Update: use PowerShell script PythonEmbed4Win.ps1.
The instructions in this gist have some subtle problems and this gist will not be updated.
| // ==UserScript== | |
| // @name New Userscript | |
| // @namespace http://tampermonkey.net/ | |
| // @version 0.1 | |
| // @description try to take over the world! | |
| // @author You | |
| // @match https://teams.microsoft.com/* | |
| // @icon https://www.google.com/s2/favicons?domain=teams.microsoft.com | |
| // @grant none | |
| // ==/UserScript== |
| // ==UserScript== | |
| // @name Generic Streaming Site Improvements | |
| // @namespace http://onai.net/ | |
| // @version 0.2 | |
| // @description Removing junk for Generic Streaming Sites | |
| // @author Kevin Gwynn | |
| // @match https://dudestream.com/* | |
| // @match http://dudestream.com/* | |
| // @match https://embedstream.me/* | |
| // @match https://crackstreams.biz/* |
| // ==UserScript== | |
| // @name betterDashboard | |
| // @namespace Nothing4You | |
| // @match https://tracker.archiveteam.org/*/ | |
| // @grant none | |
| // @version 1.2.0 | |
| // @author Nothing4You | |
| // @description adds more information to archive team tracker dashboards | |
| // @updateURL https://gist.githubusercontent.com/Nothing4You/b127b3cc4d4fabe372dcf078dbe86070/raw/dashboard.user.js | |
| // ==/UserScript== |
| Set-Strictmode -Version 2 | |
| # Applies reg keys from https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-40444 | |
| # Although the above document is still "Revision 1.0", Microsoft has removed the WOW6432 section | |
| for($i = 0; $i -le 3; $i++) { | |
| $RegPath = "HKLM:\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\$i" | |
| if (-not (Test-Path $RegPath)) { | |
| New-Item $RegPath -Force | |
| } |
| #change permissions and delete shadows | |
| $checkPermissions = icacls c:\Windows\System32\config\sam | |
| if ($checkPermissions -like '*BUILTIN\Users:(I)(RX*)*') { | |
| icacls c:\windows\system32\config\*.* /inheritance:e | |
| vssadmin delete shadows /quiet /all | |
| $vulnerable = $true | |
| } | |
| else { | |
| $vulnerable = $false | |
| } |
The instructions in this gist have some subtle problems and this gist will not be updated.
| #This is the name of the zip file in the component. Make sure that the PowerShell App Deployment Toolkit is zipped. | |
| $ZipFile = "DesktopSOE.zip" | |
| #This will create a folder called: C:\Temp (these folders can be changed to suit your requirements) | |
| Mkdir c:\Temp -Force | |
| #This will create a folder called: C:\Temp\DesktopSOE\ (these folders can be changed to suit your requirements) | |
| Mkdir C:\Temp\DesktopSOE\ -Force | |
| #This will then copy your PowerShellAppDeployment Toolkit to a folder, outside of the CentraStage Packagestore location. | |
| Copy-Item -Path "$ZipFile" -Destination "C:\Temp\$ZipFile" -Recurse | |
| $DestinationFolder = $ZipFile.Split(".")[0] | |
| #This will then extract your PowerShell App Deployment Toolkit and run it. |
| #NoEnv | |
| #SingleInstance, Force | |
| SetWorkingDir %A_ScriptDir% | |
| return | |
| getActiveExplorerPath() | |
| { | |
| ; https://www.autohotkey.com/boards/viewtopic.php?f=6&t=69925 | |
| explorerHwnd := WinActive("ahk_class CabinetWClass") |
| # params | |
| [CmdletBinding(DefaultParameterSetName="Casual")] | |
| param ( | |
| [Alias("c")] | |
| [Parameter(ParameterSetName = "Pro", Mandatory = $true)] | |
| [ValidateSet("stable", "beta", "dev", "canary")] | |
| [string]$Channel, | |
| [Alias("v")] | |
| [Parameter(ParameterSetName = "Pro", Mandatory = $true)] | |
| [ValidateNotNullOrEmpty()] |
| https://regex101.com/r/jcpyd3/1 ❤️ #create #test #dispaygroups | |
| https://www.nodexr.net/ ❤️ #create #debug #visualize | |
| https://regexr.com/ # create | |
| https://regex-generator.olafneumann.org/ #wizard | |
| https://extendsclass.com/regex-tester.html #create #debug #visualize | |
| http://www.txt2re.com/ #wizard #broken |