Skip to content

Instantly share code, notes, and snippets.

View robertkirkman's full-sized avatar
🇺🇸

Robert Kirkman robertkirkman

🇺🇸
View GitHub Profile
@Aldaviva
Aldaviva / Linux VPN server.md
Last active January 30, 2023 10:42
OpenVPN client and server configuration with bridging

OpenVPN server configuration for a Linux server like a Raspberry Pi

Prerequisites

  • Linux (tested on Raspbian 10 Buster and 11 Bullseye)
  • OpenVPN (tested on 2.4.7-1 and 2.5.1-3 from apt)
  • bridge-utils (tested on 1.6-2 and 1.7-1 from apt)

Ethernet configuration

/etc/network/interfaces

@tokhi
tokhi / unixToolbox.md
Last active October 10, 2024 16:30
Collection of Unix/Linux/BSD commands and tasks which are useful for IT work or for advanced users.

#Unix Toolbox

This document is a collection of Unix/Linux/BSD commands and tasks which are useful for IT work or for advanced users. This is a practical guide with concise explanations, however the reader is supposed to know what s/he is doing.

##Unix Toolbox revision 14.4

The latest version of this document can be found at http://cb.vu/unixtoolbox.xhtml. Replace .xhtml on the link with .pdf for the PDF version and with .book.pdf for the booklet version. On a duplex printer the booklet will create a small book ready to bind. This XHTML page can be converted into a nice PDF document with a CSS3 compliant application (see the script example). See also the about page.
Error reports and comments are m
@Pulimet
Pulimet / AdbCommands
Last active October 21, 2024 14:49
Adb useful commands list
Hi All!
I've recently launched a tool that wraps many of the commands here with a user interface. This desktop application is currently available for macOS. There's a roadmap outlining planned features for the near future.
Feel free to request any features you'd like to see, and I'll prioritize them accordingly.
One of the most important aspects of this application is that every command executed behind the scenes is displayed in a special log section. This allows you to see exactly what’s happening and learn from it.
Here's the link to the repository: https://github.com/Pulimet/ADBugger
App Description:
ADBugger is a desktop tool designed for debugging and QA of Android devices and emulators. It simplifies testing, debugging, and performance analysis by offering device management, automated testing, log analysis, and remote control capabilities. This ensures smooth app performance across various setups.
@chrisdone
chrisdone / gist:02e165a0004be33734ac2334f215380e
Last active October 4, 2024 00:07
Build and run minimal Linux / Busybox systems in Qemu

Common

export OPT=/opt
export BUILDS=/some/where/mini_linux
mkdir -p $BUILDS

Linux kernel

@bonniss
bonniss / github-search-cheatsheet.md
Last active October 2, 2024 16:04
Github search cheatsheet from official docs.

Github Search Cheat Sheet

GitHub’s search supports a variety of different operations. Here’s a quick cheat sheet for some of the common searches.

For more information, visit our search help section.

Basic search

@bmwalters
bmwalters / arch-linux-32-bit-chroot.md
Last active December 11, 2023 07:19
Creating a 32-bit Arch Linux chroot

on the host system

  1. Download an iso
  2. mkdir mounted-iso mounted-root root live
  3. sudo mount -o loop archlinux-2020.06.01-i686.iso mounted-iso/
  4. sudo mount -t squashfs mounted-iso/arch/i686/airootfs.sfs mounted-root/
  5. sudo cp -av mounted-root/. root/
  6. sudo umount mounted-root
  7. sudo umount mounted-iso
  8. sudo mount -o bind root live/
  9. sudo arch-chroot live bash
@s3rvac
s3rvac / gcc-10-debian-buster.sh
Created October 31, 2020 10:39
Steps to build GCC 10 on Debian Buster.
#!/bin/bash
#
# Steps to build GCC 10 on Debian Buster.
#
set -e -x
# Install all dependencies.
export DEBIAN_FRONTEND=noninteractive
apt update
@thalamus
thalamus / ArchLinuxARM-M1
Last active October 16, 2024 23:00
How to boot Arch Linux ARM in QEMU (patched for M1)
/*
* This document is provided to the public domain under the
* terms of the Creative Commons CC0 public domain license
*/
How to boot Arch Linux ARM in QEMU (patched for M1)
Prerequisites:
QEMU - patched for M1 processors - patches: https://github.com/utmapp/qemu
import struct, time
## This experiment demonstrates that the claimed "hash" (that is not a hash) used
## by the L2 cache ECC debug feature used by Operation Triangulation is not secure,
## and can be trivially reverse engineered by anyone who owns one of the machines
## with the hardware (such as any M1 Mac), in seconds to days. Therefore, this proves
## that no "insider" access or leak is necessary to obtain this table, and that the
## attackers most likely did exactly the same thing.
## This is the "black box", i.e. the hardware: The table is not exposed to the caller.
class BlackBox: