- 🗒 - List of useful links for amlogic S9xx/S8xx SoCs i've compiled by myself.
⚠️ - Please leave a comment if you have a suggestion. This list will not contain paid programs
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| volumeselect() { | |
| while true; | |
| do | |
| getevent -lc 1 2>&1 | grep VOLUME | grep DOWN > "$TMPDIR"/events | |
| if grep VOLUME "$TMPDIR"/events >/dev/null; | |
| then break | |
| fi | |
| done | |
| if grep VOLUMEUP "$TMPDIR"/events >/dev/null; |
error:03000098:digital envelope routines:do_sigver_init:invalid digest:crypto/evp/m_sigver.c:342:
make[1]: *** [/home/xxx/kernel/common/certs/Makefile:94: certs/signing_key.pem] Error 1
make[1]: *** Deleting file 'certs/signing_key.pem'
make: *** [/home/xxx/kernel/common/Makefile:1998: certs] Error 2
make: *** Waiting for unfinished jobs....This error might occur durring kernel build. It is happening because newer versions of OpenSSL disallow using SHA-1.
How to extract PStore from a device with mtkclient
- This must be done after a kernel panic/warm boot. Otherwise you might not get any meaningful data.
- The first two steps can be skipped if you know the address and the length of the region.
- Extract
expdbpartition and run thestringsagainst the image.
$ python mtk.py r expdb expdb.img
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # Crash analytics | |
| firebase-settings.crashlytics.com | |
| crashlyticsreports-pa.googleapis.com | |
| crashlytics.com | |
| sentry.com | |
| # Samsung TV network issue | |
| cdn.samsungcloudsolution.com | |
| # Site-breaking domains |
- OISD Big list
- AWAvenue advertising SDKs (mobile) blocklist
- PhishingArmy Extended
- OpenPhish / IPThreat / PhishTank