A multipurpose bot designed to make Discord better for everyone, written in Python.

Overview

Hadum

Hadum

CodeFactor Python license

A multipurpose bot that makes Discord better for everyone

Features

  • A Fully Functional Moderation component: manage your staff, members and permissions all in one bot.
  • Memes.
  • Support Chatbot (Coming Soon™)

Commands

Hadum Features a wide(-ish) set of commands to choose from.

Command Usage Description
ping h.ping Get Latency between bot and Discord Servers
coinflip h.coinflip Flip a coin!
kick h.kick [user] [reason] Kick a user from your guild
masskick h.masskick [users] Kicks multiple users at a time
ban h.ban [user] [reason] Permanently Bans a user
massban h.massban [users] Bans multiple users at a time
purge h.purge [number_of_messages] Delete messages in the current channel

Command Line Args

Hadum Features a few CLI args to choose from (more coming soon)

Name/Flag Description
-q Skip the 'Hadum' loading animation
-v Show error logs in console
-h Get help

To use them, enter

python main.py /[ARG_FLAG]  # Windows
python3 main.py -[ARG_FLAG] # Linux/Unix-like/Windows WSL

Hosting on your own machine

So, you edited the code to your own liking and now you want to host it on your own machine? No problem! There are 3 ways of installing the bot:

  1. (NOTE: This is now deprecated, use Docker instead.) For an automatic install, run bash scripts/install.sh (Linux/Unix or Windows WSL only) in the root directory of the project

  2. For a Docker Installation, run the following command (don't ignore comments!):

    docker run -it $(docker build --build-args token=BOT_TOKEN -q .)  # Replace 'BOT_TOKEN' with your token.
  3. Or by following the steps below for a manual installation of the bot:

    1. Clone the repository using
    git clone https://github.com/shadawcraw/Hadum.git
    cd Hadum  # Accessing the project directory
    1. To install the dependencies, Run in the root folder of the project the following command:
    python -m pip  --no-cache-dir -r requirements.txt  # Windows
    python3 -m pip3 --no-cache-dir -r requirements.txt # Windows WSL, Linux and UNIX-Like systems (OSX)

    In a Bash/ZSH shell or in Windows WSL.

    1. Then, create a file named ".env" in the root folder of the project.

    2. Once that is done, enter the following lines into the .env file created earlier: TOKEN="[YOUR_TOKEN_HERE]" Remember to put the variable name in ALL CAPS and replace the brackets and the text inside it with your own token.

    3. After that, you're all set! Run the run.sh file or enter python main.py for Windows and python3 main.py for Linux and Unix-like systems.

Changelog

See CHANGELOG.md

Addendum A

Run docker image ls to see available images and their IDs

Comments
  • Sourcery refactored master branch

    Sourcery refactored master branch

    Branch master refactored by Sourcery.

    If you're happy with these changes, merge this Pull Request using the Squash and merge strategy.

    See our documentation here.

    Run Sourcery locally

    Reduce the feedback loop during development by using the Sourcery editor plugin:

    Review changes via command line

    To manually merge these changes, make sure you're on the master branch, then run:

    git fetch origin sourcery/master
    git merge --ff-only FETCH_HEAD
    git reset HEAD^
    

    Help us improve this pull request!

    opened by sourcery-ai[bot] 1
  • [Snyk] Security upgrade python from 3.9.5 to 3.9

    [Snyk] Security upgrade python from 3.9.5 to 3.9

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.9, as this image has only 237 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 714 | Buffer Overflow
    SNYK-DEBIAN10-OPENSSL-1569403 | No Known Exploit | | critical severity | 714 | Buffer Overflow
    SNYK-DEBIAN10-OPENSSL-1569403 | No Known Exploit | | critical severity | 714 | Buffer Overflow
    SNYK-DEBIAN10-OPENSSL-1569403 | No Known Exploit | | high severity | 614 | Out-of-bounds Read
    SNYK-DEBIAN10-OPENSSL-1569406 | No Known Exploit | | medium severity | 514 | CVE-2021-4160
    SNYK-DEBIAN10-OPENSSL-2388381 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

    opened by snyk-bot 0
  • [Snyk] Security upgrade python from 3.9.5 to 3.9.10

    [Snyk] Security upgrade python from 3.9.5 to 3.9.10

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.9.10, as this image has only 237 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN10-EXPAT-2406128 | No Known Exploit | | critical severity | 714 | Buffer Overflow
    SNYK-DEBIAN10-OPENSSL-1569403 | No Known Exploit | | critical severity | 714 | Buffer Overflow
    SNYK-DEBIAN10-OPENSSL-1569403 | No Known Exploit | | critical severity | 714 | Buffer Overflow
    SNYK-DEBIAN10-OPENSSL-1569403 | No Known Exploit | | high severity | 614 | Out-of-bounds Read
    SNYK-DEBIAN10-OPENSSL-1569406 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

    opened by snyk-bot 0
  • [Snyk] Security upgrade python from 3.9.5 to 3.9

    [Snyk] Security upgrade python from 3.9.5 to 3.9

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.9, as this image has only 235 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | high severity | 567 | SQL Injection
    SNYK-DEBIAN10-CYRUSSASL2-2412041 | No Known Exploit | | high severity | 567 | SQL Injection
    SNYK-DEBIAN10-CYRUSSASL2-2412041 | No Known Exploit | | critical severity | 714 | Buffer Overflow
    SNYK-DEBIAN10-OPENSSL-1569403 | No Known Exploit | | critical severity | 714 | Buffer Overflow
    SNYK-DEBIAN10-OPENSSL-1569403 | No Known Exploit | | high severity | 614 | Out-of-bounds Read
    SNYK-DEBIAN10-OPENSSL-1569406 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

    opened by snyk-bot 0
  • [Snyk] Security upgrade python from 3.8 to 3.9.5

    [Snyk] Security upgrade python from 3.8 to 3.9.5

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.9.5, as this image has only 458 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2331802 | No Known Exploit | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2331808 | No Known Exploit | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2331811 | No Known Exploit | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2359255 | No Known Exploit | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2384928 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    opened by snyk-bot 0
  • [Snyk] Security upgrade python from 3.8 to 3.10.0b3

    [Snyk] Security upgrade python from 3.8 to 3.10.0b3

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.10.0b3, as this image has only 458 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2331802 | No Known Exploit | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2331808 | No Known Exploit | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2331811 | No Known Exploit | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2359255 | No Known Exploit | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2384928 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    opened by snyk-bot 0
  • [Snyk] Security upgrade python from 3.8 to 3.9.5

    [Snyk] Security upgrade python from 3.8 to 3.9.5

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.9.5, as this image has only 449 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2359255 | No Known Exploit | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2359255 | No Known Exploit | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2384928 | No Known Exploit | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2384928 | No Known Exploit | | critical severity | 500 | Improper Input Validation
    SNYK-DEBIAN11-PYTHON39-1290158 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    opened by snyk-bot 0
  • [Snyk] Security upgrade python from 3.8 to 3.10.0b2

    [Snyk] Security upgrade python from 3.8 to 3.10.0b2

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.10.0b2, as this image has only 449 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2359255 | No Known Exploit | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2359255 | No Known Exploit | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2384928 | No Known Exploit | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2384928 | No Known Exploit | | critical severity | 500 | Improper Input Validation
    SNYK-DEBIAN11-PYTHON39-1290158 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    opened by snyk-bot 0
  • [Snyk] Security upgrade python from 3.8 to 3.10.0b2

    [Snyk] Security upgrade python from 3.8 to 3.10.0b2

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.10.0b2, as this image has only 449 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2359255 | No Known Exploit | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2359255 | No Known Exploit | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2384928 | No Known Exploit | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2384928 | No Known Exploit | | critical severity | 500 | Buffer Overflow
    SNYK-DEBIAN11-GLIBC-2340922 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    opened by snyk-bot 0
  • Bump certifi from 2021.10.8 to 2022.12.7

    Bump certifi from 2021.10.8 to 2022.12.7

    Bumps certifi from 2021.10.8 to 2022.12.7.

    Commits

    Dependabot compatibility score

    Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


    Dependabot commands and options

    You can trigger Dependabot actions by commenting on this PR:

    • @dependabot rebase will rebase this PR
    • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
    • @dependabot merge will merge this PR after your CI passes on it
    • @dependabot squash and merge will squash and merge this PR after your CI passes on it
    • @dependabot cancel merge will cancel a previously requested merge and block automerging
    • @dependabot reopen will reopen this PR if it is closed
    • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
    • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
    • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
    • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    • @dependabot use these labels will set the current labels as the default for future PRs for this repo and language
    • @dependabot use these reviewers will set the current reviewers as the default for future PRs for this repo and language
    • @dependabot use these assignees will set the current assignees as the default for future PRs for this repo and language
    • @dependabot use this milestone will set the current milestone as the default for future PRs for this repo and language

    You can disable automated security fix PRs for this repo from the Security Alerts page.

    dependencies 
    opened by dependabot[bot] 0
  • [Snyk] Security upgrade aiohttp from 3.7.4.post0 to 3.8.0

    [Snyk] Security upgrade aiohttp from 3.7.4.post0 to 3.8.0

    This PR was automatically created by Snyk using the credentials of a real user.


    Snyk has created this PR to fix one or more vulnerable packages in the `pip` dependencies of this project.

    Changes included in this PR

    • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
      • requirements.txt

    Vulnerabilities that will be fixed

    By pinning:

    Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------|:------------------------- high severity | 686/1000
    Why? Proof of Concept exploit, Has a fix available, CVSS 7.3 | HTTP Header Injection
    SNYK-PYTHON-AIOHTTP-1584144 | aiohttp:
    3.7.4.post0 -> 3.8.0
    | No | Proof of Concept

    (*) Note that the real score may have changed since the PR was raised.

    Some vulnerabilities couldn't be fully fixed and so Snyk will still find them when the project is tested again. This may be because the vulnerability existed within more than one direct dependency, but not all of the affected dependencies could be upgraded.

    Check the changes in this PR to ensure they won't cause issues with your project.


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    📚 Read more about Snyk's upgrade and patch logic


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

    opened by BiasedKiwi 0
  • [Snyk] Security upgrade aiohttp from 3.7.4.post0 to 3.8.0

    [Snyk] Security upgrade aiohttp from 3.7.4.post0 to 3.8.0

    This PR was automatically created by Snyk using the credentials of a real user.


    Snyk has created this PR to fix one or more vulnerable packages in the `pip` dependencies of this project.

    Changes included in this PR

    • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
      • requirements.txt

    Vulnerabilities that will be fixed

    By pinning:

    Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------|:------------------------- high severity | 686/1000
    Why? Proof of Concept exploit, Has a fix available, CVSS 7.3 | HTTP Header Injection
    SNYK-PYTHON-AIOHTTP-1584144 | aiohttp:
    3.7.4.post0 -> 3.8.0
    | No | Proof of Concept

    (*) Note that the real score may have changed since the PR was raised.

    Some vulnerabilities couldn't be fully fixed and so Snyk will still find them when the project is tested again. This may be because the vulnerability existed within more than one direct dependency, but not all of the affected dependencies could be upgraded.

    Check the changes in this PR to ensure they won't cause issues with your project.


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    📚 Read more about Snyk's upgrade and patch logic


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

    opened by BiasedKiwi 0
  • [Snyk] Security upgrade aiohttp from 3.7.4.post0 to 3.8.0

    [Snyk] Security upgrade aiohttp from 3.7.4.post0 to 3.8.0

    This PR was automatically created by Snyk using the credentials of a real user.


    Snyk has created this PR to fix one or more vulnerable packages in the `pip` dependencies of this project.

    Changes included in this PR

    • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
      • requirements.txt

    Vulnerabilities that will be fixed

    By pinning:

    Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------|:------------------------- high severity | 686/1000
    Why? Proof of Concept exploit, Has a fix available, CVSS 7.3 | HTTP Header Injection
    SNYK-PYTHON-AIOHTTP-1584144 | aiohttp:
    3.7.4.post0 -> 3.8.0
    | No | Proof of Concept

    (*) Note that the real score may have changed since the PR was raised.

    Some vulnerabilities couldn't be fully fixed and so Snyk will still find them when the project is tested again. This may be because the vulnerability existed within more than one direct dependency, but not all of the affected dependencies could be upgraded.

    Check the changes in this PR to ensure they won't cause issues with your project.


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    📚 Read more about Snyk's upgrade and patch logic


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

    opened by BiasedKiwi 0
Releases(v0.7.4)
  • v0.7.4(Jan 28, 2022)

    Version 0.7.4

    What's Changed

    • Minor changes to the install script by @shadawcraw in https://github.com/shadawcraw/Hadum-Bot/pull/26

    Full Changelog: https://github.com/shadawcraw/Hadum-Bot/compare/v0.7.3...v0.7.4

    Source code(tar.gz)
    Source code(zip)
  • v0.7.3(Jan 27, 2022)

    Version 0.7.3

    What's Changed

    • General code cleanup by @shadawcraw in https://github.com/shadawcraw/Hadum-Bot/pull/25

    Full Changelog: https://github.com/shadawcraw/Hadum-Bot/compare/v0.7.2...v0.7.3

    Source code(tar.gz)
    Source code(zip)
  • v0.7.2(Jan 27, 2022)

    Version 0.7.2

    What's Changed

    • Update install script by @shadawcraw in https://github.com/shadawcraw/Hadum-Bot/pull/22

    Full Changelog: https://github.com/shadawcraw/Hadum-Bot/compare/v0.7.1...v0.7.2

    Source code(tar.gz)
    Source code(zip)
  • v0.7.1(Jan 25, 2022)

    Version 0.7.1

    What's Changed

    • Update issue templates by @shadawcraw in https://github.com/shadawcraw/Hadum-Bot/pull/2
    • Added SQLite Support by @shadawcraw in https://github.com/shadawcraw/Hadum-Bot/pull/8
    • Sourcery refactored master branch by @sourcery-ai in https://github.com/shadawcraw/Hadum-Bot/pull/20
    • Add install script by @shadawcraw in https://github.com/shadawcraw/Hadum-Bot/pull/21

    New Contributors

    • @sourcery-ai made their first contribution in https://github.com/shadawcraw/Hadum-Bot/pull/20

    Full Changelog: https://github.com/shadawcraw/Hadum-Bot/compare/v0.9.0...v0.7.1

    Source code(tar.gz)
    Source code(zip)
  • v0.8.0(Jan 27, 2022)

    Version 0.8.0

    What's Changed

    • Auto Updates and Discord Status by @shadawcraw in https://github.com/shadawcraw/Hadum-Bot/pull/19

    Full Changelog: https://github.com/shadawcraw/Hadum-Bot/compare/v0.6.2...v0.8.0

    Source code(tar.gz)
    Source code(zip)
  • v0.7.0(Dec 19, 2021)

    Version 0.7.0

    What's Changed

    • Auto Updates and Discord Status by @shadawcraw in https://github.com/HadumDev/Hadum-Bot/pull/19

    Full Changelog: https://github.com/HadumDev/Hadum-Bot/compare/v0.6.2...v0.7.0

    Source code(tar.gz)
    Source code(zip)
  • v0.6.2(Dec 19, 2021)

    Version 0.6.2

    What's Changed

    • Add .env.example by @shadawcraw in https://github.com/HadumDev/Hadum-Bot/pull/18

    Full Changelog: https://github.com/HadumDev/Hadum-Bot/compare/v0.6.1...v0.6.2

    Source code(tar.gz)
    Source code(zip)
  • v0.6.1(Dec 18, 2021)

    Version 0.6.1

    What's Changed

    • v0.6.0 by @shadawcraw in https://github.com/HadumDev/Hadum-Bot/pull/15
    • v0.6.1 by @shadawcraw in https://github.com/HadumDev/Hadum-Bot/pull/16

    Full Changelog: https://github.com/HadumDev/Hadum-Bot/compare/v0.6.0...v0.6.1

    Source code(tar.gz)
    Source code(zip)
  • v0.6.0(Dec 13, 2021)

  • v0.5.0(Dec 13, 2021)

  • v0.4.0(Dec 13, 2021)

  • v0.3.0(Dec 13, 2021)

  • v0.2.0(Dec 13, 2021)

  • v0.1.0(Dec 13, 2021)

API kumpulan doa-doa sesuai al-qur'an dan as-sunnah

API kumpulan doa-doa sesuai al-qur'an dan as-sunnah

Miftah Afina 4 Nov 26, 2022
A Python library for the Docker Engine API

Docker SDK for Python A Python library for the Docker Engine API. It lets you do anything the docker command does, but from within Python apps – run c

Docker 6.1k Jan 03, 2023
NFTs Upload to OpenSea CuseEdition

NFTs-Upload-to-OpenSea-CuseEdition YOUTUBE VIDEO - Soon... Download Python and

Lil Cuse 2 Jan 04, 2022
BiliBili-live-barrage-transceiver - A simple python program for sending and receiving barrage in bilibili live room

BiliBili-live-barrage-transceiver - A simple python program for sending and receiving barrage in bilibili live room

zeroy 2 Jan 18, 2022
A superb Telegram VoiceChat Player. Powered by FalconRoBo.

𝕱𝖆𝖑𝖈𝖔𝖓𝕸𝖚𝖘𝖎𝖈 A sᴜᴘᴇʀʙ Tᴇʟᴇɢʀᴀᴍ VᴏɪᴄᴇCʜᴀᴛ Pʟᴀʏᴇʀ, ᴍᴀᴅᴇ ᴜsɪɴɢ Lᴀᴛᴇsᴛ Pʏᴛʜᴏɴ ᴀɴᴅ Pʏʀᴏɢʀᴀᴍ. 𝑷𝒐𝒘𝒆𝒓𝒆𝒅 𝒃𝒚 𝑭𝒂𝒍𝒄𝒐𝒏𝑹𝒐𝑩𝒐 FalconMusic

FalconRoBo 2 Oct 21, 2022
Script que realiza a identificação de todos os logins e senhas dos wifis conectados em uma máquina e envia os dados para um e-mail especificado.

getWIFIConnection Script que realiza a identificação de todos os logins e senhas dos wifis conectados em uma máquina e envia os dados para um e-mail e

Vinícius Azevedo 3 Nov 27, 2022
A Rich renderable for viewing Multiple Sequence Alignments in the terminal.

rich-msa A simple module to render colorful Multiple Sequence Alignment with rich in the terminal. 🔧 Installing Install the rich-msa package directly

Martin Larralde 64 Dec 04, 2022
A simple Discord Bot that uses the free CryptoCompare API to display cryptocurrency prices

What is this? This is a simple Discord Bot coded in Python that uses the free CryptoCompare API to display cryptocurrency prices Download Use git to c

Kevin 10 Apr 17, 2022
Simulación con el método de Montecarlo para verificar ganancias con márgenes negativos.

Apliación del método Monte Carlo a un ejemplo que incluye márgenes negativos. Por Marco A. de la Cruz Importante La información contenida en este ejem

1 Jan 17, 2022
Quot-a-lecture - Lecture transcript question extraction

Setup virtualenv venv source venv/bin/activate pip install -r requirements.txt

Pratyaksh Sharma 5 Sep 12, 2022
A userbot made for telegram

𝚃𝙷𝙴 𝙼𝙰𝙵𝙸𝙰𝙱𝙾𝚃 This is a userbot made for telegram. I made this userbot with help of all other userbots available in telegram. All credits go

MafiaBotOP 8 Apr 08, 2022
A Discord bot that enables using breakout rooms on a server

Discord Breakout Room Bot This bot enables you to use breakout rooms on your Discord server! Note This bot was thrown together within a few hours, so

Till Müller 2 Nov 23, 2021
Reddit bot for r/khiphop

khiphop-bot Description This project is a collection of scripts that better the state of the r/khiphop subreddit, which represents Korean Hip-Hop and

1 Dec 21, 2021
Python package for agilex robotics mobile base platform

This is Python API for Agilex Robotics Mobile base This is a python API for Can communication with Agilex Robotics Mobile base and controlling it. Sup

7 Sep 06, 2022
Simple Telegram AI Chat bot made using OpenAI and Luna API

Yui Yui, is a simple telegram chat bot made using OpenAI and Luna Chat bot Deployment 👀 Deploying is easy 🤫 ! You can deploy this bot in Heroku or i

I'm Not A Bot #Left_TG 21 Dec 29, 2022
Telegram vc userbot

Telegram Vc Userbot Available Commands /ping :- To check whether userbot is up or not /joinvc :- To join vc /leavevc :- To leave vc /join_group :- To

NandyDark 7 Nov 18, 2022
You cant check for conflicts until course enrolment actually opens. I wanted to do it earlier.

AcornICS I noticed that Acorn it does not let you check if a timetable is valid based on the enrollment cart, it also does not let you visualize it ea

Isidor Kaplan 2 Sep 16, 2021
Multi-purpose bot made with discord.py

PizzaHat Discord Bot A multi-purpose bot for your server! ℹ️ • Info PizzaHat is a multi-purpose bot, made to satisfy your needs, as well as your serve

DTS 28 Dec 16, 2022
NFT Generator - A NFT Generator created using Python

NFT_Generator v1 An NFT Generator created using Python. This NFT Generation tool

3 Dec 02, 2022
BingBot - A bot that will automate searches on bing

bingBot A bot that will automate searches on bing. To install this just download

Lukas 2 Jul 28, 2022