Skip to content

Instantly share code, notes, and snippets.

View muink's full-sized avatar
🍭
🍭 🍭

Anya Lin muink

🍭
🍭 🍭
  • Azeroth land
View GitHub Profile
@velzie
velzie / manifest-v2-chrome.md
Last active April 24, 2025 13:21
How to keep using adblockers on chrome and chromium

How to keep using adblockers on chrome and chromium

  1. google's manifest v3 has no analouge to the webRequestBlocking API, which is neccesary for (effective) adblockers to work
  2. starting in chrome version 127, the transition to mv3 will start cutting off the use of mv2 extensions alltogether
  3. this will inevitably piss of enterprises when their extensions don't work, so the ExtensionManifestV2Availability key was added and will presumably stay forever after enterprises complain enough

You can use this as a regular user, which will let you keep your mv2 extensions even after they're supposed to stop working

Linux

In a terminal, run:

@muink
muink / urid.jq
Last active February 15, 2024 12:52 — forked from jcracknell/urldecode.jq
def urid:
def uni2num:
if 48 <= . and . <= 57 then . - 48 elif 65 <= . and . <= 70 then . - 55 else . - 87 end;
# ^ ^ ^ ^ ^
# | | | | 97 | 102
# uni0 ---------- uni9 -48=0-9 uniA ----------- uniF -55=10-15 unia - unif -87=10-15
# de pct-encoded
def decode:
def loop($i):

Enable & Using vGPU Passthrough

This gist is almost entirely not unlike Derek Seaman's awesome blog:

Proxmox VE 8: Windows 11 vGPU (VT-d) Passthrough with Intel Alder Lake

As such please refer to that for pictures, here i will capture the command lines I used as i sequence the commands a little differently so it makes more logic to me.

This gists assumes you are not running ZFS and are not passing any other PCIE devices (as both of these can require addtional steps - see Derek's blog for more info)

This gist assumes you are not running proxmox in UEFI Secure boot - if you are please refer entirely to dereks blog.

@veltlion
veltlion / qbittorrent.sh
Last active February 15, 2025 14:24
NATMap 打洞后自动更新 qBittorrent/Transmission 监听端口和 OpenWrt 防火墙规则并推送到 Telegram
#!/bin/sh
protocol=$5
inner_ip=$6
inner_port=$4
outter_ip=$1
outter_port=$2
ip4p=$3
qbv4="10.0.0.123"
@santaklouse
santaklouse / CrossOver.sh
Last active April 25, 2025 05:14
unlimited CrossOver trial (MacOS)
#!/usr/bin/env bash
# checck if pidof exists
PIDOF="$(which pidof)"
# and if not - install it
(test "${PIDOF}" && test -f "${PIDOF}") || brew install pidof
# find app in default paths
CO_PWD=~/Applications/CrossOver.app/Contents/MacOS
test -d "${CO_PWD}" || CO_PWD=/Applications/CrossOver.app/Contents/MacOS
@sergeiwaigant
sergeiwaigant / url_encode_string_with_linux_tools.md
Last active April 24, 2025 21:35
Simply URL encode string with Linux/Bash/Shell tools

Reference https://stackoverflow.com/a/34407620/13287790

$ printf %s 'encode this'|jq -sRr @uri
encode%20this

$ jq -rn --arg x 'encode this' '$x|@uri'
encode%20this

# -r (--raw-output) outputs the raw contents of strings instead of JSON string literals. -n (--null-input) doesn't read input from STDIN.
@tamnil
tamnil / SolidWorks_Spoof.sh
Created November 29, 2020 08:53 — forked from W-Floyd/SolidWorks_Spoof.sh
Simple script to make a Virtualbox VM hidden enough to install SolidWorks
#!/bin/bash
__get_random_string () {
openssl rand -hex "${1}" | cut -c "1-${1}"
}
__my_vm='W10'
@muink
muink / Go.cmd
Last active April 22, 2025 08:02
Openwrt本地源构建
@echo off
set "path=%path%;%~dp0cwRsync_5.5.0_x86_Free\bin"
start cmd
@muink
muink / pcap-dnsproxy-watchdog.sh
Created December 6, 2019 11:15 — forked from HackingGate/pcap-dnsproxy-watchdog.sh
A watchdog for Pcap-DNSProxy on OpenWrt
PROG=/usr/sbin/Pcap_DNSProxy
LOGTIME=$(date "+%Y-%m-%d %H:%M:%S")
if [ $(ps|grep ${PROG}|grep -v grep|wc -l) -ge 1 ]; then
echo "['$LOGTIME'] Pcap_DNSProxy is running, PID is $(pidof ${PROG##*/})"
else
echo "['$LOGTIME'] Pcap_DNSProxy is not running."
/etc/init.d/pcap-dnsproxy start
fi
@muink
muink / JMS583-SMART-INFO.md
Created November 26, 2019 13:00
read SMART info of JMS583 on CrystalDiskInfo