To summarize new users. The code provided are designed to be executed within a Linux shell. It will then output a file named
android_brute-force_0000-9999.txt
From there, take that and encode it on ducktoolkit.com. There is one line for every pin combination, why it's 600k.
I don't know if this payload still works, I'm going to try it on an s8+ with a USB -> USB-C converter and post the results.