This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| ## F1: = ID ## F2: = GAME ## | |
| 545408B5~NBA 2K15 | |
| 5752084D~LEGO Jurassic World | |
| 585509D5~Flowrider | |
| 41560870~Jurassic - The Hunted | |
| 5553083F~Csi - Deadly Intent | |
| 585508EB~Ace Of Dynamites | |
| 585509B6~Oto | |
| 58550A02~Pingvinas | |
| 58410909~Blazing Birds |
Some notes, tools, and techniques for reverse engineering macOS binaries.
Based on https://busylog.net/telnet-imap-commands-note/
- -k -- don't verify certificate (optional)
- -n -- use .netrc for username and password (optional)
- -X -- request to send to server
$ wget -e robots=off -r -np 'http://example.com/folder/'
- -e robots=off causes it to ignore robots.txt for that domain
- -r makes it recursive
- -np = no parents, so it doesn't follow links up to the parent folder