Skip to content

Instantly share code, notes, and snippets.

View Dobrowit's full-sized avatar
😸

Radosław Czyżewski Dobrowit

😸
View GitHub Profile

Fish function To update Ollama models For Mac

function update_ollama_models
    echo "Fetching list of Ollama models..."
    set -l jobs
    ollama list | tail -n +2 | while read -l line
        set model_name (echo $line | awk '{print $1}')
        if test -n "$model_name"
            echo "Attempting to update model: $model_name"
            ollama pull $model_name &
@nerdyslacker
nerdyslacker / void_gnome.md
Last active April 7, 2025 14:08
[Void Linux + GNOME] void linux configuration from scrath with gnome de #linux #void #gnome
@shreve
shreve / dolphin.py
Created August 9, 2022 04:11
Read and modify your FlipperZero dolphin's state
"""
Dolphin.py
Access your dolphin's state.
"""
import sys
from struct import Struct
apps = [
@shizonic
shizonic / README.md
Created December 4, 2019 19:02 — forked from gbrlsnchs/README.md
Void Linux Installation Guide (UEFI + chroot + brtfs + LUKS Encryption)

Void Linux installation guide!

Live image

Logging in

User is anon and password is voidlinux. The root user is root and has the same password. This document implies you're using the root user, so no sudo is used until the main user is created and used.

Setting keyboard layout

@corenting
corenting / ed_notes.md
Last active April 30, 2025 09:09
Elite: Dangerous APIs findings
@klightspeed
klightspeed / .EliteDangerousCompanionAPI.md
Last active June 10, 2023 03:30
Simple C# Elite Dangerous Companion API client

Simple CAPI client to retrieve player profile from the Elite Dangerous Companion API using OAuth2

@arav97531
arav97531 / ed-journal-extractor.py
Last active May 31, 2022 20:31
Elite: Dangerous Journal Extractor
#!/usr/bin/env python3
"""Elite: Dangerous Journal Extractor
Is a tool for extracting information from journal files.
Features:
- extract your discoveries into a CSV table;
- make an ImportStars.txt file.
Changelog:
Version 1.0.1 - 19th October 2018
@aallan
aallan / mac-vendor.txt
Last active May 11, 2025 20:59
List of MAC addresses with vendors identities
000000 Officially Xerox
000001 SuperLAN-2U
000002 BBN (was internal usage only, no longer used)
000003 XEROX CORPORATION
000004 XEROX CORPORATION
000005 XEROX CORPORATION
000006 XEROX CORPORATION
000007 XEROX CORPORATION
000008 XEROX CORPORATION
000009 powerpipes?
@pklaus
pklaus / ddnsserver.py
Last active March 24, 2025 19:48 — forked from andreif/Simple DNS server (UDP and TCP) in Python using dnslib.py
Simple DNS server (UDP and TCP) in Python using dnslib.py
#!/usr/bin/env python
"""
LICENSE http://www.apache.org/licenses/LICENSE-2.0
"""
import argparse
import datetime
import sys
import time
import threading