Skip to main content

Posts

PARROT GRUB LUKS ENCRYPTED BOOT

  If you have encrypted /boot, make sure it's LUKS1, GRUB doesn't support LUKS2 , if you want to use LUKS2 make sure it is the pbkdf2 and not argon , as it is not supported as of yet and is the default one used by LUKS2, so take care of it. cryptsetup luksDump /dev/sda** BOOT INTO THE LIVE ENVIRONMENT Make folders for mount mkdir /mnt/ boot mkdir /mnt/ boot/efi #Decrypt luks drives / and /boot Cryptsetup luksOpen /dev/ sda** mount-name-x // both root and boot mount -o subvol=@ /dev/m apper /mount-name-root /m nt mount /dev/m apper /mount-name-boot /m nt/boot mount /dev/ sda1 /mnt/ boot/efi #Bind /dev /proc /sys /run mount --bind /dev /m nt/dev mount --bind /proc /m nt/proc mount --bind /sys /m nt/sys mount --bind /run /m nt/run update-grub // Update the grub config (grub.cfg) based on current working update-initramfs -u // Update the initramfs grub-install /dev/ sda // Update the efi one, only use when /boot part is changed aka change in / dev /sda-boot, like when you en...
Recent posts

open-appsec

  Compile your own open-appsec for raspberry-pi 5 //Install Dependencies wget https: //downloads.openappsec.io/open-appsec-install sudo apt install -y build-essential cmake git libssl- dev libcurl4-openssl- dev \ libboost- all - dev libjsoncpp- dev pkg-config sudo apt install libgtest- dev sudo apt install doxygen sudo apt- get install libgmock- dev sudo apt- get install libmaxminddb- dev sudo apt- get install libpcre2- dev sudo apt- get install libhiredis- dev sudo apt- get install libxml2- dev sudo apt- get update && sudo apt- get install -y \ libboost- dev \ libssl- dev \ libpcre2- dev \ libxml2- dev \ libgtest- dev \ libcurl4-openssl- dev \ libhiredis- dev \ redis-server \ libmaxminddb- dev //Compile & Make git clone https: //github.com/openappsec/openappsec.git cd openappsec/ cmake -DCMAKE_INSTALL_PREFIX=build_out . sudo make install sudo make package wget https://github.com/mikefarah/yq/releases/d...

Extend Linux Root (Encrypted) Different Disk or Same

  Get the partition from fdisk -l ==> /dev/sda** Next pvcreate /dev/sda**   Check groupname of root (Gparted) Using vgextend nameofgroup /dev/sda** == > Example==> vgextend crypto_kali /dev/sda9 Confirm Using  pvscan Get the mount point of root from fdisk -l ==> /dev/mapper/** Using  lvextend -l +100%FREE /dev/mapper/** resize2fs /dev/mapper/** Done.    Example # fdisk -l /dev/sda9  14509 14699  183980   1.8G Linux filesystem Disk /dev/mapper/crypto_kali-root: 4.72 GiB, 480205 bytes, 9379 sectors Units: sectors of 1 * 5 = 5 bytes # pvcreate /dev/sda9    # vgextend crypto_kali /dev/sda9 # lvextend -l +100%FREE /dev/mapper/crypto_kali-root # resize2fs /dev/mapper/crypto_kali-root    

Dolphin as Root

Terminal  pkexec env DISPLAY = $DISPLAY XAUTHORITY = $XAUTHORITY KDE_SESSION_VERSION =5 KDE_FULL_SESSION = true dolphin Desktop ( RIGHT CLICK) Create New >> Link To Application (Recommended) OR Create Dolphin.desktop Modify this .desktop file created with Link To Application from Terminal Using gedit, "gedit Dolphin.desktop" with [Desktop Entry] Comment[en_US]= Comment= Exec=pkexec env DISPLAY=$DISPLAY XAUTHORITY=$XAUTHORITY KDE_SESSION_VERSION=5 KDE_FULL_SESSION=true dolphin GenericName[en_US]= GenericName= Icon=file-manager MimeType= Name[en_US]=Dolphin Name=Dolphin Path= StartupNotify=true Terminal=false TerminalOptions= Type=Application X-KDE-SubstituteUID=false X-KDE-Username= Easy Way in Link to Application, Direct Add: Environment Variable: add full Exec command, just make sure it doesn't add '' in commands like in my case, after clicking ok, recheck '' . So, modify it with gedit.

RSA Key Generate Flutter

Generate RSA Key Pairs in Flutter With PointyCastle. Generate Same Key Pairs based on n inputs, Such as User Name and Password. Generation Link Documentation Awesome Crypto Utility Dart File Utility Requirement Dart File   Here is a Code thanks to above three, RSA Key Pairs based on User Email and Password. import 'dart:typed_data' ; import 'package:pointycastle/api.dart' as crypto ; import 'dart:convert' ; import '../../../storage.dart' ; //Shared Prefs file to Store Keys import '../Helper/CryptoUtils.dart' ; //Awesome Utility Dart File import "package:pointycastle/export.dart" ; class RSAGeneration { String _email ; String _password ; String myPublicKey = '' ; String myPrivateKey = '' ; RSAGeneration({ required String email , required String password}) : _email = email , _password = password ; Uint8List deriveKeyFromInput (String input) { Digest digest = SHA256Digest () ; Uint8List data = Uint8List ...

ReVanced YT

How to use ReVanced CLI Prerequisites Use Linux OR Download JDK 17 Download adb  adb(Linux):  apt install google-android-platform-tools-installer App To Patch (Supported YT apks) Embedded URL's below ReVanced CLI ReVanced Patches ReVanced Integrations Official Repo Check all options in CLI (help menu) java -jar revanced-cli-2.21.1-all.jar -h Check all patches available (list menu) java -jar revanced-cli-2.21.1-all.jar -b revanced-patches-2.173.0.jar -a yt.apk -l To Apply Patches java -jar revanced-cli.jar -c -a appname.apk -o output-appname.apk -m revanced-integrations.apk -b revanced-patches.jar   Install Patched apk on phone with microg (non-root) To install directly on phone use (Root)  install same version unpatched.apk on phone. add option -d to above command,  -d device-name(from adb) Enable Dev Options > Enable Usb Debugging  adb   devices (copy device name) > allow on device (prompt) adb  shell su -c exit (give roo...

Linux Persistence in Live Boot Media (Encrypted)

  Encrypted Persistence in Linux (LUKS Format) (Live Boot) Copy Paste in Terminal cryptsetup --verbose --verify-passphrase luksFormat /dev/sdb3 cryptsetup luksOpen /dev/sdb3 my_usb mkfs.ext4 -L persistence /dev/mapper/my_usb e2label /dev/mapper/my_usb persistence mkdir -p /mnt/my_usb mount /dev/mapper/my_usb /mnt/my_usb echo "/ union" | sudo tee /mnt/my_usb/persistence.conf umount /dev/mapper/my_usb cryptsetup luksClose /dev/mapper/my_usb Restart. On boot select Live boot with Encrypted Persistence. Learn more/ Official website / Click here