I hereby claim:
- I am delusionallogic on github.
- I am delusional (https://keybase.io/delusional) on keybase.
- I have a public key ASArxuFEJzzYpRppA9700I1CaD9pF7KtNDVBjJKwN-ufDQo
To claim this, I am signing this object:
#compdef zathura | |
# zsh completions for 'zathura' | |
# automatically generated with http://github.com/RobSis/zsh-completion-generator | |
local arguments | |
arguments=( | |
{-h,--help}'[Show help options]' | |
{-e,--reparent}'[Reparents to window specified by xid (X11)]' | |
{-c,--config-dir}'[Path to the config directory]' |
I hereby claim:
To claim this, I am signing this object:
#!/bin/sh | |
userresources=$HOME/.Xresources | |
usermodmap=$HOME/.Xmodmap | |
sysresources=/etc/X11/xinit/.Xresources | |
sysmodmap=/etc/X11/xinit/.Xmodmap | |
# merge in defaults and keymaps | |
if [ -f $sysresources ]; then |
#!/bin/bash | |
i=0 | |
while read p; do | |
IFS="-" read -ra ADDR <<< "$p" | |
n="${ADDR[0]}" | |
start="${ADDR[1]}" | |
end="${ADDR[2]}" | |
echo "$start $end" |
# How many Controllers? (support up to 4 Controllers) | |
CONTROLLER_NUM=2 | |
case $CONTROLLER_NUM in | |
1) CONTROLLER="-w 0 -l 2 --trigger-as-button --dpad-as-button" | |
;; | |
2) CONTROLLER="-w 0 -l 2 --trigger-as-button --dpad-as-button --next-controller -w 1 -l 3 --trigger-as-button --dpad-as-button" | |
;; | |
3) CONTROLLER="-w 0 -l 2 --trigger-as-button --dpad-as-button --next-controller -w 1 -l 3 --trigger-as-button --dpad-as-button --next-controller -w 2 -l 4 --trigger-as-button --dpad-as-button" | |
;; |
Webwhale encryption is the codename of my effort to make encryption actually useful, and put the power in the hands of the developer. | |
The encryption is based on a quite simple RSA encryption for sharing the symmetric AES key. This method requires you to have a webserver! Here's how to do it: | |
On your webserver you need to set up a php script that will accept the RSA public key, encrypt the key and send it. This could for example use phpSecLib: | |
<?php | |
error_reporting(E_ERROR | E_WARNING | E_PARSE); | |
set_include_path(get_include_path() . PATH_SEPARATOR . 'phpseclib'); |
Required functions: --Please keep everything in these functions, you need all, otherwise the program wont work | |
init() --Runs once on lua load | |
tick(time) --Runs every 100 ms, waits for last call. parameters: time = seconds since epoch | |
Global Methods: | |
loadEncrypted(string encryptedLua) --Run a string of encrypted Lua (You get the string crypted using the encrypter linked above) | |
getHWID() --Get a unique HWID for the computer | |
getWindow(string windowName) --Get the window instance of the window with the given name | |
getWindowByHandle(IntPtr handle) --Get a window based on the handle | |
getWindowWait(string windowName, int timeout) --Same as getWindow, except it keep on trying until timeout, returns when window is gotten or timeout is up (in seconds) |
function init() | |
print("Lol spam (I guess)") | |
window = getWindow("PVP.net Client") | |
waitTime = tonumber(Console:ReadLine("Time between messages")) | |
spamString = Console:ReadLine("String to send") | |
threadLock = false | |
lastRunTime = os.time() | |
end |
local OBJDEF = { varsion = 1.0 } | |
local JSON = (loadfile "JSON")() | |
local function exploreTable(table, resultTable) | |
local varCount = 0 | |
if resultTable == nil then | |
resultTable = {} | |
end | |
for k,v in pairs(table) do |