Skip to content

Instantly share code, notes, and snippets.

@ayancey
ayancey / hitboards_request_for_comment.md
Created January 8, 2024 01:37
HitBoards Proposal & Request for Comment

Test.

'''''''''''''''''''''''''''''
' Purpose: Allows you to easily get the RAM configuration of a computer. LAN Sweeper won't tell you the RAM type, but this utility will. This should be useful for RAM upgrades.
' Requirements: Probably admin in Active Directory
' Written by: Alex Yancey
' Date: September 15, 2016
'''''''''''''''''''''''''''''
' More info about SMBIOS can be found in the SMBIOS specification: https://www.dmtf.org/standards/smbios, and from this article: http://www.codeguru.com/cpp/misc/misc/system/article.php/c12347/SMBIOS-Demystified.htm
computer_name = InputBox("Computer name: ", "RAM Identifier")
^b:: ; CTRL+B hotkey
MouseMove, 85, 851
Click
Send, mid{enter}
MouseMove, 952, 131
Click
Send, Lux
@ayancey
ayancey / ram_type.py
Last active November 12, 2021 13:58
Gets the type of RAM in Windows, with raw SMBIOS data. Works even if Win32_PhysicalMemory.MemoryType is Unknown.
import wmi
import struct
# RAM memory types described in 7.18.2 in SMBIOS Specification
MEMORY_TYPES = {1: 'Other', 2: 'Unknown', 3: 'DRAM', 4: 'EDRAM', 5: 'VRAM', 6: 'SRAM', 7: 'RAM', 8: 'ROM', 9: 'FLASH', 10: 'EEPROM', 11: 'FEPROM', 12: 'EPROM', 13: 'CDRAM', 14: '3DRAM', 15: 'SDRAM', 16: 'SGRAM', 17: 'RDRAM', 18: 'DDR', 19: 'DDR2', 20: 'DDR2 FB-DIMM', 21: 'Reserved', 22: 'Reserved', 23: 'Reserved', 24: 'DDR3', 25: 'FBD2'}
def Get_SMBIOS(w):
SMBIOSTableData = ""
for i in w.query("SELECT * FROM MSSmBios_RawSMBiosTables")[0].SMBiosData:
#include <ESP8266WiFi.h>
#include <stdlib.h>
const char* ssid = "MAAQ";
const char* password = "";
WiFiServer server(80);
void setup() {
pinMode(LED_BUILTIN, OUTPUT);
import ui
import appex
import requests
import json
if appex.is_running_extension():
url = appex.get_url()
else:
url = 'https://dynasty-scans.com/chapters/together_with_hecaa_chan_2'
import records
db = records.Database('mysql://root:a6478a14@172.16.144.157/bank')
# Create User table
db.query("""CREATE TABLE `user` (
`id` INT NOT NULL AUTO_INCREMENT,
`first_name` VARCHAR(100) NOT NULL,
`middle_name` VARCHAR(100) NOT NULL,
import records
db = records.Database('mysql://root:a6478a14@172.16.144.157/bank')
print('Welcome to the Softbank registration system!')
print('Please tell us the following information...')
first_name = raw_input('First name: ')
middle_name = raw_input('Middle name: ')
last_name = raw_input('Last name: ')
username = first_name.lower()[0] + last_name.lower()
import records
import datetime
db = records.Database('mysql://root:a6478a14@172.16.144.157/bank')
print('Welcome to Softbank. Please enter your username and password...')
username = raw_input('Username: ')
password = raw_input('Password: ')
# This SQL library does not immediately run the query and store the results until we tell it to.
'''''''''''''''''''''''''''''
' Purpose: Allows us to remotely map drives without psexec or knowing the user's password
' Requirements: Windows 7 (may support older OSes), Administrator (maybe)
' Written by: Alex Yancey
' Date: December 20, 2016
'''''''''''''''''''''''''''''
Set objFSO = CreateObject("Scripting.FileSystemObject")
Set objFile = objFSO.CreateTextFile("remotemap.bat")