This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# the tag to look for, your spam should have this tag | |
spam_tag = "spam" | |
# Where to store the eml files | |
# !!! Note that there is not a trailing slash, do not put one !!! | |
destination = "/opt/zammad/spam_tickets" | |
#find tickets with a spam tag | |
puts "Looking for Spam\r\n" | |
for ticket in Ticket.all do |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
### | |
### | |
### UPDATE: For Win 11, I recommend using this tool in place of this script: | |
### https://christitus.com/windows-tool/ | |
### https://github.com/ChrisTitusTech/winutil | |
### https://www.youtube.com/watch?v=6UQZ5oQg8XA | |
### iwr -useb https://christitus.com/win | iex | |
### | |
### OR take a look at | |
### https://github.com/HotCakeX/Harden-Windows-Security |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
function fuck() { | |
killall -9 $2; | |
if [ $? == 0 ] | |
then | |
echo | |
echo " (╯°□°)╯︵$(echo $2|flip &2>/dev/null)" | |
echo | |
fi | |
} |