I hereby claim:
- I am delusionallogic on github.
- I am delusional (https://keybase.io/delusional) on keybase.
- I have a public key ASArxuFEJzzYpRppA9700I1CaD9pF7KtNDVBjJKwN-ufDQo
To claim this, I am signing this object:
| #compdef zathura | |
| # zsh completions for 'zathura' | |
| # automatically generated with http://github.com/RobSis/zsh-completion-generator | |
| local arguments | |
| arguments=( | |
| {-h,--help}'[Show help options]' | |
| {-e,--reparent}'[Reparents to window specified by xid (X11)]' | |
| {-c,--config-dir}'[Path to the config directory]' |
I hereby claim:
To claim this, I am signing this object:
| #!/bin/sh | |
| userresources=$HOME/.Xresources | |
| usermodmap=$HOME/.Xmodmap | |
| sysresources=/etc/X11/xinit/.Xresources | |
| sysmodmap=/etc/X11/xinit/.Xmodmap | |
| # merge in defaults and keymaps | |
| if [ -f $sysresources ]; then |
| #!/bin/bash | |
| i=0 | |
| while read p; do | |
| IFS="-" read -ra ADDR <<< "$p" | |
| n="${ADDR[0]}" | |
| start="${ADDR[1]}" | |
| end="${ADDR[2]}" | |
| echo "$start $end" |
| # How many Controllers? (support up to 4 Controllers) | |
| CONTROLLER_NUM=2 | |
| case $CONTROLLER_NUM in | |
| 1) CONTROLLER="-w 0 -l 2 --trigger-as-button --dpad-as-button" | |
| ;; | |
| 2) CONTROLLER="-w 0 -l 2 --trigger-as-button --dpad-as-button --next-controller -w 1 -l 3 --trigger-as-button --dpad-as-button" | |
| ;; | |
| 3) CONTROLLER="-w 0 -l 2 --trigger-as-button --dpad-as-button --next-controller -w 1 -l 3 --trigger-as-button --dpad-as-button --next-controller -w 2 -l 4 --trigger-as-button --dpad-as-button" | |
| ;; |
| Webwhale encryption is the codename of my effort to make encryption actually useful, and put the power in the hands of the developer. | |
| The encryption is based on a quite simple RSA encryption for sharing the symmetric AES key. This method requires you to have a webserver! Here's how to do it: | |
| On your webserver you need to set up a php script that will accept the RSA public key, encrypt the key and send it. This could for example use phpSecLib: | |
| <?php | |
| error_reporting(E_ERROR | E_WARNING | E_PARSE); | |
| set_include_path(get_include_path() . PATH_SEPARATOR . 'phpseclib'); |
| Required functions: --Please keep everything in these functions, you need all, otherwise the program wont work | |
| init() --Runs once on lua load | |
| tick(time) --Runs every 100 ms, waits for last call. parameters: time = seconds since epoch | |
| Global Methods: | |
| loadEncrypted(string encryptedLua) --Run a string of encrypted Lua (You get the string crypted using the encrypter linked above) | |
| getHWID() --Get a unique HWID for the computer | |
| getWindow(string windowName) --Get the window instance of the window with the given name | |
| getWindowByHandle(IntPtr handle) --Get a window based on the handle | |
| getWindowWait(string windowName, int timeout) --Same as getWindow, except it keep on trying until timeout, returns when window is gotten or timeout is up (in seconds) |
| function init() | |
| print("Lol spam (I guess)") | |
| window = getWindow("PVP.net Client") | |
| waitTime = tonumber(Console:ReadLine("Time between messages")) | |
| spamString = Console:ReadLine("String to send") | |
| threadLock = false | |
| lastRunTime = os.time() | |
| end |
| local OBJDEF = { varsion = 1.0 } | |
| local JSON = (loadfile "JSON")() | |
| local function exploreTable(table, resultTable) | |
| local varCount = 0 | |
| if resultTable == nil then | |
| resultTable = {} | |
| end | |
| for k,v in pairs(table) do |