Jump to content
EGGTCL dot us

All Activity

This stream auto-updates

  1. Earlier
  2. Version 1.0.0

    0 downloads

    List of steiner's scripts.
    Free
  3. Try this command; cd /usr/share/webmin/ ./setup-repos.sh -f
  4. Version 1.0.0

    1 download

    Commands: <bot> !stat|tstat <nick> <channel> - View statistics of the selected nick for all time|today in the specified channel. <bot> !place|tplace <nick> <parameter> <channel> - View the place of the chosen nick in channel for the specified parameter for all time|today. <bot> !top|ttop <number> <parameter> <channel> - View top users for all time|today in the chosen channel by the chosen parameter. <bot> !all <channel> - View the full statistics of your chosen channel for all time. <bot> * Available options: letter, line, smiles, words, joins, nick, action, kicks, topics, modes, time. <bot> ** Without specifying a channel or user, the statistics of the current channel or the user who used the command will be shown. If the parameter is absent, the quantity will be used as words. <bot> !sappend <nick1> <nick2> <channel> - Combined statistics of nick1 and nick2 in channel. nick1 it will then be removed. <bot> !sset <nick> <parameter> <value> <channel> - installing a new values for parameter on nick for channel. <bot> * As a parameter, use only lines, words, letters, smilies, joins, nicks, actions, kicks, topics, modes, time. <bot> !sraw <nick> <channel> - viewing statistics for nick in channel in the "raw" format.
    Free
  5. Forcing the domain to serve securely using HTTPS (for any site) The following forces any http request to be rewritten using https. For example, the following code forces a request to http://example.com to load https://example.com. It also forces directly linked resources (images, css, etc.) to use https: RewriteEngine On RewriteCond %{HTTPS} !=on RewriteRule ^(.*)$ https://%{HTTP_HOST}%{REQUEST_URI} [L,R=301,NE] Header always set Content-Security-Policy "upgrade-insecure-requests;" Forcing HTTPS with WordPress Option #1 RewriteEngine On RewriteCond %{HTTPS} !=on RewriteRule ^(.*)$ https://%{HTTP_HOST}%{REQUEST_URI} [L,R=301,NE] Header always set Content-Security-Policy "upgrade-insecure-requests;" Full example including the default WordPress code Below is what your .htaccess file looks like with both the new HTTPS code and existing WordPress code. RewriteEngine On RewriteCond %{HTTPS} !=on RewriteRule ^(.*)$ https://%{HTTP_HOST}%{REQUEST_URI} [L,R=301,NE] Header always set Content-Security-Policy "upgrade-insecure-requests;" # BEGIN WordPress # The directives (lines) between `BEGIN WordPress` and `END WordPress` are # dynamically generated, and should only be modified via WordPress filters. # Any changes to the directives between these markers will be overwritten. <IfModule mod_rewrite.c> RewriteEngine On RewriteBase / RewriteRule ^index\.php$ - [L] RewriteCond %{REQUEST_FILENAME} !-f RewriteCond %{REQUEST_FILENAME} !-d RewriteRule . /index.php [L] </IfModule> # END WordPress Option #2 In this example, make sure to change example.com to your actual domain name. RewriteEngine On RewriteCond %{SERVER_PORT} 80 RewriteRule ^(.*)$ https://www.example.com/$1 [R=301,L,NE] Header always set Content-Security-Policy "upgrade-insecure-requests;" Full example including the default WordPress code Below is what your .htaccess file looks like with both the new HTTPS code and existing WordPress code. RewriteEngine On RewriteCond %{SERVER_PORT} 80 RewriteRule ^(.*)$ https://www.example.com/$1 [R=301,L,NE] Header always set Content-Security-Policy "upgrade-insecure-requests;" # BEGIN WordPress # The directives (lines) between `BEGIN WordPress` and `END WordPress` are # dynamically generated, and should only be modified via WordPress filters. # Any changes to the directives between these markers will be overwritten. <IfModule mod_rewrite.c> RewriteEngine On RewriteBase / RewriteRule ^index\.php$ - [L] RewriteCond %{REQUEST_FILENAME} !-f RewriteCond %{REQUEST_FILENAME} !-d RewriteRule . /index.php [L] </IfModule> # END WordPress That's it.
  6. Version 1.0.0

    1 download

    Countdown Reach Date to date.
    Free
  7. Version 1.0.0

    0 downloads

    Christmas & New Year Countdown for 2hours autoshow in the channel.
    Free
  8. Version 1.0.0

    1 download

    # chanrelay.tcl 3.14 # # A way to link your channels # # Author: CrazyCat <crazycat@c-p-f.org> # http://www.eggdrop.fr # irc.zeolia.net #eggdrop # # Declare issues at https://gitlab.com/tcl-scripts/chanrelay # No issue means no bug 🙂 # ## DESCRIPTION ## # # This TCL is a complete relay script wich works with botnet. # All you have to do is to include this tcl in all the eggdrop who # are concerned by it. # # You can use it as a spy or a full duplex communication tool. # # It don't mind if the eggdrops are on the same server or not, # it just mind about the channels and the handle of each eggdrop. ## CHANGELOG ## # # 3.14 - The Pi edition 🙂 # Now possible to change the (user@network) displayed # just add the usermask correct value in settings # %nick% and %network% are dynamic variables # Think to escape chars as [] or {} # # 3.13 # Modified join/part/quit procs # Add a limit to message length # # 3.12 # Added colors for actions and non-message # # # 3.11 # Made the "oper" setting functionnal # Removed MDS support # # 3.10 # Added debug log. It can be enable and disable in configuration # and with /msg rc.debug <on|off> # # 3.9 # Added exclusion list to ignore some users # Added a way to restrict relay to an internal user list # # 3.81 # Action mades by server are no more using nick "*" # Added a protection on oper actions: # the action must come from the oper bot # Correction of the quit transmission: when the bot leaves, # it now detect and transmit # Added botnet status broadcast # Changed the unload system (thanks to MenzAgitat) # # 3.8 # Correction : the config file can now use username for naming, # allowing to have relaying eggdrops in the same place with # different settings # # 3.7 # Addition of @commandes (public) restricted to operators: # @topic <network|all> a new topic : # Changes topic on specified network (or all) # @mode <network|all> +mode [arg][,-mode [arg]] : # Changes modes on specified network (or all) # All modes must be separated with a comma # @kick <network|all> user [reason] : # Kicks user on specified network (or all) # @ban <network|all> user [reason]: # Ban-kick user on specified network (or all) # Default reason and banmask are in the conf section # # 3.6-3 # Correction of trans mode on/off # # 3.6-2 # Correction of the logging of actions (/me) # Nick was replaced with ACTION # Correction of empty chan list (!who) # # 3.6-1 # Correction of the !who command # It's now possible to have the list from a specific server # # 3.6 # Correction of modes catching / transmitting # # 3.5 (Beta) # Integration of Message Delivery Service (MDS) # by MenzAgitat # # 3.4 # Settings modified by msg commands are now saved # Correction of small bugs # Best verification of settings sent # Acknowledgement and error messages added # # 3.3-1 # Correction for /msg eggdrop trans <action> [on|off] # # 3.3 # Added lines introducing beginning and ending of userlist # # 3.2 # Added gray user highlight # # 3.1 # Added check for linked bot # Corrected parse of some messages # Corrected pub commands # # 3.0 # Complete modification of configuration # Use of namespace # No more broadcast, the relay is done with putbot ## TODO ## # # Enhance configuration # Allow save of configuration # Multi-languages ## CONFIGURATION ## # # For each eggdrop in the relay, you have to # indicate his botnet nick, the chan and the network. # # Syntax: # set regg(USERNAME) { # "chan" "#CHANNEL" # "network" "NETWORK" #} # with: # USERNAME : The username sets in eggdrop.conf (case-sensitive) # optionaly, you can override default values: # * highlight (0/1/2/3): is speaker highlighted ? (no/bold/undelined/gray) # * snet (y/n): is speaker'network shown ? # * transmit (y/n): does eggdrop transmit his channel activity ? # * receive (y/n): does eggdrop diffuse other channels activity ? # * oper (y/n): does the eggdrop accept @ commands (topic, kick, ban) ? # * syn_topic (y/n): if set to Yes, the eggdrop will # synchronize the channel topic when changed on # another chan of the relay # # userlist(beg) is the sentence announcing the start of !who # userlist(end) is the sentence announcing the end of !who
    Free
  9. You will have a HUB bot, the bot that will send the userfile to other bots. Decide who that will be. Then, on this Hub bot (BotHUB) do this for each bot that is going to receive the userfile: .botattr ShareBot +s|+s #sharedchannel On your passive bot (ShareBot) do this: .botattr BotHUB +p|+s #sharedchannel .botattr BotHUB +h (only do this when you want the bots to connect) The |+s is used to make the bot also share flags for the given channel. For this to work, you must also set the channel in your configuration file to be "shared". Set this in both bots configuration. .channel set #sharedchannel +shared
  10. Version 1.0.0

    2 downloads

    PLEASE customise the settings before rehashing your bot!
    Free
  11. Version 1.0.0

    1 download

    PLEASE customise the settings before rehashing your bot! This is the enhanced version of original version Trivia.tcl made by Souperman. Enhanced with a !choose option for multiple question files. Reason for the adjustment was purely to have an *Nerd* version with all kinds of exams like MCSE MCSA CCISP or whatever those whizzkids want. Enhancements: The questionfiles can handle tabs for better editting and manipulation eg with a spreadsheet using tabs as a seperator. When the next question is selected, all tabs will be removed. The questionfiles can be setup to use multiplechoice questions. The script will determine if a question is a multiplechoice or not. If not, it will sendout the question on one line. If it is, it will sendout the question and choices on different lines. This is the layout for them: Answer|Question $A:choice $B:choice $C:choice $D:choice $E:choice It doenst matter how many choices there are, the script will figure it out. lowercase uppercase... it doesnt matter. Cheat protection for blocking people from just trying and guessing. This is especially handy with multiplechoice question with one answer.
    Free
  12. CheapWindowsVPS https://vpshostingservice.co/cart.php?a=add&pid=57 $11/month $5.50/month Coupon Code: 50LEB https://vpshostingservice.co/cart.php?a=confproduct&i=3 $20/month $10/month Coupon Code: 50LEB https://vpshostingservice.co/cart.php?a=add&pid=53 Pricing: $7/month (50% off) Coupon Code: 50LEB https://vpshostingservice.co/cart.php?a=add&pid=54 Pricing: $14/month (50% off) Coupon Code: 50LEB RackNerd https://my.racknerd.com/cart.php?a=confproduct&i=0 Pricing: $69/year https://my.racknerd.com/cart.php?a=add&pid=436 Pricing: $115/year CloudServer https://cloudserver.net/billing/cart.php?a=add&pid=15&billingcycle=annually&promocode=LEB3GBWINVPSDEALYEARLY Pricing: $95/year https://cloudserver.net/billing/cart.php?a=add&pid=16&billingcycle=annually&promocode=LEB4GBWINVPSDEAL Pricing: $120/year
  13. CloudServer - https://cloudserver.net/billing/cart.php?a=confproduct&i=2 Pricing: $23.88/year ServerHost - https://vpshostingservice.co/cart.php?a=confproduct&i=1 Pricing: $2.00/month (75% off) Coupon Code: 2LEB
  14. Here are the few list of 1 Dollar VPS per month. ServerHost - https://vpshostingservice.co/cart.php?a=add&pid=61 Pricing: $1.40/month (80% off) Coupon Code: 1LEB ----------------------------------------------------------------------- CloudServer - https://cloudserver.net/billing/index.php?rp=/store/custom-packages/leb-1gb-annual-plan Pricing: $10.00/year ----------------------------------------------------------------------- HudsonValleyHost - https://billing.hudsonvalleyhost.com/cart.php?a=confproduct&i=0 Pricing: $15.00/year -----------------------------------------------------------------------
  15. Looking for the cheapest VPS providers? RackNerd - https://my.racknerd.com/index.php?rp=/store/shared-hosting CloudServer - https://cloudserver.net/billing/index.php?rp=/store/bfcm2022 Server Host - https://vpshostingservice.co/store/vps-nvme LetBox - https://my.letbox.com/index.php?rp=/store/vps
  16. Introduction ZNC is an IRC network bouncer software. ZNC comes with various modules and features that can cater to your usage requirements. We will be compiling ZNC with the web interface enabled in this tutorial. In the web interface, you can create, edit, configure, and remove users from your ZNC instance. Installation If you want to compile ZNC with OpenSSL support, you need the OpenSSL development package. On Debian/Ubuntu this is called libssl-dev, on CentOS/Fedora/Red Hat it's openssl-devel. If you want to compile ZNC with OpenSSL support, you need the OpenSSL development package. On Debian/Ubuntu this is called libssl-dev, on CentOS/Fedora/Red Hat it's openssl-devel, and on openSUSE it's libopenssl-devel. A good way to install this and other dependencies is the build dependency feature of package managers (apt-get build-dep / yum-builddep / zypper source-install --build-deps-only). Download the latest version of ZNC from https://znc.in/ wget https://znc.in/releases/znc-1.7.4.tar.gz tar -xzvf znc-1.7.4.tar.gz rm -rf znc-1.7.4.tar.gz cd znc-1.7.4 ./configure --prefix="$HOME/.local" (use --prefix="$HOME/.local" if you don't want a system wide installation or simply don't have root access; use --with-openssl=/path/to/openssl if you have a non-standard SSL path) (use --help to see other configure options) make (if you are on a dedicated server and your CPU has more than one core, you can use make -jX where X is the number of CPU cores to speed up compilation) make install Please note that compiling can take 5-10 minutes or more. If you get an error saying: No compiler with C++11 support was found do this: sudo apt-get install gcc-4.7 g++-4.7 and to start your ZNC, type: znc
  17. 1. SSH into the server SSH into the server running your HTTP website as a user with sudo privileges. 2. Install snapd You'll need to install snapd and make sure you follow any instructions to enable classic snap support. Follow these instructions on snapcraft's site to install snapd. or here; Installing snap on Debian sudo apt update sudo apt install snapd If the sudo command isn’t installed (usually because a root password was provided at install time), you can install snap by first switching to the root account: $ su root # apt update # apt install snapd Either log out and back in again, or restart your system, to ensure snap’s paths are updated correctly. After this, install the core snap in order to get the latest snapd. $ sudo snap install core core 16-2.45.2 from Canonical✓ installed Note: some snaps require new snapd features and will show an error such as snap "lxd" assumes unsupported features" during install. You can solve this issue by making sure the core snap is installed (snap install core) and it’s the latest version (snap refresh core). To test your system, install the hello-world snap and make sure it runs correctly: $ sudo snap install hello-world hello-world 6.3 from Canonical✓ installed $ hello-world Hello World! 3. Remove certbot-auto and any Certbot OS packages If you have any Certbot packages installed using an OS package manager like apt, dnf, or yum, you should remove them before installing the Certbot snap to ensure that when you run the command certbot the snap is used rather than the installation from your OS package manager. The exact command to do this depends on your OS, but common examples are sudo apt-get remove certbot, sudo dnf remove certbot, or sudo yum remove certbot. 4. Install Certbot Run this command on the command line on the machine to install Certbot. sudo snap install --classic certbot 5. Prepare the Certbot command Execute the following instruction on the command line on the machine to ensure that the certbot command can be run. sudo ln -s /snap/bin/certbot /usr/bin/certbot 6. Choose how you'd like to run Certbot Either get and install your certificates... Run this command to get a certificate and have Certbot edit your apache configuration automatically to serve it, turning on HTTPS access in a single step. sudo certbot --apache Or, just get a certificate If you're feeling more conservative and would like to make the changes to your apache configuration by hand, run this command. sudo certbot certonly --apache 7. Test automatic renewal The Certbot packages on your system come with a cron job or systemd timer that will renew your certificates automatically before they expire. You will not need to run Certbot again, unless you change your configuration. You can test automatic renewal for your certificates by running this command: sudo certbot renew --dry-run The command to renew certbot is installed in one of the following locations: /etc/crontab/ /etc/cron.*/* systemctl list-timers 8. Confirm that Certbot worked To confirm that your site is set up properly, visit https://yourwebsite.com/ in your browser and look for the lock icon in the URL bar.
  18. Install Python 3.11 on Ubuntu To install the latest Python 3.11 version, you can use “deadsnakes” team PPA which contains more recent Python versions packaged for Ubuntu. $ sudo add-apt-repository ppa:deadsnakes/ppa $ sudo apt update $ sudo apt install python3.11 If you want to install a specific Python version or multiple versions of Python in your Ubuntu system, you can simply run the following command with the Python version number as shown. $ sudo apt install python3.10 $ sudo apt install python3.9 $ sudo apt install python3.8 $ sudo apt install python3.7 $ sudo apt install python3.6 To view a list of all Python binaries installed on your system, run the following ls command. $ ls -l /usr/bin/python* List Python Binaries lrwxrwxrwx 1 root root 10 Apr 22 2022 /usr/bin/python3 -> python3.10 -rwxr-xr-x 1 root root 5901416 Apr 2 2022 /usr/bin/python3.10 -rwxr-xr-x 1 root root 6705016 Oct 24 15:56 /usr/bin/python3.11 -rwxr-xr-x 1 root root 960 Dec 23 2020 /usr/bin/python3-futurize -rwxr-xr-x 1 root root 964 Dec 23 2020 /usr/bin/python3-pasteurize From the output in the screenshot above, the default Python version on the test system is 3.10, you can also check the Python version using the following command. $ python -V Python 3.10.4
  19. Please allow some time for the configuration. And also please note For Ubuntu & Debian instance needs to enable IPV6 manually after configuring. Kindly follow the below-mentioned steps to enable the IPv6 address for your server. Login to your server via ssh connection and adding the the below entries in sysctl.conf file: nano /etc/sysctl.conf Scroll all the way down, and add the following lines at the end: net.ipv6.conf.all.autoconf = 0 net.ipv6.conf.all.accept_ra = 0 net.ipv6.conf.eth0.autoconf = 0 net.ipv6.conf.eth0.accept_ra = 0 To check run: sysctl -p Then try to restart network systemctl restart networking Then check with ping6 google.com If its still not working try to reboot your VPS once. Note: Lastly, also ensure that your /etc/sysctl.conf file does not have any values in place that might be disabling IPv6 connectivity. If it does, be sure to comment those out and refresh your settings afterwards by using "sysctl -p" or by rebooting your VPS.
  20. Version 1.0.0

    1 download

    Says the uptime of the machine and bot uptime of server connected. set pubtrig "!" # Set global|channel flags to trigger commands set sysflags o|m bind pub - ${pubtrig}uptime uptime:pub proc uptime:pub {nick uhost hand chan arg} { global uptime server sysflags if {([matchattr [nick2hand $nick] $sysflags]) && (![regexp c [getchanmode $chan]])} { puthelp "PRIVMSG $chan :\002S\002\037ystem\037: [eval exec uptime]" puthelp "PRIVMSG $chan :\002B\002\037ot\037 ($server): [duration [expr [unixtime] - $uptime]]" } else { if {([matchattr [nick2hand $nick] $sysflags]) && ([regexp c [getchanmode $chan]])} { puthelp "PRIVMSG $chan :System: [eval exec uptime]" puthelp "PRIVMSG $chan :Bot ($server): [duration [expr [unixtime] - $uptime]]" } } } bind pub - ${pubtrig}os osystem:pub proc osystem:pub {nick uhost hand chan arg} { global botnick sysflags if {([matchattr [nick2hand $nick] $sysflags]) && (![regexp c [getchanmode $chan]])} { puthelp "PRIVMSG $chan :\002O\002\037perating\037 \002S\002\037ystem\037: [eval exec uname] [eval exec uname -r]" } else { if {([matchattr [nick2hand $nick] $sysflags]) && ([regexp c [getchanmode $chan]])} { puthelp "PRIVMSG $chan :Operating System: [eval exec uname] [eval exec uname -r]" } } }
    Free
  21. Pugsley

    Channel Relay

    Chanrelay.tcl 3.14 by CrazyCat Download here You need to have two (2) eggdrop bot to work this script. =================================================== set regg(tin) { <-------- the username of your bot (Bot A) "chan" "#aslpls" "network" "UnderX" "highlight" 3 "log" "y" "oper" "y" "syn_topic" "y" "col_act" "lightred" "col_jpq" "lightblue" "col_mode" "green" "usermask" "\[%network%\] <%nick%>" } set regg(rest) { <-------- the username of your bot (Bot B) "chan" "#aslpls" "network" "Undernet" "highlight" 3 "oper" "y" } =================================================== From your eggdrop directory, create a folder name "databases" Now, run the bot and follow the commands afterwards. Done.
  22. How do I link two bots? Two bots can link through a TCP connection (telnet) and you will then be able to talk to the people on others bots partyline. You will need at least Botnet Master access on both bots to link them, or have someone do their stuff on the other side. You will have to know the address and port each bot is listening to. Then, all you need to link them is to set the following: 1. Decide which bot you will want to link to which one. Let's say it is BotA and BotB.On BotA, add an bot record for BotB. .+bot BotB botb.telnetaddress.here:port (if you already have a BotB user without the +b flag, remove it, and readd it this way. You cannot simply do a .chattr BotB +b to turn it into a bot) 2. On BotB, do the same for BotA: .+bot BotA bota.telnetaddress.here:port 3. How can I make my bots always connect to each other when they start (+h)? You will want to make one of the bots the HUB of your little botnet, that is, other bots will always try to connect to it first. For this, you must set it with the +h bot flag on all other bots. In the case you have BotA and BotB, and want BotA to connect to BotB and vice-versa, you set the +h flag to the opposite bot: on BotB: .botattr +h BotA on BotA: .botattr +h BotB 4. Link both bots, from any side. For example from BotA, type: .link BotB They should link and tell you that it was successful. It's DONE. What if my bots won't link for some reason? The password is incorrect. Remove the password on both bots: on BotB: .chpass BotA on BotA: .chpass BotB Link again If still some other error occurred: Check if you have set the telnet-addresses and the port number correct. Use the .dccstat command on both bots to see if they are really listening "(telnet) * lstn" on the ports you specified. Make sure you are not using a firewall, if you are, you need to guarantee that the telnet connection from one bot to the other can come through it. See some settings in the sample configuration file for further help. Source: BASCHNY
  23. Version 1.0.0

    2 downloads

    Auto Speak in YOur Channel.
    Free
  24. Version 1.0.0

    0 downloads

    NickServ Networks
    Free
  25. Version 1.0.0

    1 download

    this script is for ircop only.
    Free
  26. Version 1.0.0

    0 downloads

    Warning! C-style comments (/* and */) in vhostfile might confuse this script Za da go upravlqva i ima dostap user do komandata trqbva da ima flag +V Usage: .dellvhost spoof/vhost example: .dellvhost test.com Usage: .addvhost ident@host password vhost example: .addvhost *ident@83.43.56.45 pass123 spoof.com Location ot ircd's vhosts.conf - bot must be on the same shell, or have access to it
    Free
  1. Load more activity
Ă—
Ă—
  • Create New...