--------- beginning of crash | |
09-29 01:53:37.473 5583 5583 E AndroidRuntime: FATAL EXCEPTION: main | |
09-29 01:53:37.473 5583 5583 E AndroidRuntime: Process: com.google.android.googlequicksearchbox:search, PID: 5583 | |
09-29 01:53:37.473 5583 5583 E AndroidRuntime: java.util.concurrent.CancellationException | |
09-29 01:53:37.473 5583 5583 E AndroidRuntime: at ipii.c(PG:1) | |
09-29 01:53:37.473 5583 5583 E AndroidRuntime: at ipii.get(PG:1) | |
09-29 01:53:37.473 5583 5583 E AndroidRuntime: at gjsd.b(PG:2) | |
09-29 01:53:37.473 5583 5583 E AndroidRuntime: at dljt$c.j(PG:22) | |
09-29 01:53:37.473 5583 5583 E AndroidRuntime: at dljt$c.h(PG:7) | |
09-29 01:53:37.473 5583 5583 E AndroidRuntime: at dljt$c.g(PG:10) |
dpkg -l |grep php > php.log | |
sudo apt-get remove '^php.*' | |
sudo apt install -y php$1-cli php$1-common php$1-bcmath php$1-curl php$1-geoip php$1-gmp php-$1http php-$1intl php-$1mbstring php-$1mysql php-$1propro php$1-raphf php$1-tidy php$1-xml php$1-zip php$1-bcmath php$1-curl php$1-gd php$1-gmp php$1-intl php$1-json php$1-mbstring php$1-mysql php$1-opcache php$1-readline php$1-tidy php$1-xml php$1-zip php$1-imap --install-recommends | |
php --version | |
php -m | |
sudo apt install -y libapache2-mod-php$1 --install-recommends | |
sudo a2dismod php7 | |
sudo a2dismod php7.4 | |
sudo a2dismod php8.0 |
help | |
------------ | |
Admin Commands | |
stop (Stops the server) | |
end game (Ends the round) | |
force start (Force starts the game if server is waiting for players) | |
say [your word] (Says in chat) | |
sayto [steamid] [your word] (Says in chat to only specific player) | |
ban [steamid] |
<!DOCTYPE html> | |
<html> | |
<!-- Example: http://minopia.de/gh/compare/?base=https://github.com/IKennyAgain/iw4x_waypoints/tree/master&compare=https://github.com/xlabs-mirror/iw4x-bot-waypoints/tree/master --> | |
<head> | |
<meta charset="UTF-8"> | |
<title>GitHub Compare URL Generator</title> | |
<link rel="stylesheet" href="https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0/css/bootstrap.min.css"> | |
<style> | |
.dark-mode { | |
background-color: rgb(71, 71, 71); |
<?php // session_start(); | |
ini_set('display_errors', 1); | |
ini_set('display_startup_errors', 1); | |
error_reporting(E_ALL); | |
define("PHP_OS_FAMILY", "Windows"); | |
$out=""; | |
function logg($msg) { | |
global $out; | |
if (is_array($msg)) { | |
$msg = implode("\n", $msg); |
Library: C:\Users\elder\UnityProjects\Twister Research and Rescue 2022\Temp\StagingArea\Data\Plugins\x86_64\lib_burst_generated | |
--platform=Windows | |
--backend=burst-llvm-14 | |
--target=X64_SSE2 | |
--global-safety-checks-setting=Off | |
--meta-data-generation=False | |
--dump=Function | |
--float-precision=Standard | |
--compilation-defines=UNITY_2021_3_17 | |
--compilation-defines=UNITY_2021_3 |
Reverse engineering a cloud IPTV CCTV camera to use it locally without relying on its app or cloud infrastructure can be a complex task. It typically requires advanced knowledge of network protocols, firmware analysis, and reverse engineering techniques. Keep in mind that reverse engineering may void the warranty of the device and may be against the terms of service of the manufacturer.
Here are some general steps you can follow to attempt reverse engineering:
-
Network Analysis: Use tools like Wireshark or tcpdump to capture network traffic between the camera and its servers. Analyze the captured packets to understand the communication protocol used by the camera. Look for any encryption or encoding schemes applied to the data.
-
Firmware Analysis: Obtain the camera's firmware and extract its contents. Analyze the firmware image to identify the underlying operating system and any embedded applications. Look for configuration files, binaries, or scripts that might provide clues about the camera's functio
; Checksums generated by ExactFile 1.0.0.15 | |
; http://www.exactfile.com | |
; 11/06/2023 00:57:38 | |
376ede28f4b0902ed4a486ca707044b757a45b9bbf89bb1b617e1c32e0db6c4f299044d6866758303a208a0de64fddec12f307d1e5cbb6f72159617b2bc7daef ?SHA512*iw4x.dll | |
4e01e613e7b99fe0e18b4d7d04cc2ed221f4a0c3375da6fe1c9b1ae72aa2f419a721824b88cc3fc32bb05ff84bd3daf791eaeced5fafc363306f18e98ef3d9ae ?SHA512*iw4x.exe | |
67bc63673ceb38eb37cda12fc48e4753fb73f5a0cd36a7dd47fd158bf6aaa6f5369b23b8e0dbd7605f695a0cb6fb5c969c11dfefb9900d7da30a4ddbbea8ecab ?SHA512*TestFiles.exe | |
0cd7b64c50ad29725f864ea6021c919faf87efe6cfe840888b5c6384ca3b98d925e15f159c42080ae671681aa48ff0e94c7b2c8f80574d8c7c0dffbe49714265 ?SHA512*xlabs.exe | |
13b76f6be3c08f8d4b660dcf738e3921e986f75f1cc10027f7f7509f835ec39bd75813eb19711b3e77e9304f04e069a0723353aa648360f231ddc37a081c6d79 ?SHA512*iw4x\iw4x_00.iwd | |
b72efb723a73a3647661a4afee53aedb2a95ad7aa75b1d0b3608ca518a2c88a917a4fa59b52d823c93917516679cfed57a7da118ab0b981d5aaba4a516f2d086 ?SHA512*iw4x\iw4x_01.iwd |