Skip to content

Instantly share code, notes, and snippets.

View mingwiki's full-sized avatar
🌈
不学习往死里打

mingwiki

🌈
不学习往死里打
View GitHub Profile
@mingwiki
mingwiki / CapsLockCtrlEscape.ahk
Created May 14, 2025 02:32 — forked from sedm0784/CapsLockCtrlEscape.ahk
AutoHotkey script to map Caps Lock to Escape when it's pressed on its own and Ctrl when used in combination with another key, à la Steve Losh. Adapted from one that does something similar with the Ctrl Key on the Vim Tips Wiki (http://vim.wikia.com/wiki/Map_caps_lock_to_escape_in_Windows?oldid=32281). (Plus contribs from @randy909 & @mmikeww.)
g_LastCtrlKeyDownTime := 0
g_AbortSendEsc := false
g_ControlRepeatDetected := false
*CapsLock::
if (g_ControlRepeatDetected)
{
return
}
@mingwiki
mingwiki / ZeroOmega.json
Last active September 2, 2025 10:39
ZeroOmega Sync
{
"+__ruleListOf_auto switch": {
"name": "__ruleListOf_auto switch",
"defaultProfileName": "direct",
"profileType": "RuleListProfile",
"color": "#99dd99",
"format": "AutoProxy",
"matchProfileName": "proxy",
"revision": "198e6e604a0",
"sourceUrl": "https://hub.zed.ink:8443/api/domain/b64"
@mingwiki
mingwiki / .ssh config
Last active October 9, 2022 13:31
windows ssh config
Host 10.10.10.10
HostName 10.10.10.10
User root
ForwardAgent yes
Port 33
Host naizi.fun
HostName naizi.fun
User root
ForwardAgent yes
@mingwiki
mingwiki / flypy.reg
Created October 7, 2022 15:02
windows 小鹤双拼
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\Microsoft\InputMethod\Settings\CHS]
"Enable Cloud Candidate"=dword:00000000
"Enable Dynamic Candidate Ranking"=dword:00000001
"EnableExtraDomainType"=dword:00000001
"Enable self-learning"=dword:00000001
"EnableSmartSelfLearning"=dword:00000001
"EnableLiveSticker"=dword:00000000
"Enable EUDP"=dword:00000001
@mingwiki
mingwiki / network.ps1
Last active August 11, 2022 15:55
Set all ports forwarding from windows to WSL2
If (-NOT ([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")) {
$arguments = "& '" + $myinvocation.mycommand.definition + "'"
Start-Process powershell -Verb runAs -ArgumentList $arguments
Break
}
$remoteport = bash.exe -c "ifconfig eth0 | grep 'inet '"
$found = $remoteport -match '\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}';
if ($found) {