Sharing
Share files and apps on android to other devices using browser
Share files and apps over HTTP.
You need the other device to be connected to the same network. just toggle on the server and scan the QR Code on other device and you're good to go. Files sent from browser to the app can be found in Sharing/ folder in your internal storage. You can always disable uploads in the app settings.
https://github.com/Ammar64/Sharing
ββ¬Download
https://github.com/Ammar64/Sharing/releases/latest
https://f-droid.org/packages/com.ammar.sharing/
#share #file #Transfer #Android #qr
Share files and apps on android to other devices using browser
Share files and apps over HTTP.
You need the other device to be connected to the same network. just toggle on the server and scan the QR Code on other device and you're good to go. Files sent from browser to the app can be found in Sharing/ folder in your internal storage. You can always disable uploads in the app settings.
https://github.com/Ammar64/Sharing
ββ¬Download
https://github.com/Ammar64/Sharing/releases/latest
https://f-droid.org/packages/com.ammar.sharing/
#share #file #Transfer #Android #qr
GitHub
GitHub - Ammar64/Sharing: Share files and apps on android to other devices using browser
Share files and apps on android to other devices using browser - Ammar64/Sharing
π8β€4π€2π1
Interactive PDF Analysis (also called IPA) allows any researcher to explore the inner details of any PDF file. PDF files may be used to carry malicious payloads that exploit vulnerabilities, and issues of PDF viewer, or may be used in phishing campaigns as social engineering artefacts. The goal of this software is to let any analyst go deep on its own the PDF file. Via IPA, you may extract important payload from PDF files, understand the relationship across objects, and infer elements that may be helpful for triage of malicious or untrusted payloads.
IPA/README.md at main Β· seekbytes/IPA Β· GitHub
#PDF #PDFanalysis #Malware #Security
IPA/README.md at main Β· seekbytes/IPA Β· GitHub
#PDF #PDFanalysis #Malware #Security
π17β€4
This media is not supported in your browser
VIEW IN TELEGRAM
How to export this channel
If you run into any issues with the export, change the date range to month by month.
If you run into any issues with the export, change the date range to month by month.
π6
From preppercollective:
Lots of DMCA takes-downs today. Channel is now private.
We'll see if this helps. Here's an invite link if you need it. https://t.me/+nmw_P039K8Q4ZWRh
Lots of DMCA takes-downs today. Channel is now private.
We'll see if this helps. Here's an invite link if you need it. https://t.me/+nmw_P039K8Q4ZWRh
β€14
#Unlock #bootloader #xiaomi #Android
HyperSploit
Bypass HyperOS restrictions on bootloader unlocking
https://github.com/TheAirBlow/HyperSploit/
https://xdaforums.com/t/hypersploit-bypass-hyperos-bootloader-unlocking-restrictions.4668775/
MiUnlockTool
Retrieve encryptData (token) for Xiaomi devices to unlock bootloader, it is compatible with all platforms.
https://github.com/offici5l/MiUnlockTool
termux-miunlock
A program that can be used to retrieve the bootloader unlock token for Xiaomi devices (and unlock the bootloader) using Termux
https://github.com/RohitVerma882/termux-miunlock/
HyperSploit
Bypass HyperOS restrictions on bootloader unlocking
https://github.com/TheAirBlow/HyperSploit/
https://xdaforums.com/t/hypersploit-bypass-hyperos-bootloader-unlocking-restrictions.4668775/
MiUnlockTool
Retrieve encryptData (token) for Xiaomi devices to unlock bootloader, it is compatible with all platforms.
https://github.com/offici5l/MiUnlockTool
termux-miunlock
A program that can be used to retrieve the bootloader unlock token for Xiaomi devices (and unlock the bootloader) using Termux
https://github.com/RohitVerma882/termux-miunlock/
GitHub
GitHub - TheAirBlow/HyperSploit: Bypasses HyperOS restrictions on bootloader unlocking
Bypasses HyperOS restrictions on bootloader unlocking - TheAirBlow/HyperSploit
π24π₯12β€7π€―3
Media is too big
VIEW IN TELEGRAM
kv4p HT introduction
Turn your phone into a modern ham radio transceiver.
https://kv4p.com
#HAM #radio
@LinuxTechIndex
Turn your phone into a modern ham radio transceiver.
https://kv4p.com
#HAM #radio
@LinuxTechIndex
π17π€3
Open NotebookLM offers a community-driven #ai #alternative to Google NotebookLM!
https://itsfoss.com/open-notebooklm/
@itsfoss_official
https://itsfoss.com/open-notebooklm/
@itsfoss_official
It's FOSS
Meet Open NotebookLM: An Open Source Alternative to Google's NotebookLM
Good to see an open source alternative arriving on the scene so soon.
π5π4β€1π1
This is the best search engine for current events and history
Clip Genie - Grand Theft World
https://grandtheftworld.com/clip-genie
https://gtw.clipgenie.com
Another search engine:
https://corbettreport.com
#Google #search #engines #alternatives
Clip Genie - Grand Theft World
https://grandtheftworld.com/clip-genie
https://gtw.clipgenie.com
Another search engine:
https://corbettreport.com
#Google #search #engines #alternatives
π€‘8π4π3β€1π₯±1
Amir Taaki
@Narodism
States track our phones using the #IMEI code. But you can change it. They don't want people to know. This info is kept secret.
But today I am making it public in this guide. You will get a hotspot usable with any phone that protects your IMEI from the government for $300.
Your phone broadcasts 2 pieces of info: the IMEI which is tied to the phone's hardware and the IMSI which is tied to the SIM card. To change the IMSI, simply use change your SIM card every so often.
The Pinephone allows you to change this number. Here's a guide to setup the phone for this. You will need a Pinephone, a micro SD card and an adapter for your computer.
Terminology
There are 3 storage types: SPI-NOR, eMMC and the SD card.
The SPI-NOR stores the bootloader. The eMMC is internal memory for the OS. We will use the SD card to load the bootloader into the SPI-NOR.
Setup the Installer Environment
We install the OS to the pinephone using a tool called pmbootstrap, but it needs root access. So I instead made a VM with a USB passthrough and installed Manjaro Linux there.
You can do this with virt-manager, then add a new VM with the Manjaro VM and install it. Then inside Manjaro, you can install spice guest tools for more seemless integration (optional).
For the USB passthrough, I had to edit /etc/libvirt/qemu/manjaro.xml, where I added this code:
<disk type='block' device='disk'>
<driver name='qemu' type='raw' cache='none'/>
<source dev='/dev/sdb'/>
<target dev='vdb' bus='virtio'/>
<address type='pci' domain='0x0000' bus='0x07' slot='0x00' function='0x0'/>
</disk>
(replace /dev/sdb and the other details with the relevant info you need)
Now when I boot the VM, I see a device called /dev/vdb which corresponds to my host computer's /dev/sdb.
Install pmbootstrap and we're ready to go.
Install PostmarketOS
We will install PostmarketOS with SXMO which is a tiling WM. It's quite easy to learn, just read the userguide. Don't be lazy. But if you're a normie, fine you can use Phosh instead which is just like Android.
Using pmbootstrap
Now connect the Pinephone Pro to your computer and put it in the mount mode (blue light), and it should appear on your computer with lsblk.
Inside the Manjaro VM, perform the install:
pmbootstrap zap
pmbootstrap init
pmbootstrap install --fde --sdcard=/dev/vdb ----cipher aes-cbc-essiv:sha256
We need the cipher option due to bug #2916 on postmarketOS bug tracker.
Install Bootloader
Now on your normal machine, put the tow-boot installer. Download tow-boot's spi.installer.img and dd to your SD card. Follow the SPI installer instructions.
Now your phone should boot pmOS.
Tweaks
Disable suspend in System Menu -> Config -> Auto-suspend / Auto-screen-off.
Optionally install an Arch Linux chroot for access to more packages you might not have in pmOS.
IMEI Changing
Now for the juicy part of the guide.
SSH is enabled by default, so SSH in. On your phone, open a terminal and type ip a to find your IP. Then just use ssh username@XXXX. Now sudo su as root. Create this file /root/.bashrc.
alias show-imei="echo 'AT+EGMR=0,7' | atinout - /dev/EG25.AT /dev/stdout"
function _set_imei() {
IMEI=$1
echo "AT+EGMR=1,7,\"$IMEI\"" | atinout - /dev/EG25.AT /dev/stdout
}
# Vanity, I prefer - to _ for cmds ;)
alias set-imei=_set_imei
Now reload your shell using source ~/.bashrc. You now have the commands show-imei and set-imei XXXXX.
To get the IMEI code, we will impersonate legit devices. I scraped all the TAC code prefixes from public DBs and made a little util for that. Download it from github: narodnik/immi. You simply run ./imeichanger.py and it gives you an IMEI code you can put into set-imei.
@Narodism
States track our phones using the #IMEI code. But you can change it. They don't want people to know. This info is kept secret.
But today I am making it public in this guide. You will get a hotspot usable with any phone that protects your IMEI from the government for $300.
Your phone broadcasts 2 pieces of info: the IMEI which is tied to the phone's hardware and the IMSI which is tied to the SIM card. To change the IMSI, simply use change your SIM card every so often.
The Pinephone allows you to change this number. Here's a guide to setup the phone for this. You will need a Pinephone, a micro SD card and an adapter for your computer.
Terminology
There are 3 storage types: SPI-NOR, eMMC and the SD card.
The SPI-NOR stores the bootloader. The eMMC is internal memory for the OS. We will use the SD card to load the bootloader into the SPI-NOR.
Setup the Installer Environment
We install the OS to the pinephone using a tool called pmbootstrap, but it needs root access. So I instead made a VM with a USB passthrough and installed Manjaro Linux there.
You can do this with virt-manager, then add a new VM with the Manjaro VM and install it. Then inside Manjaro, you can install spice guest tools for more seemless integration (optional).
For the USB passthrough, I had to edit /etc/libvirt/qemu/manjaro.xml, where I added this code:
<disk type='block' device='disk'>
<driver name='qemu' type='raw' cache='none'/>
<source dev='/dev/sdb'/>
<target dev='vdb' bus='virtio'/>
<address type='pci' domain='0x0000' bus='0x07' slot='0x00' function='0x0'/>
</disk>
(replace /dev/sdb and the other details with the relevant info you need)
Now when I boot the VM, I see a device called /dev/vdb which corresponds to my host computer's /dev/sdb.
Install pmbootstrap and we're ready to go.
Install PostmarketOS
We will install PostmarketOS with SXMO which is a tiling WM. It's quite easy to learn, just read the userguide. Don't be lazy. But if you're a normie, fine you can use Phosh instead which is just like Android.
Using pmbootstrap
Now connect the Pinephone Pro to your computer and put it in the mount mode (blue light), and it should appear on your computer with lsblk.
Inside the Manjaro VM, perform the install:
pmbootstrap zap
pmbootstrap init
pmbootstrap install --fde --sdcard=/dev/vdb ----cipher aes-cbc-essiv:sha256
We need the cipher option due to bug #2916 on postmarketOS bug tracker.
Install Bootloader
Now on your normal machine, put the tow-boot installer. Download tow-boot's spi.installer.img and dd to your SD card. Follow the SPI installer instructions.
Now your phone should boot pmOS.
Tweaks
Disable suspend in System Menu -> Config -> Auto-suspend / Auto-screen-off.
Optionally install an Arch Linux chroot for access to more packages you might not have in pmOS.
IMEI Changing
Now for the juicy part of the guide.
SSH is enabled by default, so SSH in. On your phone, open a terminal and type ip a to find your IP. Then just use ssh username@XXXX. Now sudo su as root. Create this file /root/.bashrc.
alias show-imei="echo 'AT+EGMR=0,7' | atinout - /dev/EG25.AT /dev/stdout"
function _set_imei() {
IMEI=$1
echo "AT+EGMR=1,7,\"$IMEI\"" | atinout - /dev/EG25.AT /dev/stdout
}
# Vanity, I prefer - to _ for cmds ;)
alias set-imei=_set_imei
Now reload your shell using source ~/.bashrc. You now have the commands show-imei and set-imei XXXXX.
To get the IMEI code, we will impersonate legit devices. I scraped all the TAC code prefixes from public DBs and made a little util for that. Download it from github: narodnik/immi. You simply run ./imeichanger.py and it gives you an IMEI code you can put into set-imei.
π3
Mobile Internet + Wifi Hotspot Tethering
Put your SIM in. Now you have cellular.
To activate mobile internet, you need to add your GSM. Do this in System Menu -> Add a GSM Network. You can find the details online by Google. Usually your phone provider will even send you the details via SMS.
OK now you have mobile internet. Making the Wifi hotspot tether is super easy. Just go in System Menu -> Networks -> Add a Wifi Hotspot and enter the hotspot details.
Finally whenever you want to put your phone in "airplane mode", just go to System Menu -> Networks -> Disable GSM.
Final Tips and Tricks
You may want to configure or disable the firewall.
SSH comes preconfigured but you might want to disable password logins.
Received SMS are stored in ~/.local/share/sxmo/modem/ as text files so you can read them comfy from your computer with SSH.
Pipewire is installed native. You can even install a node editor like qpwgraph so you can pipe audio to multiple audio devices simultaneously. Cool af huh?
See the SXMO tips and trickspage on pmOS wiki.
See also https://agorism.dev/ppp.html
Put your SIM in. Now you have cellular.
To activate mobile internet, you need to add your GSM. Do this in System Menu -> Add a GSM Network. You can find the details online by Google. Usually your phone provider will even send you the details via SMS.
OK now you have mobile internet. Making the Wifi hotspot tether is super easy. Just go in System Menu -> Networks -> Add a Wifi Hotspot and enter the hotspot details.
Finally whenever you want to put your phone in "airplane mode", just go to System Menu -> Networks -> Disable GSM.
Final Tips and Tricks
You may want to configure or disable the firewall.
SSH comes preconfigured but you might want to disable password logins.
Received SMS are stored in ~/.local/share/sxmo/modem/ as text files so you can read them comfy from your computer with SSH.
Pipewire is installed native. You can even install a node editor like qpwgraph so you can pipe audio to multiple audio devices simultaneously. Cool af huh?
See the SXMO tips and trickspage on pmOS wiki.
See also https://agorism.dev/ppp.html
π9π₯4β€1π₯±1