Site/Network | Abbreviation |
---|---|
9Now | 9NOW |
A&E | AE |
ABC (AU) iView | AUBC |
ABC (US) | AMBC |
Adult Swim | AS |
Al Jazeera English | AJAZ |
All4 (Channel 4, ex-4oD) | ALL4 |
Amazon | AMZN |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import os | |
import requests | |
import werkzeug | |
from tqdm import tqdm | |
def download_ckpt(url:str, filename:str="", overwrite:bool=False, chunk_size:int=1) -> None: | |
""" | |
try auto detect file name if left empty | |
option to overwrite if file already existed |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// ==UserScript== | |
// @name Reqbot Userscript | |
// @namespace http://tampermonkey.net/ | |
// @version 0.2 | |
// @description Autofill reqbot template on requests.php | |
// @author Slyyxp | |
// @match https://jpopsuki.eu/forums.php?action=new&forumid=28 | |
// @icon https://www.google.com/s2/favicons?sz=64&domain=jpopsuki.eu | |
// @grant none | |
// ==/UserScript== |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
""" | |
Super trivial 'exploit' to Recover Client IDs from Challenges where it's Encrypted by Privacy Mode. | |
This can be done on 90% of third-party CDM Implementations, APIs, Proxies. It might work on some | |
license servers which they use their own certificate, but only if they forget to verify the signature | |
of the service certificate. So this wont work on any License Server that proxies to Google's Server. | |
The attack effectively boils down to the missing verification of Service Certificate signatures. | |
So just replace the public key of a service cert with one you have the private key for, and then | |
give it that. Now you can decrypt. |
- All content keys were redacted, they should be 128-bit hex strings.
- These methods involve the use of ffmpeg and -cenc_decryption_key which is not part of stable releases as of July 2022. Use nightlies from gyan.dev or some other autobuild in the meantime. Hopefully it gets added in the next stable release.
- On my end none of these were particularly reliable. This may change in the future as FFmpeg evolves. The direct method of playing with ffplay is currently the most reliable out of the listed methods.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
""" | |
Usage: mkse.py [path_to_container] | |
Requirements: pymediainfo module, mkvextract in system path | |
""" | |
import subprocess | |
import sys | |
import re | |
from pathlib import Path | |
from pymediainfo import MediaInfo |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from functools import wraps | |
import os | |
import re | |
import subprocess | |
from pathlib import Path | |
from typing import Literal | |
from urllib.parse import quote_plus, unquote_plus, urlencode, urljoin | |
from uuid import uuid4 | |
import requests |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
function jhexdump(array) { | |
if(!array) return; | |
console.log("---------jhexdump start---------"); | |
var ptr = Memory.alloc(array.length); | |
for(var i = 0; i < array.length; ++i) | |
Memory.writeS8(ptr.add(i), array[i]); | |
console.log(hexdump(ptr, {offset: 0, length: array.length, header: false, ansi: false})); | |
console.log("---------jhexdump end---------"); | |
} |
Note: Picture is heavily outdated; I use the same desk and monitor but the PC is completely different in all ways.
For information on my PC build, see: https://ie.pcpartpicker.com/user/rlaPHOENiX/saved/9G7yxr
Stuff I no longer use
Note: this no longer works
NewerOlder