Testing Environment:
- Phone: Pixel 3 XL
- OS: Android 11, Build RQ3A.211001.001
- Security Update: 10/1/21
- Google Play System Update: 1/1/21
| ;FLAVOR:Marlin | |
| ;TIME:11263 | |
| ;Filament used: 26.7137m | |
| ;Layer height: 0.3 | |
| ;MINX:46.285 | |
| ;MINY:55.586 | |
| ;MINZ:0.3 | |
| ;MAXX:173.825 | |
| ;MAXY:164.414 | |
| ;MAXZ:38.1 |
| #!D:\Program Files\Python37\python.exe | |
| # UPDATE THE PATH ABOVE TO THE FULL PATH TO YOUR python.exe FILE!!!! | |
| # deluge-banned-files-rpc.py | |
| # bengalih | |
| # v.0.1 | |
| # The purpose of this script is to be run with the Execute plugin for Deluge | |
| # Enable it to run on Torrent Add event | |
| # If there are problems, enable Deluge debug logging and search for the name of this script. |
| # sonarr-blacklist.py | |
| # bengalih | |
| # v.0.2 | |
| # This script will perform in two ways: | |
| # 1) Pass a torrent ID/HASH as the first argument. In this method, the script will search the sonarr queue for that torrent and perform the OPERATIONS. | |
| # 2) Run with no argument. In this method, the script will search all items in the sonarr queue for the STATUS_MESSAGES_TO_CHECK and if a match is found perform the OPERATIONS | |
| # When passed a torrent ID/HASH the script will enumerate the sonarr queue every QUEUE_CHECK_WAIT seconds for QUEUE_CHECK_MAX_ATTEMPTS. | |
| # The default is 5/24, which is 2 minutes. |
| ############################################################################## | |
| # RARBGRansomRecovery.ps1 | |
| # v.0.1.1 | |
| # by bengalih | |
| # You may need to set your PoweShell Execution policy as below: | |
| # Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope Process -Force | |
| # If that doesn't work try: | |
| # Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass |
| # scrcpy-pin-unlock.ps1 | |
| # v.0.1 - 8/30/24 | |
| # bengalih | |
| # SETUP THE BELOW VALUES FOR YOUR SYSTEM | |
| ########################################################### | |
| # Name of your scrcpy window | |
| $windowTitle = "Pixel 3 XL" | |
| # Full path to scrcpy's adb.exe | |
| $adbPath = "C:\Program Files\scrcpy-win64-v2.6.1\adb.exe" |
| { | |
| "id": 999038, | |
| "created_at": "2023-07-28 12:46:39", | |
| "updated_at": "2024-04-08 07:50:24", | |
| "name": "United States SOCKS #27", | |
| "station": "196.247.50.3", | |
| "ipv6_station": "", | |
| "hostname": "socks-us27.nordvpn.com", | |
| "load": 0, | |
| "status": "online", |
| bitmoji app - first attempt with swift-https (failed), second attemp was manual rename with windows-http (success), | |
| third attempt was swift-http (success), fourth attempt was manual rename with windows-https (success), | |
| fifth attempt was android-https (success). | |
| Summary: everything works with http OR https except Swift. | |
| Line 627: 2022-01-27 03:02:37 10.10.10.102 MOVE /websync/ben-pixel/SwiftBackup_f71903a497f67757/Pixel+3+XL/com.bitstrips.imoji.app+(Pixel+3+XL) https://webdav.domain.com:443/websync/ben-pixel/SwiftBackup_f71903a497f67757/Pixel%203%20XL/com.bitstrips.imoji.app%20(Pixel%203%20XL)%20(archived) 443 [email protected] 10.10.10.90 SwiftBackup+/+4.0.0+(525);+Google/Pixel+3+XL - 400 1 0 53 | |
| Line 653: 2022-01-27 03:05:17 10.10.10.102 MOVE /websync/ben-pixel/SwiftBackup_f71903a497f67757/Pixel+3+XL/com.bitstrips.imoji.app+(Pixel+3+XL) http://webdav.domain.com:1008/websync/ben-pixel/SwiftBackup_f71903a497f67757/Pixel%203%20XL/com.bitstrips.imoji.app%20(Pixel%203%20XL)%20(archived) 1008 user 10.10.10.120 Mic |
| F:\>python | |
| Python 3.8.5 (tags/v3.8.5:580fbb0, Jul 20 2020, 15:43:08) [MSC v.1926 32 bit (Intel)] on win32 | |
| Type "help", "copyright", "credits" or "license" for more information. | |
| >>> from FATtools.Volume import * | |
| >>> root = vopen('F:', 'r+b') | |
| >>> root.listdir() | |
| ['MP3S', 'System Volume Information', 'C.mp3', 'B.mp3', 'A.mp3'] | |
| >>> root.sort() | |
| (7, 121) | |
| >>> root.listdir() |
| My GV number ends in 2364 and I give Google Voice engineering your permission to examine my configuration and call data. | |
| The first set of calls were performed as follows: | |
| - This set of calls were performed over 4G/LTE with no Wi-Fi calling enabled (standard configuration). | |
| 1) 1/3/22 7:26 pm CST - from Pixel 3XL with last digits 0472 on Mint (T-Mobile MVNO) | |
| 2) 1/3/22 7:29 pm CST - from Pixel 3XL with last digits 0472 on Mint | |
| 3) 1/3/22 7:31 pm CST - from Pixel 3XL with last digits 4072 on Mint | |
| 4) 1/3/22 7:33 pm CST - from Pixel 3XL with last digits 4072 on Mint |