I hereby claim:
- I am SaphireLattice on github.
- I am saphire (https://keybase.io/saphire) on keybase.
- I have a public key whose fingerprint is E367 DE5F 5560 78E2 29D5 B5F2 58E8 3E36 BFDC EE93
To claim this, I am signing this object:
| @-moz-document domain("forums.spacebattles.com"), domain("forums.sufficientvelocity.com"), domain("forum.questionablequesting.com"), url-prefix("https://xenforo.com/community/") { | |
| span[style*="Transparent"], span[style*="transparent"], span[style*="TRANSPARENT"] { | |
| text-shadow: 0px 1px 1px #4b2972, 0px -1px 1px #4b2972 !important; | |
| color: rgba(114, 26, 214, 100) !important; | |
| } | |
| } | |
| @-moz-document url-prefix("https://xenforo.com/community/"), domain("forums.spacebattles.com"), domain("forums.sufficientvelocity.com"), domain("forum.questionablequesting.com") { | |
| span[style*="Transparent"], span[style*="transparent"], span[style*="TRANSPARENT"] { | |
| color: white; |
| mem = {[1] = "0 5 10 0 11 14 13 4 11 8 8 7 1 4 12 11"} | |
| --mem = {[0] = "0 2 7 0"} | |
| function split(str) | |
| local ret = {} | |
| local i = 1 | |
| for text in string.gmatch(str, "%S+") do | |
| ret[i] = tonumber(text) | |
| i = i + 1 | |
| end |
| import xml.etree.ElementTree as ET | |
| import os.path as path | |
| import os | |
| import sys | |
| tree = ET.parse(sys.argv[1]) | |
| root = tree.getroot() | |
| def tryfind(src, what): | |
| ls = os.listdir(src) |
I hereby claim:
To claim this, I am signing this object:
| const printOutput = true; | |
| // 0123456789AB C D | |
| console.log((()=>"console.log("+(alph="(),$=>[|]+-0\\\"",src=` | |
| ( | |
| (index,temp,names,alphabet,source) => | |
| names | |
| [names[++index]] | |
| [names[++index]] | |
| (source, |
| [[ -o login ]] && source ~/.zshenv || touch ~/.zshenv # /etc/profile can override zshenv PATH | |
| ### ESSENTIALS ### | |
| export TZ=Etc/GMT-6 | |
| export LANG="en_GB.UTF-8" | |
| export LANGUAGE="en_GB.UTF-8" | |
| # XDG home config cleanup {{{ |
| const code128b = [ | |
| { char: " ", pattern: "11011001100" }, | |
| { char: "!", pattern: "11001101100" }, | |
| { char: '"', pattern: "11001100110" }, | |
| { char: "#", pattern: "10010011000" }, | |
| { char: "$", pattern: "10010001100" }, | |
| { char: "%", pattern: "10001001100" }, | |
| { char: "&", pattern: "10011001000" }, | |
| { char: "'", pattern: "10011000100" }, | |
| { char: "(", pattern: "10001100100" }, |
| *://animalcrossing.fandom.com/de/* | |
| *://ark.fandom.com/de/* | |
| *://detektivconan.fandom.com/* | |
| *://minecraft.fandom.com/de/* | |
| *://pokemon.fandom.com/de/* | |
| *://starcitizen.fandom.com/de/* | |
| *://terraria.fandom.com/de/* | |
| *://tombraider.fandom.com/de/* | |
| *://2xko.fandom.com/* | |
| *://acecombat.fandom.com/* |
Just assorted collection of useful uBlacklist filter snippets to throw into your subscriptions or main list
For context: uBlacklist is a browser extension that allows you to block sites from appearing in search based on the URL matching a regular expression pattern.
dll-spam.txt - Filter out sites that just SEO spam for any query related to DLLs, offering