Skip to content

Instantly share code, notes, and snippets.

View Windows81's full-sized avatar
🧊
Keep Byfron Bypassed™

VisualPlugin Windows81

🧊
Keep Byfron Bypassed™
View GitHub Profile
@Windows81
Windows81 / .lua
Last active November 2, 2021 01:55
Run this in your level-7 script executor to grab chat messages from a YouTube live stream.
-- To terminate loop: _G.h = nil
LIVE_CHAT_KEY = 'AIzaSyBUPetSUmoZL-OhlxA7wSac5XinrygCqMo'
VIDEO_ID = 'Pv03E59RkNA'
MSG_FUNCTION = _G.msg
CONTINUE = false
url =
'https://www.youtube.com/youtubei/v1/live_chat/get_live_chat?alt=json&key=' ..
LIVE_CHAT_KEY
_G.h = {
@Windows81
Windows81 / .txt
Last active February 15, 2025 05:20
[[https://github.com/Windows81/Almost-CyberGhost]] List of CyberGhost HTTPS proxy hosts (connect vía port 9002, no authentication required)
84.239.14.162 blade1.bucharest-rack485.nodes.gen4.ninja:9002
89.187.163.167 blade10.singapore-rack455.nodes.gen4.ninja:9002
84.239.49.189 blade15.bucharest-rack488.nodes.gen4.ninja:9002
84.239.49.48 blade12.bucharest-rack482.nodes.gen4.ninja:9002
84.239.49.222 blade6.bucharest-rack490.nodes.gen4.ninja:9002
89.187.163.172 blade15.singapore-rack455.nodes.gen4.ninja:9002
89.187.163.168 blade11.singapore-rack455.nodes.gen4.ninja:9002
156.146.59.43 blade17.newyork-rack451.nodes.gen4.ninja:9002
156.146.59.15 blade14.newyork-rack452.nodes.gen4.ninja:9002
84.239.49.196 blade1.bucharest-rack489.nodes.gen4.ninja:9002
@Windows81
Windows81 / .ps1
Created June 4, 2021 07:41
Searches for and generates a video that plays each subdirectory's songs in reverse order.
ls -dir|%{$d,$c=$_,0;$f=((ls $_|%{$c++;"amovie=`"./$($d.Name)/$($_.Name-replace "'","\\\'")`"[a$c];color=color=#111111:r=2:size=hd720:duration=7,drawtext=text=`"$($_.BaseName-replace "'","ʼ")`":fontcolor=white:x=(w-tw)/2:y=(h-42)/2:fontsize=42[v$c];"})-join '')+"anullsrc=cl=stereo,atrim=0:1[a0];color=color=black:d=1:s=hd720[v0];"+((($c++..0)|%{"[v$_][a$_]"})-join'')+"concat=v=1:a=1:n=$c[out0][out1]";echo $f;ffmpeg -f lavfi -i $f -v error -stats "$d.mp4" -y}
#!/bin/bash
h=$(curl -s "https://register.msi5.com/webreg/production/webapi/api/JWTAuthenticate/Authenticate" -H "Content-Type: application/json" --request POST --data '{"a":"xLvWuXsR6wDgDPbE","b":"aPe9338TgpeUjRXK"}')
curl -s "https://register.msi5.com/webreg/production/webapi/api/Schedule/GetCourseByID?CC=MTC&book=CARIDERITE&SC=CORONA" -H "Authorization: $h" | grep -Po '(?<="seats":)\d+' | echo
@Windows81
Windows81 / .ps1
Last active May 19, 2021 02:57
WWV clone, but it's musical...
$n=[DateTime]::Now.addseconds(14.5);
$c=@(
@('00',59),
@('01',1,10,24,28,37,40,48),
@('02',9,13,21,31,46,53,57),
@('03',14,18,23,29,56),
@('04',4,11,16,30,34,42,47,55),
@('05',7,17,20,33,38,58),
@('06',12,22,27,41,44,51),
@('07',2,6,15,36,43,52),
@Windows81
Windows81 / .yaml
Created May 8, 2021 18:33
List of video URLs and named by YuJa ID [[NOT CLICKBAIT]]
This file has been truncated, but you can view the full file.
+2790000:
url: >
https://coursecast-chatter.s3.us-west-2.amazonaws.com/Video-036fe3e5-2c7b-489a-a342-467c4062b29f_processed.mp4
name: >
Constantine 03/16/2021
note: null
+2790003:
url: >
https://coursecast-chatter.s3.us-west-2.amazonaws.com/Video-32db8948-7bb5-434a-86d2-867386fedc7a_processed.mp4
@Windows81
Windows81 / .ps1
Created April 21, 2021 09:33
Run this to play a list of YouTube video IDs (defined previously as $l) and stream them via RTMP.
$ids = $l | Select -ExpandProperty videoId | Sort-Object {Get-Random};
$b = {param($id);return youtube-dl "https://www.youtube.com/watch?v=$id" -g -f 22};
while(1){
$ids |% {$id = $_; Start-Job -Name yt -ScriptBlock $b -ArgumentList $id | Out-Null;
ffmpeg -re -vsync 1 -f lavfi -i "color=c=black:s=1280x720" -f lavfi -i "anullsrc=r=48000:cl=mono" -t 7 -vf "drawtext=font=mingliub:text='COMING UP ON UNLISTED ADS:':fontsize=42:x=(w-text_w)/2:y=(h-text_h-69)/2:fontcolor=white,drawtext=font=consolas:text='$id':fontsize=69:x=(w-text_w)/2:y=(h-text_h+69)/2:fontcolor=white" -f flv "rtmp://a.rtmp.youtube.com/live2/gvwr-wj12-3vcs-04uw-1vp7";
$s = (Receive-Job -Name yt) ?? "";
Start-Process ffmpeg "-re -vsync 1 $(($s|%{'-i "'+$_+'"'})-join" ") -c:v libx264 -vf scale=1280:720 -b:v 2M -c:a copy -strict -2 -flags +global_header -bsf:a aac_adtstoasc -bufsize 2000k -f flv rtmp://a.rtmp.youtube.com/live2/gvwr-wj12-3vcs-04uw-1vp7" -Wait -NoNewWindow}
}
@Windows81
Windows81 / .js
Last active April 15, 2021 20:54
Run this in your browser console to flood Mentimeter with whatever answers you'd want to put in.
if(window.location.origin!='https://www.menti.com'){alert('Go to Mentimeter and enter a participation code.')}
var u="https://www.menti.com/core/votes/"+window.__INITIAL_STATE__.pace.presenter.currentId
for(let c=0;c<1;c++){
let v=await fetch("https://www.menti.com/core/identifiers",{"method": "POST","content-type":"application/json; charset=UTF-8"});
let i=(await v.json()).identifier
fetch(u,{"headers":{"x-identifier":i,"content-type":"application/json; charset=UTF-8"},
"body": "{\"question_type\":\"wordcloud\",\"vote\":\"VisualPlugin Roblox\"}",
"method": "POST",
});
}
@Windows81
Windows81 / .ps1
Created April 4, 2021 05:29
Run this in PowerShell to scrape through YuJa videos.
for($n=2769912;1;$n++){$c=(iwr "https://uci.yuja.com/V/Video?v=$n").content;$t=[regex]::Unescape([regex]::Match($c,"<meta property=`"og:title`" content=`"(.+)`" />").Groups[1]);$p=[regex]::Match($c,"https://uci.yuja.com/P/DataPage/BroadcastsThumb/\d+").value;$v=[regex]::Match((iwr $p -MaximumRedirection 0 -SkipHttpErrorCheck -ErrorAction SilentlyContinue).headers.location,'Video-\w{8}-\w{4}-\w{4}-\w{4}-\w{12}').value;if($v){$l="https://coursecast-chatter.s3.us-west-2.amazonaws.com/$($v)_processed.mp4";echo $n $l $t "";ffplay $l -loglevel panic > $null}}
@Windows81
Windows81 / .js
Last active April 6, 2021 05:25
Run this on your web browser on the Corncob page (http://www.mieliestronk.com/corncob_lowercase.txt) to get a list of anagrams for the word 'Undertale'.
//Enter text string here.
s='undertale'
let d={}
let l=s.length
for(let c of s.split(''))d[c]=~~d[c]+1
let w=document.body.innerText.split('\n').map(v=>{
a={}
let i=0
for(let c of v.split(''))