// This is the legend code. Add this after your existing table code.
// Add custom CSS for the legend
const legendCSS = `
<style>
.legend-container {
text-align: right;
margin-top: 10px;
font-size: 0.9em;
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python3 | |
""" | |
JSON Structure Analyzer and Reducer | |
=================================== | |
A powerful command-line tool for analyzing, reducing, and exploring JSON file structures. | |
Designed to help developers understand large JSON datasets by providing multiple modes | |
of interaction: structure reduction for LLM analysis, hierarchical size analysis, and | |
interactive terminal-based exploration. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python3 | |
""" | |
First, create a simple deck in Obsidian. | |
Next, leverage: "Pandoc Plugin: Export as Beamer Slides" | |
Finally, convert to PDF via this tool. | |
usage: obsidian-compile-slides [-h] [--nodracula] [--nomono] | |
Compile beamer slides with optional Dracula theme |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python3 | |
import sys | |
import tiktoken | |
DEFAULT_ENCODING = "cl100k_base" | |
def count_tokens(encoding_name, text): | |
"""Count the number of tokens in the given text using the specified encoding.""" | |
enc = tiktoken.get_encoding(encoding_name) | |
return len(enc.encode(text)) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
```dataviewjs | |
// Function to format number with commas | |
function formatNumber(num, decimals = 0) { | |
return num.toFixed(decimals).replace(/\B(?=(\d{3})+(?!\d))/g, ","); | |
} | |
// Function to format date from YYYY-MM-DD to M/D (no leading zeros) | |
function formatDate(dateString) { | |
const [year, month, day] = dateString.split('-'); | |
return `${parseInt(month)}/${parseInt(day)}`; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# pop-working: Pops the top block of multiline content from the "working" file. | |
# It reads lines until it finds a line with at least 3 hyphens (e.g. "------"). | |
# If a separator is found, the lines before it are copied to the clipboard (via pbcopy), | |
# displayed to the user, and removed (including the separator) from the file. | |
# If no separator is found, the entire file is copied to the clipboard and the file is emptied. | |
# If the file exists but is empty, the script exits with a message. | |
# Finally, the script counts the number of remaining blocks (separated by lines of ≥3 hyphens) | |
# and displays that count. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#### Sigma Rule: Initial Access via Social Engineering and RMM Tool Installation | |
```yaml | |
title: Initial Access via Social Engineering and RMM Tool Installation | |
id: 1a2b3c4d-5e6f-7g8h-9i0j-1k2l3m4n5o6p | |
description: Detects the installation of Remote Monitoring and Management (RMM) utilities following social engineering attacks, which may indicate initial access by threat actors. | |
status: experimental | |
author: Your Name | |
logsource: | |
category: process_creation | |
product: windows |
You are the worlds greatest content summarizer with an IQ of 479. You've been hired by the President of the United States of America to act as the official summarizer of all content that she's to read. To accomplish this job well you must be both PRECISE and CONCISE. Do not lose any information, but exercise extreme brevity when relaying that information. Spend 8 virtual hours following this step-by-step methodology and then producing a report following the Template defined below, finally read in the content to summarize under the Input section.
- Initial Reading and Understanding
- Objective: Grasp the core message and main points.
- Action: Read the entire document quickly to get an overview.
- Identify Key Sections
- Objective: Locate sections with essential information.
const ignoreFolders = ["YouTube"];
const ignoreContent = "Watched"; // Define the content to ignore
const results = dv.pages(`"/"`)
.file.tasks
.where(task => !ignoreFolders.includes(task.path.split("/")[0]) && !task.text.includes(ignoreContent));
const tasks = [...results].flat();
const completedTasks = tasks.filter(task => task.completed);
NewerOlder