A multipurpose bot designed to make Discord better for everyone, written in Python.

Overview

Hadum

Hadum

CodeFactor Python license

A multipurpose bot that makes Discord better for everyone

Features

  • A Fully Functional Moderation component: manage your staff, members and permissions all in one bot.
  • Memes.
  • Support Chatbot (Coming Soon™)

Commands

Hadum Features a wide(-ish) set of commands to choose from.

Command Usage Description
ping h.ping Get Latency between bot and Discord Servers
coinflip h.coinflip Flip a coin!
kick h.kick [user] [reason] Kick a user from your guild
masskick h.masskick [users] Kicks multiple users at a time
ban h.ban [user] [reason] Permanently Bans a user
massban h.massban [users] Bans multiple users at a time
purge h.purge [number_of_messages] Delete messages in the current channel

Command Line Args

Hadum Features a few CLI args to choose from (more coming soon)

Name/Flag Description
-q Skip the 'Hadum' loading animation
-v Show error logs in console
-h Get help

To use them, enter

python main.py /[ARG_FLAG]  # Windows
python3 main.py -[ARG_FLAG] # Linux/Unix-like/Windows WSL

Hosting on your own machine

So, you edited the code to your own liking and now you want to host it on your own machine? No problem! There are 3 ways of installing the bot:

  1. (NOTE: This is now deprecated, use Docker instead.) For an automatic install, run bash scripts/install.sh (Linux/Unix or Windows WSL only) in the root directory of the project

  2. For a Docker Installation, run the following command (don't ignore comments!):

    docker run -it $(docker build --build-args token=BOT_TOKEN -q .)  # Replace 'BOT_TOKEN' with your token.
  3. Or by following the steps below for a manual installation of the bot:

    1. Clone the repository using
    git clone https://github.com/shadawcraw/Hadum.git
    cd Hadum  # Accessing the project directory
    1. To install the dependencies, Run in the root folder of the project the following command:
    python -m pip  --no-cache-dir -r requirements.txt  # Windows
    python3 -m pip3 --no-cache-dir -r requirements.txt # Windows WSL, Linux and UNIX-Like systems (OSX)

    In a Bash/ZSH shell or in Windows WSL.

    1. Then, create a file named ".env" in the root folder of the project.

    2. Once that is done, enter the following lines into the .env file created earlier: TOKEN="[YOUR_TOKEN_HERE]" Remember to put the variable name in ALL CAPS and replace the brackets and the text inside it with your own token.

    3. After that, you're all set! Run the run.sh file or enter python main.py for Windows and python3 main.py for Linux and Unix-like systems.

Changelog

See CHANGELOG.md

Addendum A

Run docker image ls to see available images and their IDs

Comments
  • Sourcery refactored master branch

    Sourcery refactored master branch

    Branch master refactored by Sourcery.

    If you're happy with these changes, merge this Pull Request using the Squash and merge strategy.

    See our documentation here.

    Run Sourcery locally

    Reduce the feedback loop during development by using the Sourcery editor plugin:

    Review changes via command line

    To manually merge these changes, make sure you're on the master branch, then run:

    git fetch origin sourcery/master
    git merge --ff-only FETCH_HEAD
    git reset HEAD^
    

    Help us improve this pull request!

    opened by sourcery-ai[bot] 1
  • [Snyk] Security upgrade python from 3.9.5 to 3.9

    [Snyk] Security upgrade python from 3.9.5 to 3.9

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.9, as this image has only 237 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 714 | Buffer Overflow
    SNYK-DEBIAN10-OPENSSL-1569403 | No Known Exploit | | critical severity | 714 | Buffer Overflow
    SNYK-DEBIAN10-OPENSSL-1569403 | No Known Exploit | | critical severity | 714 | Buffer Overflow
    SNYK-DEBIAN10-OPENSSL-1569403 | No Known Exploit | | high severity | 614 | Out-of-bounds Read
    SNYK-DEBIAN10-OPENSSL-1569406 | No Known Exploit | | medium severity | 514 | CVE-2021-4160
    SNYK-DEBIAN10-OPENSSL-2388381 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

    opened by snyk-bot 0
  • [Snyk] Security upgrade python from 3.9.5 to 3.9.10

    [Snyk] Security upgrade python from 3.9.5 to 3.9.10

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.9.10, as this image has only 237 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN10-EXPAT-2406128 | No Known Exploit | | critical severity | 714 | Buffer Overflow
    SNYK-DEBIAN10-OPENSSL-1569403 | No Known Exploit | | critical severity | 714 | Buffer Overflow
    SNYK-DEBIAN10-OPENSSL-1569403 | No Known Exploit | | critical severity | 714 | Buffer Overflow
    SNYK-DEBIAN10-OPENSSL-1569403 | No Known Exploit | | high severity | 614 | Out-of-bounds Read
    SNYK-DEBIAN10-OPENSSL-1569406 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

    opened by snyk-bot 0
  • [Snyk] Security upgrade python from 3.9.5 to 3.9

    [Snyk] Security upgrade python from 3.9.5 to 3.9

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.9, as this image has only 235 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | high severity | 567 | SQL Injection
    SNYK-DEBIAN10-CYRUSSASL2-2412041 | No Known Exploit | | high severity | 567 | SQL Injection
    SNYK-DEBIAN10-CYRUSSASL2-2412041 | No Known Exploit | | critical severity | 714 | Buffer Overflow
    SNYK-DEBIAN10-OPENSSL-1569403 | No Known Exploit | | critical severity | 714 | Buffer Overflow
    SNYK-DEBIAN10-OPENSSL-1569403 | No Known Exploit | | high severity | 614 | Out-of-bounds Read
    SNYK-DEBIAN10-OPENSSL-1569406 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

    opened by snyk-bot 0
  • [Snyk] Security upgrade python from 3.8 to 3.9.5

    [Snyk] Security upgrade python from 3.8 to 3.9.5

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.9.5, as this image has only 458 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2331802 | No Known Exploit | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2331808 | No Known Exploit | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2331811 | No Known Exploit | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2359255 | No Known Exploit | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2384928 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    opened by snyk-bot 0
  • [Snyk] Security upgrade python from 3.8 to 3.10.0b3

    [Snyk] Security upgrade python from 3.8 to 3.10.0b3

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.10.0b3, as this image has only 458 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2331802 | No Known Exploit | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2331808 | No Known Exploit | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2331811 | No Known Exploit | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2359255 | No Known Exploit | | critical severity | 500 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2384928 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    opened by snyk-bot 0
  • [Snyk] Security upgrade python from 3.8 to 3.9.5

    [Snyk] Security upgrade python from 3.8 to 3.9.5

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.9.5, as this image has only 449 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2359255 | No Known Exploit | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2359255 | No Known Exploit | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2384928 | No Known Exploit | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2384928 | No Known Exploit | | critical severity | 500 | Improper Input Validation
    SNYK-DEBIAN11-PYTHON39-1290158 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    opened by snyk-bot 0
  • [Snyk] Security upgrade python from 3.8 to 3.10.0b2

    [Snyk] Security upgrade python from 3.8 to 3.10.0b2

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.10.0b2, as this image has only 449 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2359255 | No Known Exploit | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2359255 | No Known Exploit | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2384928 | No Known Exploit | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2384928 | No Known Exploit | | critical severity | 500 | Improper Input Validation
    SNYK-DEBIAN11-PYTHON39-1290158 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    opened by snyk-bot 0
  • [Snyk] Security upgrade python from 3.8 to 3.10.0b2

    [Snyk] Security upgrade python from 3.8 to 3.10.0b2

    Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

    Changes included in this PR

    • Dockerfile

    We recommend upgrading to python:3.10.0b2, as this image has only 449 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

    Some of the most important vulnerabilities in your base image include:

    | Severity | Priority Score / 1000 | Issue | Exploit Maturity | | :------: | :-------------------- | :---- | :--------------- | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2359255 | No Known Exploit | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2359255 | No Known Exploit | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2384928 | No Known Exploit | | critical severity | 571 | Integer Overflow or Wraparound
    SNYK-DEBIAN11-EXPAT-2384928 | No Known Exploit | | critical severity | 500 | Buffer Overflow
    SNYK-DEBIAN11-GLIBC-2340922 | No Known Exploit |


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    opened by snyk-bot 0
  • Bump certifi from 2021.10.8 to 2022.12.7

    Bump certifi from 2021.10.8 to 2022.12.7

    Bumps certifi from 2021.10.8 to 2022.12.7.

    Commits

    Dependabot compatibility score

    Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


    Dependabot commands and options

    You can trigger Dependabot actions by commenting on this PR:

    • @dependabot rebase will rebase this PR
    • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
    • @dependabot merge will merge this PR after your CI passes on it
    • @dependabot squash and merge will squash and merge this PR after your CI passes on it
    • @dependabot cancel merge will cancel a previously requested merge and block automerging
    • @dependabot reopen will reopen this PR if it is closed
    • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
    • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
    • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
    • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    • @dependabot use these labels will set the current labels as the default for future PRs for this repo and language
    • @dependabot use these reviewers will set the current reviewers as the default for future PRs for this repo and language
    • @dependabot use these assignees will set the current assignees as the default for future PRs for this repo and language
    • @dependabot use this milestone will set the current milestone as the default for future PRs for this repo and language

    You can disable automated security fix PRs for this repo from the Security Alerts page.

    dependencies 
    opened by dependabot[bot] 0
  • [Snyk] Security upgrade aiohttp from 3.7.4.post0 to 3.8.0

    [Snyk] Security upgrade aiohttp from 3.7.4.post0 to 3.8.0

    This PR was automatically created by Snyk using the credentials of a real user.


    Snyk has created this PR to fix one or more vulnerable packages in the `pip` dependencies of this project.

    Changes included in this PR

    • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
      • requirements.txt

    Vulnerabilities that will be fixed

    By pinning:

    Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------|:------------------------- high severity | 686/1000
    Why? Proof of Concept exploit, Has a fix available, CVSS 7.3 | HTTP Header Injection
    SNYK-PYTHON-AIOHTTP-1584144 | aiohttp:
    3.7.4.post0 -> 3.8.0
    | No | Proof of Concept

    (*) Note that the real score may have changed since the PR was raised.

    Some vulnerabilities couldn't be fully fixed and so Snyk will still find them when the project is tested again. This may be because the vulnerability existed within more than one direct dependency, but not all of the affected dependencies could be upgraded.

    Check the changes in this PR to ensure they won't cause issues with your project.


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    📚 Read more about Snyk's upgrade and patch logic


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

    opened by BiasedKiwi 0
  • [Snyk] Security upgrade aiohttp from 3.7.4.post0 to 3.8.0

    [Snyk] Security upgrade aiohttp from 3.7.4.post0 to 3.8.0

    This PR was automatically created by Snyk using the credentials of a real user.


    Snyk has created this PR to fix one or more vulnerable packages in the `pip` dependencies of this project.

    Changes included in this PR

    • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
      • requirements.txt

    Vulnerabilities that will be fixed

    By pinning:

    Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------|:------------------------- high severity | 686/1000
    Why? Proof of Concept exploit, Has a fix available, CVSS 7.3 | HTTP Header Injection
    SNYK-PYTHON-AIOHTTP-1584144 | aiohttp:
    3.7.4.post0 -> 3.8.0
    | No | Proof of Concept

    (*) Note that the real score may have changed since the PR was raised.

    Some vulnerabilities couldn't be fully fixed and so Snyk will still find them when the project is tested again. This may be because the vulnerability existed within more than one direct dependency, but not all of the affected dependencies could be upgraded.

    Check the changes in this PR to ensure they won't cause issues with your project.


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    📚 Read more about Snyk's upgrade and patch logic


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

    opened by BiasedKiwi 0
  • [Snyk] Security upgrade aiohttp from 3.7.4.post0 to 3.8.0

    [Snyk] Security upgrade aiohttp from 3.7.4.post0 to 3.8.0

    This PR was automatically created by Snyk using the credentials of a real user.


    Snyk has created this PR to fix one or more vulnerable packages in the `pip` dependencies of this project.

    Changes included in this PR

    • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
      • requirements.txt

    Vulnerabilities that will be fixed

    By pinning:

    Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity :-------------------------:|-------------------------|:-------------------------|:-------------------------|:-------------------------|:------------------------- high severity | 686/1000
    Why? Proof of Concept exploit, Has a fix available, CVSS 7.3 | HTTP Header Injection
    SNYK-PYTHON-AIOHTTP-1584144 | aiohttp:
    3.7.4.post0 -> 3.8.0
    | No | Proof of Concept

    (*) Note that the real score may have changed since the PR was raised.

    Some vulnerabilities couldn't be fully fixed and so Snyk will still find them when the project is tested again. This may be because the vulnerability existed within more than one direct dependency, but not all of the affected dependencies could be upgraded.

    Check the changes in this PR to ensure they won't cause issues with your project.


    Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

    For more information: 🧐 View latest project report

    🛠 Adjust project settings

    📚 Read more about Snyk's upgrade and patch logic


    Learn how to fix vulnerabilities with free interactive lessons:

    🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

    opened by BiasedKiwi 0
Releases(v0.7.4)
  • v0.7.4(Jan 28, 2022)

    Version 0.7.4

    What's Changed

    • Minor changes to the install script by @shadawcraw in https://github.com/shadawcraw/Hadum-Bot/pull/26

    Full Changelog: https://github.com/shadawcraw/Hadum-Bot/compare/v0.7.3...v0.7.4

    Source code(tar.gz)
    Source code(zip)
  • v0.7.3(Jan 27, 2022)

    Version 0.7.3

    What's Changed

    • General code cleanup by @shadawcraw in https://github.com/shadawcraw/Hadum-Bot/pull/25

    Full Changelog: https://github.com/shadawcraw/Hadum-Bot/compare/v0.7.2...v0.7.3

    Source code(tar.gz)
    Source code(zip)
  • v0.7.2(Jan 27, 2022)

    Version 0.7.2

    What's Changed

    • Update install script by @shadawcraw in https://github.com/shadawcraw/Hadum-Bot/pull/22

    Full Changelog: https://github.com/shadawcraw/Hadum-Bot/compare/v0.7.1...v0.7.2

    Source code(tar.gz)
    Source code(zip)
  • v0.7.1(Jan 25, 2022)

    Version 0.7.1

    What's Changed

    • Update issue templates by @shadawcraw in https://github.com/shadawcraw/Hadum-Bot/pull/2
    • Added SQLite Support by @shadawcraw in https://github.com/shadawcraw/Hadum-Bot/pull/8
    • Sourcery refactored master branch by @sourcery-ai in https://github.com/shadawcraw/Hadum-Bot/pull/20
    • Add install script by @shadawcraw in https://github.com/shadawcraw/Hadum-Bot/pull/21

    New Contributors

    • @sourcery-ai made their first contribution in https://github.com/shadawcraw/Hadum-Bot/pull/20

    Full Changelog: https://github.com/shadawcraw/Hadum-Bot/compare/v0.9.0...v0.7.1

    Source code(tar.gz)
    Source code(zip)
  • v0.8.0(Jan 27, 2022)

    Version 0.8.0

    What's Changed

    • Auto Updates and Discord Status by @shadawcraw in https://github.com/shadawcraw/Hadum-Bot/pull/19

    Full Changelog: https://github.com/shadawcraw/Hadum-Bot/compare/v0.6.2...v0.8.0

    Source code(tar.gz)
    Source code(zip)
  • v0.7.0(Dec 19, 2021)

    Version 0.7.0

    What's Changed

    • Auto Updates and Discord Status by @shadawcraw in https://github.com/HadumDev/Hadum-Bot/pull/19

    Full Changelog: https://github.com/HadumDev/Hadum-Bot/compare/v0.6.2...v0.7.0

    Source code(tar.gz)
    Source code(zip)
  • v0.6.2(Dec 19, 2021)

    Version 0.6.2

    What's Changed

    • Add .env.example by @shadawcraw in https://github.com/HadumDev/Hadum-Bot/pull/18

    Full Changelog: https://github.com/HadumDev/Hadum-Bot/compare/v0.6.1...v0.6.2

    Source code(tar.gz)
    Source code(zip)
  • v0.6.1(Dec 18, 2021)

    Version 0.6.1

    What's Changed

    • v0.6.0 by @shadawcraw in https://github.com/HadumDev/Hadum-Bot/pull/15
    • v0.6.1 by @shadawcraw in https://github.com/HadumDev/Hadum-Bot/pull/16

    Full Changelog: https://github.com/HadumDev/Hadum-Bot/compare/v0.6.0...v0.6.1

    Source code(tar.gz)
    Source code(zip)
  • v0.6.0(Dec 13, 2021)

  • v0.5.0(Dec 13, 2021)

  • v0.4.0(Dec 13, 2021)

  • v0.3.0(Dec 13, 2021)

  • v0.2.0(Dec 13, 2021)

  • v0.1.0(Dec 13, 2021)

Django3 web app that renders OpenWeather API data ☁️☁️

nz-weather For a live build, visit - https://brandonru.pythonanywhere.com/ NZ Openweather API data rendered using Django3 and requests ☀️ Local Run In

Brandon Ru 1 Oct 17, 2021
Date Time Userbot With Python

DATE_TIME_USERBOT An Telegram Bot By @Pythone_3 Config Vars API_ID : Telegram API_ID, get it from my.telegram.org/apps API_HASH : Telegram API_ID, get

Sinzz-sinan-m 2 Oct 20, 2021
🤖 The bot that runs the official Fairfield Programming Association Discord server.

🤖 The bot that runs the official Fairfield Programming Association Discord server.

Fairfield Programming Association 1 Jan 07, 2022
Telegram Radio - A User-bot who continuously play random audio files (from the famous telegram music channel @mveargasm) in the intended voice chat.

MvEargasmDJ: This is my submission for the Telegram Radio Project of Baivaru. Which required a userbot to continiously play random audio files from th

eyaadh 24 Nov 12, 2022
Automatically Edits Videos and Uploads to Tiktok with 1 line of code.

TiktokAutoUploader - Open to code contributions Automatically Edits Videos and Uploads to Tiktok with 1 line of code. Setup pip install -r requirement

Michael Peres 199 Dec 27, 2022
A command line interface for accessing google drive

Drive Cli Get the ability to access Google Drive without leaving your terminal. Inspiration Google Drive has become a vital part of our day to day lif

Chirag Shetty 538 Dec 12, 2022
Subtitle Translater

Subtitle Translater

OshadhaVimukthi 2 Nov 29, 2021
Simple stock price analytics

mune · Mune is an open source python web application built to analyze stocks, named after Homma Munehisa. Currently, the forecasting component is powe

Richard Hong 14 Aug 30, 2021
A telegram smoot and high quality music player bot.

▪︎ Music Player ▪︎ A smooth telegram music bot with high quality songs ■ [Features] • Fast Starts streaming your inputs while downloading and converti

Simple Boy 3 Feb 05, 2022
Its The Basic Commands Of Termux

Its The Basic Commands Of Termux

ANKIT KUMAR 1 Dec 27, 2021
Full-featured Python interface for the Slack API

This repository is archived and will not receive any updates It's time to say goodbye. I'm archiving Slacker. It's been getting harder to find time to

Oktay Sancak 1.6k Dec 13, 2022
rewise is an unofficial wrapper for google search's auto-complete feature

rewise is an unofficial wrapper for google search's auto-complete feature

Somdev Sangwan 71 Jul 19, 2022
Zalo AI challenge 2021 5K-Compliance

Zalo AI challenge 2021 5K-Compliance Prepare data: Dữ liệu của ban tổ chức cung

Nguyễn nhật hoàng 32 Nov 21, 2022
A Python Instagram Scraper for Downloading Profile's Posts, stories, ProfilePic and See the Details of Particular Instagram Profile.

✔ ✔ InstAstra ⚡ ⚡ ⁜ Description ~ A Python Instagram Scraper for Downloading Profile's Posts, stories, ProfilePic and See the Details of Particular In

12 Jun 23, 2022
Telegram bot for our internal organizers tasks

Welcome to ppm-telegram-bot 👋 Telegram Bot Platform integration for bot commands processing. We use it for our internal @piterpy-meetup needs, basica

PiterPy Meetup 10 Jul 28, 2022
🤖 Chegg answers requested and sent by the Discord BOT to the targeted user.

Chegg BOT Description "I believe that open-source resources are a must for everyone around. Especially in the field of education. As Chegg c

Vusal Ismayilov 33 Aug 20, 2021
MemeBot - A discord bot that tracks how good people's memes are

MemeBot A discord Meme "Karma" Tracking bot Dependancies Make sure you have pymongo installed and a mongodb cluster setup with two collections. pip in

Uday Sharma 3 Aug 10, 2022
A discord.py bot template with Cogs implemented.

discord-cogs-template A discord.py bot template with Cogs implemented. Instructions Before you start ⚠ Basic knowledge of python is required. Steps If

censor 2 Sep 02, 2022
Erhalten Sie wichtige Warnmeldungen des Bevölkerungsschutzes für Gefahrenlagen wie zum Beispiel Gefahrstoffausbreitung oder Unwetter per Programmierschnittstelle.

nina-api Erhalten Sie wichtige Warnmeldungen des Bevölkerungsschutzes für Gefahrenlagen wie zum Beispiel Gefahrstoffausbreitung oder Unwetter per Prog

Bundesstelle für Open Data 68 Dec 19, 2022
Finds Jobs on LinkedIn using web-scraping

Find Jobs on LinkedIn 📔 This program finds jobs by scraping on LinkedIn 👨‍💻 Relies on User Input. Accepts: Country, City, State 📑 Data about jobs

Matt 44 Dec 27, 2022