- Web Wormhole https://webwormhole.io/ https://github.com/saljam/webwormhole
- Localsend https://web.localsend.org/
- FilePizza https://file.pizza/
ShareDrop sharedrop.io https://github.com/szimek/sharedrop(SOLD, not recommended, use one of the forks)A clone SnapDrop snapdrop.net https://github.com/RobinLinus/snapdrop(SOLD, not recommended, use one of the forks)- A fork PairDrop https://pairdrop.net/ https://github.com/schlagmichdoch/pairdrop
- ToffeeShare https://toffeeshare.com/
- Instant.io https://instant.io/
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| function ConvertTo-PackedGuid { | |
| <# | |
| .SYNOPSIS | |
| https://gist.github.com/MyITGuy/d3e039c5ec7865edefc157fcd625a20a | |
| Converts a GUID string into a packed globally unique identifier (GUID) string. | |
| .DESCRIPTION | |
| Takes a GUID string and breaks it into 6 parts. It then loops through the first five parts and reversing the order. It loops through the sixth part and reversing the order of every 2 characters. It then joins the parts back together and returns a packed GUID string. | |
| .EXAMPLE | |
| ConvertTo-PackedGuid -Guid '{7C6F0282-3DCD-4A80-95AC-BB298E821C44}' | |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| FROM ubuntu | |
| RUN apt update | |
| RUN apt install -y tini dumb-init python3-pip | |
| RUN pip install apache-airflow | |
| # place the entrypoint script | |
| COPY entrypoint.sh /entrypoint | |
| RUN chmod +x /entrypoint | |
| # a script that calls airflow (and does test-relevant things too) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # This script will manually rip out all VMware Tools registry entries and files for Windows 2008-2019 | |
| # Tested for 2019, 2016, and probably works on 2012 R2 after the 2016 fixes. | |
| # This function pulls out the common ID used for most of the VMware registry entries along with the ID | |
| # associated with the MSI for VMware Tools. | |
| function Get-VMwareToolsInstallerID { | |
| foreach ($item in $(Get-ChildItem Registry::HKEY_CLASSES_ROOT\Installer\Products)) { | |
| If ($item.GetValue('ProductName') -eq 'VMware Tools') { | |
| return @{ | |
| reg_id = $item.PSChildName; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| function ConvertFrom-PackedGuid { | |
| <# | |
| .SYNOPSIS | |
| Converts a packed globally unique identifier (GUID) string into a GUID string. | |
| .DESCRIPTION | |
| Takes a packed GUID string and breaks it into 6 parts. It then loops through the first five parts and reversing the order. It loops through the sixth part and reversing the order of every 2 characters. It then joins the parts back together and returns a GUID. | |
| .EXAMPLE | |
| ConvertFrom-PackedGuid -PackedGuid '2820F6C7DCD308A459CABB92E828C144' | |
| The output of this example would be: {7C6F0282-3DCD-4A80-95AC-BB298E821C44} |