Skip to content

Instantly share code, notes, and snippets.

Keybase proof

I hereby claim:

  • I am realdomdom on github.
  • I am realdomdom (https://keybase.io/realdomdom) on keybase.
  • I have a public key whose fingerprint is 4F2A CB3C 5E45 D87D EF44 1F64 AC2C 5481 9499 826D

To claim this, I am signing this object:

@realdomdom
realdomdom / halo.sh
Last active November 13, 2016 19:25
#!/usr/bin/env bash
echo "THIS SCRIPT ONLY WORKS ON UBUNTU FOR NOW." > /dev/tty;
echo "IT WILL INSTALL THE HALO: CUSTOM EDITION DEDICATED SERVER PROGRAM, PATCH IT, INSTALL THE OPEN SAUCE AND SAPP MODIFICATIONS, AND DOWNLOAD CUSTOM MAPS." > /dev/tty;
echo "IT WILL ALSO INSTALL THE SOFTWARE-PROPERTIES PACKAGE, FLUXBOX, X2GO SERVER, WINE AND OTHER DEPENDENCIES." > /dev/tty;
if [ "$(uname)" == "Darwin" ]; then
{ echo "YOU ARE RUNNING MAC OS." > /dev/tty; exit 1; }
elif [ "$(expr substr $(uname -s) 1 10)" == "MINGW32_NT" ]; then
{ echo "YOU ARE RUNNING WINDOWS." > /dev/tty; exit 1; }
elif [ "$(expr substr $(uname -s) 1 5)" == "Linux" ]; then
if [ "$(whoami)" != "root" ]; then
@echo off
wmic computersystem where name="%computername%" set AutomaticManagedPagefile=False
wmic pagefileset where name="C:\\pagefile.sys" delete
wmic process where name="OriginThinSetupInternal.exe" CALL setpriority 64
wmic process where name="SearchIndexer.exe" CALL setpriority 64
wmic process where name="spoolsv.exe" CALL setpriority 64
wmic process where name="lp-service.exe" CALL setpriority 128
wmic process where name="LoudPlay-server.exe" CALL setpriority 128
start cd %userprofile%\Downloads ^&^& curl https://install.robertsspaceindustries.com/star-citizen/RSI-Setup-1.5.5.exe
start /belownormal langswitcher-ng.exe -win de-DE -ubisoft de-DE -origin de_DE -battlenet deDE -i4game eu -wargaming de -rgl de-DE -egl de-DE -steam german & start /belownormal compact /compactos:always
@echo off
SETLOCAL EnableExtensions
set EXE=Cloudflare WARP.exe
FOR /F %%x IN ('tasklist /NH /FI "IMAGENAME eq %EXE%"') DO IF %%x == %EXE% goto STOP
mshta 'vbscript:Execute("CreateObject(""shell.application"").ShellExecute""net"",""start CloudflareWARP"","""",""runas"",1:close")'
timeout /T 10 /nobreak
CD "C:\Program Files\Cloudflare\Cloudflare WARP\"
START "" "C:\Program Files\Cloudflare\Cloudflare WARP\Cloudflare WARP.exe"
exit
:EOF
@realdomdom
realdomdom / init.txt
Created March 2, 2022 17:29
C:\Program Files (x86)\Microsoft Games\Halo
chimera_af true
chimera_aim_assist true
chimera_block_loading_screen true
chimera_block_mouse_acceleration true
chimera_diagonals 0.75
chimera_fov auto
chimera_fov_cinematic auto
chimera_fp_reverb true
chimera_throttle_fps 60
chimera_uncap_cinematic true
@realdomdom
realdomdom / dgVoodoo.conf
Created March 2, 2022 17:30
C:\Program Files (x86)\Microsoft Games\Halo
;==========================================================================
; === Text based config file for dgVoodoo2
; === Use this file if you are a game modder/hacker or an experted user and
; want to modify some advanced properties not available via the CPL.
;==========================================================================
Version = 0x275
;--------------------------------------------------------------------------
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\PCHC]
"UpgradeEligibility"=dword:00000001
[HKEY_LOCAL_MACHINE\SYSTEM\Setup\LabConfig]
"BypassTPMCheck"=dword:00000001
"BypassSecureBootCheck"=dword:00000001
"BypassRAMCheck"=dword:00000001
"BypassStorageCheck"=dword:00000001
@echo off
if not [%1] equ [] reg add HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\%~nx1 /v UseLargePages /t REG_DWORD /d 1
where /q ntrights || call :download
ntrights +r SeLockMemoryPrivilege -u ""
:eof
:download
for /f "delims=" %%A in ('hostname.exe') do set "host_name=%%A"
for /f "tokens=3" %%* in ('route.exe print ^|findstr "\<0.0.0.0\>"') do @set "gateway=%%*"
for /f "tokens=3" %%* in ('ipconfig ^|findstr "\<DNS-Suffix\>"') do @set "dns_suffix=%%*"
if [%dns_suffix] equ [] do @set "dns_suffix=WORKGROUP"
@realdomdom
realdomdom / unzip.cmd
Last active March 12, 2022 21:08
unzip c:\path\to\file.zip [directory]
<!-- :
@echo off
if [%1] equ [] (echo Missing file parameter. && echo unzip c:\path\to\file.zip [directory] && exit /b 1)
if %1 not exist (echo File not found. && echo unzip c:\path\to\file.zip [directory] && exit /b 2)
if [%2] not equ [] (if %2 not exist (mkdir %2 && if %errorlevel% not 0 (echo Invalid parameter. && echo unzip c:\path\to\file.zip [directory] && exit /b 3)))
if [%2] equ [] (cscript //nologo "%~f0?.wsf" /ZipFile:%1 /ExtractTo:%~dp0 //job:unzip && exit /b)
cscript //nologo "%~f0?.wsf" /ZipFile:%1 /ExtractTo:%2 //job:unzip
exit /b
--->
<package>
Set-NetAdapterRSS -Name "Ethernet 2" -Profile Closest -BaseProcessorNumber 2 -MaxProcessorNumber 5 -NumberOfReceiveQueues 2
New-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Enum\PCI\VEN_8086&DEV_1533&SUBSYS_00028086&REV_03\4&5dc256b&0&0028\Device Parameters\Interrupt Management\Affinity Policy" -Name AssignmentSetOverride -PropertyType Binary -Value 3c
New-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Enum\PCI\VEN_8086&DEV_1533&SUBSYS_00028086&REV_03\4&5dc256b&0&0028\Device Parameters\Interrupt Management\Affinity Policy" -Name DevicePolicy -PropertyType DWord -Value 4
New-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Enum\PCI\VEN_8086&DEV_1533&SUBSYS_00028086&REV_03\4&5dc256b&0&0028\Device Parameters\Interrupt Management\Routing Info" -Name StaticVector -PropertyType DWord -Value 46
<#
NDIS.SYS Set mask 2,3,4,5 (of 0-6)
or via intPolicy_x64.exe
#>