OpenVPN server configuration for a Linux server like a Raspberry Pi
- Linux (tested on Raspbian 10 Buster and 11 Bullseye)
- OpenVPN (tested on
2.4.7-1
and2.5.1-3
from apt) - bridge-utils (tested on
1.6-2
and1.7-1
from apt)
#Unix Toolbox
##Unix Toolbox revision 14.4
Hi All! | |
I've recently launched a tool that wraps many of the commands here with a user interface. This desktop application is currently available for macOS. There's a roadmap outlining planned features for the near future. | |
Feel free to request any features you'd like to see, and I'll prioritize them accordingly. | |
One of the most important aspects of this application is that every command executed behind the scenes is displayed in a special log section. This allows you to see exactly what’s happening and learn from it. | |
Here's the link to the repository: https://github.com/Pulimet/ADBugger | |
App Description: | |
ADBugger is a desktop tool designed for debugging and QA of Android devices and emulators. It simplifies testing, debugging, and performance analysis by offering device management, automated testing, log analysis, and remote control capabilities. This ensures smooth app performance across various setups. |
GitHub’s search supports a variety of different operations. Here’s a quick cheat sheet for some of the common searches.
For more information, visit our search help section.
mkdir mounted-iso mounted-root root live
sudo mount -o loop archlinux-2020.06.01-i686.iso mounted-iso/
sudo mount -t squashfs mounted-iso/arch/i686/airootfs.sfs mounted-root/
sudo cp -av mounted-root/. root/
sudo umount mounted-root
sudo umount mounted-iso
sudo mount -o bind root live/
sudo arch-chroot live bash
#!/bin/bash | |
# | |
# Steps to build GCC 10 on Debian Buster. | |
# | |
set -e -x | |
# Install all dependencies. | |
export DEBIAN_FRONTEND=noninteractive | |
apt update |
/* | |
* This document is provided to the public domain under the | |
* terms of the Creative Commons CC0 public domain license | |
*/ | |
How to boot Arch Linux ARM in QEMU (patched for M1) | |
Prerequisites: | |
QEMU - patched for M1 processors - patches: https://github.com/utmapp/qemu |
import struct, time | |
## This experiment demonstrates that the claimed "hash" (that is not a hash) used | |
## by the L2 cache ECC debug feature used by Operation Triangulation is not secure, | |
## and can be trivially reverse engineered by anyone who owns one of the machines | |
## with the hardware (such as any M1 Mac), in seconds to days. Therefore, this proves | |
## that no "insider" access or leak is necessary to obtain this table, and that the | |
## attackers most likely did exactly the same thing. | |
## This is the "black box", i.e. the hardware: The table is not exposed to the caller. | |
class BlackBox: |