Possible future updates... * Improvement of mod-lists from output of text, intelligently adding few more keywords. This will have to wait for a significantly different install of mods, to yield significantly different output to work from, however, typically I use around 100 mods, most of them I, know and used before. * Development of web-crawler for compiling all, mod-names and relating categories, from most popular collections into concise format, then feeding that into GPT4, then updating word-lists. * Options of which sorting method to use, 1) First-Words, 2) Word-Lists, 3) Both (normal). This probs the one to go for next update.
The virus scan on this site currently doesn't have full compatibility, I found, "Quarantine" and "Suspicious", is triggerd, and the scanners say: 95% is "Undetected" + "5%" is ""Unable to process file type" = Fail
See here: https://www.virustotal.com/gui/file/36c0dc2dc82b68ef46d99aa7ceea2d33ef1c4ffa93ed74eee08f487ba45ce42e/detection/f-36c0dc2dc82b68ef46d99aa7ceea2d33ef1c4ffa93ed74eee08f487ba45ce42e-1695437619
The scanners require programming for PowerShell, however, if you are worried about such things with a small powershell script such as this, you could always feed the script into GPT4 and ask it if there is anything malicious in it.
The process is currently... 1. **All Capitals Identification**: If the folder name starts with a sequence of all capital letters (like "CW" in "CW Raiders"), then this sequence is taken as the group name.3. **First Word Selection**: If the above rule doesn't apply, then, the script then takes the first extracted word as the group name, however, this word must not be over 12 characters in length, 3. **Capital Letter Identification with Constraints**: If the above rules doesn't apply, the script identifies words in the folder name by looking for sequences that start with a capital letter followed by lowercase letters. Sequences with two consecutive capital letters or a capital letter not followed by a lowercase letter are excluded. 4. **Word Extraction**: If the above rules doesn't apply, then, using regular expressions, the script extracts sequences that match the pattern of a capital letter followed by a sequence of lowercase letters3. **Word Extraction**: Using regular expressions, the script extracts sequences that match the pattern of a capital letter followed by a sequence of lowercase letters. 5. ** Short-lists of words***: After completing all 3 processes, then, the remaining unidentified items and all current individual items, are passed through non-case sensitive linked word-list in json format noted in the paths. 6. **Length Limitation**: After completing all processes, then, The remaining unidentified items and all current individual items, need to be then processed, taking the first 5 letters of the folder name, and then the remaining unidentified items become the only individual items. 7. **Outputting of file** Production of file "Mod_Analysis_Output.txt", that are detailing final list of mostly grouped items, with largest items of either type first.
3 comments
* Improvement of mod-lists from output of text, intelligently adding few more keywords. This will have to wait for a significantly different install of mods, to yield significantly different output to work from, however, typically I use around 100 mods, most of them I, know and used before.
* Development of web-crawler for compiling all, mod-names and relating categories, from most popular collections into concise format, then feeding that into GPT4, then updating word-lists.
* Options of which sorting method to use, 1) First-Words, 2) Word-Lists, 3) Both (normal). This probs the one to go for next update.
95% is "Undetected" + "5%" is ""Unable to process file type" = Fail
See here:
https://www.virustotal.com/gui/file/36c0dc2dc82b68ef46d99aa7ceea2d33ef1c4ffa93ed74eee08f487ba45ce42e/detection/f-36c0dc2dc82b68ef46d99aa7ceea2d33ef1c4ffa93ed74eee08f487ba45ce42e-1695437619
The scanners require programming for PowerShell, however, if you are worried about such things with a small powershell script such as this, you could always feed the script into GPT4 and ask it if there is anything malicious in it.
1. **All Capitals Identification**: If the folder name starts with a sequence of all capital letters (like "CW" in "CW Raiders"), then this sequence is taken as the group name.3. **First Word Selection**: If the above rule doesn't apply, then, the script then takes the first extracted word as the group name, however, this word must not be over 12 characters in length,
3. **Capital Letter Identification with Constraints**: If the above rules doesn't apply, the script identifies words in the folder name by looking for sequences that start with a capital letter followed by lowercase letters. Sequences with two consecutive capital letters or a capital letter not followed by a lowercase letter are excluded.
4. **Word Extraction**: If the above rules doesn't apply, then, using regular expressions, the script extracts sequences that match the pattern of a capital letter followed by a sequence of lowercase letters3. **Word Extraction**: Using regular expressions, the script extracts sequences that match the pattern of a capital letter followed by a sequence of lowercase letters.
5. ** Short-lists of words***: After completing all 3 processes, then, the remaining unidentified items and all current individual items, are passed through non-case sensitive linked word-list in json format noted in the paths.
6. **Length Limitation**: After completing all processes, then, The remaining unidentified items and all current individual items, need to be then processed, taking the first 5 letters of the folder name, and then the remaining unidentified items become the only individual items.
7. **Outputting of file** Production of file "Mod_Analysis_Output.txt", that are detailing final list of mostly grouped items, with largest items of either type first.