Navigation Menu

Skip to content

Instantly share code, notes, and snippets.

View JLChnToZ's full-sized avatar
🥽
From game to XR experience

Jeremy Lam aka. Vistanz JLChnToZ

🥽
From game to XR experience
View GitHub Profile
@JLChnToZ
JLChnToZ / SelectionExtension.cs
Last active January 4, 2022 07:47
A tool for temporary holds selections in Unity
using System.Linq;
using System.Collections.Generic;
using UnityEngine;
using UnityEditor;
using UnityObject = UnityEngine.Object;
public class SelectionExtension: EditorWindow {
[MenuItem("Window/Selection Ex")]
@JLChnToZ
JLChnToZ / UdonAssemblyBuilder.cs
Last active July 30, 2023 19:49
Udon Assembly Low Level Builder for VRChat, helper for generating Udon Assembly programmatically.
using System;
using System.Text;
using System.Text.RegularExpressions;
using System.Collections.Generic;
using System.Reflection;
using UnityEngine;
using VRC.Udon;
using VRC.Udon.Common;
using VRC.Udon.Common.Interfaces;
using VRC.Udon.Graph;
@JLChnToZ
JLChnToZ / JLChnToZ.VRC.CheatDetector.cs
Last active December 15, 2021 19:22
Cheat detector for platform-like games in VRChat.
using System;
using UdonSharp;
using UnityEngine;
using VRC.SDKBase;
using VRC.Udon;
namespace JLChnToZ.VRC {
[UdonBehaviourSyncMode(BehaviourSyncMode.NoVariableSync)]
public class CheatDetector : UdonSharpBehaviour {
[Tooltip("Detects open menu stucking cheat.")]
@JLChnToZ
JLChnToZ / UdonBehaviourInspectorDrawer.cs
Last active September 20, 2021 11:49
Unity Inspector Extension to display/manipulate UdonBehaviours internal state within editor.
using System;
using System.Linq;
using System.Collections.Generic;
using System.Reflection;
using UnityEngine;
using UnityEditor;
using VRC.Udon;
using VRC.Udon.Common.Interfaces;
namespace UInspectorPlus.Udon {
@JLChnToZ
JLChnToZ / FixSceneReference.cs
Last active August 10, 2021 12:11
Editor helper for finding (and try to fix) missing Udon references when updating 2018 project to 2019
using UnityEngine;
using UnityEditor;
using UnityEditor.Experimental.SceneManagement;
using System.Collections.Generic;
using VRC.SDKBase;
using VRC.Udon;
using UnityObject = UnityEngine.Object;
public class FixSceneReference : EditorWindow {
@JLChnToZ
JLChnToZ / MazeGen.cs
Last active August 7, 2021 05:57
Network synchronized random maze generator for VRChat. Powered by UdonSharp.
using System;
using UnityEngine;
using VRC.SDKBase;
using VRC.Udon;
using UdonSharp;
namespace JLChnToZ.VRC.Maze {
[RequireComponent(typeof(MeshFilter)), UdonBehaviourSyncMode(BehaviourSyncMode.Manual)]
public class MazeGen : UdonSharpBehaviour {
// Constants
@JLChnToZ
JLChnToZ / rabbit_virus.yaml
Created December 24, 2020 13:03
Killer Bunny Virus Datapack for Minecraft Java Edition
# This data file extends behaviours of killer bunnies to act like a virus in Minecraft Java Edition.
# To convert this file into datapack and usable in saves, use https://www.npmjs.com/package/mcds-convert
# Killer bunnies are hostile, they have white fur and with red bloody eyes.
# First killer bunny will randomly appears at night and/or thunderstorm weather.
# Invisibility potion/effect is also the cause of killer bunnies.
# Killer bunnies will randomly infects nearby normal rabbits.
# Killer bunnies will randomly breed themselves, even there is only one.
# Killer bunnies can be cured with night vision potion.
pack:
pack_format: 7 # Change to 6 for running in 1.16.2+, and 5 for in 1.15+

How to play ASCII-Art Star Wars offline

Following will teach you how to play the "easter-egg" (which actually isn't, but many people describe this as an easter egg) of ASCII-Art Star Wars (or Star Wars in terminal/telnet, whatever), the one you normally starts like this:

$ telnet towel.blinkenlights.nl
  1. Before you start, ensure Node.js is installed.
  2. Navigate to www.asciimation.co.nz, the original home of that ASCII-Art Star Wars.
  3. Press F12 to open developer tools.
@JLChnToZ
JLChnToZ / bsod.ps1
Last active December 7, 2019 09:47
Simple PowerShell script that gives you BSOD
$winId = [System.Security.Principal.WindowsIdentity]::GetCurrent()
$winPrincipal = New-Object System.Security.Principal.WindowsPrincipal($winId)
$adminRole = [System.Security.Principal.WindowsBuiltInRole]::Administrator
If (-Not $winPrincipal.IsInRole($adminRole)) {
$cmdArgs = '-File', $MyInvocation.MyCommand.Path, '-ExecutionPolicy', 'Bypass'
Start-Process 'PowerShell' $cmdArgs -Verb RunAs
Exit
}
$memberDef = @'
[DllImport("ntdll.dll", SetLastError = true)]
var c=String.fromCharCode,s='var c=String.fromCharCode,s=#%#;console.log(s.replace(new RegExp(c(35),c(103)),c(39)).replace(c(37),s))';console.log(s.replace(new RegExp(c(35),c(103)),c(39)).replace(c(37),s))