a fixed version of this weird recipe: https://pinchofyum.com/red-curry-lentils
- 3 cups green lentils
- 3-4 onions, diced
a fixed version of this weird recipe: https://pinchofyum.com/red-curry-lentils
ngol -- Gold Mine
ntav -- Tavern
ngme -- Goblin Merchant
ngad -- Goblin Laboratory
nmrk -- Marketplace
nfoh -- Fountain of Health
nmoo -- Fountain of Mana
nwgt -- Way Gate
nshp -- Goblin Shipyard
(2)Amazonia.w3x
(2)AncientIsles.w3x
(2)BanditRidge.w3x
(2)Circumvention.w3x
(2)ConcealedHill.w3x
(2)Dalaran.w3x
(2)EchoIsles.w3x
(2)GlacialThaw.w3x
(2)Justice.w3x
#!/usr/bin/env python3 | |
import hashlib | |
from getpass import getpass | |
from requests import get | |
'''troy hunt runs haveibeenpwned.com. he collects huge dumps of breached passwords, | |
and has made them available. you can download the entire dump of hashes (annoying), | |
or you can query his API directly. doing this on his website involves typing in the | |
actual candidate password you want to check and assuming nothing untoward happens. |
function battime() | |
{ | |
minutes=$(/usr/sbin/ioreg -r -n AppleSmartBattery | grep InstantTimeToEmpty | \grep -Eo "\d+") | |
hours=$(echo "$minutes / 60" | bc) | |
remainder=$(echo "$minutes - (60 * $hours)" | bc) | |
echo "[+] battery time remaining : ${hours}h ${remainder}m" | |
} |
#!/usr/bin/env python3 | |
import sys | |
import argparse | |
import subprocess | |
import re | |
def cleanmac(mac): | |
return re.sub('[^0-9a-f]', '', mac.lower()) |