1.1.1.1
1.0.0.1
2606:4700:4700::1111
2606:4700:4700::1001
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import java.io.FileOutputStream | |
import java.io.PrintWriter | |
import java.nio.file.Files | |
import java.time._ | |
import java.time.format._ | |
import scala.io.Source | |
import scala.util.matching.Regex | |
object Schedule { |
This is a simple set of scripts to install and run Neos headless via SteamCMD.
- OPTIONAL: create a new user for this setup. SteamCMD has been known in the past to nuke the entire home directory of the user running it.
- Install SteamCMD
- Toss
update.sh
,appupdate.txt
, andrun_server.sh
into the same directory that SteamCMD is installed to. (steamcmd.sh
should be there) - Fill in the blanks in
appupdate.txt
. The password for the Neos Headless Beta can be obtained from a channel in the Neos Discord, if you are in the relevant Patreon tier.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
process() { | |
pushd . > /dev/null | |
cd "$(dirname "$1")" | |
echo "$PWD" | |
git fetch --all | |
popd > /dev/null | |
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
BusinessX.ClassroomBoard | |
BusinessX.ClassroomController | |
BusinessX.ClassroomDatabaseController | |
BusinessX.ClassroomGrabbable | |
BusinessX.ClassroomHighlight | |
BusinessX.ClassroomHighlightManager | |
BusinessX.ClassroomLabel | |
BusinessX.ClassroomModelControls | |
BusinessX.ClassroomQuizController | |
BusinessX.HideShowControl |
I'm "runtime" in-game. U-runtime
if you need my user id. zkxs#1039
on Discord. Feel free to reach out to me if you've got questions.
An exploit allowing a malicious actor to join sessions while impersonating another user via the use of a MITM (man-in-the-middle) attack.
I am specifically searching for exploits with large security impacts due to the new issue bounty policy.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env bash | |
if ! uname | grep -iq darwin; then | |
echo "This script is designed for Mac OSX use" >&2 | |
exit 1 | |
fi | |
if ! [ -e "patch.js" ]; then | |
echo "Place your javascript to inject in patch.js" >&2 | |
exit 1 |
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
NewerOlder