Skip to content

Instantly share code, notes, and snippets.

View s4dr0t1's full-sized avatar
📚
The curse of knowledge

Rohit Dhill s4dr0t1

📚
The curse of knowledge
View GitHub Profile
-- Basics
local wezterm = require("wezterm")
local act = wezterm.action
if wezterm.config_builder then
config = wezterm.config_builder()
end
-- Helper functions
function scheme_for_appearance(appearance)
# Inserts a blank line between shell prompts
add_newline = true
[username]
show_always = true
disabled = false
style_root = "bold red"
style_user = "bold yellow"
format = "[$user](bold green)[@](bold green)"

openpgp4fpr:CAAF47E471E769D34DC3912F950AD2384C65B8B3

@s4dr0t1
s4dr0t1 / wezterm.lua
Created June 28, 2023 09:25 — forked from quangIO/wezterm.lua
My wezterm config with tmux-like bindings
local wezterm = require 'wezterm';
return {
color_scheme = "Dracula",
-- colors = {
-- background = "#0c0e14",
-- },
window_decorations = "NONE",
font = wezterm.font("Iosevka"),
font_size = 10.0,
-- dpi = 192.0,
@s4dr0t1
s4dr0t1 / gist:05b028311669bbc46f683c72ce1e852d
Created May 30, 2023 05:50 — forked from atcuno/gist:3425484ac5cce5298932
HowTo: Privacy & Security Conscious Browsing

The purpose of this document is to make recommendations on how to browse in a privacy and security conscious manner. This information is compiled from a number of sources, which are referenced throughout the document, as well as my own experiences with the described technologies.

I welcome contributions and comments on the information contained. Please see the How to Contribute section for information on contributing your own knowledge.

Table of Contents

@s4dr0t1
s4dr0t1 / nixos.md
Created August 22, 2022 20:04 — forked from martijnvermaat/nixos.md
Installation of NixOS with encrypted root
-----BEGIN PGP PUBLIC KEY BLOCK-----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@s4dr0t1
s4dr0t1 / resources.md
Created July 7, 2021 03:03 — forked from muff-in/resources.md
A curated list of Assembly Language / Reversing / Malware Analysis / Game Hacking-resources

Keybase proof

I hereby claim:

  • I am s4dr0t1 on github.
  • I am s4dr0t1 (https://keybase.io/s4dr0t1) on keybase.
  • I have a public key ASCf1JLP1cxXflRAAkKO0TQoFI2NnsR6ixdwylys5YtNiAo

To claim this, I am signing this object: