Skip to content

Instantly share code, notes, and snippets.

View DeckerSU's full-sized avatar

DeckerSU DeckerSU

View GitHub Profile
@DeckerSU
DeckerSU / reset paragon ntfs for mac trial
Created July 24, 2025 09:21 — forked from ervinod/reset paragon ntfs for mac trial
reset paragon ntfs for mac trial
sudo rm -rf "/Library/Application Support/Paragon Software/"
sudo rm /Library/LaunchDaemons/com.paragon-software.installer.plist
sudo rm /Library/LaunchDaemons/com.paragon-software.ntfs.loader.plist
sudo rm /Library/LaunchDaemons/com.paragon-software.ntfsd.plist
sudo rm /Library/LaunchAgents/com.paragon-software.ntfs.notification-agent.plist
sudo rm -rf /Library/Filesystems/ufsd_NTFS.fs/
sudo rm -rf /Library/PrivilegedHelperTools/com.paragon-software.installer
sudo rm -rf /Library/Extensions/ufsd_NTFS.kext/
sudo rm -rf /Library/PreferencePanes/ParagonNTFS.prefPane
@DeckerSU
DeckerSU / 1. codesign.sh
Created May 30, 2025 08:58 — forked from Integralist/1. codesign.sh
Go: Codesign a Go test binary that listens on network and needs to accept incoming network connections #go #macos #network #security
# 0. Have a binary to codesign.
# NOTE: I use `if os.Getenv("SKIP_FTP") != "" { t.Skip("...") }` to allow skipping the test when running the full test suite.
go test -c -o ./path/to/package/test_binary ./path/to/package
# 1. Create self-signed private key and certificate
# IMPORTANT: The `-addext` flags are essential for codesigning purposes.
openssl req -new -x509 -days 365 -nodes \
-keyout ExampleTestBinaryCodeSigning.key -out ExampleTestBinaryCodeSigning.crt \
@DeckerSU
DeckerSU / heupdater.txt
Created March 6, 2025 22:24 — forked from horzadome/heupdater.txt
Hurricane Electric IPv6 tunnel updater script for Mikrotik RouterOS
# Update Hurricane Electric IPv6 Tunnel Client IPv4 address
# This is an upgrade to an existing script from
# http://wiki.mikrotik.com/wiki/Hurricane_Electric_IPv6_Tunnel_-_IPv4_Endpoint_updater
# API call format:
# https://#USERNAME:[email protected]/nic/update?username=$USERNAME&password=$API_KEY&hostname=$TUNNEL_ID
# ----------------------------------
# Modify the following to match your parameters
# ----------------------------------
# Router's WAN interface name
@DeckerSU
DeckerSU / openssh-latest-build-install.md
Created July 1, 2024 17:15 — forked from jtmoon79/openssh-latest-build-install.md
OpenSSH: build and install the latest version
@DeckerSU
DeckerSU / outbound-email-with-cloudflare.md
Created February 5, 2024 17:19 — forked from irazasyed/outbound-email-with-cloudflare.md
Using Gmail SMTP with Cloudflare Email Routing: A Step-by-Step Guide

Using Gmail SMTP with Cloudflare Email Routing: Step-by-Step Guide

Learn how to send emails through Gmail SMTP with Cloudflare Email Routing in this comprehensive guide.

Step 1: Enable 2-Factor Authentication

To proceed with this method, ensure that you have enabled two-factor authentication for your Google account. If you haven't done so already, you can follow the link to set it up → Enable 2FA in your Google account.

Step 2: Create an App Password for Mail

@DeckerSU
DeckerSU / private_fork.md
Created March 22, 2023 07:50 — forked from 0xjac/private_fork.md
Create a private fork of a public repository

The repository for the assignment is public and Github does not allow the creation of private forks for public repositories.

The correct way of creating a private frok by duplicating the repo is documented here.

For this assignment the commands are:

  1. Create a bare clone of the repository. (This is temporary and will be removed so just do it wherever.)

git clone --bare [email protected]:usi-systems/easytrace.git

@DeckerSU
DeckerSU / cryptography-file-formats.md
Created February 10, 2023 20:46 — forked from tuansoibk/cryptography-file-formats.md
Cryptography material conversion and verification commands
  1. Introduction
  2. Standards
  3. Common combinations
  4. Conversion
  5. Verification/Inspection
  6. Tips for recognising

Introduction

It happens that there are many standards for storing cryptography materials (key, certificate, ...) and it isn't always obvious to know which standard is used by just looking at file name extension or file content. There are bunch of questions on stackoverflow asking about how to convert from PEM to PKCS#8 or PKCS#12, while many tried to answer the questions, those answers may not help because the correct answer depends on the content inside the PEM file. That is, a PEM file can contain many different things, such as an X509 certificate, a PKCS#1 or PKCS#8 private key. The worst-case scenario is that someone just store a non-PEM content in "something.pem" file.

@DeckerSU
DeckerSU / guix-sigs.md
Created December 6, 2022 10:49 — forked from hebasto/guix-sigs.md
The `bitcoin-core/guix.sigs` Repository Workflow

The bitcoin-core/guix.sigs Repository Workflow

Common environment variables

export SIGNER="hebasto"
export GUIX_SIGS_REPO="/home/hebasto/guix.sigs"
export DETACHED_SIGS_REPO="/home/hebasto/bitcoin-detached-sigs"
@DeckerSU
DeckerSU / signing-vbox-kernel-modules.md
Created December 5, 2022 11:50 — forked from reillysiemens/signing-vbox-kernel-modules.md
Signing VirtualBox Kernel Modules

Signing VirtualBox Kernel Modules

These are the steps I followed enable VirtualBox on my laptop without disabling UEFI Secure Boot. They're nearly identical to the process described on [Øyvind Stegard's blog][blog], save for a few key details. The images here are borrowed from the [Systemtap UEFI Secure Boot Wiki][systemtap].

  1. Install the VirtualBox package (this might be different for your platform).
    src='https://download.virtualbox.org/virtualbox/rpm/fedora/virtualbox.repo'