Skip to content

Instantly share code, notes, and snippets.

View 144mb's full-sized avatar
💾

1.44 MB 144mb

💾
View GitHub Profile
@asheroto
asheroto / README.md
Last active December 11, 2025 17:11
Bypass Windows 11 Upgrade Assistant / PC Health Check / TPM and CPU Settings. Ignore PC Health Check results.

Bypass Windows 11 Upgrade Assistant / Setup Hardware Checks (TPM, CPU, RAM)

This PowerShell script allows you to bypass TPM 2.0, unsupported CPU, and memory checks enforced by the Windows 11 Upgrade Assistant and setup.exe from Windows installation media. It eliminates common upgrade blocks such as:

  • This PC doesn't currently meet Windows 11 system requirements.
  • TPM 2.0 must be supported and enabled on this PC.
  • The processor isn't currently supported for Windows 11.

What It Does

function Write-CustomLog {
param([string]$Message)
$callerInfo = (Get-PSCallStack)[1]
$scriptName = Split-Path -Leaf $callerInfo.ScriptName
$lineNumber = $callerInfo.ScriptLineNumber
$functionName = $callerInfo.FunctionName
$logEntry = "{0:yyyy-MM-dd HH:mm:ss} - {1}:{2} - {3} - {4}" -f `
(Get-Date), $scriptName, $lineNumber, $functionName, $Message
@144mb
144mb / dist-upgrade-buster-to-bookworm.sh
Created June 12, 2024 14:59 — forked from rrottmann/dist-upgrade-buster-to-bookworm.sh
Dist-Upgrade Debian 10 Buster to Debian 12 Bookworm
# Dist-Upgrade Debian 10 Buster to Debian 12 Bookworm
# Debian 10
apt-get -y update
apt-get -y upgrade
apt-get -y full-upgrade
cat > /etc/apt/sources.list <<"EOF"
deb http://deb.debian.org/debian/ bullseye main
deb-src http://deb.debian.org/debian/ bullseye main
deb http://security.debian.org/debian-security stable-security/updates main
@steventroughtonsmith
steventroughtonsmith / apple_eu_dma_compliance_workshop_whisper_transcript.txt
Created March 19, 2024 04:42
Apple/EU DMA Compliance Workshop whisper-generated transcript March 18 2024
Good morning everybody.
I hope you are ready to start.
We still still new participants entering into the room but I think we can start.
So welcome to everybody to our first DMA compliance workshop after compliance day.
So today's edition is with Apple and thanks a lot to Apple for coming here today to explain and discuss our DMA compliance solutions.
@jborean93
jborean93 / Get-ServiceCredential.ps1
Last active October 22, 2025 12:44
Get's the username and password for installed Windows services
# Copyright: (c) 2019, Jordan Borean (@jborean93) <[email protected]>
# MIT License (see LICENSE or https://opensource.org/licenses/MIT)
Function Get-ServiceCredential {
<#
.SYNOPSIS
Retrieve the username and plaintext password for all services installed on the local computer.
.DESCRIPTION
Will retrieve the username and plaintext password for the service(s) specified. This must be run as an
@teknoraver
teknoraver / unixhttpc.go
Last active November 26, 2025 20:43
HTTP over Unix domain sockets in golang
package main
import (
"context"
"flag"
"fmt"
"io"
"net"
"net/http"
"os"