Skip to content

Instantly share code, notes, and snippets.

View prime-optimal's full-sized avatar

optimal prime prime-optimal

View GitHub Profile
@0xdevalias
0xdevalias / ai-voice-cloning.md
Created March 24, 2025 09:23 — forked from d00m4ace/ai-voice-cloning.md
AI Voice Cloning
@0xdevalias
0xdevalias / reverse-engineering-macos.md
Last active August 9, 2025 13:19
Some notes, tools, and techniques for reverse engineering macOS binaries
@0xdevalias
0xdevalias / ai-voice-cloning-transfer.md
Last active August 10, 2025 08:14
Some notes on AI Voice Cloning/Transfer (eg. RVCv2)

AI Voice Cloning / Transfer (eg. RVCv2)

My random collection of notes on AI voice cloning services/models/techniques/etc. Just because something is listed here, doesn't necessarily mean I have tried it, nor endorse it. Use this as a starting point for doing your own further research.

Table of Contents

@0xDispatch
0xDispatch / tootbot.py
Last active August 10, 2023 23:47
changing tweeting from api1 to apiv2, adding client for api v2,
import praw
import json
import tweepy
import time
import os
import csv
import configparser
import urllib.parse
import sys
from imgurpython import ImgurClient
@nielsvanvelzen
nielsvanvelzen / jf-dev-auth.md
Last active August 6, 2025 00:25
Jellyfin API Authorization

Jellyfin API Authorization

To start using the Jellyfin API, authorization is probably the first thing you'll need to do. Jellyfin's authorization options can be a bit confusing because there are a lot of deprecated options.

Generally there are three ways to authenticate: no authorization, user authorization with an access token or authorization with an API key. The first way is easy, just do nothing. But most often you'll need to use either the access token or API key.

Sending authorization values

There are multiple methods for transmitting authorization values, however, some are outdated and scheduled to be removed. It's recommend to use the Authorization header. If header auth isn't an option, the token may be sent through the ApiKey query parameter. Sending secure data in a query parameter is unsafe as the changes of it leaking (via logs, copy-paste actions or by other means) are high. Only use this method as a last resort.

@rromanchuk
rromanchuk / README.md
Last active May 10, 2024 03:28
Building ffmpeg with x265 NEON arm64 cpu acceleration support (Ubuntu LTS, t4g, a1 ec2 family)
@tannerdsilva
tannerdsilva / hostXMRNode.md
Last active May 30, 2025 04:00
How To Build And Host a Monero Node from Source

How to Build and Install a Monero Node on a Debian-based System

Hello. In this document, we will walk through the steps of building and hosting your own Monero node from source on a Debian-based Linux system. These systems include Raspbian, Debian (9 and above), and Ubuntu (18.04 and above). This tutorial assumes that you are capable of accessing the ROOT terminal of your Debian-based system, and are capable of getting your system online if necessary. You may plan on using an external storage device to store the blockchain, this tutorial will include the optional steps to support external storage. Alternatively, this setup procedure can also accomodate users looking to host a pruned blockchain with restricted storage space.

Here are some useful links for reaching this prerequisite if you do not currently have access to a Debian-based system that meets the recommended system requirements.

@maximousblk
maximousblk / tor.md
Created September 8, 2020 06:29
A super simple guide to starting up your own Tor hidden service

Host your own Tor hidden service!

A super simple guide to spinning up a Tor hidden service. [tl;dr]

Ubuntu 20.04 LTS was used for the making of this guide.

Install Tor

you can install Tor using the following command

@leptos-null
leptos-null / YouTube_Music_Client.md
Last active April 12, 2024 03:31
Writing an iOS YouTube Music client

Writing an iOS YouTube Music client

I’ve been using YouTube Music as my main music streaming service for almost a year and a half. The iOS client is great- I’ve never had a single complaint. It’s potentially one of the most bug free apps I’ve ever used, it has an extremely friendly, and simple, graphical interface, and the service itself is great.

I was curious how the client worked in terms of networking, and while curiosity may treat cats poorly, it lands researchers in black sites can provide a lot of insight.

Step 0

The first thing I do when reverse engineering a client is monitor HTTP requests while the application starts up, and when doing the tasks interested in. On a jailbroken iOS device, I use FLEX by FlipBoard.

#!/usr/bin/env python2
# vim:fileencoding=utf-8
from __future__ import unicode_literals, division, absolute_import, print_function
from calibre.web.feeds.news import BasicNewsRecipe
class AdvancedUserRecipe1526022279(BasicNewsRecipe):
title = 'Calibre Blog'
oldest_article = 1000
max_articles_per_feed = 100
auto_cleanup = True