sh -c "$(curl -fsSL https://raw.githubusercontent.com/robbyrussell/oh-my-zsh/master/tools/install.sh)"
- Download zsh-autosuggestions by
youtube-get-subs() { | |
echo "getting filenames..." | |
filename=$(youtube-dl --simulate --get-title $1)-$(youtube-dl --simulate --get-id $1) | |
echo "Downloading video data" | |
youtube-dl --continue --write-auto-sub --sub-format vtt --sub-lang en --write-thumbnail --write-description --skip-download $1 | |
echo $filename | |
echo "Removing --> time stuff" | |
sed -i '/-->/d' $filename.en.vtt | |
echo "Removing empty lines" | |
grep "\S" $filename.en.vtt > $filename.txt |
#!/bin/sh | |
################################################################################ | |
# Copyright (c) 2020 Plyint, LLC <[email protected]>. All Rights Reserved. | |
# This file is licensed under the MIT License (MIT). | |
# Please see LICENSE.txt for more information. | |
# | |
# DESCRIPTION: | |
# This script allows a user to encrypt a password (or any other secret) at | |
# runtime and then use it, decrypted, within a script. This prevents shoulder | |
# surfing passwords and avoids storing the password in plain text, which could |
echo -en "\e]P0232323" #black | |
echo -en "\e]P8882B99" #darkgrey | |
echo -en "\e]P1D75F5F" #darkred | |
echo -en "\e]P9E33636" #red | |
echo -en "\e]P287AF5F" #darkgreen | |
echo -en "\e]PA98E34D" #green | |
echo -en "\e]P3D7AF87" #brown | |
echo -en "\e]PBFFD75F" #yellow | |
echo -en "\e]P48787AF" #darkblue | |
echo -en "\e]PC7373C9" #blue |
#!/bin/sh | |
image_name="keybaseio/client:latest" | |
contname="keybase" | |
nodename="--hostname=${contname}" | |
runname="--name=${contname}" | |
run_rm="--rm=true" | |
# build_rm="--force-rm=true" | |
ports="" | |
volumes="-v ~/.keybase:/home/keybase/.config/keybase" | |
with_tty="--tty" |
# ~/.config/mpv/mpv.conf | |
#The default profile which sets some recommended settings | |
profile=gpu-hq | |
#The called API | |
#Use "opengl" if you have compatibility issues | |
gpu-api=vulkan | |
vo=gpu #tct | |
#Decoding API for 8bit h264 (or whatever your CPU supports) content | |
#Only should be used when you get many frame drops |
To test if udp port is responding, use netcat.
An example from the man page:
nc -v -u -z -w 3 example.host 20-30
Send UDP packets to ports 20-30 of example.host, and report which ones did not respond with an ICMP packet after three seconds. Of course, if a firewall is DROPing, which is normally the case when dealing with internet-faced gateways, you won't receive an ICMP response.
udp://p4p.arenabg.com:1337/announce | |
udp://explodie.org:6969/announce | |
http://tracker1.itzmx.com:8080/announce | |
udp://tracker.birkenwald.de:6969/announce | |
udp://tracker.moeking.me:6969/announce | |
http://tracker.bt4g.com:2095/announce | |
udp://tracker.beeimg.com:6969/announce | |
udp://opentracker.i2p.rocks:6969/announce | |
http://open.acgnxtracker.com:80/announce | |
udp://fe.dealclub.de:6969/announce |
[ | |
"https://ipfs.io/ipfs/:hash", | |
"https://:hash.ipfs.dweb.link", | |
"https://gateway.ipfs.io/ipfs/:hash", | |
"https://ipfs.infura.io/ipfs/:hash", | |
"https://ninetailed.ninja/ipfs/:hash", | |
"https://ipfs.globalupload.io/:hash", | |
"https://10.via0.com/ipfs/:hash", | |
"https://ipfs.eternum.io/ipfs/:hash", | |
"https://hardbin.com/ipfs/:hash", |
I hereby claim:
To claim this, I am signing this object: