File: Download Infomark imw c910w firmwareimw-c910w hack imw-c910w unlock hack clear modem free internet imw-c910w manual imw-c910w firmware update imw-c910w default password infomark imw-c900w imw-c910w reset FCC IDENTIFIER: YCO-IMW-C910W. Name of Grantee: Infomark Co., Ltd. Equipment Class: Licensed Non-Broadcast Station Transmitter. Notes: WiMAX & WiFi 12 Dec 2010 Firmware Version : 1.9.9.4 Hardware Version : R051.2 Device Name : IMW-C615W Device Manufacturer : INFOMARK (infomark.co.kr This is the Device Update screen from the Clear IMW-C910W router. Spot Current Device Software Version Check for Updates CHECK Update Firmware From WiMAX & WiFi Dual CPE user manual details for FCC ID YCO-IMW-C910W made by Infomark Co., Ltd.. Document Includes Users Manual 0
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # Converts Flipper SubGhz RAW Files to PSCustomObject[] | |
| function ConvertFrom-SubGhzRAW { | |
| param( | |
| [Parameter(Mandatory = $true, Position = 0, ValueFromPipeline = $true)] | |
| [String] $Path | |
| ) | |
| process { | |
| $data = Get-Content $Path | |
| if(!$data.Contains("Filetype: Flipper SubGhz RAW File")) { |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/env bash | |
| shopt -s nullglob | |
| lastgroup="" | |
| for g in `find /sys/kernel/iommu_groups/* -maxdepth 0 -type d | sort -V`; do | |
| for d in $g/devices/*; do | |
| if [ "${g##*/}" != "$lastgroup" ]; then | |
| echo -en "Group ${g##*/}:\t" | |
| else | |
| echo -en "\t\t" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <# | |
| .SYNOPSIS | |
| Create a GPU-P Guest driver package. | |
| .DESCRIPTION | |
| Gathers the necessary files for a GPU-P enabled Windows guest to run. | |
| .EXAMPLE | |
| New-GPUPDriverPackage -DestinationPath '.' | |
| .EXAMPLE | |
| New-GPUPDriverPackage -Filter 'nvidia' -DestinationPath '.' | |
| .INPUTS |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| // License: Apache 2.0. See LICENSE file in root directory. | |
| // Copyright(c) 2015 Intel Corporation. All Rights Reserved. | |
| #define _USE_MATH_DEFINES | |
| #include <cmath> | |
| #include "image.h" | |
| //#include "../include/librealsense2/rsutil.h" // For projection/deprojection logic | |
| #ifdef __SSSE3__ | |
| #include <tmmintrin.h> // For SSE3 intrinsic used in unpack_yuy2_sse |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| 204 password | |
| 193 123456 | |
| 144 admin | |
| 125 support | |
| 116 123 | |
| 114 1234 | |
| 105 default | |
| 99 12345 | |
| 97 1 | |
| 84 ubnt |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| addEventListener('fetch', event => { | |
| event.respondWith(fetchAndCheckPassword(event.request)) | |
| }) | |
| async function fetchAndCheckPassword(req) { | |
| if (req.method == "POST") { | |
| try { | |
| const post = await req.formData(); | |
| const pwd = post.get('password') | |
| const enc = new TextEncoder("utf-8").encode(pwd) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| /* | |
| ********************************************************************* | |
| Part of UEFI DXE driver code that injects Hyper-V VM exit handler | |
| backdoor into the Device Guard enabled Windows 10 Enterprise. | |
| Execution starts from new_ExitBootServices() -- a hook handler | |
| for EFI_BOOT_SERVICES.ExitBootServices() which being called by | |
| winload!OslFwpKernelSetupPhase1(). After DXE phase exit winload.efi | |
| transfers exeution to previously loaded Hyper-V kernel (hvix64.sys) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| for d in $(find /sys/kernel/iommu_groups/ -type l | sort -n -k5 -t/); do | |
| n=${d#*/iommu_groups/*}; n=${n%%/*} | |
| printf 'IOMMU Group %s ' "$n" | |
| lspci -nns "${d##*/}" | |
| done; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| $toolsDir = "$(Split-Path -parent $MyInvocation.MyCommand.Definition)" | |
| $psFileFullPath = Join-Path $toolsDir "ps1crash.ps1" | |
| Install-BinFile ` | |
| -Name ps1crash ` | |
| -Path "$env:SystemRoot\System32\WindowsPowerShell\v1.0\powershell.exe" ` | |
| -Command "-NoProfile -ExecutionPolicy unrestricted -Command `"&'$psFileFullPath' %*`"" |
NewerOlder