coastermelt | make open source firmware for burning anything
kandi X-RAY | coastermelt Summary
kandi X-RAY | coastermelt Summary
coastermelt is a Python library. coastermelt has no bugs, it has no vulnerabilities, it has a Permissive License and it has low support. However coastermelt build file is not available. You can download it from GitHub.
The coastermelt project is an effort to make open source firmware for creatively repurposing BD-R drives. Follow the video channel: The new firmware is still not real yet, this project is still in the early stages of reverse engineering.
The coastermelt project is an effort to make open source firmware for creatively repurposing BD-R drives. Follow the video channel: The new firmware is still not real yet, this project is still in the early stages of reverse engineering.
Support
Quality
Security
License
Reuse
Support
coastermelt has a low active ecosystem.
It has 210 star(s) with 23 fork(s). There are 45 watchers for this library.
It had no major release in the last 6 months.
There are 1 open issues and 3 have been closed. On average issues are closed in 11 days. There are no pull requests.
It has a neutral sentiment in the developer community.
The latest version of coastermelt is current.
Quality
coastermelt has 0 bugs and 0 code smells.
Security
coastermelt has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.
coastermelt code analysis shows 0 unresolved vulnerabilities.
There are 0 security hotspots that need review.
License
coastermelt is licensed under the MIT License. This license is Permissive.
Permissive licenses have the least restrictions, and you can use them in most projects.
Reuse
coastermelt releases are not available. You will need to build from source code and install.
coastermelt has no build file. You will be need to create the build yourself to build the component from source.
Installation instructions, examples and code snippets are available.
coastermelt saves you 2752 person hours of effort in developing the same functionality from scratch.
It has 5960 lines of code, 560 functions and 21 files.
It has high code complexity. Code complexity directly impacts maintainability of the code.
Top functions reviewed by kandi - BETA
kandi has reviewed coastermelt and discovered the below as its top functions. This is intended to give you an instant insight into coastermelt implemented functionality, and help decide if they suit your requirements.
- Watch a block of addresses
- Pushes the buffer
- Read block of data from d
- Read data from the buffer
- Generate lnstm
- Return a function to be used for dstpc
- Load data from the device
- Generate condition codes
- Create a function for a BIC instruction
- Clz operator
- Create a function for removing negative values
- Returns a function op_cmp
- Return a function for Cmn instruction
- Create a function for MAAS
- Create a function for an EOR instruction
- Create a function for an orrs instruction
- Create a function for an ROR instruction
- Upper function for uull
- Create a function that returns a function for the RSBS
- Create a function for the SBCS instruction
- Unulls routine
- Create a function for an instruction
- Read a block of data from a block
- Create a function that returns a function that returns a function op
- Prints information about the key
- Create a function for an ADCS instruction
Get all kandi verified functions for this library.
coastermelt Key Features
No Key Features are available at this moment for coastermelt.
coastermelt Examples and Code Snippets
No Code Snippets are available at this moment for coastermelt.
Community Discussions
No Community Discussions are available at this moment for coastermelt.Refer to stack overflow page for discussions.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install coastermelt
If the update worked, you'll see my backdoor signature show up when you run mtflash. This is how you can tell your drive has the patch! Otherwise it should mostly work, though of course it's totally untrustworthy at this point. I mean, we just turned off all the bootloader integrity checks. But hooray! Now if you have IPython, you can start the interactive shell. For more about what you can do with it, take a look at the shell recipe book.
Get XCode, right?
Also this compiler. Put it in your path or something: arm-none-eabi-gcc
Yet another weird compiler. With homebrew, do brew install sdcc
You probably want to have IPython too. It's great, and the cool debug shell needs it.
You usually want to have no disc in the drive or have the tray ejected when you start working with it. Otherwise, the OS can keep us from claiming the device.
Run make in the backdoor directory to build the patched firmware and the Python extensions
If you're paranoid like me, make disassemble will show you the damage
If you're ready to toast your drive, run make flash
Get XCode, right?
Also this compiler. Put it in your path or something: arm-none-eabi-gcc
Yet another weird compiler. With homebrew, do brew install sdcc
You probably want to have IPython too. It's great, and the cool debug shell needs it.
You usually want to have no disc in the drive or have the tray ejected when you start working with it. Otherwise, the OS can keep us from claiming the device.
Run make in the backdoor directory to build the patched firmware and the Python extensions
If you're paranoid like me, make disassemble will show you the damage
If you're ready to toast your drive, run make flash
Support
For any new features, suggestions and bugs create an issue on GitHub.
If you have any questions check and ask questions on community page Stack Overflow .
Find more information at:
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page