Code to do NF in HDR,HEVC,HPL,MPL

Overview

Netflix-DL 6.0 |HDR-HEVC-MPL-HPL NOT Working| !

Buy working netflix cdm from [email protected]

Use Python 3.9.8 & install

Quick start

install.requirements.bat
For Chrome install the following addon
https://chrome.google.com/webstore/detail/get-cookiestxt/bgaddhkoddajcdgocldbbfleckgcbcid?hl=en

get cookies.txt from netflix site you should be login in the browser and put it in as cookies.txt in 
\configs\Cookies
Now edit config.py in following path
\configs\config.py
line no .108-109
	"email": "xxx",
	"password": "xxxx",
    put your login details here
Now enjoy using it

Examples

netflix.py 81478916 -q 1080 --hdr

netflix.py 81478916 -q 1080 --hevc

netflix.py 81478916 -q 1080 --main

netflix.py 81478916 -q 1080 --high

Specify the audio bit rate, download the highest bit rate audio track by default, optional: 128, 256, 448, etc. --aformat-2c, --audio-format-2ch Specify to download 2.0 channel audio tracks --aformat-51ch, --audio-format-51ch Specify to download 5.1 channel audio tracks --keep keep the original material files after mixed stream mkv, delete by default -keys, --license Only output widevine key to the console and exit --no-aria2c Do not call the aria2c downloader, use the Python downloader, and use aria2c by default This parameter is not recommended --nv do not download the video (Video) --na do not download audio (Audio) --ns do not download subtitles (Subtitle) Additional configuration file parameters (Manifest): --main specifies H.264 Main --high Specify H.264 High --hevc specify H.265 --hdr specify H.265 HDR --check Compare the quality of H.264 Main/H.264 High">
USAGE:
    -h,--help  Display the complete parameter setting help file and exit
    -q 
   
     video resolution, the highest (1080) is selected by default, optional: 480, 720, 1080, etc.
    -o 
    
     
                 Download temporary folder
    -f 
     
      
                 mkv mixed stream output folder, do not specify the default output to download temporary folder
    -s 
      
        Season number (Season) does not specify that all seasons are downloaded by default
    -e 
       
         The number of episodes (Episode) does not specify the default download complete episode "-e 1" download episode 1; "-e 1-7" download episodes 1-7; "-e 2,5" Download episodes 2 and 5 -p, --prompt Interactively prompt to enter yes/no before downloading --AD language code, --alang language code Specify the audio track language, download the highest bit rate audio track in the original language (Original) by default Language code location: "/helpers/Muxer.py" --slang language code Specify the subtitle language, download all language subtitles by default, For example, "--slang zhoS zhoT" specifies simplified Chinese and traditional Chinese subtitles --flang language code Specify the "scene subtitle" language (Force Subtitle) --all-audios Download all language audio tracks --all-forced Download "scene subtitles" in all languages --audio-bitrate 
        
          Specify the audio bit rate, download the highest bit rate audio track by default, optional: 128, 256, 448, etc. --aformat-2c, --audio-format-2ch Specify to download 2.0 channel audio tracks --aformat-51ch, --audio-format-51ch Specify to download 5.1 channel audio tracks --keep keep the original material files after mixed stream mkv, delete by default -keys, --license Only output widevine key to the console and exit --no-aria2c Do not call the aria2c downloader, use the Python downloader, and use aria2c by default This parameter is not recommended --nv do not download the video (Video) --na do not download audio (Audio) --ns do not download subtitles (Subtitle) Additional configuration file parameters (Manifest): --main specifies H.264 Main --high Specify H.264 High --hevc specify H.265 --hdr specify H.265 HDR --check Compare the quality of H.264 Main/H.264 High 
        
       
      
     
    
   

Hello Fellow < Developers/ >!

Hi! My name is WVDUMP. I am Leaking the scripts to punish few idiots 😄

About Me

Github




Microsoft Exchange Server SSRF漏洞(CVE-2021-26855)

Microsoft_Exchange_Server_SSRF_CVE-2021-26855 zoomeye dork:app:"Microsoft Exchange Server" 使用Seebug工具箱及pocsuite3编写的脚本Microsoft_Exchange_Server_SSRF_CV

conjojo 37 Nov 12, 2022
The next level Python obfuscator, nearly impossible to deobfuscate.

🐸 Kramer 🐸 Kramer is a next level obfuscation tool written in Python3 allowing you to obfuscate your Python3 code easily and securely. It uses Berse

Billy 114 Dec 26, 2022
XSS scanner in python

DeadXSS XSS scanner in python How to Download: Step 1: git clone https://github.com/Deadeye0x/DeadXSS.git Step 2: cd DeadXSS Step 3: python3 DeadXSS.p

2 Jul 17, 2022
Proof-of-concept obfuscation toolkit for C# post-exploitation tools

InvisibilityCloak Proof-of-concept obfuscation toolkit for C# post-exploitation tools. This will perform the below actions for a C# visual studio proj

259 Dec 19, 2022
neo Tool is great one in binary exploitation topic

neo Tool is great one in binary exploitation topic. instead of doing several missions by many tools and windows, you can now automate this in one tool in one session.. Enjoy it

Hamza Elansari 4 Oct 10, 2022
RCE Exploit for Gitlab < 13.9.4

GitLab-Wiki-RCE RCE Exploit for Gitlab 13.9.4 RCE via unsafe inline Kramdown options when rendering certain Wiki pages Allows any user with push acc

Enox 52 Nov 09, 2022
Hikvision 流媒体管理服务器敏感信息泄漏

Hikvisioninformation Hikvision 流媒体管理服务器敏感信息泄漏 Options optional arguments: -h, --help show this help message and exit -u url, --url url

Henry4E36 13 Nov 09, 2022
Cobalt Strike < 4.4 dos CVE-2021-36798

CVE-2021-36798 CVE-2021-36798 Cobalt Strike 4.3 dos 用法 python3 CVE-2021-36798.py BeaconURL 打瘫Cobalt Strike 只需要一个包 已测试 4.3 4.2 参考: https://labs.sent

37 Nov 09, 2022
This repository contains wordlists for each versions of common web applications and content management systems (CMS). Each version contains a wordlist of all the files directories for this version.

webapp-wordlists This repository contains wordlists for each versions of common web applications and content management systems (CMS). Each version co

Podalirius 396 Jan 08, 2023
Vuln Scanner With Python

VulnScanner Features Web Application Firewall (WAF) detection. Cross Site Scripting (XSS) tests. SQL injection time based test. SQL injection error ba

< / N u l l S 0 U L > 1 Dec 25, 2021
Infection Monkey - An automated pentest tool

Infection Monkey Data center Security Testing Tool Welcome to the Infection Monkey! The Infection Monkey is an open source security tool for testing a

Guardicore Ltd. 6k Jan 09, 2023
Crypto Meta Extractor

Crypto Meta Extractor This repository contains the code which extracts some metadata of all the cryptocurrencies listed (9K) on CoinMarketCap. Coding

Samyak Jain 3 Jul 03, 2022
An ARP Spoofer attacker for windows to block away devices from your network.

arp0_attacker An ARP Spoofer-attacker for Windows -OS to block away devices from your network. INFO Built in Python 3.8.2. arp0_attackerx.py is Upgrad

Wh0_ 15 Mar 17, 2022
NEW FACEBOOK CLONER WITH NEW PASSWORD, TERMUX FB CLONE, FB CLONING COMMAND. M

NEW FACEBOOK CLONER WITH NEW PASSWORD, TERMUX FB CLONE, FB CLONING COMMAND. M

Mr. Error 81 Jan 08, 2023
Script checks provided domains for log4j vulnerability

log4j Script checks provided domains for log4j vulnerability. A token is created with canarytokens.org and passed as header at request for a single do

Matthias Nehls 2 Dec 12, 2021
Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.

CVE-2021-31166: HTTP Protocol Stack Remote Code Execution Vulnerability This is a proof of concept for CVE-2021-31166 ("HTTP Protocol Stack Remote Cod

Axel Souchet 820 Dec 18, 2022
A simple python-function, to gain all wlan passwords from stored wlan-profiles on a computer.

Wlan Fetcher Windows10 Description A simple python-function, to gain all wlan passwords from stored wlan-profiles on a computer. Usage This Script onl

2 Nov 20, 2021
Bypass 4xx HTTP response status codes.

Forbidden Bypass 4xx HTTP response status codes. To see all the test cases, check the source code - follow the NOTE comments. Script uses multithreadi

Ivan Šincek 165 Dec 28, 2022
Mass Check Vulnerable Log4j CVE-2021-44228

Log4j-CVE-2021-44228 Mass Check Vulnerable Log4j CVE-2021-44228 Introduction Actually I just checked via Vulnerable Application from https://github.co

Justakazh 6 Dec 28, 2022
Huskee: Malware made in Python for Educational purposes

𝐇𝐔𝐒𝐊𝐄𝐄 Caracteristicas: Discord Token Grabber Wifi Passwords Grabber Googl

chew 4 Aug 17, 2022