I hereby claim:
- I am cjavad on github.
- I am cjavad (https://keybase.io/cjavad) on keybase.
- I have a public key whose fingerprint is 327D BAC9 CB53 F4EA CCB0 C831 ACC6 E0BE BDBC 43F4
To claim this, I am signing this object:
| exec ac_config | |
| exec ac_crosshair | |
| exec ac_baited | |
| exec ac_expr | |
| exec ac_spam | |
| bind mouse1 "+attack" | |
| bind mouse2 "+attack2" | |
| bind mouse4 "+voicerecord" | |
| bind w "+forward" |
| """ | |
| DEFINE FUNCTIONS HERE | |
| """ | |
| import re | |
| # get steamid of trader | |
| def TradeLink2SteamId(tradeurl): | |
| tradeurl = str(tradeurl) | |
| partnerid = re.search("(=).*?(&)", tradeurl).group().strip("=").strip("&") |
I hereby claim:
To claim this, I am signing this object:
Crack.py is a macos "password-finder" tool that can either go over a wordlist by itself or generate hashcat output for macos 10.8+ passwords (mode 7100).
To generate the required xml file, use the following command
sudo defaults read /var/db/dslocal/nodes/Default/users/<username>.plist ShadowHashData|tr -dc 0-9a-f|xxd -r -p|plutil -convert xml1 - -o <username>.xmlWhere <username> is your target username.
Then you can run
| END-USER LICENSE AGREEMENT FOR ASEPRITE | |
| IMPORTANT: PLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT CAREFULLY BEFORE CONTINUING WITH THIS PROGRAM INSTALL. This End-User License Agreement ("EULA") is a legal agreement between you (either an individual or a single entity) and David Capello, for the software product(s) identified above which may include associated software components, media, printed materials, and "online" or electronic documentation ("SOFTWARE PRODUCT"). By installing, copying, or otherwise using the SOFTWARE PRODUCT, you agree to be bound by the terms of this EULA. This license agreement represents the entire agreement concerning the program between you and David Capello, (referred to as "licenser"), and it supersedes any prior proposal, representation, or understanding between the parties. If you do not agree to the terms of this EULA, do not install or use the SOFTWARE PRODUCT. | |
| The SOFTWARE PRODUCT is protected by copyright laws and international copyright treaties, as well a |
| - 14e54344 14740600, 86821 | |
| - 63e273d2 14740601, 86820 | |
| - faeb2268 14740602, 86823 | |
| - 8dec12fe 14740603, 86822 | |
| - 1388875d 14740604, 86825 | |
| - 648fb7cb 14740605, 86824 | |
| - fd86e671 14740606, 86827 | |
| - 8a81d6e7 14740607, 86826 | |
| - 1a3ecb76 14740608, 86829 | |
| - 6d39fbe0 14740609, 86828 |
| #!bin/python3 | |
| import sys | |
| import random | |
| from string import digits, ascii_uppercase, ascii_lowercase | |
| from requests import get | |
| base_url = "https://api.myjson.com/bins/" | |
| def gen(): | |
| return ''.join([random.choice(digits + ascii_lowercase) for x in range(5)]) |
| // M11.js | |
| /* | |
| * Modules 11 control algorithm it's used | |
| * Used by the danish goverment to validate CPR numbers (social security numbers). | |
| * It works by having a number list and giving them each a weight from 2 to 7 then | |
| * multiplying them to then divide the number with the mod (11 usually) | |
| * to see if the reminder is 0. | |
| * | |
| * the modules operator (%) in javascript takes bad values. |
| (re)loading renderer plugins | |
| index.html:35 total init time 229.82999999999998 | |
| 10bundle.js:47 Ignored CC1 code: "" | |
| r.VT.dispatch @ bundle.js:47 | |
| bundle.js:47 Unknown ESC code: "�" | |
| r.VT.dispatch @ bundle.js:47 | |
| bundle.js:47 Ignored CC1 code: "\u0013" | |
| r.VT.dispatch @ bundle.js:47 | |
| 2bundle.js:47 Ignored CC1 code: "" | |
| r.VT.dispatch @ bundle.js:47 |
| // Future versions of Hyper may add additional config options, | |
| // which will not automatically be merged into this file. | |
| // See https://hyper.is#cfg for all currently supported options. | |
| module.exports = { | |
| config: { | |
| // Choose either "stable" for receiving highly polished, | |
| // or "canary" for less polished but more frequent updates | |
| updateChannel: 'stable', |