This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
sc delete atvi-randgrid_sr | |
sc create atvi-randgrid_sr type= kernel binPath= "I:\Program Files (x86)\Steam\steamapps\common\Call of Duty HQ\randgrid.sys" | |
sc sdset atvi-randgrid_sr D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWRPWPLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
set -e | |
if [[ $EUID -ne 0 ]]; then | |
echo "This script must be run as root" 1>&2 | |
exit 1 | |
fi | |
function install() { |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Panzer Front Ausf.B / PAK (script 0.1) | |
# script for QuickBMS http://quickbms.aluigi.org | |
get FILES long | |
get GLOBALHEADERLENGTH long | |
goto 0x08 | |
for i = 0 < FILES | |
SavePos STARTPOS | |
print "STARTPOS: %STARTPOS|h%" | |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import os | |
# extract archive.imp with quickbms and imp0.bms to get the raw files | |
# use this one http://aluigi.altervista.org/bms/imp0.bms | |
# then copy this script into the extracted folder | |
rootdir = './' | |
# note: this will not work on all files only the ones that have a cheap header before dds | |
for subdir, dirs, files in os.walk(rootdir): | |
for file in files: | |
print os.path.join(subdir, file) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
My Parrot AR Drone 2.0 crashed into water and was dead but... | |
It still saved the footage as mp4.tmpvid, that is damaged and not playable anymore. | |
Here is how it can be fixed: | |
1. Get recover_mp4 (freeware) and ffmpeg and extract | |
2. Open cmd where you extracted recover_mp4 and ffmpeg | |
3. | |
This hex dump is a analyze file used by recover_mp4! |