s .. .. .x+=:.
:8 oe .x~~"*Weu. x .d88" . uW8" z` ^%
.u . u. .88 .@88 d8Nu. 9888c 5888R `t888 . <k
.d88B :@8c ...ue888b :888ooo =*88888 88888 98888 '888R u 8888 . .@8Ned8"
="8888f8888r 888R Y888r -*8888888 88888 "***" 9888% 888R us888u. 9888.z88N .@^%8888"
4888>'88" 888R I888> 8888 88888 ..@8*" 888R .@88 "8888" 9888 888E x88: `)8b.
4888> ' 888R I888> 8888 88888 ````"8Weu 888R 9888 9888 9888 888E 8888N=*8888
4888> 888R I888> 8888 88888 .. ?8888L 888R 9888 9888 9888 888E %8" R88
.d888L .+ u8888cJ888 .8888Lu= 88888 :@88N '8888N 888R 9888 9888 9888 888E @8Wou 9%
^"8888*" "*888*P" ^%888* 88888 *8888~ '8888F .888B . 9888 9888 .8888 888" .888888P`
"Y" 'Y" 'Y" 88888 '*8"` 9888% ^*888% "888*""888" `%888*%" ` ^"F
'**%%%%%%** `~===*%"` "% ^Y" ^Y' "`
Scripts for building/solving puzzles, exploiting vulnerabilities, or solving simple problems.