| Concept | Formula | Citation |
|---|---|---|
| Voltage (V) | [1-3] | |
| Current (I) | [4] | |
| Conductance (G) | [5] | |
| Wire Resistance (R) | [6] |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Add-Type @" | |
| using System; | |
| using System.Runtime.InteropServices; | |
| using System.Diagnostics; | |
| public class Win32 { | |
| [DllImport("user32.dll")] | |
| public static extern bool SetWindowPos(IntPtr hWnd, IntPtr hWndInsertAfter, | |
| int X, int Y, int cx, int cy, uint uFlags); |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; | |
| ; ; | |
| ; Simple boot loader to load code from serial into memory starting ; | |
| ; at 08000h. Starting code execution after loading. ; | |
| ; ; | |
| ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; | |
| org 00000h | |
| setup: ld sp, 0ffffh ; set stack pointer |
This Bash script creates a virtual display on an Android device and streams it using scrcpy. It's designed to work with Android Debug Bridge (ADB) and scrcpy, providing a seamless way to create and interact with a secondary display on your Android device.
- Android Debug Bridge (ADB) installed and accessible from the command line
scrcpyinstalled and accessible from the command line
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Add-Type @" | |
| using System; | |
| using System.Runtime.InteropServices; | |
| public static class Power | |
| { | |
| [DllImport("kernel32.dll", SetLastError = true)] | |
| public static extern uint SetThreadExecutionState(uint esFlags); | |
| } | |
| "@ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <? | |
| if(file_exists('/www/global/lockdown')) { | |
| if($_COOKIE['4chan_auser'] && $_COOKIE['4chan_apass'] && ($_POST['mode']=='usrdel'||$_GET['mode']=='latest')) { | |
| // ok | |
| } | |
| else { | |
| die('Posting temporarily disabled. Come back later!<br/>—Team 4chan (uptime? what\'s that?)'); | |
| } | |
| } | |
| include_once "./yotsuba_config.php"; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # ---------------------------------------------------------------------------------------------- | |
| # HULK - HTTP Unbearable Load King | |
| # | |
| # This tool is a DOS tool that is meant to put heavy load on HTTP servers in order to bring them | |
| # to their knees by exhausting the resource pool. It is meant for research purposes only, | |
| # and any malicious usage of this tool is prohibited. | |
| # | |
| # Author: Barry Shteiman, version 1.0 | |
| # Converted to Python 3 | |
| # ---------------------------------------------------------------------------------------------- |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import base58 | |
| import hashlib | |
| from fastecdsa import curve | |
| from fastecdsa import keys | |
| updhsh = lambda h, s: [h.update(s), h][1] | |
| b58chk = lambda s: base58.b58encode(bytes(hexbyt(s))) | |
| concat = lambda s1, s2: "{}{}".format(s1, s2) | |
| hexbyt = lambda s: bytes(bytearray.fromhex(s)) |