Train
1 2
3
| // -novid -tickrate 128 -nojoy -language colormod -refresh 240 -port 27015 -netconport 2121 | |
| clear | |
| // viewmodel | |
| viewmodel_presetpos "3" | |
| cl_bob_lower_amt "5.000000" | |
| cl_bobamt_lat "0.100000" | |
| cl_bobamt_vert "0.100000" | |
| cl_bobcycle "0.98" |
| find . -name "README.md" -type f -not -path "./node_modules/*" -delete |
| import hashlib | |
| bindingPhrase = "" | |
| fullBindingPhrase = f"-DMY_BINDING_PHRASE=\"{bindingPhrase}\"" | |
| fullBindingPhrase = fullBindingPhrase.strip() | |
| bindingPhraseHash = hashlib.md5(fullBindingPhrase.encode()).digest() | |
| UIDbytes = ",".join(list(map(str, bindingPhraseHash))[0:6]) | |
| print(UIDbytes) |
| If (-NOT ([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")) { | |
| $arguments = "& '" + $myinvocation.mycommand.definition + "'" | |
| Start-Process powershell -Verb runAs -ArgumentList $arguments | |
| Break | |
| } | |
| $remoteport = bash.exe -c "ip addr | grep -Ee 'inet.*eth0'" | |
| $found = $remoteport -match '\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}'; | |
| if ($found) { |
| // crosshair CSGO-XuOok-rrdJJ-CjErV-Hav78-qXJeB | |
| // misc | |
| cl_color 4 | |
| cl_crosshair_friendly_warning 0 | |
| cl_dm_buyrandomweapons 0 | |
| cl_hide_avatar_images 0 | |
| cl_invites_only_friends 0 | |
| cl_invites_only_mainmenu 0 | |
| cl_join_advertise 2 |
Train
1 2
3