Skip to content

Instantly share code, notes, and snippets.

View killerswin2's full-sized avatar

killerswin2

View GitHub Profile
@UserUnknownFactor
UserUnknownFactor / exe_strings_tool.py
Last active August 25, 2025 15:43
Python tool to translate x86 exe strings by replacing their references to a newly created .trans PE section
import struct
import pefile
import re
import capstone
from tqdm import tqdm
CACHE_DIR = "__pycache__"
cache = None
ENABLE_CACHE = True
try:
@UserUnknownFactor
UserUnknownFactor / Japanese SFX.md
Last active August 24, 2025 19:57
Japanese game and manga text sound effect (SFX) database

Japanese SFX

Introduction

This is a compiled collection of common Japanese SFXs (sound effects or onomatopoeia).

This collection uses mostly Romaji transliterations. Some of them can be used in combination with other SFXs; some of them, or combinations thereof, can be written separately for emphasis within the same panel (example: do-ki-, ドッ キッ ), but can be considered part of the same action; some use repeated sub-elements or prolongation characters (ー) within them. All interjections can be written differently, usually to indicate particularly strong or repeated stimulation. For example, a cho in isolation is almost certainly a truncated version of chotto, where the speaker was distracted from finishing the word. A prolongation of a character, on the other hand, often implies lazy, harsh, or sloppy pronunciation, or possibly even a scream. Because of this, many SFXs can have multiple meanings, depending on the action drawn, as well as one's interpretation of that action.

@fnky
fnky / ANSI.md
Last active August 30, 2025 00:08
ANSI Escape Codes

ANSI Escape Sequences

Standard escape codes are prefixed with Escape:

  • Ctrl-Key: ^[
  • Octal: \033
  • Unicode: \u001b
  • Hexadecimal: \x1B
  • Decimal: 27
@augustoproiete
augustoproiete / ReadingPortableExecutable_PE_header.cs
Created December 6, 2016 04:03
Reading the Portable Executable (PE) header in C#
// Credits: John Stewien
// From: http://code.cheesydesign.com/?p=572
/*
Reading the Portable Executable (PE) header in C#
My job consists of writing fully custom applications for groups of people. The time pressure of these projects is quite high, so generally people start using the application while I’m still writing it, which means I write it modularly and add features as I go along. I also fix bugs as they are discovered. My clients are 2 tiered where expert users get a new build first, they test if for a while, and if they think it’s acceptable they then pass it on to others.
This method of distribution is quite ad-hoc so when a client rings me up and asks me to view their screen to look at something, it’s useful to know what build they are running. To facillitate this I print the link date in the main Window Title so I instantly have an idea about how old the version is that I am looking at. This date is calculated at run time. To do this requires reading in the Portable Executable (PE) header from th