Skip to content

Instantly share code, notes, and snippets.

View cheeseonamonkey's full-sized avatar
😅
Sweating, and smiling

Alexander H cheeseonamonkey

😅
Sweating, and smiling
View GitHub Profile
@cheeseonamonkey
cheeseonamonkey / adb-tailscale-android-use.md
Created February 5, 2026 06:31 — forked from shehbajdhillon/adb-tailscale-android-use.md
Setup guide for letting AI agents (Claude Code, Cursor, etc.) control your Android remotely via ADB + Tailscale

ADB over Tailscale

Securely connect to Android over the internet using ADB + Tailscale.

You can also copy paste this gist into your agent of choice and have it explain you what to do.

This guide sets up remote ADB access so you can run android-use — an agent skill that lets AI interact with your Android device over ADB.


@cheeseonamonkey
cheeseonamonkey / snowflake_iran.py
Last active February 5, 2026 06:33
snoflake iran (run a Tor Snowflake proxy in Docker without any headaches; ~40% of all Snowflake traffic is estimated to be Iranian)
#!/usr/bin/env python3
"""
snowflake.py — Snowflake proxy manager + robust impact stats (Docker)
- One file
- Privacy-safe (no IPs, no geo, no guessing)
- Horizontal scaling
"""
from __future__ import annotations
ollama list | awk 'NR>1 {print $1}' | fzf | xargs -I{} sh -c \
'GGUF="$(ollama show {} --modelfile | awk "/^FROM /{print \$2}")"; \
npx @huggingface/gguf --show-tensor "$GGUF"'
# === ULTIMATE METRIC MINER (EXTENDED FOR MINING & BANDWIDTH APPS) ===
Clear-Host
$H = "Cyan"; $V = "White"; $L = "DarkGray"; $W = "Yellow"
# 1. CPU DEEP DIVE + INSTRUCTION SETS
Write-Host "--- [1] CPU METRICS + INSTRUCTION SETS ---" -ForegroundColor $H
$cpu = Get-CimInstance Win32_Processor
$cpuCache = Get-CimInstance Win32_CacheMemory
$l2 = ($cpuCache | Where-Object { $_.Level -eq 4 -or $_.Purpose -eq "L2 Cache" } | Measure-Object -Property MaxCacheSize -Sum).Sum
$l3 = ($cpuCache | Where-Object { $_.Level -eq 5 -or $_.Purpose -eq "L3 Cache" } | Measure-Object -Property MaxCacheSize -Sum).Sum
@cheeseonamonkey
cheeseonamonkey / _output.md
Last active January 20, 2026 11:27
scout.py -

Python code scout: metrics + locally-generated summaries.

It’s useful for AI-agent priming because it extracts code into a dense signal - enough context for an agent to start acting like it “read the code.”

The summaries are actually quite lit; runs locally on your CPU (the model is <200MB) and is good at explaining what the code does, not just what it’s called.

  • Scout on itself compresses 5,123 source tokens into 1,628.
  • In another larger project: 22,962 into just 6,372! The agent could describe the whole thing technically, predict bugs, and suggest refactors with no additional context from source.
@cheeseonamonkey
cheeseonamonkey / install_vivaldi.sh
Created January 7, 2026 11:24 — forked from pkorpine/install_vivaldi.sh
Add Vivaldi repo to Debian/Ubuntu
echo "deb http://repo.vivaldi.com/stable/deb/ stable main" | sudo tee /etc/apt/sources.list.d/vivaldi.list > /dev/null
wget -O - http://repo.vivaldi.com/stable/linux_signing_key.pub | sudo apt-key add -
sudo apt update && sudo apt install vivaldi-stable
netcheck() {
emulate -L zsh
setopt local_options no_monitor no_notify
local R=$'\e[0m' B=$'\e[1m' G=$'\e[32m' E=$'\e[31m' D=$'\e[90m'
local OK="${B}${G}${R}" NO="${B}${E}${R}" WAIT="${D}${R}"
local host=google.com url=http://connectivitycheck.gstatic.com/generate_204
local dns=$WAIT http=$WAIT dp hp dr hr
draw(){ print -nr -- $'\r\e[2K'"DNS [$dns] | HTTP [$http]"; }
@cheeseonamonkey
cheeseonamonkey / _usage.md
Last active January 5, 2026 06:13
Set up a fresh server (runpod, linode, etc.) the way I like it.
curl -fsSL "https://gist.githubusercontent.com/cheeseonamonkey/38d6464c26332d73743144fc771d3c0f/raw/206180318661c451b976d9fe47425e5a930d7f74/bootstrap_fresh_host.sh" | bash
@cheeseonamonkey
cheeseonamonkey / easytether_doctor.zsh
Created December 19, 2025 13:16
easytether doctor script
#!/usr/bin/env zsh
# Quick diagnostics for the EasyTether USB path.
set -u
header() {
printf '\n== %s ==\n' "$1"
}
status() {
@cheeseonamonkey
cheeseonamonkey / choice_enum_scraper.py
Created December 17, 2025 03:14
choice hotels hidden services analysis?
#!/usr/bin/env python3
import re, time, json, gzip, argparse, hashlib, logging
from urllib.parse import urljoin, urlparse, parse_qs
from xml.etree import ElementTree as ET
from curl_cffi import requests
from curl_cffi.requests.exceptions import Timeout, RequestException
BASE = "https://www.choicehotels.com"
BROWSERS = ["chrome120", "chrome110", "safari17"]