Skip to content

Instantly share code, notes, and snippets.

@peterkaminski
peterkaminski / DOM3D.user.js
Created March 29, 2024 03:57 — forked from hf02/DOM3D.user.js
3D DOM viewer, copy-paste this into your console to visualise the DOM topographically.
// ==UserScript==
// @name 3D DOM viewer
// @namespace https://gist.github.com/hf02/2f2fb776ba233fd758af559b9de9e177
// @version 2024-03-27
// @description 3D DOM viewer
// @author OrionReed (forked by hf02)
// @match *://*/*
// @icon data:image/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==
// @grant GM_registerMenuCommand
// ==/UserScript==
I am attesting that this GitHub handle peterkaminski is linked to the Tezos account tz1VzQTaB1UngQpJDoVxgQmzKGnniNuHkn3N for tzprofiles
sig:edsigu663GdY5HBQDNsYvndyhTbQYjnzMHYhtVmyUdeomXuuqR5xJXxtt2Ldex7JdfeBUP8MEmEHTeRQdAc8ScJvRbaYHH8M7Tr
@peterkaminski
peterkaminski / mattermost-dl.py
Created November 26, 2020 14:18 — forked from RobertKrajewski/mattermost-dl.py
This script allows to export the content (text+files) of an interactively selected Mattermost channel (public, private, group, direct message) to files. Tested on Mattermost 5.27 using Python 3.7
from datetime import datetime
from mattermostdriver import Driver
import pathlib
import json
def connect(host, username, login_token):
# Connect to server
d = Driver({
"url": host,
@peterkaminski
peterkaminski / gist:d9960b40a0869404a8fc0064e343b847
Created February 1, 2019 23:06 — forked from felixzapata/gist:9320651
generate a random number and convert it to base 36
var rand = function() {
return Math.random().toString(36).substr(2); // remove `0.`
};
var token = function() {
return rand() + rand(); // to make it longer
};
token(); // "bnh5yzdirjinqaorq0ox1tf383nb3xr"
@peterkaminski
peterkaminski / webmsg.py
Last active July 9, 2019 18:06 — forked from bxt/webmsg.py
Really simple python web server to serve a maintenance message to the web
# forked from https://gist.github.com/bxt/3491401
import string,cgi,time, datetime
from BaseHTTPServer import BaseHTTPRequestHandler, HTTPServer
class MyHandler(BaseHTTPRequestHandler):
def do_GET(self):
try:
self.send_response(503) # let bots know whats up
self.send_header('Content-type','text/html')
self.end_headers()
### Keybase proof
I hereby claim:
* I am peterkaminski on github.
* I am peterkaminski (https://keybase.io/peterkaminski) on keybase.
* I have a public key whose fingerprint is C668 36A2 6429 A419 BA9A 34D4 592C F548 C228 D177
To claim this, I am signing this object:

The binary on the website is capable only to decode encrypted data, not encode, and may contain trojan (seems like it doesn't, but don't believe me). The binary is signed with the valid (usual) key. All old versions are wiped, the repository is wiped too.


Assumption #1 The website is presumed hacked, the keys are presumed compromised. Please do not download or run it. And please don't switch to bitlocker.

Latest working version is 7.1a. Version 7.2 is a hoax

On the SourceForge, the keys were changed before any TrueCrypt files uploaded, but now they are deleted and the old keys got reverted back.