Skip to content

Instantly share code, notes, and snippets.

View muink's full-sized avatar
:octocat:

Anya Lin muink

:octocat:
  • Azeroth land
View GitHub Profile
@muink
muink / urid.jq
Last active February 15, 2024 12:52 — forked from jcracknell/urldecode.jq
def urid:
def uni2num:
if 48 <= . and . <= 57 then . - 48 elif 65 <= . and . <= 70 then . - 55 else . - 87 end;
# ^ ^ ^ ^ ^
# | | | | 97 | 102
# uni0 ---------- uni9 -48=0-9 uniA ----------- uniF -55=10-15 unia - unif -87=10-15
# de pct-encoded
def decode:
def loop($i):

Enable & Using vGPU Passthrough

This gist is almost entirely not unlike Derek Seaman's awesome blog:

Proxmox VE 8: Windows 11 vGPU (VT-d) Passthrough with Intel Alder Lake

As such please refer to that for pictures, here i will capture the command lines I used as i sequence the commands a little differently so it makes more logic to me.

This gists assumes you are not running ZFS and are not passing any other PCIE devices (as both of these can require addtional steps - see Derek's blog for more info)

This gist assumes you are not running proxmox in UEFI Secure boot - if you are please refer entirely to dereks blog.

@veltlion
veltlion / natter-hook.sh
Last active March 31, 2024 05:05
Natter/NATMap 打洞后自动更新 qBittorrent/Transmission 监听端口和 OpenWrt 防火墙规则/iptables 规则 并推送到 Telegram
#!/bin/sh
# Natter
protocol=$1
inner_ip=$2
inner_port=$3
outter_ip=$4
outter_port=$5
# ipv4hex=$(printf '%02x' ${outter_ip//./ })
# ip4p="2001::$(printf '%2x' ${outter_port}):${ipv4hex:0:4}:${ipv4hex:4}"
@santaklouse
santaklouse / CrossOver.sh
Last active May 4, 2024 01:53
unlimited CrossOver trial (MacOS)
#!/usr/bin/env bash
# checck if pidof exists
PIDOF="$(which pidof)"
# and if not - install it
(test "${PIDOF}" && test -f "${PIDOF}") || brew install pidof
# find app in default paths
CO_PWD=~/Applications/CrossOver.app/Contents/MacOS
test -d "${CO_PWD}" || CO_PWD=/Applications/CrossOver.app/Contents/MacOS
@sergeiwaigant
sergeiwaigant / url_encode_string_with_linux_tools.md
Last active May 1, 2024 19:16
Simply URL encode string with Linux/Bash/Shell tools

Reference https://stackoverflow.com/a/34407620/13287790

$ printf %s 'encode this'|jq -sRr @uri
encode%20this
$ jq -rn --arg x 'encode this' '$x|@uri'
encode%20this
-r (--raw-output) outputs the raw contents of strings instead of JSON string literals. -n (--null-input) doesn't read input from STDIN.

-R (--raw-input) treats input lines as strings instead of parsing them as JSON, and -sR (--slurp --raw-input) reads the input into a single string. You can replace -sRr with -Rr if your input only contains a single line, or if you don't want to replace linefeeds with %0A:
@muink
muink / Go.cmd
Last active October 4, 2022 07:54
Openwrt本地源构建
@echo off
set "path=%path%;%~dp0cwRsync_5.5.0_x86_Free\bin"
start cmd
@muink
muink / pcap-dnsproxy-watchdog.sh
Created December 6, 2019 11:15 — forked from HackingGate/pcap-dnsproxy-watchdog.sh
A watchdog for Pcap-DNSProxy on OpenWrt
PROG=/usr/sbin/Pcap_DNSProxy
LOGTIME=$(date "+%Y-%m-%d %H:%M:%S")
if [ $(ps|grep ${PROG}|grep -v grep|wc -l) -ge 1 ]; then
echo "['$LOGTIME'] Pcap_DNSProxy is running, PID is $(pidof ${PROG##*/})"
else
echo "['$LOGTIME'] Pcap_DNSProxy is not running."
/etc/init.d/pcap-dnsproxy start
fi
@muink
muink / JMS583-SMART-INFO.md
Created November 26, 2019 13:00
read SMART info of JMS583 on CrystalDiskInfo
@muink
muink / how-to-install-viper4android-on-android-10.md
Last active February 3, 2024 10:26
如何在Android 11上安装ViPER4Android

如何在Android 11上安装ViPER4Android

如果你已更新到最新版本的Android 10/11/12,则可能已经注意到Magisk存储库中的ViPER4Android不再起效。 不过你很幸运!如果按照此页面上的步骤进行操作,你将即刻在Android 10/11/12上运行ViPER4Android。 不过当心,你必须遵循以下步骤进行操作,否则必须从步骤1重新开始。

  1. 如果你有安装ViPER4AndroidAudio Modification Library模块,请在Magisk Manager中卸载它们。然后重启设备。
  2. 从XDA Labs下载最新的[ViPER4Android FX apk][]。 下载[Viper4AndroidFX 2.7][Zackptg5]模块。
@muink
muink / git-latest-github-releases.md
Last active December 6, 2019 11:05
Get latest GitHub Releases

Get latest GitHub Releases

REPO_URL=jthistle/SUDO/
REPO_URL=brave/brave-browser/

302 response