Skip to main content


Showing posts from December, 2022

mdev mtp fix   nano /etc/mdev.conf # Populate /dev/bus/usb.   SUBSYSTEM=usb;DEVTYPE=usb_device;.* root:root 660 */opt/mdev/dev-bus-usb   # Don't create old usbdev* devices.  usbdev[0-9].[0-9]* root:root 660 ! # comment these lines # load drivers for usb devices #usb[0-9]+    root:root 0660 */lib/mdev/usbdev  cat /opt/mdev/dev-bus-usb --------------------------------------------------------------------------------------------------------- #!/bin/sh # Takes care of /dev/bus/usb devices. # # The mdev.conf gives us limited options on how to handle ownership, so a fix has come as script. # # Features: # - Support smartcard devices. Adjust device group to one that let pcscd open them. # - If Android device is plugged in, make it possible for users in plugdev group to open them (mtp, fastboot, adb

alpine .profile alias

 alias pkl='apk -u list' alias D=doas alias pku='doas apk update' alias pkuu='doas apk upgrade' alias pks='apk search' alias pkii=' doas apk add' alias pki='apk info' alias pkp='apk policy' alias pkd='apk dot'

wpa_supplicant without root using linux capabilities

run wpa_supplican with Linux capabilities instead of privileged process   apk add libcap-utils doas setcap cap_net_admin,cap_net_raw+ep  /sbin/wpa_supplicant ## sudo chown wpas wpa_supplicant  ##optional  ## sudo chmod 0100 wpa_supplicant  ##optional  This combination of setcap, chown, and chmod commands would allow wpas user to execute wpa_supplicant with additional network admin/raw capabilities.   cat ./wifi wpa_supplicant -B -Dnl80211 -iwlan0 -c ~/.wpa/config doas udhcpc -i wlan0 -q  cat ~/.wpa/config ctrl_interface=/home/kai/.wpa update_config=1 network={     ssid="somessid"     psk="strongpassword" } wpa_cli -p ~/.wpa remove capabilities setcap -r </path/to/bin> find caps of bin getcap /sbin/wpa_supplicant search all bins with caps getcap -r /

winpe   Right-click Deployment and Imaging Tools Environment and select Run as administrator . copype amd64 C:\winpe_amd64    Dism /mount-image /imagefile:c:\WinPE_amd64\media\sources\boot.wim /index:1 /mountdir:c:\winpe_amd64\mount    add optional components (oc)  components are in folder  C:\Program Files (x86)\Windows Kits\10\Assessment and Deployment Kit\Windows Preinstallation Environment\amd64\WinPE_OCs\         Dism /Add-Package /Image:"C:\WinPE_amd64\mount" /PackagePath:"C:\Program Files (x86)\Windows Kits\10\Assessment and Deployment Kit\Win

google download links   ##not supported   ##diff paltform 32/64 bit     ##diff paltform 32/64 bit  platform=win64 = 64 bit platform=win64 = 32 bit   for all users # portable version src::

 mtk old bootrom(brom) flash bypass

Download tools  download exploits latest: got::  download bypass utility   latest: got::   download python extract : 7z x 7z x copy playloads and default_config.json5 file from exploits*.zip to bypass folder  install python with pip and select add to path pip install pyusb json5   Install libusb filter   download libusb-win32 d Launch filter wizard, click next Connect powered off phone