a fixed version of this weird recipe: https://pinchofyum.com/red-curry-lentils
- 3 cups green lentils
- 3-4 onions, diced
a fixed version of this weird recipe: https://pinchofyum.com/red-curry-lentils
ngol -- Gold Mine
ntav -- Tavern
ngme -- Goblin Merchant
ngad -- Goblin Laboratory
nmrk -- Marketplace
nfoh -- Fountain of Health
nmoo -- Fountain of Mana
nwgt -- Way Gate
nshp -- Goblin Shipyard
(2)Amazonia.w3x
(2)AncientIsles.w3x
(2)BanditRidge.w3x
(2)Circumvention.w3x
(2)ConcealedHill.w3x
(2)Dalaran.w3x
(2)EchoIsles.w3x
(2)GlacialThaw.w3x
(2)Justice.w3x
| #!/usr/bin/env python3 | |
| import hashlib | |
| from getpass import getpass | |
| from requests import get | |
| '''troy hunt runs haveibeenpwned.com. he collects huge dumps of breached passwords, | |
| and has made them available. you can download the entire dump of hashes (annoying), | |
| or you can query his API directly. doing this on his website involves typing in the | |
| actual candidate password you want to check and assuming nothing untoward happens. |
| function battime() | |
| { | |
| minutes=$(/usr/sbin/ioreg -r -n AppleSmartBattery | grep InstantTimeToEmpty | \grep -Eo "\d+") | |
| hours=$(echo "$minutes / 60" | bc) | |
| remainder=$(echo "$minutes - (60 * $hours)" | bc) | |
| echo "[+] battery time remaining : ${hours}h ${remainder}m" | |
| } |
| #include <stdlib.h> | |
| int main(void) | |
| { | |
| char toprint[56] = "python -c 'import os; os.system(\"echo $(printf howdy)\")'"; | |
| system(toprint); | |
| } |