Look at LSB init scripts for more information.
Copy to /etc/init.d:
# replace "$YOUR_SERVICE_NAME" with your service's name (whenever it's not enough obvious)| #!/usr/bin/env python3 | |
| # | |
| # generate reverse powershell cmdline with base64 encoded args | |
| # | |
| import sys | |
| import base64 | |
| def help(): | |
| print("USAGE: %s IP PORT" % sys.argv[0]) |
| # SGR color constants | |
| # rene-d 2018 | |
| class Colors: | |
| """ ANSI color codes """ | |
| BLACK = "\033[0;30m" | |
| RED = "\033[0;31m" | |
| GREEN = "\033[0;32m" | |
| BROWN = "\033[0;33m" | |
| BLUE = "\033[0;34m" |
Look at LSB init scripts for more information.
Copy to /etc/init.d:
# replace "$YOUR_SERVICE_NAME" with your service's name (whenever it's not enough obvious)This list was posted over at Unix-Ninja. I take no credit for these. Posting these here for my own convenience.
Extract md5 hashes
# egrep -oE '(^|[^a-fA-F0-9])[a-fA-F0-9]{32}([^a-fA-F0-9]|$)' *.txt | egrep -o '[a-fA-F0-9]{32}' > md5-hashes.txt
# egrep -oE '(^|[^a-fA-F0-9])[a-fA-F0-9]{32}([^a-fA-F0-9]|$)' *.txt | egrep -o '[a-fA-F0-9]{32}' > md5-hashes.txt
| /* Generate colors using https://github.com/andreyvit/plist-to-json */ | |
| const col = [] // run your .itermcolors file through the above parser and replace the array with the output | |
| function componentToHex(c) { | |
| const hex = c.toString(16) | |
| return hex.length === 1 ? `0${hex}` : hex | |
| } | |
| const mapping = { | |
| 'terminal.background':'Background Color', |