Skip to content

Instantly share code, notes, and snippets.

@PhylumChordata
PhylumChordata / games.md
Created April 15, 2022 09:26 — forked from XlogicX/games.md
List of Boot Sector Gamers

Boot Sector Games

A list of playable boot sector games, most of which are on github. Fun to play, great to learn from. There are also many cool non-booting boot sectors out there that aren't games (so more like demos), but this page is just reserved to interactive boot sectors / games. This list is also not complete, but not on purpose, it is a best effort collection of games, so if you know of any fun boot sector games, please contribute.

This page lists a collection of 26 games spanning several authors: nanochess, me, daniel-e, shikhin, JulianSlzr, XanClic, QiZD90, darkvoxels, guyhill, w-shackleton, egtzori, VileR, ish_works, franeklubi, and queso_fuego. peterferrie should also be mentioned as he has touched a lot of these games.

TetrOS

https://github.com/daniel-e/tetros

Tetris Clone. Full color, no score. This was one of the older boot sector games out there. TetrOS

@PhylumChordata
PhylumChordata / enable USB debug.adb
Created April 3, 2022 08:23 — forked from pantasio/enable USB debug.adb
adb cmd enable USB debug cant touch screeen
I got it to work :)
NOTE: This requires unlocked bootloader.
Connect the device to Mac or PC in recovery mode. (I had to map the process in my mind as the screen was broken).
Now open terminal/CMD in computer and go to platform-tools/. type and enter ./adb devices to check if the device is connected in recovery mode.
Now type ./adb shell mount data and ./adb shell mount system to mount the respective directories.
Get the persist.sys.usb.config file in your system using ./adb pull /data/property/persist.sys.usb.config /Your directory
Now open that file in a texteditor and edit it to mtp,adb and save.
Now push the file back in the device; ./adb push /your-directory/persist.sys.usb.config /data/property
<Query Kind="Program">
<Reference>&lt;RuntimeDirectory&gt;\System.Windows.Forms.dll</Reference>
<Reference>&lt;RuntimeDirectory&gt;\System.Security.dll</Reference>
<Reference>&lt;RuntimeDirectory&gt;\System.Configuration.dll</Reference>
<Reference>&lt;RuntimeDirectory&gt;\Accessibility.dll</Reference>
<Reference>&lt;RuntimeDirectory&gt;\System.Runtime.Serialization.Formatters.Soap.dll</Reference>
<Reference>&lt;RuntimeDirectory&gt;\System.Deployment.dll</Reference>
<NuGetReference>DynamicLINQ</NuGetReference>
<NuGetReference>DynamicQuery</NuGetReference>
<NuGetReference>Newtonsoft.Json</NuGetReference>
@PhylumChordata
PhylumChordata / cm002_decode.py
Created February 12, 2022 18:44 — forked from blundeln/cm002_decode.py
Ghidra decoder script for crackme cm002, Nick Blundell, Jan 2022
# Decoder for crackme cm002, Nick Blundell, Jan 2022
# https://crackmes.one/crackme/61a0f51433c5d413767c9bd6
from ghidra.app.emulator import EmulatorHelper
from ghidra.program.model.symbol import SymbolUtilities
# Config
VERBOSE = True
UPDATE_MEMORY = True
; ___ _ __ ___ __ ___
; / __|_ _ __ _| |_____ / /| __|/ \_ )
; \__ \ ' \/ _` | / / -_) _ \__ \ () / /
; |___/_||_\__,_|_\_\___\___/___/\__/___|
; An annotated version of the snake example from Nick Morgan's 6502 assembly tutorial
; on http://skilldrick.github.io/easy6502/ that I created as an exercise for myself
; to learn a little bit about assembly. I **think** I understood everything, but I may
; also be completely wrong :-)
@PhylumChordata
PhylumChordata / README.txt
Created July 27, 2021 16:30 — forked from bitbank2/README.txt
Multi-Invaders emulator for Arduino
Multi-Invaders Game Emulator
Written by Larry Bank ([email protected])
Copyright (c) 2021 BitBank Software, Inc.
Project started July 2021
This Arduino sketch contains the code needed to emulate the original
Taito Space Invaders along with Galaxy Wars and Lunar Rescue. The project
does not contain any game code and instead will read the game code and data
from ZIP files provided by the user. The 3 ZIP files can be from MAME or
other emulators and must contain the following files: