Libreware
6.26K subscribers
365 photos
31 videos
113 files
728 links
Libreware Software Library

πŸ“‘ t.me/Libreware

β˜… Send us your suggestions and menaces here:
https://t.me/joinchat/nMOOE4YJPDFhZjZk
Download Telegram
Sharing

Share files and apps on android to other devices using browser

Share files and apps over HTTP.
You need the other device to be connected to the same network. just toggle on the server and scan the QR Code on other device and you're good to go. Files sent from browser to the app can be found in Sharing/ folder in your internal storage. You can always disable uploads in the app settings.

https://github.com/Ammar64/Sharing

Download
https://github.com/Ammar64/Sharing/releases/latest

https://f-droid.org/packages/com.ammar.sharing/

#share #file #Transfer #Android #qr
πŸ‘8❀4πŸ€”2🍌1
Interactive PDF Analysis (also called IPA) allows any researcher to explore the inner details of any PDF file. PDF files may be used to carry malicious payloads that exploit vulnerabilities, and issues of PDF viewer, or may be used in phishing campaigns as social engineering artefacts. The goal of this software is to let any analyst go deep on its own the PDF file. Via IPA, you may extract important payload from PDF files, understand the relationship across objects, and infer elements that may be helpful for triage of malicious or untrusted payloads.

IPA/README.md at main Β· seekbytes/IPA Β· GitHub

#PDF #PDFanalysis #Malware #Security
πŸ‘17❀4
PrepperCollective.torrent
1.2 MB
🫑5πŸ€”1
This media is not supported in your browser
VIEW IN TELEGRAM
How to export this channel

If you run into any issues with the export, change the date range to month by month.
πŸ‘6
From preppercollective:

Lots of DMCA takes-downs today. Channel is now private.

We'll see if this helps. Here's an invite link if you need it. https://t.me/+nmw_P039K8Q4ZWRh
❀14
#Unlock #bootloader #xiaomi #Android

HyperSploit
Bypass HyperOS restrictions on bootloader unlocking
https://github.com/TheAirBlow/HyperSploit/
https://xdaforums.com/t/hypersploit-bypass-hyperos-bootloader-unlocking-restrictions.4668775/

MiUnlockTool
Retrieve encryptData (token) for Xiaomi devices to unlock bootloader, it is compatible with all platforms.
https://github.com/offici5l/MiUnlockTool

termux-miunlock
A program that can be used to retrieve the bootloader unlock token for Xiaomi devices (and unlock the bootloader) using Termux
https://github.com/RohitVerma882/termux-miunlock/
πŸ‘24πŸ”₯12❀7🀯3
Media is too big
VIEW IN TELEGRAM
kv4p HT introduction

Turn your phone into a modern ham radio transceiver.

https://kv4p.com

#HAM #radio
@LinuxTechIndex
πŸ‘17πŸ€”3
This is the best search engine for current events and history

Clip Genie - Grand Theft World

https://grandtheftworld.com/clip-genie

https://gtw.clipgenie.com

Another search engine:
https://corbettreport.com

#Google #search #engines #alternatives
🀑8😐4πŸ‘3❀1πŸ₯±1
Amir Taaki
@Narodism
States track our phones using the #IMEI code. But you can change it. They don't want people to know. This info is kept secret.

But today I am making it public in this guide. You will get a hotspot usable with any phone that protects your IMEI from the government for $300.

Your phone broadcasts 2 pieces of info: the IMEI which is tied to the phone's hardware and the IMSI which is tied to the SIM card. To change the IMSI, simply use change your SIM card every so often.

The Pinephone allows you to change this number. Here's a guide to setup the phone for this. You will need a Pinephone, a micro SD card and an adapter for your computer.

Terminology

There are 3 storage types: SPI-NOR, eMMC and the SD card.

The SPI-NOR stores the bootloader. The eMMC is internal memory for the OS. We will use the SD card to load the bootloader into the SPI-NOR.

Setup the Installer Environment

We install the OS to the pinephone using a tool called pmbootstrap, but it needs root access. So I instead made a VM with a USB passthrough and installed Manjaro Linux there.

You can do this with virt-manager, then add a new VM with the Manjaro VM and install it. Then inside Manjaro, you can install spice guest tools for more seemless integration (optional).

For the USB passthrough, I had to edit /etc/libvirt/qemu/manjaro.xml, where I added this code:

<disk type='block' device='disk'>
<driver name='qemu' type='raw' cache='none'/>
<source dev='/dev/sdb'/>
<target dev='vdb' bus='virtio'/>
<address type='pci' domain='0x0000' bus='0x07' slot='0x00' function='0x0'/>
</disk>

(replace /dev/sdb and the other details with the relevant info you need)

Now when I boot the VM, I see a device called /dev/vdb which corresponds to my host computer's /dev/sdb.
Install pmbootstrap and we're ready to go.

Install PostmarketOS

We will install PostmarketOS with SXMO which is a tiling WM. It's quite easy to learn, just read the userguide. Don't be lazy. But if you're a normie, fine you can use Phosh instead which is just like Android.

Using pmbootstrap

Now connect the Pinephone Pro to your computer and put it in the mount mode (blue light), and it should appear on your computer with lsblk.

Inside the Manjaro VM, perform the install:

pmbootstrap zap
pmbootstrap init
pmbootstrap install --fde --sdcard=/dev/vdb ----cipher aes-cbc-essiv:sha256

We need the cipher option due to bug #2916 on postmarketOS bug tracker.

Install Bootloader

Now on your normal machine, put the tow-boot installer. Download tow-boot's spi.installer.img and dd to your SD card. Follow the SPI installer instructions.

Now your phone should boot pmOS.

Tweaks

Disable suspend in System Menu -> Config -> Auto-suspend / Auto-screen-off.

Optionally install an Arch Linux chroot for access to more packages you might not have in pmOS.

IMEI Changing

Now for the juicy part of the guide.

SSH is enabled by default, so SSH in. On your phone, open a terminal and type ip a to find your IP. Then just use ssh username@XXXX. Now sudo su as root. Create this file /root/.bashrc.

alias show-imei="echo 'AT+EGMR=0,7' | atinout - /dev/EG25.AT /dev/stdout"

function _set_imei() {
IMEI=$1
echo "AT+EGMR=1,7,\"$IMEI\"" | atinout - /dev/EG25.AT /dev/stdout
}
# Vanity, I prefer - to _ for cmds ;)
alias set-imei=_set_imei

Now reload your shell using source ~/.bashrc. You now have the commands show-imei and set-imei XXXXX.

To get the IMEI code, we will impersonate legit devices. I scraped all the TAC code prefixes from public DBs and made a little util for that. Download it from github: narodnik/immi. You simply run ./imeichanger.py and it gives you an IMEI code you can put into set-imei.
πŸ‘3
Mobile Internet + Wifi Hotspot Tethering

Put your SIM in. Now you have cellular.

To activate mobile internet, you need to add your GSM. Do this in System Menu -> Add a GSM Network. You can find the details online by Google. Usually your phone provider will even send you the details via SMS.

OK now you have mobile internet. Making the Wifi hotspot tether is super easy. Just go in System Menu -> Networks -> Add a Wifi Hotspot and enter the hotspot details.

Finally whenever you want to put your phone in "airplane mode", just go to System Menu -> Networks -> Disable GSM.

Final Tips and Tricks

You may want to configure or disable the firewall.

SSH comes preconfigured but you might want to disable password logins.

Received SMS are stored in ~/.local/share/sxmo/modem/ as text files so you can read them comfy from your computer with SSH.

Pipewire is installed native. You can even install a node editor like qpwgraph so you can pipe audio to multiple audio devices simultaneously. Cool af huh?

See the SXMO tips and trickspage on pmOS wiki.

See also https://agorism.dev/ppp.html
πŸ‘9πŸ”₯4❀1πŸ₯±1