I hereby claim:
- I am kaizoku on github.
- I am kaizoku (https://keybase.io/kaizoku) on keybase.
- I have a public key whose fingerprint is 607E E3E0 8918 C79E 47A2 BDB0 2C70 AF2D F024 6B41
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
sub yarr { | |
my ($server, $data, $nick, $address, $target) = @_; | |
my $reg = qr/( | |
(?(4) Y* | Y+) | |
A+ | |
(?(4) R+ | R{2,}) | |
(G+H+)? | |
) | |
| | |
(?:A+H+O+Y+) |
#!/bin/bash | |
pkill -i iTunesHelper | |
sudo rm -rf /Applications/iTunes.app /System/Library/Extensions/AppleMobileDevice.kext /Library/Receipts/AppleMobileDeviceSupport.pkg /Library/Receipts/*iTunes* /Library/iTunes | |
rm -rf ~/Library/Preferences/com.apple.iTunes* ~/Library/Preferences/ByHost/com.apple.iTunes* |
#!/bin/bash | |
# wrapper for mount which mkdirs the mount target if it doesn't exist | |
device="${@: -2}" | |
mntdir="${@: -1}" | |
if [ "$device" -o "${device:0:1}" == "-" ] | |
then | |
: | |
elif [ "${mntdir:0:1}" == "-" ] | |
then |
/* dumpmem.c | |
* April 27th, 2008 | |
* kaizoku@phear.cc | |
* Usage: dumpmem [-p pid] [-s executable] | |
* Notes: Code inspired by, well..based on, er, actually stolen | |
* from from K-sPecial's little program to spawn a process | |
* and dump it's memory. | |
* I wanted something that would attach to an already running | |
* process instead of spawning a new one. I wrote the code | |
* to attach and option handling code, etc. |