User:Wuseman

About

 * "Linux user since 2004(Various Distros)
 * Gentoo user since 2008(My Main OS still: 2019)
 * I believe' in sharing knowledge
 * Professional Software & Hardware Cracker (References are available)
 * I have full respect for all developers who contribute to open source <3
 * Owner of: https://nr1.nu
 * Github: https://github.com/wuseman


 * One of those who at very early stages revealed how to clear the enrollment protection on the chromebook via pure hardware hacking by dumping flash and re-write the serial number (The security is still very very weak and google Google don't give a **** about his - Devices from google are usually very easy to hack compared with other manufacturers, YAY! It's true.) - (there is several guides out there nowadays) - Here you can see how Chromebook's are "protected" from thiefs and how to manage it on the "default/correct way": https://www.bettercloud.com/monitor/the-academy/disable-lost-stolen-chromebooks/


 * Another specialite is to unlock system and admin protected UEFI / BIOS setups such as on HP Elitebooks G3,G4,G5,G6 820,840, Probooks and more Models from HP that is protected by a BIOS password (ALL MODELS CAN BE HACKED NO MATTER VERSIONS). You can either short circuit the eeprom chip or manipulating the SMC.bin file and then flashing the bios(this is the safe way i DO not recommending anyone to short ciruit the chip cause its 80% that your motherboard will be fried - Yeah, been there several times myself until I figured out), this is nothing I will help you with nowadays since I don't have access to HP laptops anymore (https://www.bleepingcomputer.com/forums/t/689638/hp-bios-password-smcbin-not-working/)


 * Dell devices that has been protected by MASTER+USER password OR by an ADMIN/BIOS/SYSTEM password is possible to bypass/unlock remotely, let me know if yo need any support around this topic.

Happy Hacking!

Gentoo Wiki Maintainer Of ADB Section
Mastering ADB (Android Debug Bridge) and working with Android devices from shell (Samsung,Huawei,Motorola,LG has all been cracked or security bypassed via FRP protection, you can find my personal wikis for bypassing samsung and huawei on my github - I never had the opportunity to playw sony ericsson, xiamio etc) This does not automatically mean that I can build apps, rather the opposite. I have zero knowledge about JAVA, or atleast MINIMAL knowledge so contact me about adb/shell stuff only if you need some kind of help.

Android/adb

Known For

 * Exposed several exploits on OpenWRT, find more information on my GitHub


 * Created the first brute force tool with 100% security to break lockscreen pin on any Android device aslong as usb debugging mode has been enable, find more info about this project under 


 * Main Project: Emagnet is a tool for find leaked databases with 97.1% accurate to grab mail + password together, emagnet also have support for auto brute force gmail accounts in realtime and it's very easy to add your own scripts to run beside emagnet - 

Gentoo Tips and Tricks

 * gentoo-cheatsheet 

Gentoo Overlay

 * wuseman-overlay 

Contact
If you have problems, questions, ideas or suggestions please contact me on wuseman@nr1.nu

For faster contact visit freenode's webchat and type '/msg wuseman Hello'

Enter Freenode chat via your own client or use the web client by visit this page 

More places you can find me:

 * Nr1: 
 * Stackoverflow: 
 * Twitter: 
 * Github: 
 * CommandLineFu: 