Skip to content

Instantly share code, notes, and snippets.

@julianxhokaxhiu
julianxhokaxhiu / create-iso.sh
Created October 31, 2022 12:31
Simple bash script to create a Bootable ISO from macOS Ventura Install Image from Mac App Store
#!/usr/bin/env bash
#===========================================================================
# Works only with the official image available in the Mac App Store.
# Make sure you download the official installer before running this script.
#===========================================================================
# Change this at your desire. Sometimes this works out of the box, sometimes not.
# Default size: ~16 GB
DISK_SIZE="15361m"
# Parameters for source and destination for the Image file
# Current script is edited to put the same image on LockScreen and Wallpaper
$WallpaperURL = "bloburl from azure" # Change to your fitting
$LockscreenUrl = "bloburl from azure" # Change to your fitting
$ImageDestinationFolder = "c:\temp" # Change to your fitting - this is the folder for the wallpaper image
$WallpaperDestinationFile = "$ImageDestinationFolder\wallpaper.png" # Change to your fitting - this is the Wallpaper image
$LockScreenDestinationFile = "$ImageDestinationFolder\LockScreen.png" # Change to your fitting - this is the Lockscreen image
@jwbee
jwbee / readme.md
Last active July 26, 2025 01:00
Help me identify possible tracking device found in my car

Help me identify possible tracking device found in my car

TL;DR

I found a non-OEM electronic gadget in my car. It is wired into the ignition, and contains a 435.10 MHz radio reciever, a microcontroller, and two relays. I suspect it might be a device that allows third parties to unlock the doors and start the car with a radio.

Details

I was driving my 2020 Honda Insight EX when it started to make the annoying sound of an electromechanical relay rapidly switching on and off. When I got home I looked under the dash and straight away I could see someone other than Honda had been in here. The first thing I saw was this surface-mounted switch that doesn't belong there.

@TimLeitch
TimLeitch / Install Unifying Software
Last active October 3, 2022 19:37
Downloads and installs the latest Unifying software from Logi
$source = "https://download01.logi.com/web/ftp/pub/techsupport/unifying/unifying252.exe";
$destination = "c:\Temp\unify.exe";
$checkInstalled = "C:\Program Files\Common Files\LogiShrd\Unifying\DJCUHost.exe";
#Check if software is installed. If installed terminate script
if ((Test-Path $checkInstalled)) {
write-host "Software already installed"
}
#remove dell bloatware
$remediationscript =@"
REM UNINSTALL SCRIPT-----------------------------------------------------------------------------------------------------
REM If you are looking to add applications to this list, search the registry for the string that is listed in the Programs and Features menu until you find the "UninstallString"
REM These usually can be found in:
REM HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\ and then the SID\Product folders.
REM HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\
REM HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall
REM There may be multiple uninstall strings for the same application, add all of them here. As the dell applications are updated over time, the applicationID can change.
@mark05e
mark05e / launchPowerShellScript.cmd
Created March 8, 2022 22:58
Launch Powershell Script with same name in the same path
::====================================================================
:: Powershell script launcher
:: ref: https://stackoverflow.com/questions/10137146/is-there-a-way-to-make-a-powershell-script-work-by-double-clicking-a-ps1-file
::=====================================================================
:MAIN
@echo off
for /f "tokens=*" %%p in ("%~p0") do set SCRIPT_PATH=%%p
pushd "%SCRIPT_PATH%"
powershell.exe -sta -c "& {.\%~n0.ps1 %*}"
@d4rk-d4nph3
d4rk-d4nph3 / KQL!CVE-2022-21882.md
Last active February 5, 2022 17:38
KQL Query for CVE-2022-21882 Detection

Background

  • CVE-2022-21882 is a Win32K LPE vulnerability.
  • CVE-2022-21882 bypasses CVE-2021-1732.
  • Microsoft had patched CVE-2021-1732 back in February's patch tuesday of last year.
  • Microsoft had patched CVE-2022-21882 just recently in January's patch tuesday.
  • CVE-2022-21882's PoC is now public.

Detection

@DanielLarsenNZ
DanielLarsenNZ / reclaim-windows-11.ps1
Last active February 1, 2026 11:38
reclaim-windows-11.ps1
##########
# Tweaked Win11 Initial Setup Script
# Primary Author: Disassembler <disassembler@dasm.cz>
# Modified by: alirobe <alirobe@alirobe.com> based on my personal preferences.
# Modified by: @DanielLarsenNZ - based on my personal preferences. Some additions for Windows 11
# Version: 2.12.2, 2021-12-11
# Primary Author Source: https://github.com/Disassembler0/Win10-Initial-Setup-Script
# Tweaked Source: https://gist.github.com/alirobe/7f3b34ad89a159e6daa1/
# Tweak difference:
#
@codebykyle
codebykyle / connect.ps1
Last active October 3, 2025 08:37
Windows Terminal Split Pane Powershell Script - v2
using namespace System.Collections.Generic
# Encapsulate an arbitrary command
class PaneCommand {
[string]$Command
PaneCommand() {
$this.Command = "";
}
@brimur
brimur / MsSkuToFriendlyName.ps1
Last active March 14, 2025 10:23
Dynamic map of Microsoft SKU to friendly name
##################################################################
#
# Requires Windows PowerShell v2 - v5
# Will not work in PS 7+ due to lack of ParsedHtml functionality
#
##################################################################
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
$skuPage = Invoke-WebRequest "https://docs.microsoft.com/en-us/azure/active-directory/enterprise-users/licensing-service-plan-reference"