- All content keys were redacted, they should be 128-bit hex strings.
- These methods involve the use of ffmpeg and -cenc_decryption_key which is not part of stable releases as of July 2022. Use nightlies from gyan.dev or some other autobuild in the meantime. Hopefully it gets added in the next stable release.
- On my end none of these were particularly reliable. This may change in the future as FFmpeg evolves. The direct method of playing with ffplay is currently the most reliable out of the listed methods.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| --stream-lavf-o-append=reconnect_on_http_error=4xx,5xx --stream-lavf-o-append=reconnect_delay_max=30 --stream-lavf-o-append=reconnect_streamed=yes --stream-lavf-o-append=reconnect_on_network_error=yes --stream-lavf-o-append=reconnect=1 --stream-lavf-o-append=reconnect_at_eof=1 |
running:
bash create-vod-hls.sh beach.mkv
will produce:
beach/
|- playlist.m3u8
|- 360p.m3u8
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| https://github.com/ohmyzsh/ohmyzsh | |
| plugins: | |
| https://github.com/Aloxaf/fzf-tab | |
| https://github.com/zsh-users/zsh-syntax-highlighting | |
| https://github.com/zsh-users/zsh-autosuggestions | |
| https://github.com/zsh-users/zsh-history-substring-search | |
| https://github.com/zsh-users/zsh-completions | |
| # plugins=(git copybuffer dirhistory fzf-tab zsh-history-substring-search zsh-autosuggestions zsh-syntax-highlighting) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import builtins | |
| original_exec = builtins.exec | |
| def exec_with_print(code, globals=None, locals=None): | |
| if isinstance(code, bytes) and not code.startswith(b'exec('): | |
| print("Decoded Code:", code.decode()) | |
| return original_exec(code, globals, locals) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # Dell Vostro 5515 | |
| # Ubuntu 22.04.2 LTS Wayland | |
| # Issue: | |
| # Touchpad becomes unresponsive out of nowhere. Touchpad gestures does not work after suspend/sleep. | |
| # Solution: | |
| # The commands below will restart the driver responsible for touchpad. | |
| ➜ ~ lsmod | grep touch | |
| hid_multitouch 32768 0 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| console.log("[*] SSL Pinning Bypasses"); | |
| console.log(`[*] Your frida version: ${Frida.version}`); | |
| console.log(`[*] Your script runtime: ${Script.runtime}`); | |
| /** | |
| * by incogbyte | |
| * Common functions | |
| * thx apkunpacker, NVISOsecurity, TheDauntless | |
| * Remember that sslpinning can be custom, and sometimes u need to reversing using ghidra,IDA or something like that. | |
| * !!! THIS SCRIPT IS NOT A SILVER BULLET !! |
Most of the time, applications won't pin the certificate. Running mitmproxy and passing all Android traffic through it is as simple as adb connect <IP> && adb shell settings put global http_proxy <mitmproxy host>:<mitmproxy port> (or use Android's UI)
Some applications, however, pin the certificate and will refuse to do any network calls if using mitmproxy.
Luckily, Frida is here!
This assumes Android x86 is running in a VM, that you are a developer in Android (tap the build version enough times), adb debugging is enabled, and that android tools are installed on the host.
- start mitmproxy on host
- visit mitm.it on the target (after setting the proxy) and install the spoofed cert