Skip to content

Instantly share code, notes, and snippets.

S Cotterill theseanco

Block or report user

Report or block theseanco

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
@theseanco
theseanco / co34pt.py
Created Jun 7, 2017
MAKE YOUR OWN GOOGLE-PROOF NAMES
View co34pt.py
# -*- coding: UTF-8 -*-
# This script mangles a set of words with the first 11,264 characters of Unicode
# it will then perform the mangle to the number of times specified
# it will then save these mangled names to a file.
# it'll get messy.
# from co¥ᄀpt
from random import randint
@theseanco
theseanco / install_supercollider_sc3plugins_buntu.sh
Last active Jun 15, 2018
Install SuperCollider and sc3_plugins on *buntu
View install_supercollider_sc3plugins_buntu.sh
#!/bin/bash
# install SuperCollider 3.8 and sc3-plugins. This will dump the source files in your home directory
mkdir ~/src
cd ~/src
sudo apt-get install git
@theseanco
theseanco / co34pt_Transmediale.scd
Created Feb 9, 2017
Transmediale Algorave set
View co34pt_Transmediale.scd
/*
hallo alles
hello world, my name is co¥ᄀpt
2 seconds. i just smashed my beer back here.
*/
@theseanco
theseanco / scriptchop.py
Created Jul 22, 2016
script chopper for x201 dissection program
View scriptchop.py
# A Python script to print random (potentially) paragraphs from scripts within folders when triggered
import os
import random
# opening the python script
pyscript = open(os.path.join(os.path.dirname(__file__), 'Scripts/OSCResponder/011_RecievingProcessingTestValues.py'))
pyparagraph = []
scscript = open(os.path.join(os.path.dirname(__file__), 'Scripts/SuperCollider/HeartbeatInductionCombined/002_FormattedForTest.scd'))
View sc_ide_conf.yaml
IDE:
editor:
blinkDuration: 300
colors:
evaluatedCode: !textFormat
color: "#000000"
background: "#f8a200"
lineNumbers: !textFormat
color: "#808080"
background: "#141f2e"
@theseanco
theseanco / randomwhois.py
Created Dec 21, 2015
Random Whois - Part 1 of HSS project to grab data from random
View randomwhois.py
# a sample program to use ipwhois to dump info about a random IP address
# in order to use this you will need to install ipwhois using pip
import random
from ipwhois import IPWhois
from pprint import pprint
# getting four random numbers for the ipv4 address. Casting them as strings
r1 = str(random.randrange(255))
r2 = str(random.randrange(255))
You can’t perform that action at this time.