Skip to content

Instantly share code, notes, and snippets.

View murano500k's full-sized avatar

Artem Radchenko murano500k

View GitHub Profile
@murano500k
murano500k / gExampleClient.sh
Created September 1, 2017 07:39 — forked from jetsonhacks/gExampleClient.sh
Gstreamer RTSP H.264 Receiver
#!/bin/sh
# NVIDIA Jetson TK1
# Get rtsp stream from network, decode and display
SOURCE=<IP ADDRESS OF MACHINE, e.g. 10.10.10.10>
#VIDEO Capabilities of the receiver
VIDEO_CAPS="application/x-rtp,media=(string)video,clock-rate=(int)90000,encoding-name=(string)H264"
TCP_VIDEO_CAPS="application/x-rtp"
VIDEO_SINK="videoconvert ! xvimagesink sync=false"
TCPSRC="tcpclientsrc host=$SOURCE port=5000"
VIDEO_DEC="h264parse ! omxh264dec"
Useful ADB commands
We have made a list of the most common adb commands that will help with your FAMOCO project.
FAMOCO ID
adb shell getprop ro.serialno
DEVICE MODEL
adb shell getprop ro.product.model
Following parameter has to be added to kernel if you need to enable Android KLOG.
printk.devkmsg=on
Enable OMX full logs:
stop media
setprop debug.omxr.mc 0x33333300
setprop debug.omxr.adapter 0xffffffff
start media
or
adb root && adb shell stop media && adb shell setprop debug.omxr.mc 0x33333300 && adb shell setprop debug.omxr.adapter 0xffffffff && adb shell start media
./cts-tradefed run cts --skip-preconditions --skip-device-info --primary-abi-only -m CtsSecurityTestCases -t android.security.cts.StagefrightTest#testStagefright_bug_32322258
https://android.googlesource.com/platform/frameworks/av/+/36b04932bb93cc3269279282686b439a17a89920
CVE-2017-0603
Denial of service vulnerability in Mediaserver
A denial of service vulnerability in Mediaserver could enable an attacker to use a specially crafted file
to cause a device hang or reboot.
This issue is rated as Moderate because it requires an uncommon device configuration.
# https://push2mebot.herokuapp.com/197882762
curl -X GET "https://push2mebot.herokuapp.com/197882762/test_message"
curl -X POST -F "image=@/Users/user1/Downloads/cats.jpeg" "https://push2mebot.herokuapp.com/197882762/image"
rm -rf /tmp/timelapse
mkdir -p /tmp/timelapse
adb pull /sdcard/timelapse/ /tmp/timelapse
export IMAGEPATH=/tmp/timelapse
export VIDEOFILE=~/timelapse/video.avi
mencoder -nosound -ovc lavc -lavcopts \
vcodec=msmpeg4v2:vpass=1 \
-vf scale=1920:1080 -mf type=jpeg:fps=24 \
mf://$IMAGEPATH/*.jpg -o $VIDEOFILE
connector rpi
39 gnd green
37 red gpio25 r2
35 brown gpio24 r3
33 yellow gpio23 r4
31 orange gpio22 r1
31 black gpio21 r5
connector relay
left->right
D:\miner\0.3.4b\miner.exe --server zec-eu1.nanopool.org --user t1MRH7R3ZxzN4pahSBhNdNcDiagjaMqSe8J.tamadapc/[email protected] --pass z --port 6666
t1MRH7R3ZxzN4pahSBhNdNcDiagjaMqSe8J
[email protected]
tamadapc
View decorView = getWindow().getDecorView();
decorView.setOnSystemUiVisibilityChangeListener
(new View.OnSystemUiVisibilityChangeListener() {
@Override
public void onSystemUiVisibilityChange(int visibility) {
// Note that system bars will only be "visible" if none of the
// LOW_PROFILE, HIDE_NAVIGATION, or FULLSCREEN flags are set.
if ((visibility & View.SYSTEM_UI_FLAG_FULLSCREEN) == 0) {
// TODO: The system bars are visible. Make any desired
// adjustments to your UI, such as showing the action bar or
sftp://laptop_user_id@laptop_name.local/home/laptop_user_id