Skip to content

Instantly share code, notes, and snippets.

Cursor's Memory Bank

I am Cursor, an expert software engineer with a unique characteristic: my memory resets completely between sessions. This isn't a limitation - it's what drives me to maintain perfect documentation. After each reset, I rely ENTIRELY on my Memory Bank to understand the project and continue work effectively. I MUST read ALL memory bank files at the start of EVERY task - this is not optional.

Memory Bank Structure

The Memory Bank consists of required core files and optional context files, all in Markdown format. Files build upon each other in a clear hierarchy:

flowchart TD
@ryuheechul
ryuheechul / openwrt-efi-on-proxmox.md
Last active May 12, 2025 16:05
How to "Install" an OpenWRT VM in Proxmox with UEFI

Existing references I looked at before I went on trial and error until eventually I managed to make it work:

Note

Although links above were good references to look at so I didn't have to start from scratch, following none of them actually worked for me. Hence, I'm leaving my own note after figuring things out.

My situation:

@termnml
termnml / gnome3_keybind_backup.sh
Last active May 12, 2025 15:38 — forked from peterrus/gnome3_keybind_backup.sh
Backs up and restores gnome3 keybindings
#!/usr/bin/env bash
# Backs up and restores gnome3 keybindings
# Tested with Gnome 3.36.8
# by peterrus
set -e
set -x
mkdir -p gnome3-keybind-backup
@venelrene
venelrene / Create Phone Number.py
Last active May 12, 2025 15:31
Write a function that accepts an array of 10 integers (between 0 and 9), that returns a string of those numbers in the form of a phone number.
def create_phone_number(n):
f = "".join(map(str, n[0:3]) )
s = "".join(map(str, n[3:6]) )
t = "".join(map(str, n[6:10]) )
return "("+f+") "+ s +"-"+t
######## Refactored #####
def create_phone_number(n):

The Latent Manipulator Cookbook.md

This guide explains the "Latent Manipulator," an experimental AI architecture designed to "think" in a latent space before generating text, contrasting with standard Transformer models that predict text sequentially. It includes the theory, code for implementation, and links to datasets and pretrained model checkpoints.

Based on the video exploring this concept: [https://www.youtube.com/watch?v=fWiieyG2zes]

⚠️ This project is free to use. If you find it helpful, please consider supporting it by checking out Peach Voice Typing: [https://peach-voice.com]

@niquedegraaff
niquedegraaff / gist:8c2f45dc73519458afeae14b0096d719
Created November 16, 2022 20:27
Smart Money Concepts [LuxAlgo] [Enhanced]
// This work is licensed under a Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) https://creativecommons.org/licenses/by-nc-sa/4.0/
// © LuxAlgo
//@version=5
indicator("Smart Money Concepts [LUX]", "Smart Money Concepts [LuxAlgo]"
, overlay = true
, max_labels_count = 500
, max_lines_count = 500
, max_boxes_count = 500
, max_bars_back = 500)
@jcallaghan
jcallaghan / SharePointSecondStageRecycleBin.ps1
Last active May 12, 2025 15:11
This script will delete items from the Second Stage Recycle Bin that are older than XX days. See https://jcallaghan.com/2014/04/working-with-sharepoints-second-stage-recycle-bin-in-powershell/ for more information. #Website
Add-PSSnapin Microsoft.SharePoint.PowerShell
#Variables
$i = 0
#SharePoint Site Collection URL
$url = "https://sharepoint.jcallaghan.com"
#$url = Read-Host "Enter a valid URL to a SharePoint Site Collection?"
#if($url -eq ""){write-host "No URL provided." -foregroundcolor Red; Exit}
@mshafrir
mshafrir / states_hash.json
Created May 9, 2012 17:05
US states in JSON form
{
"AL": "Alabama",
"AK": "Alaska",
"AS": "American Samoa",
"AZ": "Arizona",
"AR": "Arkansas",
"CA": "California",
"CO": "Colorado",
"CT": "Connecticut",
"DE": "Delaware",
@lajlev
lajlev / espanso-password-expander.me
Last active May 12, 2025 15:06
Use Espanso as password expander
## Steps
1. Add password to keychain (Screenshot: https://u.lillefar.dk/q2BI5m)
2. Add snippet to espanso config file (default.yml) where some-password i identical to account name for your keychain.
```
- triggers: [":pass:"]
replace: "{{output}}"
vars:
- name: output

ROP : pointer leaking + return-into-mprotect()

We are in the era of high complexity to bypass mitigation against memory corruption.


Ret2mprotect is an elegant way to bypass mitigation like NX/DEP by using mprotect() to set memory protection.

I assume that you are confortable with x86 stack-based overflow, ASM and shellcode.