A multipurpose bot designed to make Discord better for everyone, written in Python.

Overview

Hadum

Hadum

CodeFactor Python license

A multipurpose bot that makes Discord better for everyone

Features

  • A Fully Functional Moderation component: manage your staff, members and permissions all in one bot.
  • Memes.
  • Support Chatbot (Coming Soon™)

Commands

Hadum Features a wide(-ish) set of commands to choose from.

Command Usage Description
ping h.ping Get Latency between bot and Discord Servers
coinflip h.coinflip Flip a coin!
kick h.kick [user] [reason] Kick a user from your guild
masskick h.masskick [users] Kicks multiple users at a time
ban h.ban [user] [reason] Permanently Bans a user
massban h.massban [users] Bans multiple users at a time
purge h.purge [number_of_messages] Delete messages in the current channel

Command Line Args

Hadum Features a few CLI args to choose from (more coming soon)

Name/Flag Description
-q Skip the 'Hadum' loading animation
-v Show error logs in console
-h Get help

To use them, enter

python main.py /[ARG_FLAG]  # Windows
python3 main.py -[ARG_FLAG] # Linux/Unix-like/Windows WSL

Hosting on your own machine

So, you edited the code to your own liking and now you want to host it on your own machine? No problem! There are 3 ways of installing the bot:

  1. (NOTE: This is now deprecated, use Docker instead.) For an automatic install, run bash scripts/install.sh (Linux/Unix or Windows WSL only) in the root directory of the project

  2. For a Docker Installation, run the following command (don't ignore comments!):

    docker run -it $(docker build --build-args token=BOT_TOKEN -q .)  # Replace 'BOT_TOKEN' with your token.
  3. Or by following the steps below for a manual installation of the bot:

    1. Clone the repository using
    git clone https://github.com/shadawcraw/Hadum.git
    cd Hadum  # Accessing the project directory
    1. To install the dependencies, Run in the root folder of the project the following command:
    python -m pip  --no-cache-dir -r requirements.txt  # Windows
    python3 -m pip3 --no-cache-dir -r requirements.txt # Windows WSL, Linux and UNIX-Like systems (OSX)

    In a Bash/ZSH shell or in Windows WSL.

    1. Then, create a file named ".env" in the root folder of the project.

    2. Once that is done, enter the following lines into the .env file created earlier: TOKEN="[YOUR_TOKEN_HERE]" Remember to put the variable name in ALL CAPS and replace the brackets and the text inside it with your own token.

    3. After that, you're all set! Run the run.sh file or enter python main.py for Windows and python3 main.py for Linux and Unix-like systems.

Changelog

See CHANGELOG.md

Addendum A

Run docker image ls to see available images and their IDs

Comments
  • Sourcery refactored master branch

    Sourcery refactored master branch

    Branch master refactored by Sourcery.

    If you're happy with these changes, merge this Pull Request using the Squash and merge strategy.

    See our documentation here.

    Run Sourcery locally

    Reduce the feedback loop during development by using the Sourcery editor plugin:

    Review changes via command line

    To manually merge these changes, make sure you're on the master branch, then run:

    git fetch origin sourcery/master
    git merge --ff-only FETCH_HEAD
    git reset HEAD^
    

    Help us improve this pull request!

    opened by sourcery-ai[bot] 1
  • [Snyk] Security upgrade python from 3.9.5 to 3.9

    [Snyk] Security upgrade python from 3.9.5 to 3.9

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.9, as this image has only 237 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 714 | Buffer Overflow
    SNYK-DEBIAN10-OPENSSL-1569403 | No Known Exploit | | critical severity | 714 | Buffer Overflow
    SNYK-DEBIAN10-OPENSSL-1569403 | No Known Exploit | | critical severity | 714 | Buffer Overflow
    SNYK-DEBIAN10-OPENSSL-1569403 | No Known Exploit | | high severity | 614 | Out-of-bounds Read
    SNYK-DEBIAN10-OPENSSL-1569406 | No Known Exploit | | medium severity | 514 | CVE-2021-4160
    SNYK-DEBIAN10-OPENSSL-2388381 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

    opened by snyk-bot 0
  • [Snyk] Security upgrade python from 3.9.5 to 3.9.10

    [Snyk] Security upgrade python from 3.9.5 to 3.9.10

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.9.10, as this image has only 237 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN10-EXPAT-2406128 | No Known Exploit | | critical severity | 714 | Buffer Overflow
    SNYK-DEBIAN10-OPENSSL-1569403 | No Known Exploit | | critical severity | 714 | Buffer Overflow
    SNYK-DEBIAN10-OPENSSL-1569403 | No Known Exploit | | critical severity | 714 | Buffer Overflow
    SNYK-DEBIAN10-OPENSSL-1569403 | No Known Exploit | | high severity | 614 | Out-of-bounds Read
    SNYK-DEBIAN10-OPENSSL-1569406 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

    opened by snyk-bot 0
  • [Snyk] Security upgrade python from 3.9.5 to 3.9

    [Snyk] Security upgrade python from 3.9.5 to 3.9

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.9, as this image has only 235 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | high severity | 567 | SQL Injection
    SNYK-DEBIAN10-CYRUSSASL2-2412041 | No Known Exploit | | high severity | 567 | SQL Injection
    SNYK-DEBIAN10-CYRUSSASL2-2412041 | No Known Exploit | | critical severity | 714 | Buffer Overflow
    SNYK-DEBIAN10-OPENSSL-1569403 | No Known Exploit | | critical severity | 714 | Buffer Overflow
    SNYK-DEBIAN10-OPENSSL-1569403 | No Known Exploit | | high severity | 614 | Out-of-bounds Read
    SNYK-DEBIAN10-OPENSSL-1569406 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

    opened by snyk-bot 0
  • [Snyk] Security upgrade python from 3.8 to 3.9.5

    [Snyk] Security upgrade python from 3.8 to 3.9.5

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.9.5, as this image has only 458 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2331802 | No Known Exploit | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2331808 | No Known Exploit | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2331811 | No Known Exploit | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2359255 | No Known Exploit | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2384928 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    opened by snyk-bot 0
  • [Snyk] Security upgrade python from 3.8 to 3.10.0b3

    [Snyk] Security upgrade python from 3.8 to 3.10.0b3

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.10.0b3, as this image has only 458 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2331802 | No Known Exploit | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2331808 | No Known Exploit | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2331811 | No Known Exploit | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2359255 | No Known Exploit | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2384928 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    opened by snyk-bot 0
  • [Snyk] Security upgrade python from 3.8 to 3.9.5

    [Snyk] Security upgrade python from 3.8 to 3.9.5

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.9.5, as this image has only 449 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2359255 | No Known Exploit | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2359255 | No Known Exploit | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2384928 | No Known Exploit | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2384928 | No Known Exploit | | critical severity | 500 | Improper Input Validation
    SNYK-DEBIAN11-PYTHON39-1290158 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    opened by snyk-bot 0
  • [Snyk] Security upgrade python from 3.8 to 3.10.0b2

    [Snyk] Security upgrade python from 3.8 to 3.10.0b2

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.10.0b2, as this image has only 449 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2359255 | No Known Exploit | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2359255 | No Known Exploit | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2384928 | No Known Exploit | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2384928 | No Known Exploit | | critical severity | 500 | Improper Input Validation
    SNYK-DEBIAN11-PYTHON39-1290158 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    opened by snyk-bot 0
  • [Snyk] Security upgrade python from 3.8 to 3.10.0b2

    [Snyk] Security upgrade python from 3.8 to 3.10.0b2

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.10.0b2, as this image has only 449 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2359255 | No Known Exploit | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2359255 | No Known Exploit | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2384928 | No Known Exploit | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2384928 | No Known Exploit | | critical severity | 500 | Buffer Overflow
    SNYK-DEBIAN11-GLIBC-2340922 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    opened by snyk-bot 0
  • Bump certifi from 2021.10.8 to 2022.12.7

    Bump certifi from 2021.10.8 to 2022.12.7

    Bumps certifi from 2021.10.8 to 2022.12.7.

    Commits

    Dependabot compatibility score

    Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


    Dependabot commands and options

    You can trigger Dependabot actions by commenting on this PR:

    • @dependabot rebase will rebase this PR
    • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
    • @dependabot merge will merge this PR after your CI passes on it
    • @dependabot squash and merge will squash and merge this PR after your CI passes on it
    • @dependabot cancel merge will cancel a previously requested merge and block automerging
    • @dependabot reopen will reopen this PR if it is closed
    • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
    • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
    • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
    • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    • @dependabot use these labels will set the current labels as the default for future PRs for this repo and language
    • @dependabot use these reviewers will set the current reviewers as the default for future PRs for this repo and language
    • @dependabot use these assignees will set the current assignees as the default for future PRs for this repo and language
    • @dependabot use this milestone will set the current milestone as the default for future PRs for this repo and language

    You can disable automated security fix PRs for this repo from the Security Alerts page.

    dependencies 
    opened by dependabot[bot] 0
  • [Snyk] Security upgrade aiohttp from 3.7.4.post0 to 3.8.0

    [Snyk] Security upgrade aiohttp from 3.7.4.post0 to 3.8.0

    This PR was automatically created by Snyk using the credentials of a real user.


    Snyk has created this PR to fix one or more vulnerable packages in the `pip` dependencies of this project.

    Changes included in this PR

    • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
      • requirements.txt

    Vulnerabilities that will be fixed

    By pinning:

    Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------|:------------------------- high severity | 686/1000
    Why? Proof of Concept exploit, Has a fix available, CVSS 7.3 | HTTP Header Injection
    SNYK-PYTHON-AIOHTTP-1584144 | aiohttp:
    3.7.4.post0 -> 3.8.0
    | No | Proof of Concept

    (*) Note that the real score may have changed since the PR was raised.

    Some vulnerabilities couldn't be fully fixed and so Snyk will still find them when the project is tested again. This may be because the vulnerability existed within more than one direct dependency, but not all of the affected dependencies could be upgraded.

    Check the changes in this PR to ensure they won't cause issues with your project.


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    📚 Read more about Snyk's upgrade and patch logic


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

    opened by BiasedKiwi 0
  • [Snyk] Security upgrade aiohttp from 3.7.4.post0 to 3.8.0

    [Snyk] Security upgrade aiohttp from 3.7.4.post0 to 3.8.0

    This PR was automatically created by Snyk using the credentials of a real user.


    Snyk has created this PR to fix one or more vulnerable packages in the `pip` dependencies of this project.

    Changes included in this PR

    • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
      • requirements.txt

    Vulnerabilities that will be fixed

    By pinning:

    Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------|:------------------------- high severity | 686/1000
    Why? Proof of Concept exploit, Has a fix available, CVSS 7.3 | HTTP Header Injection
    SNYK-PYTHON-AIOHTTP-1584144 | aiohttp:
    3.7.4.post0 -> 3.8.0
    | No | Proof of Concept

    (*) Note that the real score may have changed since the PR was raised.

    Some vulnerabilities couldn't be fully fixed and so Snyk will still find them when the project is tested again. This may be because the vulnerability existed within more than one direct dependency, but not all of the affected dependencies could be upgraded.

    Check the changes in this PR to ensure they won't cause issues with your project.


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    📚 Read more about Snyk's upgrade and patch logic


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

    opened by BiasedKiwi 0
  • [Snyk] Security upgrade aiohttp from 3.7.4.post0 to 3.8.0

    [Snyk] Security upgrade aiohttp from 3.7.4.post0 to 3.8.0

    This PR was automatically created by Snyk using the credentials of a real user.


    Snyk has created this PR to fix one or more vulnerable packages in the `pip` dependencies of this project.

    Changes included in this PR

    • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
      • requirements.txt

    Vulnerabilities that will be fixed

    By pinning:

    Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------|:------------------------- high severity | 686/1000
    Why? Proof of Concept exploit, Has a fix available, CVSS 7.3 | HTTP Header Injection
    SNYK-PYTHON-AIOHTTP-1584144 | aiohttp:
    3.7.4.post0 -> 3.8.0
    | No | Proof of Concept

    (*) Note that the real score may have changed since the PR was raised.

    Some vulnerabilities couldn't be fully fixed and so Snyk will still find them when the project is tested again. This may be because the vulnerability existed within more than one direct dependency, but not all of the affected dependencies could be upgraded.

    Check the changes in this PR to ensure they won't cause issues with your project.


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    📚 Read more about Snyk's upgrade and patch logic


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

    opened by BiasedKiwi 0
Releases(v0.7.4)
  • v0.7.4(Jan 28, 2022)

    Version 0.7.4

    What's Changed

    • Minor changes to the install script by @shadawcraw in https://github.com/shadawcraw/Hadum-Bot/pull/26

    Full Changelog: https://github.com/shadawcraw/Hadum-Bot/compare/v0.7.3...v0.7.4

    Source code(tar.gz)
    Source code(zip)
  • v0.7.3(Jan 27, 2022)

    Version 0.7.3

    What's Changed

    • General code cleanup by @shadawcraw in https://github.com/shadawcraw/Hadum-Bot/pull/25

    Full Changelog: https://github.com/shadawcraw/Hadum-Bot/compare/v0.7.2...v0.7.3

    Source code(tar.gz)
    Source code(zip)
  • v0.7.2(Jan 27, 2022)

    Version 0.7.2

    What's Changed

    • Update install script by @shadawcraw in https://github.com/shadawcraw/Hadum-Bot/pull/22

    Full Changelog: https://github.com/shadawcraw/Hadum-Bot/compare/v0.7.1...v0.7.2

    Source code(tar.gz)
    Source code(zip)
  • v0.7.1(Jan 25, 2022)

    Version 0.7.1

    What's Changed

    • Update issue templates by @shadawcraw in https://github.com/shadawcraw/Hadum-Bot/pull/2
    • Added SQLite Support by @shadawcraw in https://github.com/shadawcraw/Hadum-Bot/pull/8
    • Sourcery refactored master branch by @sourcery-ai in https://github.com/shadawcraw/Hadum-Bot/pull/20
    • Add install script by @shadawcraw in https://github.com/shadawcraw/Hadum-Bot/pull/21

    New Contributors

    • @sourcery-ai made their first contribution in https://github.com/shadawcraw/Hadum-Bot/pull/20

    Full Changelog: https://github.com/shadawcraw/Hadum-Bot/compare/v0.9.0...v0.7.1

    Source code(tar.gz)
    Source code(zip)
  • v0.8.0(Jan 27, 2022)

    Version 0.8.0

    What's Changed

    • Auto Updates and Discord Status by @shadawcraw in https://github.com/shadawcraw/Hadum-Bot/pull/19

    Full Changelog: https://github.com/shadawcraw/Hadum-Bot/compare/v0.6.2...v0.8.0

    Source code(tar.gz)
    Source code(zip)
  • v0.7.0(Dec 19, 2021)

    Version 0.7.0

    What's Changed

    • Auto Updates and Discord Status by @shadawcraw in https://github.com/HadumDev/Hadum-Bot/pull/19

    Full Changelog: https://github.com/HadumDev/Hadum-Bot/compare/v0.6.2...v0.7.0

    Source code(tar.gz)
    Source code(zip)
  • v0.6.2(Dec 19, 2021)

    Version 0.6.2

    What's Changed

    • Add .env.example by @shadawcraw in https://github.com/HadumDev/Hadum-Bot/pull/18

    Full Changelog: https://github.com/HadumDev/Hadum-Bot/compare/v0.6.1...v0.6.2

    Source code(tar.gz)
    Source code(zip)
  • v0.6.1(Dec 18, 2021)

    Version 0.6.1

    What's Changed

    • v0.6.0 by @shadawcraw in https://github.com/HadumDev/Hadum-Bot/pull/15
    • v0.6.1 by @shadawcraw in https://github.com/HadumDev/Hadum-Bot/pull/16

    Full Changelog: https://github.com/HadumDev/Hadum-Bot/compare/v0.6.0...v0.6.1

    Source code(tar.gz)
    Source code(zip)
  • v0.6.0(Dec 13, 2021)

  • v0.5.0(Dec 13, 2021)

  • v0.4.0(Dec 13, 2021)

  • v0.3.0(Dec 13, 2021)

  • v0.2.0(Dec 13, 2021)

  • v0.1.0(Dec 13, 2021)

This very basic script can be used to automate COVID-19 vaccination slot booking on India's Co-WIN Platform.

COVID-19 Vaccination Slot Booking Script This very basic CLI based script can be used to automate covid vaccination slot booking on Co-WIN Platform. I

605 Dec 14, 2022
📖 GitHub action schedular (cron) that posts a Hadith every hour on Twitter & Facebook.

Hadith Every Hour 📖 A bot that posts a Hadith every hour on Twitter & Facebook (Every 3 hours for now to avoid spamming) Follow on Twitter @HadithEve

Ananto 13 Dec 14, 2022
Blankly - 🚀 💸 Trade stocks, cryptos, and forex w/ one package. Easily build, backtest, trade, and deploy across exchanges in a few lines of code.

💨 Rapidly build and deploy quantitative models for stocks, crypto, and forex 🚀 View Docs · Our Website · Join Our Newsletter · Getting Started Why B

Blankly Finance 1.4k Jan 03, 2023
The best Fortnite all-in-one lobby bot!

Recommended to use on Python v3.8 stable for bot. FLB The best free Fortnite lobby bot experience! Discord server: PDennSploit Softworks LLC Getting S

Payson Holmes 2 May 11, 2022
The public discord bot, created by: primitt, further developed by: duino-coin team.

Duino Stats Mini A public Duino-Stats Discord bot. Click this link to invite the bot to your server. License Duino Stats Mini distributed under the MI

primboi 8 Mar 14, 2022
Clubhouse API written in Python. Standalone client included. For reference and education purposes only.

clubhouse-py is originally developed for the sake of interoperability. Standalone client is also created with very basic features, including but not limited to the audio-chat

1.7k Jan 05, 2023
Autov2new - Pro Auto Filter Bot V2

Pro Auto Filter Bot V2 Deploy You can deploy this bot anywhere. Watch Deploying

1 Jan 06, 2022
DiscWrappy - A Python wrapper for the Discord bot API

DiscWrappy - A Python wrapper for the Discord bot API

Jeff Morris 4 Apr 25, 2022
Trabalho N1 para a materia Tecnicas de Progamação da Anhembi Morumbi

Projeto da Anhembi Morumbi - Tecnicas de Programação. RPG de Console (CMD) Trabalho proposto pelo professor André Santana, na materia Tecnicas de Prog

Leonardo Silva M de Barros 3 Sep 12, 2021
Connects to a local SenseCap M1 Helium Hotspot and pulls API Data.

sensecap_api_checker_HELIUM Connects to a local SenseCap M1 Helium Hotspot and pulls API Data.

Lorentz Factr 1 Nov 03, 2021
Simple debugger and tester for dico-command.

dp Simple debugger and tester for dico-command. Installation pip install -U dico-dp Usage bot = dico_command.Bot(...) ... bot.load_module("dp") Comma

3 Nov 19, 2022
Basic query to access Traindex API

traindex-api-query Basic query to access Traindex API Please make sure to provide your Traindex API key to the line 8 in the script file. There are tw

Foretheta 1 Nov 11, 2021
NFT Generator: A modular NFT generator application

NFT Generator A simple passion project done with the role to learn a bit about h

2 Aug 30, 2022
Telegram Bot to save Posts or Files that can be Accessed via Special Links

OKAERI-FILE Bot Telegram untuk menyimpan Posting atau File yang dapat Diakses melalui Link Khusus. Jika Anda memerlukan tambahan module lagi dalam rep

Wahyusaputra 5 Aug 04, 2022
light wrapper for indeed.com api

Simple wrapper for indeed api. go to indeed.com - register for api publisher token example from indeed import IndeedApi token = 'your token' api =

16 Sep 21, 2022
Twitter-Scrapping - Tweeter tweets extracting using python

Twitter-Scrapping Twitter tweets extracting using python This project is to extr

Suryadeepsinh Gohil 2 Feb 04, 2022
Code done for/during the course

Serverless Course Autumn 2021 - Code This repository contains a set of examples developed during, but not limited to the live coding sessions. Lesson

Alexandru Burlacu 4 Dec 21, 2021
Currency And Gold Prices - Currency And Gold Prices For Python

Currency_And_Gold_Prices Photos from the app New Update Show range Change better

Ali HemmatNia 4 Sep 19, 2022
ANKIT-OS/TG-SESSION-HACK-BOT: A Special Repository.Telegram Bot Which Can Hack The Victim By Using That Victim Session

🔰 ᵀᴱᴸᴱᴳᴿᴬᴹ ᴴᴬᶜᴷ ᴮᴼᵀ 🔰 The owner would not be responsible for any kind of bans due to the bot. • ⚡ INSTALLING ⚡ • • 🛠️ Lᴀɴɢᴜᴀɢᴇs Aɴᴅ Tᴏᴏʟs 🔰 • If

ANKIT KUMAR 2 Dec 24, 2021
This repository are used to give class about AWS

AWSTraining This repository are used to give class about AWS by Marco Antonio Pereira Linkedin: https://www.linkedin.com/in/marcoap To see the types o

Marco Antonio Pereira 6 Nov 23, 2022