Skip to content

Instantly share code, notes, and snippets.

@vadimszzz
vadimszzz / How Linux boots.txt
Created November 8, 2022 12:24 — forked from 0xm0/How Linux boots.txt
How Linux boots
How Linux boots
As it turns out, there isn't much to the boot process:
1. A boot loader finds the kernel image on the disk, loads it into memory, and starts it.
2. The kernel initializes the devices and its drivers.
3. The kernel mounts the root filesystem.
4. The kernel starts a program called init.
5. init sets the rest of the processes in motion.
6. The last processes that init starts as part of the boot sequence allow you to log in.
@vadimszzz
vadimszzz / How to Bypass BIOS Passwords.txt
Created November 8, 2022 12:23 — forked from 0xm0/How to Bypass BIOS Passwords.txt
How to Bypass BIOS Passwords!
FOR EDUCATIONAL PURPOSES ONLY!!!!!!!!!
How to Bypass BIOS Passwords
BIOS passwords can add an extra layer of security for desktop and laptop computers. They are used to either prevent a user from changing the BIOS settings or to prevent the PC from booting without a password. Unfortunately, BIOS passwords can also be a liability if a user forgets their password, or changes the password to intentionally lock out the corporate IT department. Sending the unit back to the manufacturer to have the BIOS reset can be expensive and is usually not covered in the warranty. Never fear, all is not lost. There are a few known backdoors and other tricks of the trade that can be used to bypass or reset the BIOS
DISCLAIMER
This article is intended for IT Professionals and systems administrators with experience servicing computer hardware. It is not intended for home users, hackers, or computer thieves attempting to crack the password on a stolen PC. Please do not attempt any of these procedures if you are unfamiliar with

DTrace: The Reverse Engineer’s Unexpected Swiss Army Knife

Abstract

This paper will examine how DTrace, a kernelbased dynamic scriptable tracer, can be effectively used for reverse engineering tasks. DTrace offers an unprecedented view of both user and kernel space, which has many interesting implications for security researchers. In this paper we will introduce DTrace, comparing it to existing debuggers and tracers.

@vadimszzz
vadimszzz / About SSLs
Created November 8, 2022 12:21 — forked from 0xm0/About SSLs
About SSLs
Secure Sockets Layer or SSL is a secure protocol, which is the reason why secure E-Commerce and E-Banking is possible. It has become the de facto standard for secure and safe only transactions. When Netscape first developed SSL, the main aim or motive behind it was to ensure that the client and host can communicate or transfer data and information securely.
What SSL does in short would be, encrypt data at the sender’s end and decrypt data at the receiver’s end. This encrypted data cannot be picked up or hijacked in between and any tampering would not only be very difficult, it would easily be detected. Not only that, SSL also provides for two-way authentication i.e. verification of the client’s and the server’s identity.
The various functions or features of SSL can be divided into three main categories-:
@vadimszzz
vadimszzz / UNIX SEC.md
Created November 8, 2022 12:21 — forked from 0xm0/UNIX SEC.md
An Architectural Overview of UNIX Network Security

An Architectural Overview of UNIX Network Security

February 18, 1993

Robert B. Reinhardt breinhar@access.digex.com

ARINC Research Corporation 2551 Riva Road Annapolis, MD 21401

How to run Android Studio Emulator (AVD) without lags

Running ARMv7/ARM64 image on x86_64 host with maximum emulation performance:

  1. Close all Google Chrome instances and shutdown your antivirus.

  2. Better create ARMv7 image without Google APIs.

  3. Fix "cannot add library /usr/local/android-sdk/emulator/qemu/darwin-x86_64/lib64/vulkan/libvulkan.dylib: failed":
    λ ln -s ${ANDROID_SDK_ROOT}/emulator/lib64 ${ANDROID_SDK_ROOT}/emulator/qemu/darwin-x86_64/lib64

/**
* Sleep
*/
async function sleep(seconds = 0) {
await new Promise(r => setTimeout(r, seconds * 1000))
}
/**
* Logging function, reads null terminated string from address in line.
git submodule update --init --recursive
set -e
# Determine shell profile
try_profile() {
if [ -z "${1-}" ] || [ ! -f "${1}" ]; then
return 1
fi
echo "${1}"