Since Twitter doesn't have an edit button, it's a suitable host for JavaScript modules.
Source tweet: https://twitter.com/rauchg/status/712799807073419264
const leftPad = await requireFromTwitter('712799807073419264');
from flask import Flask, request, jsonify, json, abort | |
from flask_cors import CORS, cross_origin | |
import pandas as pd | |
app = Flask(__name__) | |
cors = CORS(app) | |
app.config['CORS_HEADERS'] = 'Content-Type' |
["container", [ | |
{ | |
"name": "windowId", | |
"type": "i32" | |
}, | |
{ | |
"name": "trades", | |
"type":["array",{ | |
"countType":"i8", | |
"type":["container",[ |
# Simulate fake processes of analysis sandbox/VM that some malware will try to evade | |
# This just spawn ping.exe with different names (wireshark.exe, vboxtray.exe, ...) | |
# It's just a PoC and it's ugly as f*ck but hey, if it works... | |
# Usage: .\fake_sandbox.ps1 -action {start,stop} | |
param([Parameter(Mandatory=$true)][string]$action) | |
$fakeProcesses = @("wireshark.exe", "vmacthlp.exe", "VBoxService.exe", | |
"VBoxTray.exe", "procmon.exe", "ollydbg.exe", "vmware-tray.exe", |
Since Twitter doesn't have an edit button, it's a suitable host for JavaScript modules.
Source tweet: https://twitter.com/rauchg/status/712799807073419264
const leftPad = await requireFromTwitter('712799807073419264');
# in bench/filter_bench.exs | |
defmodule FilterBench do | |
use Benchfella | |
@map (1..1000) |> Enum.map(fn(idx) -> {idx, Integer.to_string(idx)} end) |> Enum.into(%{}) | |
bench "anonymous function" do | |
Enum.filter(@map, fn {k, _v} -> k > 10 end) | |
end |
#!/usr/bin/env ruby | |
# make sure you the watir gem installed -> gem install watir | |
require 'watir' | |
def log (message) puts " #{message}" end | |
def success (message) puts "+ #{message}" end | |
def fail (message) puts "- #{message}" end | |
def notify (message) | |
success message.upcase | |
system 'osascript -e \'Display notification Burgerbot with title "%s"\'' % message | |
rescue StandardError => e |
Currently the ReplayMod is banned on quite a few servers. This is due to the fact that the user can move freely through the world. By allowing a server to place restrictions on a replay it might be allowed on more servers. It might also be useful to allow players to add (not remove) these restrictions to any of their replays in the Replay Viewer.
To prevent new restricted replays from being opened in an older version or a replay viewer which doesn't support restricted replays, a Disconnect packet is inserted in the replay. Any replay viewer may only remove this disconnect packet when it fully supports restricted replays or wants to display a custom failure screen.
The disconnect message should be Please update to view this replay.
(otherwise the packet is ignored). The packet may be sent at any point in time and (obviously) has to be inserted manually by the recorder, not the server. There is nothing else a replay recorder has to
// ==UserScript== | |
// @name Agar.io Expose Cells | |
// @match http://agar.io/ | |
// @run-at document-start | |
// @grant none | |
// ==/UserScript== | |
var observer = new MutationObserver(function(mutations) { | |
for (var i = 0; i < mutations.length; i++) { | |
if (/^http:\/\/agar\.io\/main_out\.js/.test(mutations[i].addedNodes[0].src)) { |
#![feature(macro_rules)] | |
/// MIT license etc. etc. | |
/// | |
/// Experimenting with Python-like list comprehensions. | |
/// | |
/// An attempt to explore the possibility space for ergonomic improvements | |
/// in Rust that can come post v1.0. Notice that there are not type declerations. | |
/// Aside from the "c!" macro invocation, Rust allows for an exact copy of the | |
/// Python comprehension syntax. |