Some notes, tools, and techniques for reverse engineering macOS binaries.
My random collection of notes on AI voice cloning services/models/techniques/etc. Just because something is listed here, doesn't necessarily mean I have tried it, nor endorse it. Use this as a starting point for doing your own further research.
import praw | |
import json | |
import tweepy | |
import time | |
import os | |
import csv | |
import configparser | |
import urllib.parse | |
import sys | |
from imgurpython import ImgurClient |
To start using the Jellyfin API, authorization is probably the first thing you'll need to do. Jellyfin's authorization options can be a bit confusing because there are a lot of deprecated options.
Generally there are three ways to authenticate: no authorization, user authorization with an access token or authorization with an API key. The first way is easy, just do nothing. But most often you'll need to use either the access token or API key.
There are multiple methods for transmitting authorization values, however, some are outdated and scheduled to be removed.
It's recommend to use the Authorization
header. If header auth isn't an option, the token may be sent through the ApiKey
query parameter. Sending secure data in a query parameter is unsafe as the changes of it leaking (via logs, copy-paste actions or by other means) are high. Only use this method as a last resort.
Current static binaries do not target https://bitbucket.org/multicoreware/x265_git/issues/563/patch-neon-arm64-improvements which can be identified
Before
x265 [info]: using cpu capabilities: none!
[libx264 @ 0xaaab0a5fc000] using cpu capabilities: ARMv8 NEON
Hello. In this document, we will walk through the steps of building and hosting your own Monero node from source on a Debian-based Linux system. These systems include Raspbian, Debian (9 and above), and Ubuntu (18.04 and above). This tutorial assumes that you are capable of accessing the ROOT terminal of your Debian-based system, and are capable of getting your system online if necessary. You may plan on using an external storage device to store the blockchain, this tutorial will include the optional steps to support external storage. Alternatively, this setup procedure can also accomodate users looking to host a pruned blockchain with restricted storage space.
Here are some useful links for reaching this prerequisite if you do not currently have access to a Debian-based system that meets the recommended system requirements.
-
[How to spawn a VP
Host your own Tor hidden service!
A super simple guide to spinning up a Tor hidden service. [tl;dr]
Ubuntu 20.04 LTS was used for the making of this guide.
you can install Tor using the following command
I’ve been using YouTube Music as my main music streaming service for almost a year and a half. The iOS client is great- I’ve never had a single complaint. It’s potentially one of the most bug free apps I’ve ever used, it has an extremely friendly, and simple, graphical interface, and the service itself is great.
I was curious how the client worked in terms of networking, and while curiosity may treat cats poorly, it lands researchers in black sites can provide a lot of insight.
The first thing I do when reverse engineering a client is monitor HTTP requests while the application starts up, and when doing the tasks interested in. On a jailbroken iOS device, I use FLEX by FlipBoard.
#!/usr/bin/env python2 | |
# vim:fileencoding=utf-8 | |
from __future__ import unicode_literals, division, absolute_import, print_function | |
from calibre.web.feeds.news import BasicNewsRecipe | |
class AdvancedUserRecipe1526022279(BasicNewsRecipe): | |
title = 'Calibre Blog' | |
oldest_article = 1000 | |
max_articles_per_feed = 100 | |
auto_cleanup = True |