Development Comparison of Rust 🦀 CLI Prompts: cliclack, dialoguer, promptly, and inquire Let's compare 4 different command line prompt crates by running their basic examples: cliclack, dialoguer, promptly, inquire.
Development My Configs for a Fancy-Looking Terminal (starship, exa, fonts) My starship and exa configs for a fancy command prompt in bash and pwsh (PowerShell). How to beautify the terminal with nerd fonts and a nice background. Making it work in Windows Terminal. Within an SSH session, under both root and non-root users.
Development Design Patterns in Rust: 100% Unique Idiomatic Examples GitHub: https://github.com/fadeevab/design-patterns-rust 👈 My repository contains 100% fresh unique idiomatic Rust examples covering all 23 classic design patterns.
Rust The Easiest Patterns in Rust A few software design patterns are seamlessly integrated into Rust, so we're using them without realizing them. Which is great! A hint: it is 2 creational patterns.
Development The Hardest Pattern in Rust: Mediator A typical Mediator pattern implementation with other languages is a classic anti-pattern in Rust: many objects hold mutable cross-references on each other, trying to mutate each other, which is a deadly sin in Rust - the compiler won't pass your first naive implementation unless it's oversimplified.
Development 💉 Decrypt iOS Applications: 3 Methods You will learn how to decrypt and dump an iOS application with 3 different tools. As a bonus: how to jailbreak iPhone (see in the annex).
Development 18 Lines of the Powerful Request Generator with Python (asyncio/aiohttp) A simple script to generate a huge amount of requests. Python 3.7 + asyncio + aiohttp.
Development How to Setup QEMU Output to Console and Automate Using Shell Script SSH. Expect. Named pipes. Input/output to the host terminal. Early boot messages.
Development Build Android Kernel and Run on QEMU with Minimal Environment: Step by Step Get the Android Linux kernel named "Goldfish". Build. Get initrd or ext4 device image. Run QEMU.
Security Shared Library Injection on Android 8.0 Full solution: https://github.com/fadeevab/TinyInjector One of the ways to carry out the shared library injection is to use ptrace system call (syscall). One process (a tracer) attaches to a tracee and calls dlopen inside tracee's virtual memory space. Superuser privileges (root) are required to attach
Security Bypassing the Android Linker Namespace The Android's linker (bionic) disallows loading most of the shared libraries from /system when a request is going from the executable code belonging to "classloader-namespace". (Source code is updated for Android 11).