Skip to content

Instantly share code, notes, and snippets.

@Bluscream
Bluscream / translation-obfuscator.py
Last active January 4, 2024 23:35
Translation Obfuscator/Scrambler
import csv
import os
import deep_translator
from deep_translator.exceptions import RequestError, LanguageNotSupportedException
from deep_translator import (
GoogleTranslator,
PonsTranslator,
LingueeTranslator,
MyMemoryTranslator
)
@Bluscream
Bluscream / py-upgrade.sh
Last active December 30, 2023 01:26
Raspbian Python upgrade bash script
#!/bin/bash
# https://raw.githubusercontent.com/tvdsluijs/sh-python-installer/main/python.sh
# Function to kill all Python processes
kill_python() {
sudo pkill -f python
}
# Function to remove all old Python versions
@Bluscream
Bluscream / app.py
Last active December 28, 2023 00:36
motionEye camera settings wrapper api flask python script
from flask import Flask, request
from motioneye_client.client import MotionEyeClient
from aiohttp import ClientSession
from json import dumps
from simpleeval import simple_eval
from base64 import b64decode
from config import *
# print(url)
{
"backup_time": "2023-11-07T13:12:01.332666+00:00",
"network_info": {
"extended_pan_id": "c2:a5:85:19:47:5c:f8:28",
"pan_id": "C4F7",
"nwk_update_id": 0,
"nwk_manager_id": "0000",
"channel": 15,
"channel_mask": [
11,
@Bluscream
Bluscream / gamemodes.php
Last active October 5, 2023 22:15
php battlebit json data parser
<?php
// Step 1: Fetch the JSON data
$jsonData = file_get_contents('https://raw.githubusercontent.com/Bluscream/battlebitapirunner-modules/master/data/gamemodes.json');
// Step 2: Parse the JSON data into a PHP array
$data = json_decode($jsonData, true);
// Step 3: Generate the HTML code for the Bootstrap table
$html = '<link rel="stylesheet" href="https://stackpath.bootstrapcdn.com/bootstrap/4.5.2/css/bootstrap.min.css">';
@Bluscream
Bluscream / logcat.log
Created September 29, 2023 00:12
Wifi Issue
This file has been truncated, but you can view the full file.
--------- beginning of crash
09-29 01:53:37.473 5583 5583 E AndroidRuntime: FATAL EXCEPTION: main
09-29 01:53:37.473 5583 5583 E AndroidRuntime: Process: com.google.android.googlequicksearchbox:search, PID: 5583
09-29 01:53:37.473 5583 5583 E AndroidRuntime: java.util.concurrent.CancellationException
09-29 01:53:37.473 5583 5583 E AndroidRuntime: at ipii.c(PG:1)
09-29 01:53:37.473 5583 5583 E AndroidRuntime: at ipii.get(PG:1)
09-29 01:53:37.473 5583 5583 E AndroidRuntime: at gjsd.b(PG:2)
09-29 01:53:37.473 5583 5583 E AndroidRuntime: at dljt$c.j(PG:22)
09-29 01:53:37.473 5583 5583 E AndroidRuntime: at dljt$c.h(PG:7)
09-29 01:53:37.473 5583 5583 E AndroidRuntime: at dljt$c.g(PG:10)
@Bluscream
Bluscream / battlebit_server_commands.txt
Last active September 21, 2023 12:18
BattleBit Server Commands
help
------------
Admin Commands
stop (Stops the server)
end game (Ends the round)
force start (Force starts the game if server is waiting for players)
say [your word] (Says in chat)
sayto [steamid] [your word] (Says in chat to only specific player)
ban [steamid]
@Bluscream
Bluscream / update-php.sh
Created August 30, 2023 11:53
PHP update script for Raspbian
dpkg -l |grep php > php.log
sudo apt-get remove '^php.*'
sudo apt install -y php$1-cli php$1-common php$1-bcmath php$1-curl php$1-geoip php$1-gmp php-$1http php-$1intl php-$1mbstring php-$1mysql php-$1propro php$1-raphf php$1-tidy php$1-xml php$1-zip php$1-bcmath php$1-curl php$1-gd php$1-gmp php$1-intl php$1-json php$1-mbstring php$1-mysql php$1-opcache php$1-readline php$1-tidy php$1-xml php$1-zip php$1-imap --install-recommends
php --version
php -m
sudo apt install -y libapache2-mod-php$1 --install-recommends
sudo a2dismod php7
sudo a2dismod php7.4
sudo a2dismod php8.0
@Bluscream
Bluscream / readme.md
Last active July 2, 2023 00:08
Useful scripts for the Unity Editor
@Bluscream
Bluscream / chatgpt-free.md
Last active June 27, 2023 20:34
Reverse Engineering Amino Communications IPTV CCTV Wifi Cloud Camera

Reverse engineering a cloud IPTV CCTV camera to use it locally without relying on its app or cloud infrastructure can be a complex task. It typically requires advanced knowledge of network protocols, firmware analysis, and reverse engineering techniques. Keep in mind that reverse engineering may void the warranty of the device and may be against the terms of service of the manufacturer.

Here are some general steps you can follow to attempt reverse engineering:

  1. Network Analysis: Use tools like Wireshark or tcpdump to capture network traffic between the camera and its servers. Analyze the captured packets to understand the communication protocol used by the camera. Look for any encryption or encoding schemes applied to the data.

  2. Firmware Analysis: Obtain the camera's firmware and extract its contents. Analyze the firmware image to identify the underlying operating system and any embedded applications. Look for configuration files, binaries, or scripts that might provide clues about the camera's functio