Skip to content

Instantly share code, notes, and snippets.

View vitqst's full-sized avatar
🎯
Focusing

vitqst

🎯
Focusing
View GitHub Profile
import multiprocessing as mp
"""
This script attempts to crack a password hashed with the Blowfish algorithm using a dictionary attack.
It utilizes multiprocessing to speed up the process by dividing the password list into chunks and
distributing them across multiple CPU cores.
Functions:
read_password_file(file_path):
Reads a file containing passwords, one per line, and returns a list of passwords.
[{"_id":"66d3dedf73346626630d20c8","patient_id":"66d3de2d73346626630d20a2","clinic_id":"663115e579eb1a7fa6f67757","treatment_plan_id":"66d3dedf73346626630d20b7","bill_details":[{"tooth_number":1,"jaw":"both","side":"both","treatment_id":"6636f42179eb1a7fa6f69e31","treatment_cost":180,"treatment_quantity":1,"treatment_name":"trám răng","treatment_code":"1714877473267-H7UCmkZoA8","note":"","_id":"66d3e18373346626630d20f0"},{"tooth_number":1,"jaw":"both","side":"both","treatment_id":"6636f42179eb1a7fa6f69e31","treatment_cost":180,"treatment_quantity":1,"treatment_name":"trám răng","treatment_code":"1714877473267-H7UCmkZoA8","note":"","_id":"66d3e18373346626630d20f1"},{"tooth_number":1,"jaw":"both","side":"both","treatment_id":"6636f42179eb1a7fa6f69e31","treatment_cost":180,"treatment_quantity":1,"treatment_name":"trám răng","treatment_code":"1714877473267-H7UCmkZoA8","note":"","_id":"66d3e18373346626630d20f2"},{"tooth_number":1,"jaw":"both","side":"both","treatment_id":"6636f42179eb1a7fa6f69e31","treatment_cost"
<?php
declare(strict_types=1);
namespace App\Console\Commands;
use Illuminate\Console\Command;
use Illuminate\Console\Scheduling\Schedule;
class ScheduleList extends Command
// Tested 11/11/2022
const isBlock = () => {
// Check for existing dialog
const dialog = Array.from(document.querySelectorAll('paper-dialog'))[0]
if (!dialog) return false
if (getComputedStyle(dialog).display === 'none') return false
console.log('BLOCKED!!!')
return true
# Trading classic - show all activity
document.querySelector('div[name=trades]').remove()
document.querySelector('div[name=marketActivity]').style.gridArea = 'inherit'
document.querySelector('div[name=marketActivity]').childNodes[1].firstElementChild.style.height = 'inherit'
[{"name":"RVN","volume":300,"price":0.16326},{"name":"RVN","volume":2428,"price":0.17216},{"name":"RVN","volume":1273,"price":0.16453},{"name":"RVN","volume":1273,"price":0.16453}]
function buildArray(n) {
const arr = [];
for (let i = 0; i < n; i++) {
arr.push(i);
}
}
function buildArray2(n) {
const arr = new Array(n).fill(0);
for (let i = 0; i < n; i++) {
arr[i] = (i);
// F12 & paster to use Ctrl+Z & Ctrl+Y for google keep draw
function KeyPress(e) {
var evtobj = window.event? event : e
if (evtobj.keyCode == 90 && evtobj.ctrlKey) {
document.querySelector("#canvas-parent > div.above-ink-canvas > div > div > div.ink-toolbar-end > div:nth-child(1) > button").click()
}
if (evtobj.keyCode == 89 && evtobj.ctrlKey) {
document.querySelector("#canvas-parent > div.above-ink-canvas > div > div > div.ink-toolbar-end > div:nth-child(2) > button").click()
}
@vitqst
vitqst / clean_html.php
Created August 28, 2018 07:11 — forked from xeoncross/clean_html.php
Sanitize HTML using PHP and the DOMDocument
<?php
/**
* Clean HTML string removing all element attributes and elements which are
* not in the provided whitelist (but keeping their allowed children).
*
* @see https://github.com/alixaxel/phunction/blob/master/phunction/HTML.php
* @param string $html to clean
* @param array $whitelist
*/
function clean_html($html, array $whitelist)
var gulp = require('gulp');
var babel = require('gulp-babel');
var babelify = require('babelify');
var uglify = require('gulp-uglify');
var streamify = require('gulp-streamify');
var browserify = require('browserify');
var source = require('vinyl-source-stream');
var del = require('del');
var vinylPaths = require('vinyl-paths');