I hereby claim:
- I am evildaemond on github.
- I am evildaemond (https://keybase.io/evildaemond) on keybase.
- I have a public key whose fingerprint is 4B06 1621 6181 FAC6 834B 8C69 BA64 7EB6 AAC1 6807
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
#/bin/bash | |
# This application requries AWS-CLI enabled and configured including your Location, and sox to allow the play command. (This could be substitued with another application if you wish to keep this as minimal as possible) | |
# We have selected "Justin" for the voice, but you can use any of the selection by AWS Polly, which are as follows; "Ivy","Joanna","Joey","Justin","Kendra","Kimberly","Matthew","Salli","Russell","Nicole","Amy","Brian","Emma","Geraint". | |
voiceid=Justin | |
# This variable is used to obtain the catfacts in a .json format, which then we pipe into jq, and finally into tr to clean the output up. | |
tts=$(curl -X GET --header 'Accept: application/json' 'https://catfact.ninja/fact' | jq '.fact' | tr -d '"') |
#!/bin/bash | |
while : | |
do | |
clear | |
curl -s 'https://cyberchallenge.com.au/2018/scoreboard/standings.json' | jq '.standings[0,1,2,3,4,5,6,7,8,9] | "\(.name) \(.points)"' | |
sleep 2m | |
done |
Link: Infernal.Buisness by Hack For Satan
#!/usr/bin/env python3 | |
# makekey.py - A key making tool | |
# This program will accept a pin configuration for a Lockwood 6 Pin lock and produce GCode to mill out the corresponding key. | |
# | |
# For example, this will produce a bump key: | |
# $ ./makekey.py 999999 | |
# | |
# This could produce a key to something else: | |
# $ ./makekey.py 123456 | |
# |