Skip to content

Instantly share code, notes, and snippets.

View vitali2y's full-sized avatar
🏠
/me @ 127.0.0.1

Vitaliy Yermolenko vitali2y

🏠
/me @ 127.0.0.1
  • $HOME @ Ukraine @ Earth
View GitHub Profile
@vitali2y
vitali2y / camenoti-and-debian-bookworm-on-odroid-u3.md
Last active November 6, 2023 21:27
All steps for running camenoti @ Debian Bookworm distro @ Odroid U3 device

The goal of this manual is:

  • installing the latest Debian Bookworm distro on quite old, but great, Odroid U3 device, and
  • installing and running the very simple (just actially few configuration lines + motion + curl), but battle-tested motion detection & notification surveillance camenoti solution on it.

Installing Debian Bookworm on Odroid U3

  1. On host box let's download the recent odroid_u3-armv7l-bookworm.img.gz from here:
➜  bookworm-230507 wget https://github.com/hexdump0815/imagebuilder/releases/download/230224-05/odroid_u3-armv7l-bookworm.img.gz
@vitali2y
vitali2y / rab13s.md
Created May 3, 2023 21:14
Rab13s / CVE-2023-30769 vulnerability

Searching for fix for Rab13s vulnerability (AKA CVE-2023-30769: more here or here) so proudly advertised by Halborn Inc with small funny Halborn did not share the Exploit-kit code with any party comment? :-)

So, here you are! ✌️ You do not need to pay them for any vulnerability disclosure / bug bounty! Just follow my hands 😉 links: from CryptoCurrency's Reddit we go to Litecoin v0.21.2.2 (where LTC Team reports about Important Security Updates under this release @ Mar 2, 2023), and among their 9 commits we can find [Rate limit

@vitali2y
vitali2y / html-gmail.md
Created May 5, 2023 10:42
Gmail Simple HTML View
@vitali2y
vitali2y / gist:8c4409a812e4bd8dfcd12dcd2f47b4bb
Created November 30, 2022 08:03
One-liner for M$Teams/etc recording @ Linux
ffmpeg -f pulse -i "$(awk '$2~/.monitor$/ {print $2; exit;}' \
<(pactl list short sources))" -i <(arecord -f CD) -filter_complex \
amix -acodec libmp3lame "$(date +%d%m%y%H%M%S)".mp3
Introduction
============
This short document contains instructions on how to install QEMU and run a
virtual machine with the disk image provided for the _Writing Linux Kernel
Modules in Rust_ session of the LF Mentorship Series.
It assumes that you have an x86-64 system running a 64-bit Linux operating
system with KVM enabled.
@vitali2y
vitali2y / my-firecracker.md
Created January 28, 2021 23:20
First steps on Firecracker, a lightweight virtualization solution for serverless computing
@vitali2y
vitali2y / chromium-recover-linux.md
Created March 30, 2022 19:37
Chromium web browser's recover steps @ Linux

Chromium recover @ Linux

Exporting Chromium browsing history to TXT

➜  ~ echo "SELECT title, datetime(last_visit_time/1000000 + (strftime('%s', '1601-01-01')),'unixepoch') last_visit_time, url from urls WHERE DATETIME (last_visit_time/1000000 + (strftime('%s', '1601-01-01')), 'unixepoch') >= DATETIME('now', '-3652 days') group by title, last_visit_time order by last_visit_time" | sqlite3 ~/.config/chromium/Default/History > ./chromium-history-$(date +%y%m%d%H%M).txt 
➜  ~ ls -la ./chromium-history-*.txt
-rw-rw-r-- 1 vit vit 4393191 Mar 30 21:50 ./chromium-history-2203302150.txt
➜  ~
@vitali2y
vitali2y / kvm-with-ubuntu-cloud-image.log
Created November 25, 2018 23:06
Creating, running, and destroying a Ubuntu 16.04 minimal cloud image KVM under Linux Mint 18.3
... in steps below:
@vitali2y
vitali2y / rpi4.log
Created September 9, 2021 19:51
LibreELEC 10.0.0 @ RPi4
➜ rpi # https://releases.libreelec.tv/LibreELEC-RPi4.arm-10.0.0.img.gz
➜ rpi F=LibreELEC-RPi4.arm-10.0.0.img; ls -la $F && md5sum $F
-rw-rw-r-- 1 vit vit 575668224 Sep 9 00:54 LibreELEC-RPi4.arm-10.0.0.img
0ebb5fd424275b202522ed285b3a365b LibreELEC-RPi4.arm-10.0.0.img
➜ rpi ssh root@rpi4 # 192.168.1.181 @ LibreELEC
~...~
root@rpi4's password: <-- libreelec: default password
##############################################
# LibreELEC #
# https://libreelec.tv #
@vitali2y
vitali2y / ping_script.sh
Created August 15, 2021 09:49
To scan IPs in your local network
#!/bin/sh
# set -x # uncomment for debugging
pingone(){
if ping -w 2 -q -c 1 192.168.1."$1" > /dev/null
then
printf "IP %s is up\n" 192.168.1."$1"
fi
}