The Ultimate Discord Hacking Bot The Ultimate Hacking Bot™️ contains a bunch of useful hacking tools: * LemmeKnow * Ares * Ciphey * Search-That-Hash The GitHub Link is below: GitHub - bee-san/discord-bot: Discord bot for Ares & Lemmeknow in the http://discord.skerritt.blog discord serverDiscord bot for Ares & Lemmeknow in the http://discord.skerritt.blog
self-hosted How we keep our self-hosted Discord bot up to date Over in my Discord we have a cool bot called ✨The Ultimate Hacking Bot✨ Really it's a bot that has a collection of pentesting tools one may find useful. With many tools come many issues... Dependency issues... If one of our many dependencies updated, our process was: 1.
AI Run your own ChatGPT in 5 minutes of work with Kobold AI This is a very quick guide on running your own ChatGPT locally. Why would you want to do this? * You can use uncensored models ChatGPT and the likes have an alignment that censors them. For example, it's primarily aligned with Americans which means it's not very
ssh SSH Permission denied (publickey). Solution 1 - Regenerate the key 1. Generate your key. 2. Configure ssh to use the key.Your config file should have something similar to the following:You can add IdentitiesOnly yes to ensure ssh uses the specified IdentityFile and no other keyfiles during authentication. Setting IdentitiesOnly prevents failed authentications
python Packaging your Python Project I was looking to package my project, Ciphey, for operating systems and for managers that aren’t PyPi. Unfortunately, there seemed to be very little information on the web about this. This is a guide on packaging your Python project for: * PyPi * HomeBrew * Windows Package Manager * Arch User Repository Semantic
Algorithms Set Theory for Programmers If you’ve spent time on HackerRank or LeetCode, you might have noticed most of the optimal solutions use Set Theory. By reading this article, you will gain a deeper knowledge into set theory and how to use it to create optimal algorithms. Set Theory was invented (or found, depending
programming 3 Tips For Making a Popular Open Source Project in 2024 [Ultimate Guide] Fancy watching this as a video instead? Click below: Introduction I have around ~10k GitHub stars. I’ve come up with a bullet-pointed actionable list of how to make open-source projects popular. One of the projects I created had 67 lines of code and had only existed for 3 days
rust Packaging Your Rust Code I recently went through the trouble of distributing a Rust package. I wished that there was a simple guide on distributing one package to many platforms, so I wrote this guide. Follow me as we publish my package, RustScan, to multiple distributions. Semantic Versioning Semantic Versioning is a system defining
programming Divide and Conquer Algorithms with Python Examples Often I’ll hear about how you can optimise a for loop to be faster or how switch statements are faster than if statements. Most computers have over 1 core, with the ability to support multiple threads. Before worrying about optimising for loops or if statements try to attack your
programming Ripgrep cheatsheet I use RipGrep all the time, but sometimes when I want to do something I have to search the internet to find out. GitHub - BurntSushi/ripgrep: ripgrep recursively searches directories for a regex pattern while respecting your gitignoreripgrep recursively searches directories for a regex pattern while respecting your gitignore
Algorithms Featured All You Need to Know About Big O Notation [Python Examples] By the end of this article, you’ll thoroughly understand Big O notation. You’ll also know how to use it in the real world, and even the mathematics behind it! In computer science, time complexity is the computational complexity that describes the amount of time it takes to run
Popular Featured Timsort — the fastest sorting algorithm you’ve never heard of Timsort: A very fast , O(n log n), stable sorting algorithm built for the real world — not constructed in academia. Timsort is a sorting algorithm that is efficient for real-world data and not created in an academic laboratory. Tim Peters created Timsort for the Python programming language in 2001. Timsort
Algorithms Greedy Algorithms In Python Greedy algorithms aim to make the optimal choice at that given moment. Each step it chooses the optimal choice, without knowing the future. It attempts to find the globally optimal way to solve the entire problem using this method. Why Are Greedy Algorithms Called Greedy? We call algorithms greedy when
hacking Featured How Does BitTorrent Work? A Plain English Guide No talk about downloading things on BitTorrent. Or the best clients to do so. Just a deep dive into the technical side of it. Anyone can read this article. Requires ZERO knowledge of networking or BitTorrent to read this. BitTorrent is one of the most common protocols for transferring large
Algorithms How to Share a Secret (Diffie-Hellman-Merkle) Diffie-Hellman-Merkle is a way to share a secret key with someone (or something) without actually sending them the key. Before we look into how we share keys let’s first look into what keys are and why we would want to invent a method to share keys without giving the
programming The Ultimate Guide to Writing Effective Commit Messages: Best Practices and Conventional Commits The ultimate guide to conventional commits and writing nicer commit messages
hacking Featured How Does Tor Really Work? The Definitive Visual Guide (2023) Today, we’re going to do a technical deep-dive into how Tor really works. No mention of how to access Tor, no mention of what might be on Tor. This is how Tor works. Without speculation and without exaggeration of what Tor is. Just a deep dive into the technical
hacking Forcing a device to disconnect from WiFi using a deauthentication attack This post will show you how to disable a devices connection to WiFi using a detauthentication attack.
hacking Shodan - The Complete Guide, Featured on TryHackMe Shodan.io is a search engine for the Internet of Things. Ever wondered how you can find publicly accessible CCTV cameras? What about finding out how many Pi-Holes are publicly accessible? Or whether your office coffee machine is on the internet? Shodan.io is the answer! Shodan scans the whole
finance Crowdstrike This article is not financial advice, and the only reason I am writing it is so I can re-read my reasoning. I am posting it online so if I am wrong, others can correct my reasoning. Per Lynch: Know what you own, and know why you own it Do your
finance The Hut Group This article is not financial advice, and the only reason I am writing it is so I can re-read my reasoning. I am posting it online so if I am wrong, others can correct my reasoning. Per Lynch: Know what you own, and know why you own it Do your
finance Rightmove This article is not financial advice, and the only reason I am writing it is so I can re-read my reasoning. I am posting it online so if I am wrong, others can correct my reasoning. Per Lynch: Know what you own, and know why you own it Do your
finance Wise - Money without Borders This article is not financial advice, and the only reason I am writing it is so I can re-read my reasoning. I am posting it online so if I am wrong, others can correct my reasoning. Per Lynch: Know what you own, and know why you own it Do your
Popular Featured Over-engineering my document storage system with Paperless-ngx I think the first realisation that I was getting old was when I implemented a system to store physical + digital documents and was excited about it. My previous document system looked a little something like this: Whenever someone asked me "hey can you prove you got a C in
Misconceptions Programmers Have about Names in the UK Contrary to popular belief, in the United Kingdom, there isn't a definition of "legal name". Lord Justice Ormrod, in the case of D v B (orse D) [1979] Fam 38, in the Court of Appeal, ascertained that: It is common ground that a surname in common