I hereby claim:
- I am alyssadev on github.
- I am alyssile (https://keybase.io/alyssile) on keybase.
- I have a public key whose fingerprint is 4304 1865 9397 3CC0 FBF0 A109 F4D2 C7A4 26DD A1BD
To claim this, I am signing this object:
#!/bin/bash | |
# mkdist.sh | |
apt update; apt install -y jq libfuse2 wget file | |
wget https://github.com/AppImage/AppImageKit/releases/download/continuous/appimagetool-x86_64.AppImage | |
chmod +x *.AppImage | |
mkdir discord | |
cd discord | |
wget https://discord.com/api/download\?platform\=linux\&format\=tar.gz | |
mv * discord.tar.gz | |
tar -xf discord.tar.gz |
I hereby claim:
To claim this, I am signing this object:
#!/usr/bin/env python3 | |
# usage: fedipost.py jsonfeed_url webhook_url [filter_text] | |
# e.g: fedipost.py https://blahaj.zone/@alypet.json webhook #alyblog | |
from markdownify import markdownify | |
from requests import get,post | |
import os, sys | |
WH = sys.argv[2] | |
try: |
/** @param {NS} ns */ | |
// script to be run after each augment to recover hack level and money | |
// 1. run scan.js, backdoor n00dles and foodnstuff using the links provided | |
// 2. run this script, starts hacking those servers | |
// 3. once you have 200k, go to aevum, then run alain/casino.js | |
// 3a. go to tech store, buy darkweb, connect darkweb, buy -a | |
// 4. run scan.js, nuke and backdoor all available servers | |
// 5. run purchase.js, update with higher ram allowance (32>2048) if you have enough money | |
// * run delete-pserv.js if there's an issue with buying the servers | |
// 6. run init.js, this will boot up stockmaster and stats, as well as starting the hack scripts running across all pservs and home |
#!/bin/bash -x | |
# curl s.aly.pet/ssh-setup | GIT_HOSTNAME=dotfiles.example.com GIT_USERNAME=you GIT_PASSWORD=password bash -x | |
if [ -z $GIT_HOSTNAME ]; then | |
echo -n "Git hostname: " | |
read -s GIT_HOSTNAME | |
fi | |
if [ -z $GIT_USERNAME ]; then | |
echo -n "Git username: " | |
read -s GIT_USERNAME | |
fi |
# authelia/config/configuration.yml | |
# run `openssl rand -hex 20` three times and update `jwt_secret`, `session.secret` and `storage.encryption_key` | |
server: | |
host: 0.0.0.0 | |
port: 9091 | |
log: | |
level: info | |
jwt_secret: TODO | |
default_redirection_url: https://auth.example.com | |
totp: |
#!/usr/bin/env python3 | |
import requests | |
from datetime import datetime, timedelta | |
with open(".bottoken") as f: | |
token = f.read().strip() | |
t = '\u2705' | |
f = '\u274c' | |
class Channel: |
with open("aoc1.txt") as f: | |
data = f.read().strip() | |
elves = [list(map(int,_.split("\n"))) for _ in data.split("\n\n")] | |
ans1 = max(sum(_) for _ in elves) | |
ans2 = sum(sorted(sum(_) for _ in elves)[-3:]) | |
print(ans1,ans2) |
#!/usr/bin/env python3 | |
from requests import get, post | |
from subprocess import Popen | |
from os import remove | |
from datetime import datetime | |
class Category: | |
HIGHLIGHTS = 71361 | |
CONDENSED = 71377 | |
FULL = 71385 |
#!/usr/bin/env python3 | |
import requests | |
from sys import stderr, stdout, argv | |
from os import environ | |
from os.path import basename | |
host = environ.get("PLEX_HOST", "localhost") | |
token = environ.get("PLEX_TOKEN", "") | |
args = argv[1:] |