Skip to content

Instantly share code, notes, and snippets.

View adammw's full-sized avatar
👨‍💻
Hacking on Kubernetes Platform @ Zendesk

Adam Malcontenti-Wilson adammw

👨‍💻
Hacking on Kubernetes Platform @ Zendesk
View GitHub Profile
import coppelia.CharWA;
import coppelia.FloatWA;
import coppelia.IntW;
import coppelia.remoteApi;
public class SensorTest
{
public static void main(String[] args)
{
// Establish VREP Connection
DGND3700 Boot Code V1.0.8
CFE version 1.0.37-104.4 for BCM96368 (32bit,SP,BE)
Build Date: Mon Feb 21 17:59:46 CST 2011 (finerain@moonlight)
Copyright (C) 2000-2009 Broadcom Corporation.
Parallel flash device: name AM29LV320MT, id 0x2201 size 32768KB
Total Flash size: 32768K with 256 sectors
ethsw: found bcm53115!
Chip ID: BCM6368B2, MIPS: 400MHz
Main Thread: TP0
#!/bin/sh
if [ "`basename "$0"`" = "google-chrome-canary" ] || [ "$1" = "--canary" ]; then
exec "/Applications/Google Chrome Canary.app/Contents/MacOS/Google Chrome Canary" --no-first-run "$@"
elif [ "`basename "$0"`" = "google-chrome" ]; then
exec "/Applications/Google Chrome.app/Contents/MacOS/Google Chrome" --no-first-run "$@"
fi
#!/usr/bin/env node
// snitunnel.js
// Listens on port 443 and forwards the connection over a HTTP proxy
// Using the SNI extension of the TLS handshake to work out the server name
var net = require('net');
var http = require('http');
var debug = require('debug')('snitunnel');
const TUNNEL_HOST = 'my.tunnel.host';
const TUNNEL_PORT = 8080;
#!/usr/bin/env node
var fs = require('fs');
var net = require('net');
var tls = require('tls');
var secureContext = tls.createSecureContext({
cert: fs.readFileSync('test_cert.pem'),
key: fs.readFileSync('test_key.pem')
})
// https://app.sm-app.co/static/js/player.js
// this script is injected into the netflix player page
// minified versions of jQuery and arrive.js removed, the ipc object communicates with scripts on https://app.sm-app.co/
var html_element;
console.log("Injected player.js is now running...");
html_element = document.getElementsByTagName("html")[0];
/mac/i.test(navigator.platform) ? html_element.setAttribute("class", "mac") : /win/i.test(navigator.platform) && html_element.setAttribute("class", "win");
$(function() {
return $(document).on("click", ".player-exit-playback, .player-back-to-browsing", function(a) {
return a.preventDefault(), ipc.sendToHost("close")
AllCops:
# Include gemspec and Rakefile
Includes:
- '**/*.gemspec'
- '**/Rakefile'
Excludes:
- 'vendor/**'
ClassLength:
Enabled: false
require = function a(b, c, d) {
function e(g, h) {
if (!c[g]) {
if (!b[g]) {
var i = "function" == typeof require && require;
if (!h && i) return i(g, !0);
if (f) return f(g, !0);
var j = new Error("Cannot find module '" + g + "'");
throw j.code = "MODULE_NOT_FOUND", j
}
// Downloads unwatermarked invidiual pages of books from EBSCOhost
var data = /\/ebook\/(.+?)\?sid=(.+?)&/.exec(location.href);
$.getJSON(`/ehost/ebookViewer/DigitalObject/${data[1]}?sid=${data[2]}&vid=0&theFormat=EB`).then(function(json) {
var pages = json.pageData.map(function(page) {
return {
filename: `${json.title.replace(/\s/,'_')}_${page.id}`,
url: `${location.origin}/ehost/ebookviewer/artifact/${data[1]}/EB/${data[2]}/0/${page.artifactId}`
};
});
[
{
"featureType": "poi",
"stylers": [
{ "visibility": "off" }
]
},{
"featureType": "landscape",
"elementType": "geometry.fill",
"stylers": [