Skip to content

Instantly share code, notes, and snippets.

View KateLibC's full-sized avatar

Cariad Keigher KateLibC

View GitHub Profile
@KateLibC
KateLibC / skytrainwceworststation.json
Created August 11, 2021 15:59
Worst SkyTrain/West Coast Express station Tournament Data
{
"requested_plotter": "SingleEliminationBracketPlotter",
"tournament": {
"id": 9957064,
"state": "awaiting_review",
"tournament_type": "single elimination",
"quick_advance": false,
"hide_seeds": false,
"hide_identifiers": false,
"show_station_and_time": false,
from BeautifulSoup import BeautifulSoup
import requests
from slacker import Slacker
slack = Slacker('api key from slack goes here')
target = 'https://nameofslack.slack.com'
targetLogin = 'slackloginemail'
targetPassword = 'password'
def manualLogin(username, password, target):
@KateLibC
KateLibC / keybase.md
Created January 12, 2015 06:56
keybase.md

Keybase proof

I hereby claim:

  • I am colinkeigher on github.
  • I am colinkeigher (https://keybase.io/colinkeigher) on keybase.
  • I have a public key whose fingerprint is 9D5E 9586 C9F3 5E4C 5BE4 F72A 284E 52DA 227C 8712

To claim this, I am signing this object:

@KateLibC
KateLibC / gist:f041d529453d73dabe94
Created January 7, 2015 15:14
VirusTotal MD5 results for %windir%
MD5: ad61f7afe913b2642650504df283aa63
Path(s):
./winsxs/wow64_microsoft-windows-dns-client_31bf3856ad364e35_6.1.7601.17514_none_4a5d2c9ecd59afa7/dnscacheugc.exe
Detection details:
AegisLab - W32.Expiro
MD5: fcf5c8bb9afd8d15b324b702f9b186b7
Path(s):
./System32/ieetwcollector.exe
./winsxs/amd64_microsoft-windows-ie-ieetwcollector_31bf3856ad364e35_11.2.9600.17239_none_a584352617c3f1bb/ieetwcollector.exe
### Keybase proof
I hereby claim:
* I am ColinKeigher on github.
* I am ColinKeigher (https://keybase.io/ColinKeigher) on keybase.
* I have a public key whose fingerprint is 3CDA 3561 ECD8 4E53 CFBF 0FB3 C109 19FB 449D D124
To claim this, I am signing this object: