https://www.youtube.com/playlist?list=PLKK11Ligqitg9MOX3-0tFT1Rmh3uJp7kA
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// Input : aabbccaabb | |
// Output : abcab????? | |
// ^ return iterator | |
#include <string> | |
#include <algorithm> | |
std::string RemoveConecutiveDup(std::string str) | |
{ | |
auto itr = std::unique(str.begin(), str.end()); |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// Window client-area is the area without Title bar,... | |
#include <Windows.h> | |
RECT rct; | |
// Getting upper-left and lower-right corners relative coordinates. | |
if (!GetClientRect(someHWND, &rct)) | |
{ | |
std::cout << "[GetClientRect] Error " << GetLastError() << '\n'; | |
return; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// Below is an example of getting Assault Cube game window width and height | |
#include <Windows.h> | |
// ClassName and WindowName of FindWindow() are generated by X-Spy tool: http://www.x-spy.net/ | |
hwndAC = FindWindow(L"SDL_app", L"AssaultCube"); | |
if (hwndAC) // >0 is a valid HWND | |
{ | |
RECT rctAC; | |
if (GetClientRect(hwndAC, &rctAC)) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// https://docs.microsoft.com/en-us/windows/win32/toolhelp/taking-a-snapshot-and-viewing-processes | |
#include <windows.h> // Must include before TlHelp32.h | |
#include <TlHelp32.h> | |
DWORD GetPIDByProcessName(const wchar_t* processName) | |
{ | |
DWORD PID = 0; | |
HANDLE hProcessSnapshot; | |
PROCESSENTRY32 PE32; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
adb -s emulator-5554 shell mkdir /data/data/com.tencent.tinput1 | |
adb -s emulator-5554 shell mkdir /data/data/com.tencent.tinput1/cache | |
adb -s emulator-5554 shell mkdir /data/data/com.tencent.tinput | |
adb -s emulator-5554 shell mkdir /data/data/com.tencent.tinput/cache | |
adb -s emulator-5554 shell am start com.tencent.ig/com.epicgames.ue4.SplashActivity filter |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
adb kill-server | |
adb start-server | |
adb shell pm uninstall com.google.android.play.games | |
adb shell pm uninstall com.google.android.gms | |
adb shell pm uninstall com.android.vending | |
adb shell pm uninstall com.google.android.feedback | |
adb shell pm uninstall com.google.android.ext.shared | |
adb shell pm uninstall com.google.android.gsf | |
adb shell pm uninstall com.google.android.gsf.login |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Issue this command to terminal with your device connected : | |
$ adb shell pm list packages | |
If that doesn't work, then: | |
$ adb shell | |
$ su | |
$ pm list packages |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
NetLimiter 3 | |
Registration name: Peter Raheli | |
Registration code: C99A2-QSSUD-2CSBG-TSRPN-A2BEB | |
NetLimiter 4 | |
Registration Name: Vladimir Putin #2 | |
Registration Code: XLEVD-PNASB-6A3BD-Z72GJ-SPAH7 | |
https://www.netlimiter.com/download | |
# Netlimiter Full Netlimiter Activated Netlimiter cracked Netlimiter Full Version Netlimiter Serial Netlimiter keygen Netlimiter crack Netlimiter 4 serial Netlimiter 4 Crack Netlimiter 4 register Netlimiter 4 patch Netlimiter full Full version Netlimiter 4 Activated Netlimiter 4 Cracked Netlimiter Pro |
NewerOlder