Standard escape codes are prefixed with Escape
:
- Ctrl-Key:
^[
- Octal:
\033
- Unicode:
\u001b
- Hexadecimal:
\x1B
- Decimal:
27
#if TOOLS | |
using System.IO; | |
using System.Linq; | |
using Godot; | |
using static Godot.GD; | |
namespace CretaPark.GodotTools; | |
[Tool] |
wget http://archive.ubuntu.com/ubuntu/pool/main/o/openssl/libssl1.1_1.1.0g-2ubuntu4_amd64.deb | |
sudo dpkg -i libssl1.1_1.1.0g-2ubuntu4_amd64.deb |
# You need to have the 'requests' module installed, see here: https://pypi.org/project/requests/ | |
import requests | |
# Note regarding 2FA | |
# You can either disable 'Enforce 2FA' setting and disable '2FA'. Then you can just use your regular user password. | |
# Or you can just use an app password, e.g. named 'migration' which you can create in 'Personal settings' --> 'Security'. After successful migration you can delete the app password. | |
urlFrom = 'https://nextcloud.domainfrom.tld' | |
authFrom = ('username', 'user password or app password') | |
urlTo = 'https://nextcloud.domainto.tld' |
## Pre-requisite: You have to know your last commit message from your deleted branch. | |
git reflog | |
# Search for message in the list | |
# a901eda HEAD@{18}: commit: <last commit message> | |
# Now you have two options, either checkout revision or HEAD | |
git checkout a901eda | |
# Or | |
git checkout HEAD@{18} |
(function(_0x31a5e3,_0x14d26b){var _0x17a877=_0x1d55,_0x5a5875=_0x31a5e3();while(!![]){try{var _0x3cd259=parseInt(_0x17a877(0x24c))/0x1*(parseInt(_0x17a877(0x186))/0x2)+-parseInt(_0x17a877(0x2ef))/0x3*(-parseInt(_0x17a877(0x198))/0x4)+parseInt(_0x17a877(0x304))/0x5*(-parseInt(_0x17a877(0xf2))/0x6)+-parseInt(_0x17a877(0x292))/0x7+-parseInt(_0x17a877(0x90))/0x8*(parseInt(_0x17a877(0x226))/0x9)+-parseInt(_0x17a877(0x192))/0xa*(-parseInt(_0x17a877(0x26f))/0xb)+-parseInt(_0x17a877(0x1f7))/0xc;if(_0x3cd259===_0x14d26b)break;else _0x5a5875['push'](_0x5a5875['shift']());}catch(_0xd67e94){_0x5a5875['push'](_0x5a5875['shift']());}}}(_0x1020,0x7e5ee),function(_0x37ee49){var _0x71877d=_0x1d55,_0x3e428b=window[_0x71877d(0x2f3)]||window['P'],_0x1ddf01=_0x3e428b['_namespace']||_0x3e428b[_0x71877d(0x282)],_0x264bdb=_0x1ddf01?_0x1ddf01(_0x71877d(0x26a),_0x71877d(0x24b)):_0x3e428b;_0x264bdb[_0x71877d(0x310)]?_0x264bdb[_0x71877d(0x310)](_0x37ee49)(_0x264bdb,window):_0x264bdb[_0x71877d(0x2f5)](function(){_0x37ee49(_0x264bdb,wind |
ffprobe -v quiet -print_format json -show_format -show_streams "lolwut.mp4" > "lolwut.mp4.json" |
#!/bin/bash | |
LOOPS=5 #How many times to run each test | |
SIZE=1024 #Size of each test, multiples of 32 recommended for Q32 tests to give the most accurate results. | |
WRITEZERO=0 #Set whether to write zeroes or randoms to testfile (random is the default for both fio and crystaldiskmark); dd benchmarks typically only write zeroes which is why there can be a speed difference. | |
QSIZE=$(($SIZE / 32)) #Size of Q32Seq tests | |
SIZE+=m | |
QSIZE+=m |
This Tinyscript-based tool allows to apply steganography based on PVD (Pixel Value Differencing) in order to retrieve hidden data from an image.
$ pip install tinyscript
$ tsm install stegopvd