How to add Cover Art Pack for Bittboy/PocketGo



-This Cover Art package has been created for the Bittboy and the pocket go retro handheld.

-It include the Covers for the GB, GBC and GBA.

-The Covers are the original ones and have been resized to fit the screen of this device.

-They have 135px width and proportioned height.

How to install this pack :

  1. Copy the “CoverArt” folder to the root of the main partition of the SD Card.

  2. Boot your bittboy and press select on the emulator you want to add Covers to.

  3. Choose the edit option.

  4. Select the Box Art option and go to /mnt/CoverArt/*GB GBC GBA*. Choose the right folder according to the emulator you need.

  5. Press start to apply your new configuration.

  6. Now when you open your emulator you should see the Cover Art on the right side of the screen.

How to clean your rom names:

If you download a rom pack on the web chances are that the names of the roms will be full of parentheses and square brackets. You need to clean your Rom files names as they need to be identical as the covers files names. Here is a batch script that can do this.

Batch :

  1. Run this script with the -n option and it will show you the result of the name modification.

rename -n 's/\(.*\)|\[.*\]| //g' *

2) If you are satisfied with the result remove the -n to actually do the renaming.

rename 's/\(.*\)|\[.*\]| //g' *

Alternatively you can use Advanced renamer for windows to clean your rom filenames :



Q: Why some of my games doesn’t have Covers?

A: The name of the game rom need to be identical as the name of the cover image. Chances are that there is a cover matching your game inside the CoverArt directory. Find it and rename it exactly like your rom. Be careful to keep the .png : For the game « » you will need to rename « Mario.png » to « MarioUSA.png » inside the CoverArt directory.


Download Link :


More Info:

The full sized original covers are from libretro and can be found here :

Credit to u/inflam52 for the tutorial that inspired me.

Testing kali linux on windows 10 with WSL

Second try :
Kali can be found directly on the windows store. This version is much more stable than the one i tried to patch from ubuntu with the git repo in my first try.

Some usefull tweeks can be found here :

Everything is working well for now.

Edit 1 )
To make nmap work, install it on windows and make an alias :

alias nmap='"/mnt/c/Program Files (x86)/Nmap/nmap.exe"'


This version is not stable.

WSL stand for windows subsystem for linux

its a kindof native port for linux inside windows. not like emulation, it share the ressources directly from windows to run linux binaries.

To repare fuckedup things at first do those :

To fix error of expired cert. when trying to use apt-get command just do this :

apt install ./kali-archive-keyring_2018.1_all.deb
apt-get update

To fix error when you are not able to resolve address (aka dns is fuckedup)
just edit /etc/resolv.conf and add your favorite dns aka or

after do an apt update && apt upgrade


Kali Linux on Windows Subsystem for Linux

Way to find clues inside a ctf box

we find a file that was created by the maker in the process of creation ie : flag.txt.

Flag.txt was created 22 august 2017

find / -type f -newermt 2017-08-20 ! -newermt 2017-08-24 -ls 2>/dev/null

We see all files that have changed between 20-08 and 24-08 (if needed we can change the range)

With that we can see interesting changes inside the boxes

A journey into Windows pentesting.

I did root many windows rig in the last week.  You can practice your skill too, just go to  Here i will not tell you how specificity root those vulnerable windows os, i just want to keep some of the basics that i learned from this.

As expected the info gathering is the same nmap nikto dirb etc.

The windows command line, as i am used to unix bash this command line was like Korean to me.

Here are the basic commands that are useful : Read more “A journey into Windows pentesting.”

CTF Sedna from Viper (hackfest 2016)

Hi everyone, I did the first Vuln VM from hackfest 2016 not long ago and i want to try this one now. It’s the second one by @ViperBlackSkull and it is the second walkthrough for me so if you need more information you can reach me on twitter at @marghost.  You can get the virtual machine HERE. So lets get started.

Read more “CTF Sedna from Viper (hackfest 2016)”