This file was generated automatically based on this two sources:
- /etc/nginx/mime.types
- http://www.garykessler.net/library/file_sigs.html
This is a JSON object by following structure:
[string ext] : {
signs: [sign]
$array = @('1a2a5773', '0fe68296', '01b7f045') | |
$expected = @('0fe68296', '01b7f045', '1a2a5773') | |
# # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # | |
Write-Host 'Bad:' # from https://stackoverflow.com/a/5429048/4880243 | |
$array | Sort-Object { [regex]::Replace($_, '\d+', { $args[0].Value.PadLeft(20) }) } | |
# # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # |
# http://www.nasdaqtrader.com/trader.aspx?id=symboldirdefs | |
# NASDAQ-Listed Securities | |
# File Name: nasdaqlisted.txt | |
# FTP Directory: ftp://ftp.nasdaqtrader.com/symboldirectory | |
# Field Name Definition | |
# Symbol The one to four or five character identifier for each | |
# NASDAQ-listed security. | |
# Security Name Company issuing the security. | |
# Market Category The category assigned to the issue by NASDAQ based on |
import argparse | |
import os | |
import shutil | |
import tempfile | |
from zipfile import ZipInfo, ZipFile | |
parser = argparse.ArgumentParser(description="Unzips a password protected .zip by performing a brute-force attack " | |
"using either a word list, password list or a dictionary.", | |
usage="BruteZIP.py -z zip.zip -d dict.txt") | |
parser.add_argument("-z", "--zip", metavar="", required=True, help="Path to the .zip file.") |
== Adb Server | |
adb kill-server | |
adb start-server | |
== Adb Reboot | |
adb reboot | |
adb reboot recovery | |
adb reboot-bootloader | |
== Shell |
----------------------------------------------------------------------------------------- | |
ID Full Name Short Name Description | |
----------------------------------------------------------------------------------------- | |
256: Show TST Show global scripts and variables. | |
257: ShowVars SV Show variables on object. You can optionally specified a papyrus variable or script to filter with [player->sv] | |
258: ShowGlobalVars SGLV Show all global variables. | |
259: ShowQuestVars SQV Show quest variables. You can optionally specified a papyrus variable or script to filter with [svq QuestID] | |
260: ShowQuests SQ List quests. | |
261: ShowQuestAliases Show quest aliases. [ShowQuestAliases QuestID] | |
262: |
This file was generated automatically based on this two sources:
This is a JSON object by following structure:
[string ext] : {
signs: [sign]
#!/bin/sh | |
# Generate self signed root CA cert | |
openssl req -nodes -x509 -newkey rsa:2048 -keyout ca.key -out ca.crt -subj "/C=AU/ST=NSW/L=Sydney/O=MongoDB/OU=root/CN=`hostname -f`/[email protected]" | |
# Generate server cert to be signed | |
openssl req -nodes -newkey rsa:2048 -keyout server.key -out server.csr -subj "/C=AU/ST=NSW/L=Sydney/O=MongoDB/OU=server/CN=`hostname -f`/[email protected]" | |
# Sign the server cert |
### | |
### | |
### UPDATE: For Win 11, I recommend using this tool in place of this script: | |
### https://christitus.com/windows-tool/ | |
### https://github.com/ChrisTitusTech/winutil | |
### https://www.youtube.com/watch?v=6UQZ5oQg8XA | |
### iwr -useb https://christitus.com/win | iex | |
### | |
### |
#!/bin/bash | |
#http://blog.oscarliang.net/raspberry-pi-voice-recognition-works-like-siri/ | |
echo “Recording… Press Ctrl+C to Stop.” | |
arecord -D “plughw:1,0” -q -f cd -t wav | ffmpeg -loglevel panic -y -i – -ar 16000 -acodec flac file.flac > /dev/null 2>&1 | |
echo “Processing…” | |
wget -q -U “Mozilla/5.0” –post-file file.flac –header “Content-Type: audio/x-flac; rate=16000” -O – “http://www.google.com/speech-api/v1/recognize?lang=en-us&client=chromium” | cut -d” -f12 >stt.txt | |
echo -n “You Said: ” |
function Get-RandomHexString { | |
param($count) | |
$hex = '012345679ABCDEF'.ToCharArray() | |
$array = foreach($number in 1..$count ){ $hex | Get-Random} | |
return (($array) -join "").ToString().ToLower() | |
} | |
function Get-WikiType{ | |
param($file) |