Skip to content

Instantly share code, notes, and snippets.

Phil Banks emirpprime

Block or report user

Report or block emirpprime

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
internationils /
Last active Feb 20, 2017
Create and apply Letsencrypt certificates to Gandi vhosts using certbot
# ---------------------------------------------------------------------
# ---------------------------------------------------------------------
# v04 - 2016-08-10 combibe create and update loop
# v03 - 2016-08-10 more cleanups
# v02 - 2016-08-04 lots of cleanups, improved loop for updates
# v01 - basic functionality
justinkelly / .htaccess
Created Jan 5, 2012
Exclude file/directories/urls from Apache .htaccess password protected site
View .htaccess
AuthType Basic
AuthName "Auth Required"
AuthUserFile /path/to/.htpasswd
Require valid-user
# allow public access to the following resources
SetEnvIf Request_URI "(path/to/directory/)$" allow
SetEnvIf Request_URI "(path/to/file\.phpt)$" allow
SetEnvIf Request_URI "(util)$" allow
Order allow,deny
Allow from env=allow
View last-tab.js
(function () {
'use strict';
$('a[data-toggle="tab"]').on('', function (e) {
var id = $(this).parents('[role="tablist"]').attr('id');
var key = 'lastTag';
if (id) {
key += ':' + id;
# Installation script for a Wordpress 3.0 website on Ubuntu 10.04
# Josh Kersey
# Created: May 15, 2012
# Last Update: June 13, 2012
# get setup parameters
echo "apache vhost name (one word):"
maban / Maban Website
Last active Jul 8, 2019 — forked from malarkey/Contract Killer
My boilerplate contract
View Maban Website

Website Contract [month] [year]

Description of this Contract

This contract is not meant to trick or deceive you; the intention is purely to protect both parties. I have tried to keep the wording as plain as possible, but if anything is unclear, please let me know and I will be more than happy to clarify it with you. Also, until you sign it, please feel free to request to change bits of it to suit your requirements.

In short, [client name] is contracting me, [my name], to [description of my role] between [start date and finish date].

By signing this, you are confirming that you have the power and ability to enter into this contract on behalf of [client's company].

sfrdmn / image_downloader.js
Last active Jul 16, 2019
Bookmarklet to download all images on a page
View image_downloader.js
;(function() {
var images = []'img'))
try {
images.forEach(function(img) {
} catch (e) {
alert("Download failed.");
console.log('Download failed.', e);
ocean90 / fbcbfwss.php
Last active Aug 1, 2019
WordPress Plugin: Filename-based cache busting for scripts/styles.
View fbcbfwss.php
* Plugin Name: Filename-based cache busting
* Version: 0.3
* Description: Filename-based cache busting for WordPress scripts/styles.
* Author: Dominik Schilling
* Author URI:
* Plugin URI:
* License: GPLv2 or later
biinari / extract-123-reg-zonefile.js
Last active Nov 5, 2019
Script to extract the DNS entries from 123-reg advanced dns page
View extract-123-reg-zonefile.js
// Moved to a new home at
BronsonQuick / populate_gravity_forms_pre_submission.php
Created May 30, 2012
Populate a hidden field in Gravity Forms before submission
View populate_gravity_forms_pre_submission.php
/* gform_pre_submission will do all forms. gform_pre_submission_1 will do a form with an ID of 1
* Keep an eye on the priority of the filter. In this case I used 9 because the Salesforce plugin we used ran a presubmission filter at 10 so we needed this to happen before it
add_filter( "gform_pre_submission_1", "add_salesforce_campaign_id_footer", 9 );
function add_salesforce_campaign_id_footer( $form ){
foreach($form["fields"] as &$field)
if($field["id"] == 2){
/* Set the variable you want here - in some cases you might need a switch based on the page ID.
* $page_id = get_the_ID();
Tenzer /
Last active Nov 29, 2019
LastPass Pwned Passwords checker

LastPass Pwned Passwords checker

This is a script for checking if any of the passwords you have stored in LastPass have been exposed through previous data breaches.

To use the script you need to have Python 3 installed and you need a CSV export of your LastPass vault. The export can be generated from the LastPass CLI with:

lpass export > lastpass.csv

or can be extracted with the browser plugin by going to the LastPass icon → More Options → Advanced → Export → LastPass CSV File (note that I did have problems getting this to work).

You can’t perform that action at this time.