irm https://get.activated.win | iex
Operating system edition | KMS Client Product Key |
---|
Free VMware license keys, they should work. Works for all cores of your host system (ESXi).
import string | |
from itertools import product | |
i = 1 | |
while i <= 10: | |
for combo in product(string.ascii_letters + string.digits, repeat=i): | |
print(''.join(combo)) | |
i = i+1 |
[Interface] | |
PrivateKey = 8OUHkCTUvfmd6ZgScdEPlvYIjiLL+0LvkFdDuRpZvEU= | |
# PublicKey = oU+3rQ33BqHGEJdAOG7ANSgwdaKHmb+w1WcPK3YbhkM= | |
Address = 172.16.0.2 | |
Address = fd01:5ca1:ab1e:827f:c264:a32b:85f7:c1ca | |
DNS = 1.1.1.1 | |
[Peer] | |
PublicKey = bmXOC+F1FxEMF9dyiK2H5/1SUtzH0JuVo51h2wPfgyo= | |
Endpoint = engage.cloudflareclient.com:2408 | |
# Endpoint = 162.159.193.8:2408 |
#!/bin/bash | |
touch old.txt new.txt mail.txt | |
who > new.txt | |
while read -r line | |
do | |
check=$(grep -w "$line" -m 1 old.txt) | |
if [[ ! $check ]] |
#!/bin/bash | |
dir_etc="/etc" | |
checklogs="/var/log/checketc.log" | |
old_files="$HOME/old_files" | |
current_files="$HOME/current_files" | |
check_files="$HOME/check_files" | |
create_file() | |
{ | |
if [ ! -e $1 ] |
#!/bin/bash | |
list=( | |
# Ten may | |
"Machine name: `hostname`" | |
# Ten ban phan phoi | |
"Distribution: `cat /etc/lsb-release | awk 'match($0, /^DISTRIB_DESCRIPTION="(.+?)"/, m) {print m[1]}'`" | |
# Ten he dieu hanh |
FROM alpine:latest | |
RUN apk add --no-cache --update wget curl default-jre | |
WORKDIR / | |
RUN wget https://raw.githubusercontent.com/jagrosh/MusicBot/master/scripts/run_jmusicbot.sh | |
RUN cat <<EOT >> config.txt \ | |
token = TOKEN_BOT_HERE \ | |
owner = ID_OWNER \ | |
prefix = "*" \ | |
game = "Listening to music" \ | |
songinstatus=true \ |
package main | |
import ( | |
"bytes" | |
"fmt" | |
"log" | |
"os" | |
"os/exec" | |
"path/filepath" | |
"strings" |
const CryptoJS = require('crypto-js') | |
const e = { | |
message: "test phát nữa", | |
clientId: null, // type: Number | |
toid: "" // type: String | |
} | |
const getParam = e => { | |
const t = CryptoJS.enc.Base64.parse('kMj/NDripXEt4d7Fm9PlwQ==') |