Skip to content

Instantly share code, notes, and snippets.

View ezekielbaniaga's full-sized avatar

Ezekiel Baniaga ezekielbaniaga

View GitHub Profile
@kassane
kassane / zig_cpp-modules.md
Last active November 20, 2024 04:05
Zig/clang++ (C++20) modules
// main.cpp

import moduleTest;

#include <cstdio>

auto main() -> int
{
@tuansoibk
tuansoibk / cryptography-file-formats.md
Last active April 10, 2025 20:30
Cryptography material conversion and verification commands
  1. Introduction
  2. Standards
  3. Common combinations
  4. Conversion
  5. Verification/Inspection
  6. Tips for recognising

Introduction

It happens that there are many standards for storing cryptography materials (key, certificate, ...) and it isn't always obvious to know which standard is used by just looking at file name extension or file content. There are bunch of questions on stackoverflow asking about how to convert from PEM to PKCS#8 or PKCS#12, while many tried to answer the questions, those answers may not help because the correct answer depends on the content inside the PEM file. That is, a PEM file can contain many different things, such as an X509 certificate, a PKCS#1 or PKCS#8 private key. The worst-case scenario is that someone just store a non-PEM content in "something.pem" file.

@LewisGaul
LewisGaul / zig-blog-posts.md
Last active April 23, 2025 07:59
Collection of blog posts about the Zig programming language
@fnky
fnky / ANSI.md
Last active April 26, 2025 12:44
ANSI Escape Codes

ANSI Escape Sequences

Standard escape codes are prefixed with Escape:

  • Ctrl-Key: ^[
  • Octal: \033
  • Unicode: \u001b
  • Hexadecimal: \x1B
  • Decimal: 27
@Pulimet
Pulimet / AdbCommands
Last active April 26, 2025 13:51
Adb useful commands list
Hi All!
I've recently launched a tool that wraps many of the commands here with a user interface. This desktop application is currently available for macOS. There's a roadmap outlining planned features for the near future.
Feel free to request any features you'd like to see, and I'll prioritize them accordingly.
One of the most important aspects of this application is that every command executed behind the scenes is displayed in a special log section. This allows you to see exactly what’s happening and learn from it.
Here's the link to the repository: https://github.com/Pulimet/ADBugger
App Description:
ADBugger is a desktop tool designed for debugging and QA of Android devices and emulators. It simplifies testing, debugging, and performance analysis by offering device management, automated testing, log analysis, and remote control capabilities. This ensures smooth app performance across various setups.