I hereby claim:
- I am ariscop on github.
- I am ariscop (https://keybase.io/ariscop) on keybase.
- I have a public key whose fingerprint is BDC0 7E53 3055 BFCF 57EC 2914 F812 A837 9BC0 EE2F
To claim this, I am signing this object:
#!/usr/bin/env python3 | |
import sys | |
import lzma | |
import crcmod | |
from struct import unpack, iter_unpack | |
from collections import namedtuple | |
from functools import partial | |
from tabulate import tabulate | |
crc32 = crcmod.predefined.mkPredefinedCrcFun('crc-32') |
#!/usr/bin/env python3 | |
import sys | |
from hashlib import md5 | |
from re import split | |
with open(sys.argv[1], "rb") as f: | |
data = b"".join(x for x in split(b"[\r\n]+", f.read()) if not x.startswith(b"#")) | |
m = md5() |
def _bits(byte): | |
return [(byte >> 0) & 1, | |
(byte >> 1) & 1, | |
(byte >> 2) & 1, | |
(byte >> 3) & 1, | |
(byte >> 4) & 1, | |
(byte >> 5) & 1, | |
(byte >> 6) & 1, | |
(byte >> 7) & 1] |
#!/usr/bin/env python3 | |
import sys, struct | |
fd = open(sys.argv[1], "rb") | |
while(True): | |
byte = fd.read(1) | |
if byte != b'-': | |
break |
#!/usr/bin/python3 | |
import sys | |
import os | |
import mmap | |
from binascii import hexlify | |
from io import BytesIO | |
from struct import calcsize, unpack, unpack_from, iter_unpack | |
from collections import namedtuple, OrderedDict | |
from pprint import pprint |
0x81f Record 0xfafa 0x191 0x17f 0x0 0x0 b'\xff\xff*' ffffffff 00000000 ffffffff 00000000 00000000 00000000 60000000 12180000 00000000 00000000 8100ee07 00000000 03000000 2206dc07 000c0001 20020204 0100ff00 00000000 12180000 01000000 30090000 00000000 00000000 0600fb01 ff000000 28000000 00000000 80030000 00000000 00000000 00000000 00000000 | |
0x11b0 Record 0xfafa 0x191 0x17f 0x0 0x0 b'misc.dat ' ffffffff 00000000 ffffffff 00200000 0200da0c 4d000000 43000000 00000000 00000000 00000000 81000000 10030000 83000000 00000000 00000100 00020204 00000000 00000000 00000000 02000000 c1120000 00000000 00000000 02000000 ff000000 2f000000 00000000 cf000000 00000000 00000000 00000000 00000000 | |
0x201f Record 0xfafa 0x291 0x27f 0x0 0x0 b'misc.idx ' ffffffff 00000000 ffffffff 00280000 00000000 00000000 43000000 12800800 00000000 00000000 8100ee07 00000000 83000000 d407dc07 00000000 20020204 01000400 02000000 12800800 03000000 30210000 00000000 00000000 0200fb01 ff000000 28000000 00000000 ce000000 00000000 00000000 00000000 00 |
I hereby claim:
To claim this, I am signing this object:
prevframes = 0 | |
recording = false | |
while 1 do | |
minutes = memory.readbyte(0x3000139) | |
seconds = memory.readbyte(0x300013A) | |
frames = memory.readbyte(0x300013B) | |
if prevframes ~= frames then | |
avi.resume() | |
if recording == true then |
/* Detect if we're launched outside of cmd by checking for other processes on our console */ | |
BOOL isTerminal(void) { | |
DWORD pid; | |
return GetConsoleProcessList(&pid, 1) != 1; | |
} |
<?php | |
$url = 'http://api.blocklist.de/getlast.php?time='; | |
$cachefile = '/tmp/blocklist.de.cache'; | |
$cachetime = 0 + @filemtime($cachefile); | |
$url = $url . $cachetime; | |
$result = file_get_contents($url); | |
if (is_string($result)) { | |
file_put_contents($cachefile, $result, FILE_APPEND); | |
$arr = explode("\n", $result); |