Skip to content

Instantly share code, notes, and snippets.

View raspiduino's full-sized avatar

gvl610 raspiduino

View GitHub Profile
@raspiduino
raspiduino / readme.md
Last active December 24, 2023 16:38
Quick and dirty solution for the Segmentation fault problem of processing package libc-bin when using apt in Armbian

I recently have Armbian installed on my set-top box and its apt got crazy when I used it:

$ sudo apt install xfce4-terminal
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
The following additional packages will be installed:
  libvte-2.91-0 libvte-2.91-common
The following NEW packages will be installed:
@jcmvbkbc
jcmvbkbc / gist:316e6da728021c8ff670a24e674a35e6
Last active April 5, 2025 21:38
esp32s3 linux rebuild scripts
Latest versions of these scripts are available in git repository https://github.com/jcmvbkbc/esp32-linux-build
@Vogtinator
Vogtinator / README.md
Last active May 27, 2025 12:26
Run Win11 on ARM in QEMU

Guide updated to use the official installation .iso from Microsoft, which finally became available in Dec. 2024! For the VHDX disk image based guide check an earlier version of this gist.

When following this guide on a host not capable of aarch64 virtualization, replace -cpu host -accel kvm with -cpu max.

  1. Download the installation .iso from https://www.microsoft.com/en-us/software-download/windows11arm64. Win11_24H2_EnglishInternational_Arm64.iso is known to work.
  2. Download the the latest virtio-win.iso from https://fedorapeople.org/groups/virt/virtio-win/direct-downloads/latest-virtio/.
  3. Create a disk image for the Windows installation: qemu-img create -f qcow2 win11.qcow2 25G
  4. Start the installation with generic (ramfb for display, usb-storage for .isos) as well as virtio (virtio-gpu-pci, virtio-block) devices: `qemu-system-aarch64 -M virt -cpu host -accel kvm -m 4G -smp 4 -device ramfb -device virtio-gpu-pci -bios /usr/share/qemu/qemu-uefi-aarch64.bin -device qemu-xhci -device usb-kbd -dev
@mhasdf
mhasdf / makie-thump-go-bluetooth-protocol.md
Last active June 11, 2023 06:03
Mackie Thump GO Bluetooth Protocol

Mackie Thump GO Bluetooth Protocol

Connection

The Thump GO is visible as two Bluethooth devices. Thump GO is an audio device. The Bluetooth device named LE_Thump GO is used for controlling the loudspeaker.

Only after an audio connection was established and the bluetooth LED lights solidly, the LE_Thump GO device is active. (With Auto Connect off, connect from a previously paired audio device to reach that state. With Auto Connect on, this state is only reached 60 seconds after turning on, even if the audio connection is established much earlier, but one can presses the PAIR button to shorten that time.)

The Bluetooth device LE_Thump GO is the interface the official app Thump Connect 2 uses. This device offers service UUID 49535343-fe7d-4ae5-8fa9-9fafd205e455. Appearently, this is the BM70/RN4870 chip with service "Microchip Transparent UART". Here, I list all the commands of the device I could reverse-engineer. I assume no liability for the correctness. All numbers are in hexadecimal notat

@patharanordev
patharanordev / uninstall-cuda-on-mac.md
Created June 4, 2022 03:13
Uninstall CUDA.framework on macOS

Uninstall CUDA.framework on macOS

If you

  • got message like "CUDA.framework is malware, ... damage on your mac"
  • using OpenCL instead
  • using macOS 10.14+ (used Metal framework instead)

and try to remove it.

Delete the following folders/files:

# Decompile
dtc -I dtb -O dts -o devicetree.dts /boot/dtb/<your_devicetree_file_name>.dtb
# Compile
dtc -I dts -O dtb devicetree.dts -o <your_devicetree_file_name>.dtb
# Merge with DTBO
fdtoverlay -i modified-base.dtb -o modified-full.dtb /boot/tegra194-p3668-all-p3509-0000-user-custom.dtbo
# DTS from fs
@fuzzKitty
fuzzKitty / gist:8ca2587213874e94e5c0aedf346c18b1
Created November 17, 2021 14:44
CVE-2020-23617 - Totolink N200RE and N100RE Routers - 2.0
CVE-2020-23617
Vulnerable Product Version: Totolink N200RE and N100RE Routers - 2.0
Vendor: http://totolink.net/
Vulnerability Type: Cross Site Scripting (XSS)
Description: A cross site scripting (XSS) vulnerability in ther error page of
Totolink N200RE and N100RE Routers 2.0 allows attackers to execute
arbitrary web scripts or HTML via a SCRIPT element.
Discovered by:
Omri Inbar, Shlomo Ben Yosef
@sekcompsci
sekcompsci / Comparison Espressif ESP MCUs.md
Last active June 1, 2025 12:52 — forked from fabianoriccardi/Comparison Espressif ESP MCUs.md
Comparison chips (SoCs) table for ESP8266/ESP32/ESP32-S2/ESP32-S3/ESP32-C3/ESP32-C6. Forked from @fabianoriccardi

Comparison chips (SoCs) table for ESP8266/ESP32/ESP32-S2/ESP32-S3/ESP32-C3/ESP32-C6

A minimal table to compare the Espressif's MCU families.

ESP8266 ESP32 ESP32-S2 ESP32-S3 ESP32-C3 ESP32-C6
Announcement Date 2014, August 2016, September 2019, September 2020, December
@cleverfox
cleverfox / hls2YT.sh
Created March 6, 2021 16:20
FFMPEG h.265 hls to youtube
ffmpeg -i http://192.168.2.11:80/sdi_ext -c:v copy -f hls -method PUT -hls_time 1 -hls_playlist_type event -http_persistent 1 'https://a.upload.youtube.com/http_upload_hls?cid=KEY&copy=0&file=stream.m3u8'
@raspiduino
raspiduino / sudocmd.md
Last active September 21, 2024 03:57
Sudo command for cmd

Sudo command for cmd

What is this?

In Linux, we can use sudo to run command as root. In Windows, we can use runas command to do that, but it doesn't support for empty password file! So we make this small macro for you to do the same thing as sudo for Windows.

How to use this?

Install this macro:

doskey sudo=start /min powershell -Command "Start-Process $* -Verb runAs"

Using this macro: