I hereby claim:
- I am sub314xxl on github.
- I am kmokhnatkin (https://keybase.io/kmokhnatkin) on keybase.
- I have a public key ASAswA4lpsIPNPotcnCAwzp7KGooBqxoeSi8sc-38QM8iAo
To claim this, I am signing this object:
#!/bin/bash | |
# chmod +x trim.awk | |
# mv trim.awk /usr/local/bin/trim and m | |
# use: 'aaa a a ' | trim | |
awk '{$1=$1};1' |
# Mass add VPN profiles with NetworkManager | |
for file in $(pwd)/*; | |
do | |
export config=$(ls -l $file | awk -F "$(pwd)/" '{print $2}'| cut -d . -f1) | |
nmcli connection import type wireguard file "$config.conf" && \ | |
nmcli connection modify "$config" connection.autoconnect no && \ | |
nmcli connection down "$config" | |
done |
pkexec tcpdump -i wlan0 -U -w - | flatpak run --branch=stable --arch=x86_64 \ | |
--filesystem=host --file-forwarding=host --share=network org.wireshark.Wireshark -k -i - | |
# pkexec is more safer than sudo | |
pkexec tcpdump -i wlan0 -U -w - | flatpak run --branch=stable --arch=x86_64 --device=all --filesystem=host --file-forwarding=host --share=network org.wireshark.Wireshark -k -i - | |
| xargs -0 -n1 sh -c 'wireshark "$@" < /dev/null' sh | |
# https://towardsdev.com/how-to-capture-packets-on-using-flatpak-wireshark-directly-from-tcpdump-on-host-system-f1ae3d0d0e3b | |
# https://wiki.wireshark.org/CaptureSetup/ |
I hereby claim:
To claim this, I am signing this object:
{ | |
"output": { | |
"bass_enhancer": { | |
"amount": 22.0, | |
"blend": 0.0, | |
"floor": 10.0, | |
"floor-active": true, | |
"harmonics": 9.999999999999995, | |
"input-gain": 0.0, | |
"output-gain": -8.0, |
--disable-features=UseSkiaRenderer,UseChromeOSDirectVideoDecoder,side-panel,read-later | |
--enable-features=VaapiVideoDecoder,VaapiVideoEncoder,VaapiIgnoreDriverChecks,UseOzonePlatform | |
--enable-start-surface-disabled-feed-improvement | |
--wm-window-animations-disabled | |
--use-cmd-decoder=passthrough | |
--process-per-site | |
--ozone-platform=x11 | |
--ignore-gpu-blocklist | |
--enable-gpu-rasterization | |
--enable-zero-copy |
http-tunnel - Tunnel tcp connection through http in Python
sshtunnel - SSH tunnels to remote server
PycURL - Python interface to libcurl
urllib3 - HTTP library with thread-safe connection pooling, file post support, sanity friendly, and more
Timers provide a great help in troubleshooting network problems. All values are | |
reported in milliseconds (ms). These timers should be used in conjunction with | |
the session termination flags. In TCP mode with "option tcplog" set on the | |
frontend, 3 control points are reported under the form "Tw/Tc/Tt", and in HTTP | |
mode, 5 control points are reported under the form "TR/Tw/Tc/Tr/Ta". In | |
addition, three other measures are provided, "Th", "Ti", and "Tq". | |
Timings events in HTTP mode: | |
first request 2nd request |
lsfonts() { | |
fc-list|awk '{$1=""}1'|cut -d: -f1|sort|uniq | |
} |
#discord #batbot #vqgan #clip #ai #eleutherai | |
https://discord.com/channels/729741769192767510/730510538060071043/ | |
.imagine QUERY --step_size 0.01 --init_weight 0.99 --start_image | |
https://faraday.logge.top/ |