I hereby claim:
- I am SaphireLattice on github.
- I am saphire (https://keybase.io/saphire) on keybase.
- I have a public key whose fingerprint is E367 DE5F 5560 78E2 29D5 B5F2 58E8 3E36 BFDC EE93
To claim this, I am signing this object:
@-moz-document domain("forums.spacebattles.com"), domain("forums.sufficientvelocity.com"), domain("forum.questionablequesting.com"), url-prefix("https://xenforo.com/community/") { | |
span[style*="Transparent"], span[style*="transparent"], span[style*="TRANSPARENT"] { | |
text-shadow: 0px 1px 1px #4b2972, 0px -1px 1px #4b2972 !important; | |
color: rgba(114, 26, 214, 100) !important; | |
} | |
} | |
@-moz-document url-prefix("https://xenforo.com/community/"), domain("forums.spacebattles.com"), domain("forums.sufficientvelocity.com"), domain("forum.questionablequesting.com") { | |
span[style*="Transparent"], span[style*="transparent"], span[style*="TRANSPARENT"] { | |
color: white; |
mem = {[1] = "0 5 10 0 11 14 13 4 11 8 8 7 1 4 12 11"} | |
--mem = {[0] = "0 2 7 0"} | |
function split(str) | |
local ret = {} | |
local i = 1 | |
for text in string.gmatch(str, "%S+") do | |
ret[i] = tonumber(text) | |
i = i + 1 | |
end |
import xml.etree.ElementTree as ET | |
import os.path as path | |
import os | |
import sys | |
tree = ET.parse(sys.argv[1]) | |
root = tree.getroot() | |
def tryfind(src, what): | |
ls = os.listdir(src) |
I hereby claim:
To claim this, I am signing this object:
const printOutput = true; | |
// 0123456789AB C D | |
console.log((()=>"console.log("+(alph="(),$=>[|]+-0\\\"",src=` | |
( | |
(index,temp,names,alphabet,source) => | |
names | |
[names[++index]] | |
[names[++index]] | |
(source, |
[[ -o login ]] && source ~/.zshenv || touch ~/.zshenv # /etc/profile can override zshenv PATH | |
### ESSENTIALS ### | |
export TZ=Etc/GMT-6 | |
export LANG="en_GB.UTF-8" | |
export LANGUAGE="en_GB.UTF-8" | |
# XDG home config cleanup {{{ |
const code128b = [ | |
{ char: " ", pattern: "11011001100" }, | |
{ char: "!", pattern: "11001101100" }, | |
{ char: '"', pattern: "11001100110" }, | |
{ char: "#", pattern: "10010011000" }, | |
{ char: "$", pattern: "10010001100" }, | |
{ char: "%", pattern: "10001001100" }, | |
{ char: "&", pattern: "10011001000" }, | |
{ char: "'", pattern: "10011000100" }, | |
{ char: "(", pattern: "10001100100" }, |
*://animalcrossing.fandom.com/de/* | |
*://ark.fandom.com/de/* | |
*://detektivconan.fandom.com/* | |
*://minecraft.fandom.com/de/* | |
*://pokemon.fandom.com/de/* | |
*://starcitizen.fandom.com/de/* | |
*://terraria.fandom.com/de/* | |
*://tombraider.fandom.com/de/* | |
*://2xko.fandom.com/* | |
*://acecombat.fandom.com/* |
Just assorted collection of useful uBlacklist filter snippets to throw into your subscriptions or main list
For context: uBlacklist is a browser extension that allows you to block sites from appearing in search based on the URL matching a regular expression pattern.
dll-spam.txt
- Filter out sites that just SEO spam for any query related to DLLs, offering