Skip to content
View fredinj's full-sized avatar

Block or report fredinj

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. ARPhysio ARPhysio Public

    ShaderLab 1

  2. decode-csc-termux decode-csc-termux Public

    Decode Samsung's cscfeature.xml Using Termux

    Shell

  3. ShopScrape-Analyzer ShopScrape-Analyzer Public

    Python

  4. Run rclone mount at signin in Window... Run rclone mount at signin in Windows in the background
    1
    *Store the log file for checks `--log-file `*
    2
    ___
    3
    
                  
    4
    ### 1. Use a service
    5
    __-- Recommended --__
  5. LSPosed parasite.md LSPosed parasite.md
    1
    Call the activity from ADB:
    2
    
                  
    3
    ```
    4
    adb shell am start -p com.android.shell -a android.intent.action.MAIN -c org.lsposed.manager.LAUNCH_MANAGER -f 0x10000000 -n com.android.shell/.BugreportWarningActivity
    5
    ```
  6. Signing kernel modules for secure boot Signing kernel modules for secure boot
    1
    Uh for some reason, you [can't dsiable](https://unix.stackexchange.com/q/696474) kernel module verification thingy if secure boot is enabled in fedora.
    2
    
                  
    3
    Fedora's kernels come with a patch that makes it not respect "module.sig_enforce=0". Read up about "CONFIG_LOCK_DOWN_IN_EFI_SECURE_BOOT"
    4
    
                  
    5
    ### Signing Kernel Module