}"