包含live555 c++库和已编译so包,若编译不成功,可在项目java目录下新建com.live555.rtsp包,将rtsp文件夹下的文件考到包内,即可使用
2022-07-11 11:40:00 5.49MB live555 rtsp ndk
1
1.redisjson2.0.8编译后的librejson.so文件 2.Rust编译 3.可以直接下载配置 4.版本为2.0.8比较新 5.redis版本要在6以上
2022-07-08 18:06:41 163.81MB redis redisjson 可执行文件 librejson.so
IDA7.0,用于逆向分析so
2022-07-08 11:41:07 161.35MB ndk
1
找了好久的出现各种问题,终于找了个可以在android 上面跑的64位的,希望能帮到大家
2022-07-07 11:05:54 1.46MB 64位libsqlite3.s
1
解决问题:Unable to download ‘libfreeimage-3.16.0-linux64.so‘.,直接传到/root/.imageio/freeimage/
2022-07-05 21:00:37 4.61MB pytorch linux
1
libz.so.1.2.7
2022-07-05 16:00:34 88KB linux
1
使用R19CNDK编译完整的FFMPE4.2.2库,用于集成到Android平台使用,完成音视频开发。 压缩包里包含了完整源码,配置文件、编译成功的动态库。如何需要重新编译,可以自己看配置文件。 配置文件包含了arm-v7、arm64-v8两种,根据自己平台可以选择编译。 ffmpeg里编译时包含了X264解码库。 支持的解码库如下; "当前APP的工作路径:/home/wbyq/qt_code/build-ffmpeg_code-Desktop_Qt_5_12_6_GCC_64bit-Release\n" "FFMPEG的版本号:4.2.2\n" "[Encode][Video]a64multi ID=142" "[Encode][Video]a64multi5 ID=143" "[Encode][Video]alias_pix ID=175" "[Encode][Video]amv ID=107" "[Encode][Video]apng ID=32782" "[Encode][Video]asv1 ID=31" "[Encode][Video]asv2 ID=32" "[Encode][Video]avrp ID=32769" "[Encode][Video]avui ID=32771" "[Encode][Video]ayuv ID=32772" "[Encode][Video]bmp ID=78" "[Encode][Video]cinepak ID=43" "[Encode][Video]cljr ID=36" "[Encode][Audeo]comfortnoise ID=86077" "[Encode][Video]dnxhd ID=99" "[Encode][Video]dpx ID=128" "[Encode][Video]dvvideo ID=24" "[Encode][Video]ffv1 ID=33" "[Encode][Video]ffvhuff ID=67" "[Encode][Video]fits ID=32803" "[Encode][Video]flashsv ID=86" "[Encode][Video]flashsv2 ID=131" "[Encode][Video]flv ID=21" "[Encode][Video]gif ID=97" "[Encode][Video]h261 ID=3" "[Encode][Video]h263 ID=4" "[Encode][Video]h263p ID=19" "[Encode][Video]huffyuv ID=25" "[Encode][Video]jpeg2000 ID=88" "[Encode][Video]jpegls ID=11" "[Encode][Video]ljpeg ID=9" "[Encode][Video]magicyuv ID=32787" "[Encode][Video]mjpeg ID=7" "[Encode][Video]mpeg1video ID=1" "[Encode][Video]mpeg2video ID=2" "[Encode][Video]mpeg4 ID=12" "[Encode][Video]msmpeg4v2 ID=15" "[Encode][Video]msmpeg4 ID=16" "[Encode][Video]msvideo1 ID=46" "[Encode][Video]pam ID=66" "[Encode][Video]pbm ID=63" "[Encode][Video]pcx ID=109" "[Encode][Video]pgm ID=64" "[Encode][Video]pgmyuv ID=65" "[Encode][Video]png ID=61" "[Encode][Video]ppm ID=62" "[Encode][Video]prores ID=147" "[Encode][Video]prores_aw ID=147" "[Encode][Video]prores_ks ID=147" "[Encode][Video]qtrle ID=55" "[Encode][Video]r10k ID=144" "[Encode][Video]r210 ID=133" "[Encode][Video]rawvideo ID=13" "[Encode][Video]roqvideo ID=38" "[Encode][Video]rv10 ID=5" "[Encode][Video]rv20 ID=6" "[Encode][Audeo]s302m ID=65562" "[Encode][Video]sgi ID=101" "[Encode][Video]snow ID=32780" "[Encode][Video]sunrast ID=110" "[Encode][Video]svq1 ID=22" "[Encode][Video]targa ID=93" "[Encode][Video]tiff ID=96" "[Encode][Video]utvideo ID=152" "[Encode][Video]v210 ID=127" "[Encode][Video]v308 ID=32774" "[Encode][Video]v408 ID=32775" "[Encode][Video]v410 ID=156" "[Encode][Video]vc2 ID=116" "[Encode][Video]wrapped_avframe ID=135169" "[Encode][Video]wmv1 ID=17" "[Encode][Video]wmv2 ID=18" "[Encode][Video]xbm ID=159" "[Encode][Video]xface ID=32779" "[Encode][Video]xwd ID=157" "[Encode][Video]y41p ID=32768" "[Encode][Video]yuv4 ID=32776" "[Encode][Video]zlib ID=54" "[Encode][Video]zmbv ID=81" "[Encode][Audeo]aac ID=86018" "[Encode][Audeo]ac3 ID=86019" "[Encode][Audeo]ac3_fixed ID=86019" "[Encode][Audeo]alac ID=86032" "[Encode][Audeo]aptx ID=88081" "[Encode][Audeo]aptx_hd ID=88082" "[Encode][Audeo]dca ID=86020" "[Encode][Audeo]eac3 ID=86056" "[Encode][Audeo]flac ID=86028" "[Encode][Audeo]g723_1 ID=86068" "[Encode][Audeo]mlp ID=86045" "[Encode][Audeo]mp2 ID=86016" "[Encode][Audeo]mp2fixed ID=86016" "[Encode][Audeo]nellymoser ID=86049" "[Encode][Audeo]opus ID=86076" "[Encode][Audeo]real_144 ID=77824" "[Encode][Audeo]sbc ID=88083" "[Encode][Audeo]sonic ID=88065" "[Encode][Audeo]sonicls ID=88066" "[Encode][Audeo]truehd ID=86060" "[Encode][Audeo]tta ID=86038" "[Encode][Audeo]vorbis ID=86021" "[Encode][Audeo]wavpack ID=86041" "[Encode][Audeo]wmav1 ID=86023" "[Encode][Audeo]wmav2 ID=86024" "[Encode][Audeo]pcm_alaw ID=65543" "[Encode][Audeo]pcm_dvd ID=65555" "[Encode][Audeo]pcm_f32be ID=65556" "[Encode][Audeo]pcm_f32le ID=65557" "[Encode][Audeo]pcm_f64be ID=65558" "[Encode][Audeo]pcm_f64le ID=65559" "[Encode][Audeo]pcm_mulaw ID=65542" "[Encode][Audeo]pcm_s8 ID=65540" "[Encode][Audeo]pcm_s8_planar ID=65563" "[Encode][Audeo]pcm_s16be ID=65537" "[Encode][Audeo]pcm_s16be_planar ID=65566" "[Encode][Audeo]pcm_s16le ID=65536" "[Encode][Audeo]pcm_s16le_planar ID=65554" "[Encode][Audeo]pcm_s24be ID=65549" "[Encode][Audeo]pcm_s24daud ID=65552" "[Encode][Audeo]pcm_s24le ID=65548" "[Encode][Audeo]pcm_s24le_planar ID=65564" "[Encode][Audeo]pcm_s32be ID=65545" "[Encode][Audeo]pcm_s32le ID=65544" "[Encode][Audeo]pcm_s32le_planar ID=65565" "[Encode][Audeo]pcm_s64be ID=67585" "[Encode][Audeo]pcm_s64le ID=67584" "[Encode][Audeo]pcm_u8 ID=65541" "[Encode][Audeo]pcm_u16be ID=65539" "[Encode][Audeo]pcm_u16le ID=65538" "[Encode][Audeo]pcm_u24be ID=65551" "[Encode][Audeo]pcm_u24le ID=65550" "[Encode][Audeo]pcm_u32be ID=65547" "[Encode][Audeo]pcm_u32le ID=65546" "[Encode][Audeo]pcm_vidc ID=67588" "[Encode][Audeo]roq_dpcm ID=81920" "[Encode][Audeo]adpcm_adx ID=69641" "[Encode][Audeo]g722 ID=69660" "[Encode][Audeo]g726 ID=69643" "[Encode][Audeo]g726le ID=71684" "[Encode][Audeo]adpcm_ima_qt ID=69632" "[Encode][Audeo]adpcm_ima_wav ID=69633" "[Encode][Audeo]adpcm_ms ID=69638" "[Encode][Audeo]adpcm_swf ID=69645" "[Encode][Audeo]adpcm_yamaha ID=69646" "[Encode][Other]ssa ID=96269" "[Encode][Other]ass ID=96269" "[Encode][Other]dvbs
2022-07-05 15:19:23 206.06MB ffmpeg android .so
1
FileNotFoundError: [Errno 2] No such file or directory: 'deep_so
2022-07-02 18:05:39 41.23MB 图像处理
1
超级DllHijack 通用的DLL劫持技术,不需要手动导出DLL的相同功能接口,非常容易! 用法: 创建一个与被劫持的DLL具有相同名称的DLL(例如,target.dll),并将被劫持的DLL重命名为其他名称(例如,target.dll.1),然后调用SuperDllHijack函数来完成hajick工作。 更新: 2020-4-4 修复了在x64中获取peb的错误。感谢 , , 。 您可以在example代码中查看更多详细信息。 VOID DllHijack1(HMODULE hMod) { TCHAR tszDllPath[MAX_PATH] = { 0 }; GetModuleFileName(hMod, tszDllPath, MAX_PATH); PathRemoveFileSpec(tszDllPath); PathAppend(tszDllPat
2022-07-02 13:22:44 565KB hook inject dllhijack C++
1
搭建Gitlab 邮件服务错误缺失文件
2022-07-01 15:00:41 1.28MB gitlab libmysqlclient
1