This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from requests import Session | |
from re import match, search | |
from bs4 import BeautifulSoup as bs | |
from os import system, chdir | |
class Teleplay: | |
def __init__(self, url: str) -> None: | |
'''Initialize a teleplay. `url` be like: `https://www.meijuwo.net/play/5940-1-1/`.''' | |
m = match(r'(https://www.meijuwo.net/play/\d+-\d+-)\d+', url) |
Inspired by this
More of my guides: Debloating MEMu - Debloating Nox (Updated)
This mainly applies to LDPlayer9. They will probably work on the low end options (like LDPlayer5) but not guaranteed.
This emulator seems to have less stability issues than MEMu. I think we get the shtick that these emulators do spooky stuff.
- Download LDPlayer, preferably an offline version from the version history
Using the URL returned by Charles Proxy when installing an extension from the Chrome Web Store to download the extension (inspired by paulirish).
$ extension_id=jifpbeccnghkjeaalbbjmodiffmgedin
$ curl --output "$extension_id.crx" --silent --location "https://clients2.google.com/service/update2/crx?response=redirect&os=mac&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=canary&prodversion=107.0.5304.0&lang=en-GB&acceptformat=crx3&x=id%3D$extension_id%26installsource%3Dondemand%26uc"
$ file "$extension_id.crx"
jifpbeccnghkjeaalbbjmodiffmgedin.crx: Google Chrome extension, version 3
The SHA-256 checksum of the downloaded file matches the value returned by the API.
$ sha256sum "$extension_id.crx"
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
curl -s http://mirrors.ubuntu.com/mirrors.txt | xargs -n1 -I {} sh -c 'echo `curl -r 0-102400 -s -w %{speed_download} -o /dev/null {}/ls-lR.gz` {}' | sort -g -r | head -1 | awk '{ print $2 }' |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# So sorry it had to come to this, this is slow. | |
# Note that pim and keyfiles etc is static and needs to be modified if used. | |
# veracrypt --text --dismount --slot 1 | |
set -eu -o pipefail | |
CONTAINER="" | |
MOUNTDIR="" | |
WORDLIST="" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
for((i=1;i<=10302;i++)); | |
do | |
echo "" | |
echo "" | |
echo "Start download book from $i" | |
echo "" | |
echo "" | |
curl "https://www.tianlangbooks.com/$i.html" -H 'authority: www.tianlangbooks.com' --data-raw 'secret_key=359198&Submit=%E6%8F%90%E4%BA%A4' --compressed | grep "蓝奏云盘" >> download.txt | |
done |
Moved to https://api.fmhy.net
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
module BoxOutSports | |
def self.kv | |
@kv ||= KeyValueJsonb.new(use_local_time: Rails.env.test?) { | |
ActiveRecord::Base.connection | |
} | |
end | |
end |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Get-WinEvent -LogName Microsoft-Windows-Sysmon/Operational | where { $_.TimeCreated -ge (Get-Date) - (New-TimeSpan -Day 1) } | where Id -EQ 1 | where Message -match "rundll32" | Format-List -Property Message | Out-String -Stream | Select-String -Pattern " CommandLine:" |