a fixed version of this weird recipe: https://pinchofyum.com/red-curry-lentils
- 3 cups green lentils
- 3-4 onions, diced
a fixed version of this weird recipe: https://pinchofyum.com/red-curry-lentils
ngol -- Gold Mine
ntav -- Tavern
ngme -- Goblin Merchant
ngad -- Goblin Laboratory
nmrk -- Marketplace
nfoh -- Fountain of Health
nmoo -- Fountain of Mana
nwgt -- Way Gate
nshp -- Goblin Shipyard
(2)Amazonia.w3x
(2)AncientIsles.w3x
(2)BanditRidge.w3x
(2)Circumvention.w3x
(2)ConcealedHill.w3x
(2)Dalaran.w3x
(2)EchoIsles.w3x
(2)GlacialThaw.w3x
(2)Justice.w3x
#!/usr/bin/env python3 | |
import hashlib | |
from getpass import getpass | |
from requests import get | |
'''troy hunt runs haveibeenpwned.com. he collects huge dumps of breached passwords, | |
and has made them available. you can download the entire dump of hashes (annoying), | |
or you can query his API directly. doing this on his website involves typing in the | |
actual candidate password you want to check and assuming nothing untoward happens. |
function battime() | |
{ | |
minutes=$(/usr/sbin/ioreg -r -n AppleSmartBattery | grep InstantTimeToEmpty | \grep -Eo "\d+") | |
hours=$(echo "$minutes / 60" | bc) | |
remainder=$(echo "$minutes - (60 * $hours)" | bc) | |
echo "[+] battery time remaining : ${hours}h ${remainder}m" | |
} |
#include <stdlib.h> | |
int main(void) | |
{ | |
char toprint[56] = "python -c 'import os; os.system(\"echo $(printf howdy)\")'"; | |
system(toprint); | |
} |