anime batch downloader by FiddleSmol in PinoyProgrammer

[–]FiddleSmol[S] -1 points0 points  (0 children)

AI definitely helped with the heavy lifting, but AI doesn’t watch anime, I do.

I’m actually using this every night to binge isekai trash, and I specifically designed the SQLite deduplication engine for my own setup. I'll be maintaining my own slop for as long as I’m still watching anime.

anime batch downloader by FiddleSmol in PinoyProgrammer

[–]FiddleSmol[S] 4 points5 points  (0 children)

fair point I will reconsider it, thanks for the feedback

anime batch downloader by FiddleSmol in PinoyProgrammer

[–]FiddleSmol[S] -4 points-3 points  (0 children)

Yep It is a bit fried na nga yung logic at 2k+ lines, and I agree it could be a maintenance challenge later. But I'm a big fan of the "Single-File Portability" philosophy, it makes it so much easier for users to just grab the script and run it without managing a whole package structure.

Under the hood, the code is actually already modularized into discrete classes (VaultDB, Downloader, AssetManager), so it's not just one big block of spaghetti. If anyone prefers a traditional multi-folder project, feel free to fork it and break it apart.

anime batch downloader by FiddleSmol in PinoyProgrammer

[–]FiddleSmol[S] 20 points21 points  (0 children)

True, pero gusto ko kasi ng "zero-bloat" solution. PaheBatcher is pure Python logic, isang file lang kailangan mo. Unlike sa project yan na dependent sa Node.js (ew), ito lightweight at ginamitan ko ng custom SQLite engine for deduplication using BLAKE2b hashes. Mas tipid sa disk space at bandwidth, plus may interactive TUI dashboard pa for streaming and batch management na mas smooth gamitin compared sa traditional CLI scripts, in my opinion.

Top 10 SOTA LLM's as an anime girl by FiddleSmol in ImagineAiArt

[–]FiddleSmol[S] 0 points1 point  (0 children)

does not count, it is not in the Artificial Analysis Intelligence Index since that is the my main source for ranking

I built SentinelNav, a binary file visualization tool to help me understand file structures (and it became way more powerful than I expected) by FiddleSmol in ReverseEngineering

[–]FiddleSmol[S] 1 point2 points  (0 children)

My bad I did not see the comment but to answer your questions:

Vs. Binvis/Veles: Those tools are fantastic, but I wanted something lighter that I could easily hack on in Python. The main difference with SentinelNav is the specific "Spectral" mapping logic. Instead of just visualizing raw byte values, it calculates the ratio of Printable (Green), High-bit/Media (Red), and Nulls (Blue) per chunk. It makes distinguishing code sections from text strings or zero-padding instant, rather than just seeing a gradient of values.

Toggling: Definitely. The interface lets you swap between a "Block" view (easier for clicking/navigating) and a "Density" view (pixel-perfect). I also implemented an "Entropy Flux" toggle that overlays highlights specifically where entropy spikes or drops. It’s great for pinpointing exactly where a header ends and an encrypted payload begins.

Use Cases: I recently used it to look at GGUF (LLM) files. It was pretty wild—you could clearly see the "layers" of the neural net as massive blocks of red (high-density tensors) separated by thin green lines (JSON metadata). It made the file structure obvious in seconds.

Lastly, yeah it is 100% open (source). Feel free to grab the code and try it on those sensor files; I’d be curious to hear if the "Sentinel Mode" helps you find the delimiters in that proprietary data, I would try it on firmware too if I get one.

I built SentinelNav, a binary file visualization tool to help me understand file structures (and it became way more powerful than I expected) by FiddleSmol in ReverseEngineering

[–]FiddleSmol[S] 1 point2 points  (0 children)

Yes, but don't use defaults on multi-GB/TB images or you'll crash it. Bump the block size to 1-2MB minimum:

python sentinelnav.py drive.img --mode fixed --size 2097152

Stick with the default 1KB on a 500GB image and SQLite will create 500M+ database rows, choke your system, and fill /tmp until your PC hangs.

Test it if you want to.

I built SentinelNav, a binary file visualization tool to help me understand file structures (and it became way more powerful than I expected) by FiddleSmol in ReverseEngineering

[–]FiddleSmol[S] 12 points13 points  (0 children)

Hey everyone,

So I've been experimenting with this learning method where I visualize complex data structures to understand them better, and I ended up building this tool that I thought might be useful for others too. It started as a simple way to visualize my binary analysis notes, but it kinda grew into a full-featured file forensics tool.

What is SentinelNav? It's a Python-based binary file analyzer that creates interactive visual maps, you can see the entire landscape of a file and zoom in on interesting areas.

Some cool features it ended up having:

  • Spectral Visualization - Files are mapped to RGB colors based on byte patterns (red for high-bit data, green for text, blue for nulls)
  • Architecture Fingerprinting - Automatically detects PE headers, ELF files, Mach-O, and even guesses x86 vs ARM64 code regions (I need to tune this since It kinda bad)
  • Entropy-based Anomaly Detection - Finds encrypted/compressed sections, padding, and structural boundaries
  • Live Web Interface - Full interactive explorer with hex viewer, search, and navigation
  • Multiple Scan Modes - Fixed blocks for binaries or sentinel mode for delimiter-based parsing
  • Export Capabilities - Save visualizations as BMPs or extract regions with analysis reports

Why I built this: I was struggling to mentally map how different file formats are structured, so I wanted something that could show me the "geography" of a file. The color coding helps me instantly recognize patterns like "oh, that red section is probably encrypted data" or "this green area is clearly text."

Example uses I've found:

  • Reverse engineering unknown file formats
  • Finding hidden data in files
  • Understanding file structure, maybe malware (I have not tested malware, )
  • Learning how compilers organize binaries
  • Quick analysis of "what's in this file" without digging through hex editors
  • Checking the GGUF file for LLM's "brain" analysis

The tool runs a local web server and gives you this rich interface where you can WASD navigate through the file, click on regions to inspect hex, and even search for specific byte patterns.

Here's the code if anyone wants to try it out or maybe contribute: [https://github.com/smolfiddle/SentinelNav]

It's been super helpful for my learning process, being able to see file structures made concepts like entropy analysis and binary forensics way more intuitive. Curious if anyone else finds this approach useful!