-
Notifications
You must be signed in to change notification settings - Fork 0
/
atom.xml
573 lines (275 loc) · 382 KB
/
atom.xml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
<title>个人的文档</title>
<link href="https://landv.cn/atom.xml" rel="self"/>
<link href="https://landv.cn/"/>
<updated>2024-07-02T02:03:03.000Z</updated>
<id>https://landv.cn/</id>
<author>
<name>landv</name>
</author>
<generator uri="https://hexo.io/">Hexo</generator>
<entry>
<title>Hyper-V配置内网固定IP以及挂载空闲磁盘到文件夹下</title>
<link href="https://landv.cn/p/cae22589.html"/>
<id>https://landv.cn/p/cae22589.html</id>
<published>2024-07-02T02:03:03.000Z</published>
<updated>2024-07-02T02:03:03.000Z</updated>
<content type="html"><![CDATA[<h1 id="Hyper-V-配置内网固定-IP"><a href="#Hyper-V-配置内网固定-IP" class="headerlink" title="Hyper-V 配置内网固定 IP"></a>Hyper-V 配置内网固定 IP</h1><p>(原文来源:<a href="https://chentanyi.github.io/2023/02/21/2023-02-21-hyperv-internal-static-ip/%EF%BC%89">https://chentanyi.github.io/2023/02/21/2023-02-21-hyperv-internal-static-ip/)</a></p><h1 id="网络选择"><a href="#网络选择" class="headerlink" title="网络选择"></a>网络选择</h1><p>在之前 <a href="https://chentanyi.github.io/2022/05/04/2022-05-01-kvm-bridge/">KVM 网络</a>里面介绍了两种网络的拓扑,Bridge 和 NAT,两者最大的区别在于是否多了一层子网,因为子网内的机器正常情况下无法被外面的其他机器访问到,因此选择的时候最主要考虑的就是这个点。</p><ol><li><strong>Default NAT</strong>: Hyper-V 和 KVM 都会在安装完成后自动创建一个带 NAT 的子网。KVM 创建的是固定的 IP 段,还可以再自行修改到想要的 IP 段;而 Hyper-V 创建的 IP 段会在每次重启时发生变化,如果要使用固定的 IP 段,需要每次都重新配置一下,相当麻烦。</li><li><strong>Bridge</strong>: 在可以搭建 Bridge 网络的情况下,我倾向使用 Bridge 网络,这种情况下,VM 和宿主机有相同的连通性,可以配置成一个类似整个局域网的设备,如旁路由。但是,Bridge 网络有着麻烦的前置条件,就是需要破坏宿主机已有的网络,并且依赖外部的路由器,一般适合用在家里能物理访问到的机器上,不用担心网络出问题了连不上。普通家用路由器的情况下,一般路由器的 DHCP 都会根据 MAC 分配固定的 IP,当然自己也可以手动指定一个不冲突的 IP。</li><li><strong>Static NAT</strong>: 这个是专门针对 Hyper-V 的,因为 KVM 默认就是 Static NAT,不需要在单独配置。Hyper-V 可以通过新建一个虚拟交换机来分配固定的 IP 段,使得虚拟机可以配置固定的 IP。</li></ol><h1 id="网络配置"><a href="#网络配置" class="headerlink" title="网络配置"></a>网络配置</h1><h2 id="Bridge"><a href="#Bridge" class="headerlink" title="Bridge"></a>Bridge</h2><p>Hyper-V 配置 Bridge 网络很简单,只要在创建虚拟交换机的时候选择<code>外部网络(External)</code>,就会自动配置完成,然后在 VM 设置里面指定对应的交换机即可。</p><h2 id="Static-NAT"><a href="#Static-NAT" class="headerlink" title="Static NAT"></a>Static NAT</h2><p>接下来就是主要讲讲配置 Static NAT 的一些步骤</p><ol><li><p>在 Hyper-V 的虚拟交换机里面添加一个<code>内部网络(Internal)</code>来配置 NAT,我把它的名字设置为 <code>Static</code></p><p><img src="https://imgs.landv.cn/imgs/202407021004265.png" alt="img"></p></li><li><p>打开适配器页面,选择当前联网的适配器,打开属性,选择分享网络给这个 NAT 交换机(这个步骤比较关键,做完才能让这个 NAT 访问外网)</p><blockquote><p>每个适配器只能分享网络给一个适配器,所以如果需要分享给多个适配器,需要选择这些适配器,右键桥接(Bridge),然后分享网络给这个网桥</p></blockquote><p><img src="https://imgs.landv.cn/imgs/202407021004525.png"></p></li><li><p>选择 <code>Static</code> 适配器,打开属性中的 <code>IPv4</code>,适配器的 IP 段默认会被改成 <code>192.168.137.0/24</code>,可以自己改成其他的 IP 段(比如我改成 <code>192.168.100.1</code>)。要记住这个适配器的 IP,是这个 NAT 网络的网关。</p><p><img src="https://imgs.landv.cn/imgs/202407021004992.png" alt="img"></p></li><li><p>新建 VM 或打开已有的 VM 的设置,将网络适配器修改为 <code>Static</code>(如果没有网络适配器可以从添加硬件里面新建一个)。</p><p><img src="https://imgs.landv.cn/imgs/202407021004908.png" alt="img"></p></li><li><p>打开 VM,将网络手动配置成 <code>Static</code> 适配器所在的 IP 段,并且选择一个不冲突的内网 IP(下面还是展示 Windows 的配置)。</p><p><img src="https://imgs.landv.cn/imgs/202407021004765.png" alt="img"></p></li></ol><p>经过上述步骤,就完成了 VM 内网固定 IP 的配置,并且也可以连接外网服务。只要适配器没有被修改,VM 的 IP 就可以一直保持不变 。</p><h1 id="windows-挂载空闲磁盘到文件夹下"><a href="#windows-挂载空闲磁盘到文件夹下" class="headerlink" title="windows 挂载空闲磁盘到文件夹下"></a>windows 挂载空闲磁盘到文件夹下</h1><p>原文来源(<a href="https://blog.csdn.net/sky0Lan/article/details/124345699%EF%BC%89">https://blog.csdn.net/sky0Lan/article/details/124345699)</a></p><h4 id="类使用linux把磁盘挂载到目录下"><a href="#类使用linux把磁盘挂载到目录下" class="headerlink" title="类使用linux把磁盘挂载到目录下"></a>类使用linux把磁盘挂载到目录下</h4><h4 id="操作"><a href="#操作" class="headerlink" title="操作"></a>操作</h4><ul><li>此电脑-》管理</li><li>磁盘管理</li></ul><p><img src="https://imgs.landv.cn/imgs/202407021005170.png" alt="在这里插入图片描述"></p><ul><li><p>选择一个未配分的磁盘空间</p><p><img src="https://imgs.landv.cn/imgs/202407021005772.png" alt="在这里插入图片描述"></p></li><li><p>选择添加驱动号或者路径 ,装入以下空白NTFS文件夹中<br><img src="https://imgs.landv.cn/imgs/202407021006589.png" alt="在这里插入图片描述"></p></li><li><p>选择挂载到的文件夹下<br><img src="https://imgs.landv.cn/imgs/202407021006831.png" alt="在这里插入图片描述"></p></li><li><p>完成</p><p><img src="https://imgs.landv.cn/imgs/202407021006707.png" alt="在这里插入图片描述"></p></li></ul>]]></content>
<summary type="html"><h1 id="Hyper-V-配置内网固定-IP"><a href="#Hyper-V-配置内网固定-IP" class="headerlink" title="Hyper-V 配置内网固定 IP"></a>Hyper-V 配置内网固定 IP</h1><p>(原文来源:<a h</summary>
<category term="landv" scheme="https://landv.cn/categories/landv/"/>
<category term="landv" scheme="https://landv.cn/tags/landv/"/>
</entry>
<entry>
<title>kingdee金蝶ocx插件VB调用问题</title>
<link href="https://landv.cn/p/48ad3543.html"/>
<id>https://landv.cn/p/48ad3543.html</id>
<published>2024-05-27T07:46:37.000Z</published>
<updated>2024-05-27T07:46:37.000Z</updated>
<content type="html"><![CDATA[<h1 id="kingdee金蝶ocx插件VB调用问题"><a href="#kingdee金蝶ocx插件VB调用问题" class="headerlink" title="kingdee金蝶ocx插件VB调用问题"></a>kingdee金蝶ocx插件VB调用问题</h1><p>在使用金蝶ocx控件的时候VB6提示<code>该部件的许可证信息没有找到,在设计环境中,没有合适的许可证使用该功能。</code></p><p>还以为和原来一样 <code>vb6OCX许可证算法分析https://landv.cn/p/f225098e.html</code> 结果发现是用MFC开发的ocx。经过静态调试、调试都没有发现有什么问题。</p><p><img src="https://imgs.landv.cn/imgs/202405271547453.png" alt="image-20240527154720375"></p><p><img src="https://imgs.landv.cn/imgs/202405271548642.png" alt="image-20240527154824593"></p><p>然后用MFC创建了一个ocx控件。原来只是简单的校验,在用ida静态反编译中也找到了这部分。</p><p><code>运行时许可证</code>打上勾。</p><p><img src="https://imgs.landv.cn/imgs/202405271559281.png" alt="image-20240527155943240"></p><figure class="highlight c++"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br><span class="line">7</span><br><span class="line">8</span><br><span class="line">9</span><br><span class="line">10</span><br><span class="line">11</span><br><span class="line">12</span><br><span class="line">13</span><br></pre></td><td class="code"><pre><span class="line"><span class="comment">// 授权字符串</span></span><br><span class="line"></span><br><span class="line"><span class="type">static</span> <span class="type">const</span> TCHAR _szLicFileName[] = _T(<span class="string">"MFCActiveXControl1.lic"</span>);</span><br><span class="line"><span class="type">static</span> <span class="type">const</span> WCHAR _szLicString[] = <span class="string">L"Copyright (c) 2024 P R C"</span>;</span><br><span class="line"></span><br><span class="line"><span class="comment">// CMFCActiveXControl1Ctrl::CMFCActiveXControl1CtrlFactory::VerifyUserLicense -</span></span><br><span class="line"><span class="comment">// 检查是否存在用户许可证</span></span><br><span class="line"></span><br><span class="line">BOOL CMFCActiveXControl1Ctrl::CMFCActiveXControl1CtrlFactory::<span class="built_in">VerifyUserLicense</span>()</span><br><span class="line">{</span><br><span class="line"><span class="keyword">return</span> <span class="built_in">AfxVerifyLicFile</span>(<span class="built_in">AfxGetInstanceHandle</span>(), _szLicFileName,</span><br><span class="line">_szLicString);</span><br><span class="line">}</span><br></pre></td></tr></table></figure><p><img src="https://imgs.landv.cn/imgs/202405271552503.png" alt="image-20240527155241415"></p><p>只需要定位字符<code>AfxVerifyLicFile</code>,不知道x64dbg 抽什么疯,跳转起来挺麻烦的。中间分析过程就不说了。就直接说最后的方法吧。</p><p><img src="https://imgs.landv.cn/imgs/202405271555399.png" alt="image-20240527155556338"></p><p>也就这个位置,这就简单了,直接搜索字符串吧。</p><p><img src="https://imgs.landv.cn/imgs/202405271556639.png" alt="image-20240527155645581"></p><p><img src="https://imgs.landv.cn/imgs/202405271557192.png" alt="image-20240527155717162"></p><p>_szLicFileName是变化的,_szLicString是固定的。也就是<code>Copyright (c) 1998 KingDee</code>每次只需要找到<code>KDSpread.lic</code> 用<code>.lic</code>搜索</p><p>最后在ocx控件的同一目录创建lic文件。再从vb6中拖住就能显示了</p><p><img src="https://imgs.landv.cn/imgs/202405271601579.png" alt="image-20240527160107547"></p><p><img src="https://imgs.landv.cn/imgs/202405271601630.png" alt="image-20240527160137588"></p><p>A .net OLE/COM viewer and inspector to merge functionality of OleView and Test Container</p><p><a href="https://github.com/landv/oleviewdotnet">https://github.com/landv/oleviewdotnet</a></p><p><img src="https://imgs.landv.cn/imgs/202405271606421.png" alt="image-20240527160600360"></p>]]></content>
<summary type="html"><h1 id="kingdee金蝶ocx插件VB调用问题"><a href="#kingdee金蝶ocx插件VB调用问题" class="headerlink" title="kingdee金蝶ocx插件VB调用问题"></a>kingdee金蝶ocx插件VB调用问题</h1><</summary>
<category term="landv" scheme="https://landv.cn/categories/landv/"/>
<category term="landv" scheme="https://landv.cn/tags/landv/"/>
</entry>
<entry>
<title>FolderPainter_文件夹改色工具</title>
<link href="https://landv.cn/p/ab55fae1.html"/>
<id>https://landv.cn/p/ab55fae1.html</id>
<published>2024-05-07T09:18:03.000Z</published>
<updated>2024-05-07T09:18:03.000Z</updated>
<content type="html"><![CDATA[<h1 id="FolderPainter-文件夹改色工具"><a href="#FolderPainter-文件夹改色工具" class="headerlink" title="FolderPainter_文件夹改色工具"></a>FolderPainter_文件夹改色工具</h1><p><strong>源地址:</strong><a href="https://www.sordum.org/10124/folder-painter-v1-3/">https://www.sordum.org/10124/folder-painter-v1-3/</a></p><p>Folder Painter 是一个免费软件,它可以让你给你的Windows资源管理器文件夹的颜色上色,并把它从默认的黄色改为其他颜色,使用这个应用程序,你可以分配任何颜色到你经常访问的文件夹,内置多款图标包,可根据爱好选择,让您的桌面图标看起来更好看</p><p><img src="https://imgs.landv.cn/imgs/202405071719331.png" alt="带有文件夹画家的彩色文件夹"><br>我们所有人都希望我们的计算机井井有条,因为在需要时可以更轻松地访问文件和文件夹。除了使用不同类型的文件的单独文件夹来组织文件之外,您还可以还可以自定义文件夹本身。我们大多数人经常遇到的相关问题之一是,我们似乎无法立即找到所需的文件夹,因为它们看起来都一样。然后我们求助于搜索它的名字或更仔细地观察。如果我们可以向 Windows 资源管理器中的文件夹添加不同的颜色,就可以解决这个问题。如果您可以为不同的文件夹分配不同的颜色,那么下次访问它们就会变得更容易。毕竟,用颜色识别文件夹比浏览文件夹名称容易得多。</p><p>Windows 10 没有任何选项供您自定义文件夹颜色。 FolderPainter 是一款免费软件,可让您为 Windows 资源管理器文件夹颜色着色并更改默认的黄色。使用此应用程序,您可以为经常访问的文件夹分配任何颜色,例如您的财务文件夹可以是绿色(如金钱),您的任务文件夹可以是红色(也许紧急?)。之后,您将不再需要浏览许多文件夹才能访问您最喜爱的文件夹。使用不同的颜色将使文件夹脱颖而出,以便您可以快速打开它。</p><p><strong>新动态(2021 年 1 月 19 日星期二)</strong></p><p>[添加] – 添加了子文件夹支持。可以从“Icons\FolderPainter.ini”文件中设置限制<br>[添加] – .ini 文件中的刷新选项<br>[已修复] – 主界面中的字体太小<br>[已修复] – 文件夹更改日期随每次图标更改而更改<br>[已修复] –一些小错误</p><p><strong>如何使用 :</strong></p><p>文件夹画家是一个易于使用的便携式免费软件程序,它允许您将代表所选文件夹的图标的颜色更改为您喜欢的任何颜色。</p><p>1.下载后解压并运行相应的exe文件“FolderPainter_x86或FolderPainter_x64.exe”,您可以从左侧窗格中选择一个图标包,默认情况下有3个图标包可用,但您总共可以下载21个图标包。</p><p><img src="https://imgs.landv.cn/imgs/202405071719742.png" alt="文件夹画家上下文菜单设置"></p><p>\2. 使用“安装”按钮,将文件夹画家添加到上下文菜单中,然后右键单击任何文件夹以打开其上下文菜单,该菜单现在将包含“更改文件夹图标”选项,如下面的快照所示。选择该选项以展开其子菜单。</p><p><img src="https://imgs.landv.cn/imgs/202405071719558.png" alt="文件夹画家上下文菜单"></p><p>上面的子菜单包含几种颜色供您选择。从那里选择一种颜色将其添加到文件夹中。按上下文菜单上的“默认文件夹图标”选项可恢复为默认颜色。要从右键菜单中卸载文件夹画家,只需使用卸载按钮。</p><p><strong>使其他计算机的颜色永久不变</strong></p><p>只需勾选“在文件夹中复制图标”即可。在更改文件夹颜色时,文件夹图标将被复制到其中,这将使更改永久化。例如;如果将文件夹复制到 USB 驱动器,文件夹颜色在其他计算机上将保持不变。</p><p><img src="https://imgs.landv.cn/imgs/202405071719925.png" alt="使文件夹颜色永久"></p><p><strong>更改所有子文件夹的颜色</strong></p><p>如果您在界面中勾选了“更改子文件夹的图标”部分,则更改图标将影响子文件夹。可以从“Icons\FolderPainter.ini”文件中的<strong>SubfolderOpt = -1</strong>行设置限制。</p><p>SubfolderOpt = -1(没有限制,所有子文件夹图标都会更改)<br>SubfolderOpt = 0(仅更改第一个子文件夹的图标)<br>SubfolderOpt = x(x > 0 ,将更改图标的子文件夹的数量)</p><p><img src="https://imgs.landv.cn/imgs/202405071719878.png" alt="文件夹画家ini文件"></p><p><strong>RefreshOtp=1</strong>,值 ;<br>0:不发送续订消息。<br>1:发送默认刷新消息。<br>2 : 将发送 BroadcastChange 消息<br>4 :将发送 F5 消息到所有打开的资源管理器窗口<br>8 :将发送刷新 iconcache 消息。</p><p><strong>使用现成的图标包或添加您自己的:</strong></p><p>我们准备了总共21个图标包(294个图标) -<a href="https://www.sordum.org/files/icon_preview/">预览版</a>,您可以从以下链接下载</p><p><a href="https://drive.google.com/uc?id=1l6ifty2mu12djJqfqT6GQYHZ1GlzoCZv&export=download"><img src="https://imgs.landv.cn/imgs/202405071719526.png" alt="下载FolderPainter图标包"></a></p><p><a href="https://yadi.sk/d/vWkaAXvjwG1b9w"><img src="https://imgs.landv.cn/imgs/202405071719258.png" alt="下载FolderPainter图标包"></a></p><p>您可以通过自定义颜色图标来自定义图标文件夹,以执行此操作;<br>\1. 将自定义彩色图标文件添加到 Icon 文件夹中,并将其重命名为 Orginals (01,02…)<br>\2. 更改FolderPainter.ini 文件中的颜色名称</p><p>文件夹画家有 CMD(命令行)支持</p><p><img src="https://imgs.landv.cn/imgs/202405071719364.png" alt="文件夹画家 cmd 支持"></p><p>该应用程序不会以任何方式影响系统性能,最重要的是它可以在 Windows 7 及更高版本上顺利运行,无需安装,无需激活码,便携式,免费软件。</p><p><strong>注意:</strong>将“更改文件夹图标”功能添加到上下文菜单是通过写入注册表来完成的。子菜单仅支持可用的 Windows 7 及更高版本操作系统和子菜单最多仅支持 16 项(为什么受到限制尚不清楚,微软留下了未解答的问题)</p><p><strong>支持的操作系统:</strong> Windows 11、Windows 10、Windows 8.1、Windows 8、Windows 7</p><p><strong>支持的语言:</strong> 英语、土耳其语、德语、法语、斯洛文尼亚语、波兰语、俄语、波斯语、日语、匈牙利语、韩语、希腊语、意大利语、希伯来语、葡萄牙语、阿拉伯语、西班牙语、简体中文、繁体中文、乌克兰语、荷兰语、丹麦语、捷克语,葡萄牙语(巴西), 罗马尼亚语, 格鲁吉亚语, 亚美尼亚语</p><p><a href="https://www.sordum.org/eula/"><img src="https://imgs.landv.cn/imgs/202405071719228.png" alt="我们的软件的 Eula 许可证"></a></p><p>文件:FolderPainter_x64.exe │ <a href="https://www.virustotal.com/gui/file/6587598990d5d107e3bc496801d55f4231ccdf5695b99a0f2afd51343d4a4259/detection">Virustotal</a><br>MD5:882119e099b8cf263918f1f7f3f475ee<br>SHA1:5be14be4d79983b420bdf03f8353ea0b01fa5ae0</p><p>文件:FolderPainter.exe │ <a href="https://www.virustotal.com/gui/file/5a0be005012a400a787368af2f3159be8e7edbc583c7167d0ecdba57a78d8fba/detection">Virustotal</a><br>MD5:fdc2d39751542b8c79f446a842e9b44b<br>SHA1:acfaedc28b90f11e577539113d917e9480b670ad</p><p><a href="https://www.sordum.org/downloads/?st-folder-painter"><img src="https://imgs.landv.cn/imgs/202405071719315.png" alt="下载"></a></p><p><a href="https://www.sordum.org/files/download/folder-painter/FolderPainter.zip">https://www.sordum.org/files/download/folder-painter/FolderPainter.zip</a></p><h2 id="图标预览"><a href="#图标预览" class="headerlink" title="图标预览"></a>图标预览</h2><p><img src="https://imgs.landv.cn/imgs/202405071730914.png" alt="img"></p><p><img src="https://imgs.landv.cn/imgs/202405071730744.png" alt="img"></p><p><img src="https://imgs.landv.cn/imgs/202405071731113.png" alt="img"></p><p><img src="https://imgs.landv.cn/imgs/202405071731788.png" alt="img"></p><p><img src="https://imgs.landv.cn/imgs/202405071731519.png" alt="img"></p><p><img src="https://imgs.landv.cn/imgs/202405071731330.png" alt="img"></p><p><img src="https://imgs.landv.cn/imgs/202405071731811.png" alt="img"></p><p><img src="https://imgs.landv.cn/imgs/202405071731459.png" alt="img"></p><p><img src="https://imgs.landv.cn/imgs/202405071731611.png" alt="img"></p><p><img src="https://imgs.landv.cn/imgs/202405071732674.png" alt="img"></p><p><img src="https://imgs.landv.cn/imgs/202405071732268.png" alt="img"></p><p><img src="https://imgs.landv.cn/imgs/202405071732321.png" alt="img"></p><p><img src="https://imgs.landv.cn/imgs/202405071732407.png" alt="img"></p><p><img src="https://imgs.landv.cn/imgs/202405071732588.png" alt="img"></p><p><img src="https://imgs.landv.cn/imgs/202405071732630.png" alt="img"></p><p><img src="https://imgs.landv.cn/imgs/202405071732651.png" alt="img"></p><p><img src="https://imgs.landv.cn/imgs/202405071732762.png" alt="img"></p><p><img src="https://imgs.landv.cn/imgs/202405071732544.png" alt="img"></p><p><img src="https://imgs.landv.cn/imgs/202405071732392.png" alt="img"></p><p><img src="https://imgs.landv.cn/imgs/202405071732224.png" alt="img"></p><p><img src="https://imgs.landv.cn/imgs/202405071732279.png" alt="img"></p><p><img src="https://imgs.landv.cn/imgs/202405071732884.png" alt="img"></p>]]></content>
<summary type="html"><h1 id="FolderPainter-文件夹改色工具"><a href="#FolderPainter-文件夹改色工具" class="headerlink" title="FolderPainter_文件夹改色工具"></a>FolderPainter_文件夹改色工具</</summary>
<category term="landv" scheme="https://landv.cn/categories/landv/"/>
<category term="landv" scheme="https://landv.cn/tags/landv/"/>
</entry>
<entry>
<title>C#开发pdf转换为图片并增加pdf特定文件右键菜单</title>
<link href="https://landv.cn/p/c883870e.html"/>
<id>https://landv.cn/p/c883870e.html</id>
<published>2024-04-24T07:59:35.000Z</published>
<updated>2024-04-24T07:59:35.000Z</updated>
<content type="html"><![CDATA[<h1 id="C-开发pdf转换为图片并增加pdf特定文件右键菜单"><a href="#C-开发pdf转换为图片并增加pdf特定文件右键菜单" class="headerlink" title="C#开发pdf转换为图片并增加pdf特定文件右键菜单"></a>C#开发pdf转换为图片并增加pdf特定文件右键菜单</h1><figure class="highlight c#"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br><span class="line">7</span><br><span class="line">8</span><br><span class="line">9</span><br><span class="line">10</span><br><span class="line">11</span><br><span class="line">12</span><br><span class="line">13</span><br><span class="line">14</span><br><span class="line">15</span><br><span class="line">16</span><br><span class="line">17</span><br><span class="line">18</span><br><span class="line">19</span><br><span class="line">20</span><br><span class="line">21</span><br><span class="line">22</span><br><span class="line">23</span><br><span class="line">24</span><br><span class="line">25</span><br><span class="line">26</span><br><span class="line">27</span><br><span class="line">28</span><br><span class="line">29</span><br><span class="line">30</span><br><span class="line">31</span><br><span class="line">32</span><br><span class="line">33</span><br><span class="line">34</span><br><span class="line">35</span><br><span class="line">36</span><br><span class="line">37</span><br><span class="line">38</span><br><span class="line">39</span><br><span class="line">40</span><br><span class="line">41</span><br><span class="line">42</span><br><span class="line">43</span><br><span class="line">44</span><br><span class="line">45</span><br><span class="line">46</span><br><span class="line">47</span><br><span class="line">48</span><br><span class="line">49</span><br><span class="line">50</span><br><span class="line">51</span><br><span class="line">52</span><br></pre></td><td class="code"><pre><span class="line"><span class="keyword">using</span> PdfiumViewer;</span><br><span class="line"></span><br><span class="line"><span class="keyword">using</span> System;</span><br><span class="line"><span class="keyword">using</span> System.Drawing.Imaging;</span><br><span class="line"><span class="keyword">using</span> System.IO;</span><br><span class="line"><span class="keyword">using</span> System.Linq;</span><br><span class="line"></span><br><span class="line"><span class="keyword">namespace</span> <span class="title">PdfToImage</span></span><br><span class="line">{</span><br><span class="line"> <span class="keyword">class</span> <span class="title">Program</span></span><br><span class="line">{</span><br><span class="line"></span><br><span class="line"> <span class="function"><span class="keyword">static</span> <span class="keyword">void</span> <span class="title">Main</span>(<span class="params"><span class="built_in">string</span>[] args</span>)</span></span><br><span class="line">{</span><br><span class="line"></span><br><span class="line"> Console.Title = Guid.NewGuid().ToString();</span><br><span class="line"> ConsoleHelper.hideConsole();</span><br><span class="line"></span><br><span class="line"> <span class="keyword">try</span></span><br><span class="line">{</span><br><span class="line"><span class="keyword">using</span> (<span class="keyword">var</span> document = PdfDocument.Load(args[<span class="number">0</span>]))</span><br><span class="line">{</span><br><span class="line"><span class="keyword">var</span> pageCount = document.PageCount;</span><br><span class="line"></span><br><span class="line"><span class="keyword">for</span> (<span class="built_in">int</span> i = <span class="number">0</span>; i < pageCount; i++)</span><br><span class="line">{</span><br><span class="line"><span class="comment">//var dpi = 300;</span></span><br><span class="line"><span class="comment">// 图片质量 150就够了</span></span><br><span class="line"><span class="keyword">var</span> dpi = <span class="number">150</span>;</span><br><span class="line"></span><br><span class="line"><span class="keyword">using</span> (<span class="keyword">var</span> image = document.Render(i, dpi, dpi, PdfRenderFlags.CorrectFromDpi))</span><br><span class="line">{</span><br><span class="line"><span class="keyword">var</span> encoder = ImageCodecInfo.GetImageEncoders()</span><br><span class="line">.First(c => c.FormatID == ImageFormat.Jpeg.Guid);</span><br><span class="line"><span class="keyword">var</span> encParams = <span class="keyword">new</span> EncoderParameters(<span class="number">1</span>);</span><br><span class="line">encParams.Param[<span class="number">0</span>] = <span class="keyword">new</span> EncoderParameter(</span><br><span class="line"> Encoder.Quality, <span class="number">100L</span>);</span><br><span class="line"></span><br><span class="line">image.Save(Path.GetFileNameWithoutExtension(args[<span class="number">0</span>]) + i + <span class="string">".png"</span>, encoder, encParams);</span><br><span class="line">}</span><br><span class="line">}</span><br><span class="line">}</span><br><span class="line">}</span><br><span class="line"><span class="keyword">catch</span> (Exception ex)</span><br><span class="line">{</span><br><span class="line">Console.WriteLine(ex.Message);</span><br><span class="line">}</span><br><span class="line"></span><br><span class="line">}</span><br><span class="line">}</span><br><span class="line">}</span><br><span class="line"></span><br></pre></td></tr></table></figure><p><img src="https://imgs.landv.cn/imgs/202404241604711.png" alt="image-20240424160412684"></p><p><img src="https://imgs.landv.cn/imgs/202404241603059.gif" alt="screenshots"></p>]]></content>
<summary type="html"><h1 id="C-开发pdf转换为图片并增加pdf特定文件右键菜单"><a href="#C-开发pdf转换为图片并增加pdf特定文件右键菜单" class="headerlink" title="C#开发pdf转换为图片并增加pdf特定文件右键菜单"></a>C#开发pdf转</summary>
<category term="landv" scheme="https://landv.cn/categories/landv/"/>
<category term="C#" scheme="https://landv.cn/categories/landv/C/"/>
<category term="格式转换" scheme="https://landv.cn/categories/landv/C/%E6%A0%BC%E5%BC%8F%E8%BD%AC%E6%8D%A2/"/>
<category term="landv" scheme="https://landv.cn/tags/landv/"/>
<category term="C#" scheme="https://landv.cn/tags/C/"/>
</entry>
<entry>
<title>python-会员数据分析平台-定制开发</title>
<link href="https://landv.cn/p/e6172f58.html"/>
<id>https://landv.cn/p/e6172f58.html</id>
<published>2024-04-10T03:46:26.000Z</published>
<updated>2024-04-10T03:46:26.000Z</updated>
<content type="html"><![CDATA[<h1 id="python-会员数据分析平台-定制开发"><a href="#python-会员数据分析平台-定制开发" class="headerlink" title="python-会员数据分析平台-定制开发"></a>python-会员数据分析平台-定制开发</h1><p><strong>浩秦数据分析平台:</strong><br>全新的数据分析平台,专为企业、研究机构和个人提供最强大的数据解决方案。无论您是初学者还是专业人士,我们的平台都能满足您的需求,让您轻松地探索、分析和可视化数据。</p><p>拍下后将由作者本人亲自指导安装以及根据您的需求进行定制开发~~~</p><p><strong>产品特点:</strong></p><ul><li>强大的功能:我们的平台集成了最先进的数据分析工具和算法,让您能够快速准确地处理海量数据,发现隐藏的模式和趋势。</li><li>易于使用:我们注重用户体验,为您提供直观简洁的界面和详细的操作指南,让您在使用过程中轻松上手。</li><li>定制化服务:无论您的需求是什么,我们都能为您量身定制解决方案,确保您得到最佳的数据分析体验。</li><li>安全可靠:我们采用最先进的安全技术和严格的数据保护措施,确保您的数据始终安全可靠。</li></ul><h2 id="使用的技术"><a href="#使用的技术" class="headerlink" title="使用的技术"></a>使用的技术</h2><ul><li>python<ul><li>flask</li><li>gunicorn</li><li>Jupyter</li><li>itables</li><li>pandas</li></ul></li><li>jquery</li><li>aardio</li></ul><h2 id="注意事项"><a href="#注意事项" class="headerlink" title="注意事项"></a>注意事项</h2><ol><li>本工具只能用于指定网络、指定电脑使用,其他位置均无法使用。</li><li>查看报表请选择左侧列表,报表生成缓存时间为6个小时,超时后将重新生成。</li><li>强制刷新请点击左侧列表中的<code>↻</code>按钮。</li><li>报表生成预计用时20秒左右,请勿重复点击报表获取和强制刷新<code>↻</code>按钮。</li><li>点击左上角<code>会员数据分析报表</code>,带小房子的一行即可回到主页面,也就是此页面。</li><li>左侧菜单中<code>X</code>用于隐藏左侧菜单,再次点击<code>☰</code>显示菜单栏。</li><li>如有疑问请联系管理员<code>浩秦</code>。</li></ol><img src="https://imgs.landv.cn/imgs/202404101147141.png" alt="7958fd6a-4bdd-400f-8cba-64aa36c8640e" style="zoom:50%;" /><img src="https://imgs.landv.cn/imgs/202404101147781.png" alt="微信截图_20240410112210" style="zoom:65%;" /><p><img src="https://imgs.landv.cn/imgs/202404101148292.jpg" alt="1712718311664"></p><p><img src="https://imgs.landv.cn/imgs/202404101148476.png" alt="微信截图_20240410105419"></p><p><img src="https://imgs.landv.cn/imgs/202404101148655.png" alt="30427d521cc5f4953e3946d54c0a50b8"></p><p><img src="https://imgs.landv.cn/imgs/202404101148891.png" alt="微信截图_20240410105547"></p>]]></content>
<summary type="html"><h1 id="python-会员数据分析平台-定制开发"><a href="#python-会员数据分析平台-定制开发" class="headerlink" title="python-会员数据分析平台-定制开发"></a>python-会员数据分析平台-定制开发</h1><</summary>
<category term="landv" scheme="https://landv.cn/categories/landv/"/>
<category term="python" scheme="https://landv.cn/categories/landv/python/"/>
<category term="数据分析" scheme="https://landv.cn/categories/landv/python/%E6%95%B0%E6%8D%AE%E5%88%86%E6%9E%90/"/>
<category term="landv" scheme="https://landv.cn/tags/landv/"/>
<category term="python" scheme="https://landv.cn/tags/python/"/>
<category term="数据分析" scheme="https://landv.cn/tags/%E6%95%B0%E6%8D%AE%E5%88%86%E6%9E%90/"/>
</entry>
<entry>
<title>QQ空间批量删除说说并自动翻页</title>
<link href="https://landv.cn/p/6e5289f2.html"/>
<id>https://landv.cn/p/6e5289f2.html</id>
<published>2024-04-09T01:34:00.000Z</published>
<updated>2024-04-09T01:34:00.000Z</updated>
<content type="html"><![CDATA[<h1 id="QQ空间批量删除说说并自动翻页"><a href="#QQ空间批量删除说说并自动翻页" class="headerlink" title="QQ空间批量删除说说并自动翻页"></a>QQ空间批量删除说说并自动翻页</h1><p><img src="https://imgs.landv.cn/imgs/202404091025341.gif" alt="screenshots"></p><figure class="highlight js"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br><span class="line">7</span><br><span class="line">8</span><br><span class="line">9</span><br><span class="line">10</span><br><span class="line">11</span><br><span class="line">12</span><br><span class="line">13</span><br><span class="line">14</span><br><span class="line">15</span><br><span class="line">16</span><br><span class="line">17</span><br><span class="line">18</span><br><span class="line">19</span><br><span class="line">20</span><br><span class="line">21</span><br><span class="line">22</span><br><span class="line">23</span><br><span class="line">24</span><br><span class="line">25</span><br><span class="line">26</span><br><span class="line">27</span><br><span class="line">28</span><br></pre></td><td class="code"><pre><span class="line"><span class="keyword">var</span> delay = <span class="number">500</span>; <span class="comment">//删除与确认操作以500ms为周期循环进行</span></span><br><span class="line"><span class="keyword">function</span> <span class="title function_">del</span>(<span class="params"></span>) {</span><br><span class="line"> <span class="keyword">try</span> {</span><br><span class="line"> <span class="variable language_">document</span>.<span class="title function_">querySelector</span>(<span class="string">'.app_canvas_frame'</span>).<span class="property">contentDocument</span>.<span class="title function_">querySelector</span>(<span class="string">'.del_btn'</span>).<span class="title function_">click</span>();</span><br><span class="line"> <span class="built_in">setTimeout</span>(<span class="string">"yes()"</span>, delay);</span><br><span class="line"> }</span><br><span class="line"> <span class="keyword">catch</span> (err) {</span><br><span class="line"> <span class="title function_">next_page</span>(); <span class="comment">//删除本页所有说说后自动翻页</span></span><br><span class="line"> }</span><br><span class="line">}</span><br><span class="line"><span class="keyword">function</span> <span class="title function_">yes</span>(<span class="params"></span>) {</span><br><span class="line"> <span class="keyword">try</span> {</span><br><span class="line"> <span class="variable language_">document</span>.<span class="title function_">querySelector</span>(<span class="string">'.qz_dialog_layer_btn'</span>).<span class="title function_">click</span>();</span><br><span class="line"> <span class="built_in">setTimeout</span>(<span class="string">"del()"</span>, delay);</span><br><span class="line"> }</span><br><span class="line"> <span class="keyword">catch</span> (err) {</span><br><span class="line"> <span class="built_in">setTimeout</span>(<span class="string">"yes()"</span>, <span class="number">1000</span>);</span><br><span class="line"> }</span><br><span class="line">}</span><br><span class="line"><span class="keyword">function</span> <span class="title function_">next_page</span>(<span class="params"></span>) {</span><br><span class="line"> <span class="variable language_">document</span>.<span class="title function_">querySelector</span>(<span class="string">'.app_canvas_frame'</span>).<span class="property">contentWindow</span>.<span class="property">document</span>.<span class="title function_">querySelectorAll</span>(<span class="string">'.mod_pagenav_main>a'</span>).<span class="title function_">forEach</span>(<span class="function"><span class="params">el</span> =></span> {</span><br><span class="line"> <span class="keyword">if</span> (el.<span class="property">title</span> === <span class="string">'下一页'</span>) {</span><br><span class="line"> el.<span class="title function_">click</span>();</span><br><span class="line"> <span class="built_in">setTimeout</span>(<span class="string">"del()"</span>, <span class="number">5000</span>);</span><br><span class="line"> }</span><br><span class="line"> })</span><br><span class="line">}</span><br><span class="line"><span class="title function_">del</span>();</span><br></pre></td></tr></table></figure>]]></content>
<summary type="html"><h1 id="QQ空间批量删除说说并自动翻页"><a href="#QQ空间批量删除说说并自动翻页" class="headerlink" title="QQ空间批量删除说说并自动翻页"></a>QQ空间批量删除说说并自动翻页</h1><p><img src="https://</summary>
<category term="landv" scheme="https://landv.cn/categories/landv/"/>
<category term="js" scheme="https://landv.cn/categories/landv/js/"/>
<category term="landv" scheme="https://landv.cn/tags/landv/"/>
<category term="js" scheme="https://landv.cn/tags/js/"/>
</entry>
<entry>
<title>PB反编译器源码查看</title>
<link href="https://landv.cn/p/ffc2d90a.html"/>
<id>https://landv.cn/p/ffc2d90a.html</id>
<published>2024-03-26T09:23:57.000Z</published>
<updated>2024-03-26T09:23:57.000Z</updated>
<content type="html"><![CDATA[<h1 id="PB反编译器源码查看"><a href="#PB反编译器源码查看" class="headerlink" title="PB反编译器源码查看"></a>PB反编译器源码查看</h1><p><strong>国内PB反编译历程</strong></p><ul><li>据<code>Hucxy</code>了解国内目前PB反编译软件有depb、pbkiller、shudepb、pb decompiler、pbdviewer。</li><li>2003年中,ljtt发布了国内首款PB反编译工具depb,该工具支持反编译PB6-7,但该工具为demo版且只显示前几行代码,后来由于作者比较忙最后一直没再更新。</li><li>2005年初,freecat破解了depb的代码显示行数限制,并发布为depb_fix。</li><li>2005年中,kivens参考litt的depb并得到freecat的帮助研发并发布了pbkiller,这是第一款PB商业反编译工具,支持PB6-9,不过后来被人破解,作者最后免费并停止更新了。</li><li>2006年,shu发布了PB反编译工具shudepb,并且一直持续更新至今,目前来说shudepb应该是最强大的PB商业反编译工具。</li><li>2009年中,chengg0769发布了PB反编译工具pb decompiler,该工具跟shudepb同样很强大,同样是收费软件,并且一直持续更新至今。</li><li>2018年底,不懂算法发布了新的PB反编译工具pbdviewer,该程序支持PB5-PB12.6,不过作者不在更新。值得一提的是该程序是用c#写的,并且无加密混淆(<code>相当于开源</code>)。</li><li>2019年初,hucxy对pbdviewer进行问题修复,并发布为pbdviewer_fix。</li></ul><p><strong>最开始大佬<code>不懂算法</code>是在看雪2018年放出来的</strong></p><p>[<a href="https://bbs.kanxue.com/thread-247372.htm">原创]PbdViewer v0.1 - PowerBuilder 反编译工具-资源下载-看雪-安全社区|安全招聘|kanxue.com</a></p><p><strong>蓝奏下载地址:</strong></p><p>原文件:<a href="https://landv.lanzn.com/iHkcx1sp6euf">https://landv.lanzn.com/iHkcx1sp6euf</a></p><p>源码:<a href="https://landv.lanzn.com/ijyO81sp8d3e">https://landv.lanzn.com/ijyO81sp8d3e</a></p><p><strong>github:</strong></p><p>由<code>Hucxy</code>提供的源码</p><p><a href="https://github.com/Hucxy/PbdViewer">Hucxy/PbdViewer: PowerBuilder Decompiler (github.com)</a></p><p><img src="https://imgs.landv.cn/imgs/202403261729094.png" alt="image-20240326172912042"></p>]]></content>
<summary type="html"><h1 id="PB反编译器源码查看"><a href="#PB反编译器源码查看" class="headerlink" title="PB反编译器源码查看"></a>PB反编译器源码查看</h1><p><strong>国内PB反编译历程</strong></p>
<ul>
<l</summary>
<category term="landv" scheme="https://landv.cn/categories/landv/"/>
<category term="landv" scheme="https://landv.cn/tags/landv/"/>
</entry>
<entry>
<title>现代化-开源的-Linux-服务器运维管理面板-1Panel</title>
<link href="https://landv.cn/p/b83de3b7.html"/>
<id>https://landv.cn/p/b83de3b7.html</id>
<published>2024-03-26T09:16:39.000Z</published>
<updated>2024-03-26T09:16:39.000Z</updated>
<content type="html"><![CDATA[<p align="center"><a href="https://1panel.cn"><img src="http://1panel.oss-cn-hangzhou.aliyuncs.com/img/1panel-logo.png" alt="1Panel" width="300" /></a></p><p align="center"><b>现代化、开源的 Linux 服务器运维管理面板</b></p><p align="center"> <a href="https://www.gnu.org/licenses/gpl-3.0.html"><img src="https://shields.io/github/license/1Panel-dev/1Panel?color=%231890FF" alt="License: GPL v3"></a> <a href="https://app.codacy.com/gh/1Panel-dev/1Panel?utm_source=github.com&utm_medium=referral&utm_content=1Panel-dev/1Panel&utm_campaign=Badge_Grade_Dashboard"><img src="https://app.codacy.com/project/badge/Grade/da67574fd82b473992781d1386b937ef" alt="Codacy"></a> <a href="https://github.com/1Panel-dev/1Panel/releases"><img src="https://img.shields.io/github/v/release/1Panel-dev/1Panel" alt="GitHub release"></a> <a href="https://github.com/1Panel-dev/1Panel"><img src="https://img.shields.io/github/stars/1Panel-dev/1Panel?color=%231890FF&style=flat-square" alt="Stars"></a> <a href="https://app.fossa.com/projects/git%2Bgithub.com%2F1Panel-dev%2F1Panel?ref=badge_shield"><img src="https://app.fossa.com/api/projects/git%2Bgithub.com%2F1Panel-dev%2F1Panel.svg?type=shield" alt="FOSSA Status"></a><br> [<a href="docs/README_TW.md">中文(繁體)</a>] | [<a href="docs/README_EN.md">English</a>] | [<a href="docs/README_JP.md">日本語</a>]</p><hr><p>1Panel 是新一代的 Linux 服务器运维管理面板。</p><ul><li><strong>高效管理</strong>:用户可以通过 Web 图形界面轻松管理 Linux 服务器,实现主机监控、文件管理、数据库管理、容器管理等功能;</li><li><strong>快速建站</strong>:深度集成开源建站软件 WordPress 和 <a href="https://github.com/halo-dev/halo/">Halo</a>,域名绑定、SSL 证书配置等操作一键搞定;</li><li><strong>应用商店</strong>:精选上架各类高质量的开源工具和应用软件,协助用户轻松安装并升级;</li><li><strong>安全可靠</strong>:基于容器管理并部署应用,实现最小的漏洞暴露面,同时提供防火墙和日志审计等功能;</li><li><strong>一键备份</strong>:支持一键备份和恢复,用户可以将数据备份到各类云端存储介质,永不丢失。</li></ul><h2 id="UI-展示"><a href="#UI-展示" class="headerlink" title="UI 展示"></a>UI 展示</h2><p><img src="https://imgs.landv.cn/imgs/202403261718454.png" alt="UI展示"></p><h2 id="快速开始"><a href="#快速开始" class="headerlink" title="快速开始"></a>快速开始</h2><p><strong>在线体验</strong></p><ul><li>环境地址:<a href="https://demo.1panel.cn/">https://demo.1panel.cn/</a></li><li>用户名:demo</li><li>密码:1panel</li></ul><p><strong>一键安装</strong></p><p>执行如下命令一键安装 1Panel:</p><figure class="highlight sh"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">curl -sSL https://resource.fit2cloud.com/1panel/package/quick_start.sh -o quick_start.sh && sudo bash quick_start.sh</span><br></pre></td></tr></table></figure><p><strong>学习资料</strong></p><ul><li><a href="https://1panel.cn/docs/">在线文档</a></li><li><a href="https://space.bilibili.com/510493147/channel/collectiondetail?sid=1199760">教学视频</a></li><li><a href="https://bbs.fit2cloud.com/c/1p/7">社区论坛</a></li><li><a href="https://bbs.fit2cloud.com/t/topic/2147">如何加入微信交流群?</a></li></ul><h2 id="安全说明"><a href="#安全说明" class="headerlink" title="安全说明"></a>安全说明</h2><p>如果您在使用过程中发现任何安全问题,请通过以下方式直接联系我们:</p><ul><li>邮箱:<a href="mailto:wanghe@fit2cloud.com">wanghe@fit2cloud.com</a></li></ul><h2 id="Star-History"><a href="#Star-History" class="headerlink" title="Star History"></a>Star History</h2><p><a href="https://star-history.com/#1Panel-dev/1Panel&Date"><img src="https://api.star-history.com/svg?repos=1Panel-dev/1Panel&type=Date" alt="Star History Chart"></a></p><h2 id="FOSSA-Status"><a href="#FOSSA-Status" class="headerlink" title="FOSSA Status"></a>FOSSA Status</h2><p><a href="https://app.fossa.com/projects/git%2Bgithub.com%2F1Panel-dev%2F1Panel?ref=badge_large"><img src="https://app.fossa.com/api/projects/git%2Bgithub.com%2F1Panel-dev%2F1Panel.svg?type=large" alt="FOSSA Status"></a></p><h2 id="License"><a href="#License" class="headerlink" title="License"></a>License</h2><p>Copyright (c) 2014-2024 <a href="https://fit2cloud.com/">FIT2CLOUD 飞致云</a>, All rights reserved.</p><p>Licensed under The GNU General Public License version 3 (GPLv3) (the “License”); you may not use this file except in compliance with the License. You may obtain a copy of the License at</p><p><a href="https://www.gnu.org/licenses/gpl-3.0.html">https://www.gnu.org/licenses/gpl-3.0.html</a></p><p>Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an “AS IS” BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.</p>]]></content>
<summary type="html"><p align="center"><a href="https://1panel.cn"><img src="http://1panel.oss-cn-hangzhou.aliyuncs.com/img/1panel-logo.png" alt="1Panel" width="</summary>
<category term="landv" scheme="https://landv.cn/categories/landv/"/>
<category term="linux" scheme="https://landv.cn/categories/landv/linux/"/>
<category term="tools" scheme="https://landv.cn/categories/landv/linux/tools/"/>
<category term="landv" scheme="https://landv.cn/tags/landv/"/>
<category term="linux" scheme="https://landv.cn/tags/linux/"/>
</entry>
<entry>
<title>Lucy快速启动-更新记录-下载地址</title>
<link href="https://landv.cn/p/2244e58e.html"/>
<id>https://landv.cn/p/2244e58e.html</id>
<published>2024-03-26T09:08:24.000Z</published>
<updated>2024-03-26T09:08:24.000Z</updated>
<content type="html"><![CDATA[<h1 id="Lucy快速启动-更新记录-下载地址"><a href="#Lucy快速启动-更新记录-下载地址" class="headerlink" title="Lucy快速启动-更新记录-下载地址"></a>Lucy快速启动-更新记录-下载地址</h1><p><img src="https://imgs.landv.cn/imgs/202403261709564.png" alt="image-20240326170923528"></p><p>Lucy使用还可以,只是因为有sqlite读写,请将此小软件放到固态分区里面,再挪动之前先要<code>转换到绝对路径</code>。</p><p>放到固态分区后,点击运行软件不会在卡顿一下了。我也就不在造轮子。没多少内容其实大可不必用sqlite。只需要一个自定义dat文件就好。将内容缓存到内存。这样机械硬盘使用就不会卡顿一下了。</p><p>轮子太多,用就完了<code>~~~~</code></p><p><img src="https://imgs.landv.cn/imgs/202403261712589.png" alt="image-20240326171211552"></p><p><a href="https://www.yuque.com/lucy/lucy/record">Lucy快速启动-更新记录&下载地址 (yuque.com)</a></p><p>用过音速启动、Lily等启动工具,都是很好的软件</p><p>但每个软件都不可能适应所有人的需求,于是自己又造了一个轮子</p><p>使用Lily时习惯吧名字改为Lucy,于是轮子的名字依然叫Lucy了</p><p>软件最大特色就是简洁,只为快速启动,简洁不简单</p><p>不联网,不写注册表,甚至不开机启动(可在设置页面选择开机启动)</p><p>软件使用C++编写,界面库使用网易云信NIM_Duilib,数据存储使用sqlite3本地数据库</p><p>文件(夹)、虚拟目录(我的电脑、控制面板等)、浏览器地址栏链接等都可以直接拖拽添加</p><p>添加网址可拖入浏览器网址或拖入url快捷方式(如果在icons\url下有对应域名图标会自动加载)</p><p>快捷方式可以在本页内拖动排序!</p><p>PS:软件主要自用,风格极简,不会添加绚丽特效或复杂冗余功能,以实用为主,会酌情考虑网友提出的建议进行更新,遇到BUG请留言。</p><p><strong>下载地址:</strong></p><p><a href="https://lucy.lanzouw.com/b015ebrti"><strong>https://lucy.lanzouw.com/b015ebrti</strong></a></p><p><a href="https://share.weiyun.com/Wkthi1WD"><strong>https://share.weiyun.com/Wkthi1WD</strong></a></p><p><strong>—————————————————————-</strong></p><p><strong>2024-03-21 Lucy快速启动 v1.8.3</strong></p><p>\1. 便签页切换自动保存</p><p>\2. 修复菜单和部分窗口显示问题</p><p>\3. 主窗体显隐快捷键支持设置鼠标侧键</p><p><strong>—————————————————————-</strong></p><p><strong>2024-03-12 Lucy快速启动 v1.8.2</strong></p><p>\1. 增加界面透明度设置</p><p>\2. 备注超链接支持中文,file:/支持相对路径</p><p>\3. 便签页支持超链接和拖拽</p><p>\4. 为[主界面获得焦点时按键自动搜索]增加设置选项(之前默认启用,现需要设置)</p><p><strong>—————————————————————-</strong></p><p><strong>2024-03-09 Lucy快速启动 v1.8.1</strong></p><p>\1. 主菜单加入[系统功能],不用加入链接就可以直接使用了</p><p>\2. 双击任务栏显隐排除通知区域</p><p>\3. 备注支持超链接(http: file: mailto: ftp: 等路径)</p><p><img src="https://imgs.landv.cn/imgs/202403261710965.png" alt="img"></p><p>\4. 优化主程序启动方式</p><p><strong>—————————————————————-</strong></p><p><strong>2023-12-01 Lucy快速启动 v1.8.0</strong></p><p>\1. 增加特殊标签[全部][便签]:全部标签显示当前分组内所有链接,便签用于记录文字信息</p><p>\2. 搜索功能支持多个关键字(空格间隔开)</p><p>\3. 增加分组和标签的移动快捷键(Shift+方向键)</p><p>\4. 优化URL和目录的默认打开方式</p><p><strong>—————————————————————-</strong></p><p><strong>2023-08-15 Lucy快速启动 v1.7.9</strong></p><p>\1. 支持exe,dll资源中选择图标,支持图标索引编号</p><p>\2. 支持webp格式图标</p><p>\3. 修复主题保存和conf.ini存取</p><p>\4. 标签列支持滚动条</p><p><strong>—————————————————————-</strong></p><p><strong>2023-06-17 Lucy快速启动 v1.7.8rv2</strong></p><p>\1. 【重要】修复排序模式下的删除错误</p><p><strong>—————————————————————-</strong></p><p><strong>2023-06-04 Lucy快速启动 v1.7.8</strong></p><p>\1. 支持标签内按运行次数或首字母排序</p><p>\2. 支持设置自定义打开文件夹命令</p><p>\3. 修复某些情况下的显隐冲突</p><p><strong>—————————————————————-</strong></p><p><strong>2022-06-14 Lucy快速启动 v1.7.6</strong></p><p>\1. 记忆分组和标签</p><p>\2. 优化窗口置顶,主窗口显示时按键直接打开搜索</p><p><strong>—————————————————————-</strong></p><p><strong>2022-06-09 Lucy快速启动 v1.7.5</strong></p><p>\1. 重构显隐功能代码,修复dui界面库和WorkerW窗口引起的各种显隐问题</p><p>\2. 增加鼠标滑动激活分组和标签的延时设置</p><p>ps:更新代码较多遇到BUG请留言反馈,反馈BUG时请附带版本号</p><p><strong>—————————————————————-</strong></p><p><strong>2022-05-25 Lucy快速启动 v1.7.4</strong></p><p>\1. 修复[贴边隐藏]和[启动时隐藏]冲突造成的贴边显隐异常</p><p>\2. 优化结果排序</p><p>ps:关于备份和更新的问题可以看下右键主菜单里的【帮助说明】链接【常见问题和错误处理】</p><p><strong>—————————————————————-</strong></p><p><strong>2022-05-16 Lucy快速启动 v1.7.3</strong></p><p>\1. 修复跟随鼠标显示</p><p>\2. 修复桌面四角隐藏</p><p>\3. 修复日期刷新</p><p><strong>—————————————————————-</strong></p><p><strong>2022-05-08 Lucy快速启动 v1.7.2</strong></p><p>\1. 优化贴边显隐判断机制</p><p>\2. 修复新建分组鼠标滑动激活</p><p>\3. 修复Win11画图路径(Win11画图改用UWP应用)</p><p>\4. 可设置链接名单行显示</p><p><strong>—————————————————————-</strong></p><p><strong>2022-05-01 Lucy快速启动 v1.7.1</strong></p><p>\1. 改善贴边显隐动画流畅度</p><p>\2. 增加部分系统功能选项(关机、重启、音量、环境变量等)</p><p>\3. 支持svg图标</p><p>ps: 主题配色借鉴于Edge</p><p><strong>—————————————————————-</strong></p><p><strong>2022-04-17 Lucy快速启动 v1.7.0</strong></p><p>\1. 修改主题加载模式(可自行配色啦,theme目录下存放主题xml,建议复制一份重命名后再修改)</p><p>\2. 贴边显示/隐藏动画使用线程执行</p><p>\3. 修复界面库代码引起的菜单选项无效问题</p><p>ps: 更新界面库代码产生了一些BUG,因为更新代码量较大,再遇BUG留言反馈吧</p><p><strong>—————————————————————-</strong></p><p><strong>2022-04-14 Lucy快速启动 v1.6.8修正</strong></p><p>\1. 修复界面库代码引起的拖拽排序无效</p><p><strong>—————————————————————-</strong></p><p><strong>2022-04-12 Lucy快速启动 v1.6.8</strong></p><p>\1. 更新界面库代码</p><p>\2. 优化全屏判断</p><p>\3. 支持部分虚拟文件夹拖入</p><p><strong>—————————————————————-</strong></p><p><strong>2021-10-09 Lucy快速启动 v1.6.7</strong></p><p>\1. 优化URL和虚拟目录链接的拖拽判断</p><p>\2. 增加双击桌面或任务栏显隐主界面设置项</p><p>\3. 增加标题栏搜索、菜单按钮显隐设置项</p><p>\4. 修复搜索框、搜索结果菜单等相关BUG</p><p><strong>—————————————————————-</strong></p><p><strong>2021-09-28 Lucy快速启动 v1.6.6</strong></p><p>\1. 搜索支持Everything(可在设置页面开启,开启后在lucy搜索结果后附加Everything的前16条搜索结果)</p><p>\2. 搜索内容包含备注,并且结果中显示备注</p><p>\3. 搜索结果按使用次数排序</p><p>\4. 搜索结果增加右键菜单(管理员权限启动|打开文件位置|Win原生菜单)</p><p>ps: lucy搜索结果默认是不限制结果数的,如果结合Everything使用建议限制下lucy搜索结果数;</p><p>搜索结果支持的按键切换:Tab、Shift+Tab、Home、End、UP、Down</p><p><strong>—————————————————————-</strong></p><p><strong>2021-09-24 Lucy快速启动 v1.6.5</strong></p><p>\1. 搜索结果支持tab切换</p><p>\2. URL可设置使用默认浏览器的隐私模式打开</p><p>\3. 支持更多浏览器的隐私模式(IE、Edge、FireFox、Chrome)</p><p><strong>—————————————————————-</strong></p><p><strong>2021-08-11 Lucy快速启动 v1.6.4</strong></p><p>\1. 标签可通过菜单移动到其他分组</p><p><strong>—————————————————————-</strong></p><p><strong>2021-03-23 Lucy快速启动 v1.6.2</strong></p><p>\1. 增加搜索框(支持首字母搜索,可设置快捷键打开)</p><p>\2. 修复权限问题引起的拖拽无效</p><p>\3. 重做移动复制菜单</p><p><strong>—————————————————————-</strong></p><p><strong>2021-03-13 Lucy快速启动 v1.6.1</strong></p><p>\1. 调整设置页面使用分页</p><p>\2. 修复URL拖拽,URL正则,URL右键菜单增加<使用Edge隐私模式打开>,暂不支持其他浏览器隐私模式</p><p>\3. 简化图标缓存逻辑,优化缓存方式(需重建缓存文件)</p><p>\4. 修复资源管理器重启后托盘图标消失</p><p>\5. 修复网络共享文件夹图标错误</p><p><strong>—————————————————————-</strong></p><p><strong>2021-03-01 Lucy快速启动 v1.6.0</strong></p><p>\1. 修复高分辨率屏幕设置缩放比例后图标不全问题</p><p>\2. 修复贴边隐藏后鼠标移动到边缘有时会出现不停弹出隐藏的问题</p><p>\3. 修改图标缓存使用PNG格式(需重建缓存文件)</p><p><strong>—————————————————————-</strong></p><p><strong>2021-02-21 Lucy快速启动 v1.5.9</strong></p><p>\1. 修复#类型图标缓存错误</p><p>\2. 支持刷新单个图标</p><p>\3. 支持浏览器网址拖拽添加</p><p><strong>—————————————————————-</strong></p><p><strong>2021-02-18 Lucy快速启动 v1.5.8</strong></p><p>\1. 修复各种图标缓存错误(<strong>如果存在图标错误可以删掉icon.db缓存文件,程序会自动重建</strong>)</p><p>\2. 优化靠边显隐动画</p><p>\3. 系统功能增加证书管理/计算机管理</p><p><strong>—————————————————————-</strong></p><p><strong>2021-01-27 Lucy快速启动 v1.5.7</strong></p><p>\1. 增加深色主题(设置页面,设置后需关闭重开)</p><p>\2. 系统功能增加组策略/管理工具/服务</p><p><strong>—————————————————————-</strong></p><p><strong>2020-12-20 Lucy快速启动 v1.5.6</strong></p><p>\1. 允许不同目录多个实例运行(同目录单实例)</p><p>\2. 备注可以多行</p><p>\3. 侧边栏可以设置对齐方式</p><p>\4. 编辑框支持右键菜单</p><p><strong>—————————————————————-</strong></p><p><strong>2020-11-20 Lucy快速启动 v1.5.5</strong></p><p>\1. 修复分组宽度自适应换行</p><p>\2. <strong>自定义系统托盘图标(目录下放置图标重命名notify.ico)</strong></p><p>\3. 优化全屏判断和自动隐藏</p><p><strong>—————————————————————-</strong></p><p><strong>2020-10-18 Lucy快速启动 v1.5.4</strong></p><p>\1. 修正跟随鼠标显示时位置居中</p><p>\2. 支持UWP快捷方式拖入</p><p>\3. 支持打开UWP程序所在位置</p><p><strong>—————————————————————-</strong></p><p><strong>2020-10-12 Lucy快速启动 v1.5.3</strong></p><p>\1. 增加应用的快捷键设置</p><p>\2. 修正界面超出屏幕的情况</p><p>\3. 分组/标签鼠标滑动激活分别设置</p><p>\4. 增加更新和帮助</p><p><strong>—————————————————————-</strong></p><p><strong>2020-10-03 Lucy快速启动 v1.5.2</strong></p><p>\1. 修复鼠标中键隐藏设置无效问题</p><p><strong>—————————————————————-</strong></p><p><strong>2020-09-19 Lucy快速启动 v1.5.1</strong></p><p>\1. 可设置标签栏宽度</p><p>\2. 修复图标设置不显示问题</p><p>\3. 优化快捷键设置</p><p>ps: 1.5.0的图标自定义设置有BUG,请更新1.5.1</p><p><strong>—————————————————————-</strong></p><p><strong>2020-09-18 Lucy快速启动 v1.5.0</strong></p><p>\1. 主菜单增加绝对/相对路径转换(lucy目录下始终使用相对路径不转换)</p><p>\2. 增加设置:失去焦点后隐藏</p><p>\3. 增加设置:跟随鼠标位置显示</p><p>\4. 修正删除快捷方式后图标缓存没有清理的问题</p><p>ps: 很久没更新了,一是需要的功能大都有了也还算稳定,二是想换个界面库一直也没时间搞,而且界面库也是家家有本难念的经</p><p>因为软件主要就是自己用,弃坑是不会弃坑的,除非哪位大佬再发个更好的我也去入坑</p><p>一些坛友建议的功能我个人可能用不到,所以不是那么容易发现问题,遇到BUG还是继续留言吧,叙述清楚遇到的问题即可,都会看到的</p><p><strong>—————————————————————-</strong></p><p><strong>2020-06-12 Lucy快速启动 v1.4.9(2020-06-13重新上传)</strong></p><p>\1. 支持鼠标滑动激活标签分组</p><p>\2. 修复未知类型文件图标显示</p><p>\3. 增加系统功能:关闭显示器/hosts</p><p>ps: 使用的界面库有硬伤,界面相关功能可能停滞,后续有换界面库的可能。</p><p>目前的功能基本满足了个人需求,更新会慢下来,有BUG或好的建议可以继续留言</p><p>文件大小剧减是因为没有再加壳,更新老版本时builtin文件夹需要一起</p><p><strong>—————————————————————-</strong></p><p><strong>2020-05-26 Lucy快速启动 v1.4.8</strong></p><p>\1. 可设置隐藏标题栏日期</p><p>\2. 修复部分图标黑边问题(删除db目录下的icon.db可重建所有图标,<strong>link.db千万<strong><strong>千万</strong></strong>千万****不要删!!!</strong>)</p><p>ps: 不少人问到选择列表模式后没地方右键再选平铺,列表模式第一行上边是有部分空白区域的,可以右键弹出菜单</p><p><strong>—————————————————————-</strong></p><p><strong>2020-05-15 Lucy快速启动 v1.4.7</strong></p><p>\1. 增加设置隐藏托盘图标/跨分组移动复制/删除确认</p><p>\2. 多分组换行显示</p><p>\3. 修复隐藏分组后标签的刷新</p><p>ps: 条件有限短期内不会适配高分屏dpi</p><p><strong>—————————————————————-</strong></p><p><strong>2020-05-09 Lucy快速启动 v1.4.6</strong></p><p>\1. 增加设置全屏勿扰模式</p><p>\2. 修复偶尔不能靠边隐藏问题</p><p>\3. 修正启动快捷方式后隐藏方式</p><p><strong>—————————————————————-</strong></p><p><strong>2020-05-07 Lucy快速启动 v1.4.5</strong></p><p>\1. 修复非置顶窗口时的显示问题</p><p>\2. 支持设置双击快捷方式启动</p><p>\3. 修复子菜单超出屏幕显示的问题</p><p><strong>—————————————————————-</strong></p><p><strong>2020-04-28 Lucy快速启动 v1.4.4</strong></p><p>\1. 修复删除分组卡住问题</p><p>\2. 修复新建标签未索引问题</p><p><strong>—————————————————————-</strong></p><p><strong>2020-04-26 Lucy快速启动 v1.4.3</strong></p><p>\1. 修复移动快捷方式到其他标签错误</p><p>\2. 可设置开机启动(默认不启动)</p><p><strong>—————————————————————-</strong></p><p><strong>2020-04-23 Lucy快速启动 v1.4.2</strong></p><p>\1. 修正判断顶级域名的正则表达式</p><p>\2. 快捷键设置支持Win键</p><p><strong>—————————————————————-</strong></p><p><strong>2020-04-19 Lucy快速启动 v1.4.1</strong></p><p>\1. 修复快捷键设置问题</p><p>\2. 支持鼠标中键隐藏</p><p>\3. 支持启动快捷方式后隐藏</p><p><strong>—————————————————————-</strong></p><p><strong>2020-04-18 Lucy快速启动 v1.4</strong></p><p>\1. 支持环境变量路径</p><p>\2. 支持shell命令</p><p>\3. 修正ico/png识别问题</p><p>\4. 增加设置窗口,可设置显示隐藏快捷键、窗口置顶、靠边隐藏</p><p><strong>—————————————————————-</strong></p><p><strong>2020-04-13 Lucy快速启动 v1.3</strong></p><p>\1. 修复编辑属性没有保存到数据库的BUG</p><p>\2. 增加部分系统功能(控制面板/注册表/命令行等)</p><p>\3. 拖动排序过程改变光标形状</p><p>\4. 优化执行线程,优化菜单</p><p><strong>—————————————————————-</strong></p><p><strong>2020-04-09 Lucy快速启动 v1.2</strong></p><p>\1. 支持拖动排序(没有过程动画,直接点住鼠标左键拖到心仪的位置撒手即可,不要拖到空白位置)</p><p>\2. 支持显示/隐藏标签</p><p>\3. 支持隐藏到屏幕四角(如果纵向横向都贴边会隐藏到对应屏幕角里,如果希望贴某一边隐藏可以拖动窗口位置只贴一个边)</p><p><strong>—————————————————————-</strong></p><p><strong>2020-04-06 Lucy快速启动 v1.1</strong></p><p>\1. 使用半透明阴影边缘(去白边)</p><p>\2. 增加托盘,主界面关闭按钮默认最小化到托盘。如果找不到主界面隐藏到哪了,可以鼠标左键单击托盘图标</p><p>\3. 快速启动过程使用独立线程防止卡界面</p>]]></content>
<summary type="html"><h1 id="Lucy快速启动-更新记录-下载地址"><a href="#Lucy快速启动-更新记录-下载地址" class="headerlink" title="Lucy快速启动-更新记录-下载地址"></a>Lucy快速启动-更新记录-下载地址</h1><p><img s</summary>
<category term="landv" scheme="https://landv.cn/categories/landv/"/>
<category term="tools" scheme="https://landv.cn/categories/landv/tools/"/>
<category term="landv" scheme="https://landv.cn/tags/landv/"/>
<category term="tools" scheme="https://landv.cn/tags/tools/"/>
</entry>
<entry>
<title>python-WOL唤醒-使用flet开发的页面</title>
<link href="https://landv.cn/p/3bbc26ab.html"/>
<id>https://landv.cn/p/3bbc26ab.html</id>
<published>2024-03-26T08:07:51.000Z</published>
<updated>2024-03-26T08:07:51.000Z</updated>
<content type="html"><![CDATA[<h1 id="python-WOL唤醒-使用flet开发的页面"><a href="#python-WOL唤醒-使用flet开发的页面" class="headerlink" title="python-WOL唤醒-使用flet开发的页面"></a><strong>python-WOL唤醒-使用flet开发的页面</strong></h1><p>使用python和flet进行开发一个小页面:</p><p>博主使用的iOS手机,这个页面部署在一个机顶盒里面,使用<code>wg</code>进行访问内网网页WOL唤醒电脑。</p><p>我的电脑大概5秒左右就启动成功了,python代码里面使用<code>from pythonping import ping</code>进行<code>ping</code>也可以等待ping通后进行远程操作,博主使用的RDP远程桌面进行控制的。</p><p><a href="https://flet.dev/">https://flet.dev/</a></p><p>flet创建的页面属于<a href="https://web.dev/what-are-pwas/">PWA</a>页面,可以生成一个桌面快捷方式。也可以使用flet的app</p><p><strong>Testing Flet app on iOS</strong></p><p>Start building awesome mobile apps in Python using just your computer and mobile phone!</p><p>Install <a href="https://apps.apple.com/app/flet/id1624979699">Flet</a> app to your iOS device. You will be using this app to see how your Flet project is working on iPhone or iPad.</p><p><a href="https://flet.dev/docs/guides/python/testing-on-ios">https://flet.dev/docs/guides/python/testing-on-ios</a></p><p><img src="https://imgs.landv.cn/imgs/202403261655679.jpeg" alt="img"></p><figure class="highlight python"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br><span class="line">7</span><br><span class="line">8</span><br><span class="line">9</span><br><span class="line">10</span><br><span class="line">11</span><br><span class="line">12</span><br><span class="line">13</span><br><span class="line">14</span><br><span class="line">15</span><br><span class="line">16</span><br><span class="line">17</span><br><span class="line">18</span><br><span class="line">19</span><br><span class="line">20</span><br><span class="line">21</span><br><span class="line">22</span><br><span class="line">23</span><br><span class="line">24</span><br><span class="line">25</span><br><span class="line">26</span><br><span class="line">27</span><br><span class="line">28</span><br><span class="line">29</span><br><span class="line">30</span><br><span class="line">31</span><br><span class="line">32</span><br><span class="line">33</span><br><span class="line">34</span><br><span class="line">35</span><br><span class="line">36</span><br><span class="line">37</span><br><span class="line">38</span><br><span class="line">39</span><br><span class="line">40</span><br><span class="line">41</span><br><span class="line">42</span><br><span class="line">43</span><br><span class="line">44</span><br><span class="line">45</span><br><span class="line">46</span><br><span class="line">47</span><br><span class="line">48</span><br><span class="line">49</span><br><span class="line">50</span><br><span class="line">51</span><br></pre></td><td class="code"><pre><span class="line"><span class="keyword">import</span> flet <span class="keyword">as</span> ft</span><br><span class="line"><span class="keyword">from</span> flet_core <span class="keyword">import</span> padding</span><br><span class="line"><span class="keyword">from</span> wakeonlan <span class="keyword">import</span> send_magic_packet</span><br><span class="line"><span class="keyword">from</span> time <span class="keyword">import</span> sleep</span><br><span class="line"><span class="keyword">from</span> pythonping <span class="keyword">import</span> ping</span><br><span class="line"></span><br><span class="line"></span><br><span class="line"><span class="keyword">def</span> <span class="title function_">main</span>(<span class="params">page: ft.Page</span>):</span><br><span class="line"> page.title = <span class="string">"WOL启动"</span></span><br><span class="line"> target_host = <span class="string">"你的IP"</span></span><br><span class="line"></span><br><span class="line"> <span class="keyword">def</span> <span class="title function_">wol_start</span>(<span class="params">e</span>):</span><br><span class="line"> mac_address = <span class="string">'你的mac地址'</span></span><br><span class="line"> send_magic_packet(mac_address)</span><br><span class="line"> isTrue = <span class="literal">False</span></span><br><span class="line"> <span class="keyword">for</span> i <span class="keyword">in</span> <span class="built_in">range</span>(<span class="number">30</span>):</span><br><span class="line"> response_list = ping(target_host, count=<span class="number">1</span>)</span><br><span class="line"> <span class="keyword">for</span> response <span class="keyword">in</span> response_list:</span><br><span class="line"> <span class="built_in">print</span>(response)</span><br><span class="line"> page.add(ft.Text(<span class="string">f"<span class="subst">{response}</span>,<span class="subst">{i}</span>!"</span>))</span><br><span class="line"> <span class="keyword">if</span> response.success:</span><br><span class="line"> isTrue = <span class="literal">True</span></span><br><span class="line"> <span class="keyword">break</span></span><br><span class="line"> <span class="keyword">if</span> isTrue:</span><br><span class="line"> page.clean()</span><br><span class="line"> initstart()</span><br><span class="line"> page.add(ft.Text(<span class="string">f"启动成功~~~"</span>))</span><br><span class="line"> <span class="keyword">break</span></span><br><span class="line"> sleep(<span class="number">0.5</span>)</span><br><span class="line"> sleep(<span class="number">1</span>)</span><br><span class="line"> page.clean()</span><br><span class="line"> initstart()</span><br><span class="line"> <span class="built_in">print</span>(<span class="string">"ok"</span>)</span><br><span class="line"></span><br><span class="line"> <span class="keyword">def</span> <span class="title function_">initstart</span>():</span><br><span class="line"> page.add(</span><br><span class="line"> ft.ResponsiveRow([</span><br><span class="line"> ft.Container(</span><br><span class="line"> ft.ElevatedButton(text=<span class="string">"WOL-Start-myPC"</span>, on_click=wol_start),</span><br><span class="line"> padding=padding.only(top=<span class="number">55</span>)</span><br><span class="line"></span><br><span class="line"> ),</span><br><span class="line"> ])</span><br><span class="line"> )</span><br><span class="line"></span><br><span class="line"> initstart()</span><br><span class="line"></span><br><span class="line"></span><br><span class="line"><span class="comment"># ft.app(target=main)</span></span><br><span class="line"></span><br><span class="line">ft.app(target=main, host=<span class="string">'0.0.0.0'</span>, port=<span class="number">8080</span>, view=ft.AppView.WEB_BROWSER)</span><br></pre></td></tr></table></figure><p>github gist地址</p><p><a href="https://gist.github.com/landv/3e5961f6c3f44e66c4afe3ebd2aa26bd">https://gist.github.com/landv/3e5961f6c3f44e66c4afe3ebd2aa26bd</a></p><p><img src="https://imgs.landv.cn/imgs/image-20240326160951804.png" alt="image-20240326160951804"></p>]]></content>
<summary type="html"><h1 id="python-WOL唤醒-使用flet开发的页面"><a href="#python-WOL唤醒-使用flet开发的页面" class="headerlink" title="python-WOL唤醒-使用flet开发的页面"></a><strong>python</summary>
<category term="landv" scheme="https://landv.cn/categories/landv/"/>
<category term="python" scheme="https://landv.cn/categories/landv/python/"/>
<category term="landv" scheme="https://landv.cn/tags/landv/"/>
<category term="python" scheme="https://landv.cn/tags/python/"/>
</entry>
<entry>
<title>Excel解除工作表保护密码和获得密码</title>
<link href="https://landv.cn/p/c969a43c.html"/>
<id>https://landv.cn/p/c969a43c.html</id>
<published>2024-01-12T07:59:12.000Z</published>
<updated>2024-01-12T07:59:12.000Z</updated>
<content type="html"><![CDATA[<h1 id="第一种:直接删除密码保护"><a href="#第一种:直接删除密码保护" class="headerlink" title="第一种:直接删除密码保护"></a>第一种:直接删除密码保护</h1><p>来自<code>https://www.excelhome.net/4590.html</code></p><p>如何破解工作簿保护和工作表保护的问题。</p><p>注意咱们说的工作簿保护</p><p><img src="https://imgs.landv.cn/imgs//2024/01/12/16/a423810e16690a85e3b369c0515931b9.png" alt="image-20240112160115370"></p><p>在这个地方设置工作簿保护后,将对工作表进行删除、移动、新建、隐藏或者取消隐藏,以及工作表重命名等操作。<br>如果工作簿保护密码忘记了怎么办?<br>右键单击工作表标签→【查看代码】,然后插入模块,复制以下代码,粘贴到代码区域:</p><figure class="highlight vb"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br></pre></td><td class="code"><pre><span class="line"><span class="keyword">Sub</span> 工作簿密码破解()</span><br><span class="line">ActiveWorkbook.Sheets.Copy</span><br><span class="line"><span class="keyword">For</span> <span class="keyword">Each</span> sh <span class="keyword">In</span> ActiveWorkbook.Sheets</span><br><span class="line">sh.Visible = <span class="literal">True</span></span><br><span class="line"><span class="keyword">Next</span></span><br><span class="line"><span class="keyword">End</span> <span class="keyword">Sub</span></span><br></pre></td></tr></table></figure><p>点击运行按钮,稍等片刻,就会出现一个去掉保护的工作簿克隆版,咱们只要按Ctrl+S键,将这个工作簿保存一下就好了。</p><p><img src="https://imgs.landv.cn/imgs//2024/01/12/16/441ff4187120f75d79adcb7fcc118354.gif" alt="img"></p><p>接下来咱们再说说如何破解工作表保护。<br>有时我们为了防止别人修改工作表内容,会通过【审阅】→【保护工作表】来设置工作表的保护密码。</p><p><img src="https://imgs.landv.cn/imgs//2024/01/12/16/681037a7f4e865f7520fc2217294d055.png" alt="img"></p><p>如果不小心自己忘了密码或者别人的文档咱们没有密码,怎么办呢?<br>只要参考前一个动画中的步骤,右键单击工作表标签→【查看代码】,然后插入模块,复制以下代码,粘贴到代码区域,点一下运行按钮就OK了:</p><figure class="highlight vb"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br><span class="line">7</span><br></pre></td><td class="code"><pre><span class="line"><span class="keyword">Sub</span> jp()</span><br><span class="line"><span class="keyword">Dim</span> sht <span class="keyword">As</span> Worksheet</span><br><span class="line"><span class="keyword">For</span> <span class="keyword">Each</span> sht <span class="keyword">In</span> Worksheets</span><br><span class="line">sht.Protect AllowFiltering:=<span class="literal">True</span></span><br><span class="line">sht.Unprotect</span><br><span class="line"><span class="keyword">Next</span></span><br><span class="line"><span class="keyword">End</span> <span class="keyword">Sub</span></span><br></pre></td></tr></table></figure><h1 id="第二种:Excel解除工作表保护密码,并复原密码设定"><a href="#第二种:Excel解除工作表保护密码,并复原密码设定" class="headerlink" title="第二种:Excel解除工作表保护密码,并复原密码设定"></a>第二种:Excel解除工作表保护密码,并复原密码设定</h1><p>来自<code>https://www.cnblogs.com/MrZhou5/p/12134268.html</code></p><h2 id="适用环境"><a href="#适用环境" class="headerlink" title="适用环境"></a>适用环境</h2><p> 1. Office 2003(也就是老版的.xls文件)</p><p> 2. 用到宏操作</p><p> 3. 可以解除【审阅->保护工作表】的密码保护,其他的密码保护不能处理。</p><h2 id="步骤"><a href="#步骤" class="headerlink" title="步骤"></a>步骤</h2><p> 1. 打开需解除保护密码的Excel文件(.xls);</p><p> 2. 从菜单栏里找到并打开【录制宏】;</p><p> <a href="https://img2018.cnblogs.com/blog/1886818/202001/1886818-20200102172424062-644970614.png"><img src="https://imgs.landv.cn/imgs//2024/01/12/16/5ef7eb1809ead8da235620879bc349e3.png" alt="img"></a></p><p> 3. 直接点击【停止录制】(这样得到一个空宏);</p><p> 4. 点击【宏】,找到刚刚录制的宏,点击编辑;</p><p> 5. 删除窗口中的所有代码,替换为下面的内容;</p><p> 6. 如果菜单没有上述描述的按钮,可以在【文件->选项->自定义功能区】找</p><p> 7. Ctrl+S保存关闭编辑窗口;</p><p> 8. 点击【宏】,找到刚刚编辑的宏【AllInternalPasswords】,点击执行,按照提示信息操作;</p><p> 9. 等待一会弹窗会有下面的提示,这样就是成功了!(记得保存弹窗中的密码,后面要用)</p><p> 10. 这时密码已经被清除掉了,你就可以随意修改文件内容了,如果想恢复原来的密码状态,重新点击【审阅->保护工作表】把弹窗中找到的密码原封不动的拷贝进去,并保存,这样原来的密码也可以用,这个密码也可以用</p><p><em>直接选中窗口按Ctrl+C就能拷贝窗口的全部文字,可以先粘贴到文本编辑器里再取获得的密码</em></p><p><img src="https://imgs.landv.cn/imgs//2024/01/12/16/f91bea7947bd46f12ee2888689d224fc.png" alt="img"></p><h2 id="宏"><a href="#宏" class="headerlink" title="宏"></a>宏</h2><figure class="highlight vb"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br><span class="line">7</span><br><span class="line">8</span><br><span class="line">9</span><br><span class="line">10</span><br><span class="line">11</span><br><span class="line">12</span><br><span class="line">13</span><br><span class="line">14</span><br><span class="line">15</span><br><span class="line">16</span><br><span class="line">17</span><br><span class="line">18</span><br><span class="line">19</span><br><span class="line">20</span><br><span class="line">21</span><br><span class="line">22</span><br><span class="line">23</span><br><span class="line">24</span><br><span class="line">25</span><br><span class="line">26</span><br><span class="line">27</span><br><span class="line">28</span><br><span class="line">29</span><br><span class="line">30</span><br><span class="line">31</span><br><span class="line">32</span><br><span class="line">33</span><br><span class="line">34</span><br><span class="line">35</span><br><span class="line">36</span><br><span class="line">37</span><br><span class="line">38</span><br><span class="line">39</span><br><span class="line">40</span><br><span class="line">41</span><br><span class="line">42</span><br><span class="line">43</span><br><span class="line">44</span><br><span class="line">45</span><br><span class="line">46</span><br><span class="line">47</span><br><span class="line">48</span><br><span class="line">49</span><br><span class="line">50</span><br><span class="line">51</span><br><span class="line">52</span><br><span class="line">53</span><br><span class="line">54</span><br><span class="line">55</span><br><span class="line">56</span><br><span class="line">57</span><br><span class="line">58</span><br><span class="line">59</span><br><span class="line">60</span><br><span class="line">61</span><br><span class="line">62</span><br><span class="line">63</span><br><span class="line">64</span><br><span class="line">65</span><br><span class="line">66</span><br><span class="line">67</span><br><span class="line">68</span><br><span class="line">69</span><br><span class="line">70</span><br><span class="line">71</span><br><span class="line">72</span><br><span class="line">73</span><br><span class="line">74</span><br><span class="line">75</span><br><span class="line">76</span><br><span class="line">77</span><br><span class="line">78</span><br><span class="line">79</span><br><span class="line">80</span><br><span class="line">81</span><br><span class="line">82</span><br><span class="line">83</span><br><span class="line">84</span><br><span class="line">85</span><br><span class="line">86</span><br><span class="line">87</span><br><span class="line">88</span><br><span class="line">89</span><br><span class="line">90</span><br><span class="line">91</span><br><span class="line">92</span><br><span class="line">93</span><br><span class="line">94</span><br><span class="line">95</span><br><span class="line">96</span><br><span class="line">97</span><br><span class="line">98</span><br><span class="line">99</span><br><span class="line">100</span><br><span class="line">101</span><br><span class="line">102</span><br><span class="line">103</span><br><span class="line">104</span><br><span class="line">105</span><br><span class="line">106</span><br><span class="line">107</span><br><span class="line">108</span><br><span class="line">109</span><br><span class="line">110</span><br><span class="line">111</span><br><span class="line">112</span><br><span class="line">113</span><br><span class="line">114</span><br><span class="line">115</span><br><span class="line">116</span><br><span class="line">117</span><br><span class="line">118</span><br><span class="line">119</span><br><span class="line">120</span><br><span class="line">121</span><br><span class="line">122</span><br><span class="line">123</span><br><span class="line">124</span><br><span class="line">125</span><br><span class="line">126</span><br><span class="line">127</span><br><span class="line">128</span><br><span class="line">129</span><br><span class="line">130</span><br><span class="line">131</span><br><span class="line">132</span><br><span class="line">133</span><br><span class="line">134</span><br><span class="line">135</span><br><span class="line">136</span><br><span class="line">137</span><br><span class="line">138</span><br><span class="line">139</span><br><span class="line">140</span><br></pre></td><td class="code"><pre><span class="line"><span class="keyword">Option</span> <span class="keyword">Explicit</span></span><br><span class="line"></span><br><span class="line"><span class="keyword">Public</span> <span class="keyword">Sub</span> AllInternalPasswords()</span><br><span class="line"><span class="comment">' Breaks worksheet and workbook structure passwords. Bob McCormick</span></span><br><span class="line"><span class="comment">' probably originator of base code algorithm modified for coverage</span></span><br><span class="line"><span class="comment">' of workbook structure / windows passwords and for multiple passwords</span></span><br><span class="line"><span class="comment">'</span></span><br><span class="line"><span class="comment">' Norman Harker and JE McGimpsey 27-Dec-2002 (Version 1.1)</span></span><br><span class="line"><span class="comment">' Modified 2003-Apr-04 by JEM: All msgs to constants, and</span></span><br><span class="line"><span class="comment">' eliminate one Exit Sub (Version 1.1.1)</span></span><br><span class="line"><span class="comment">' Reveals hashed passwords NOT original passwords</span></span><br><span class="line"><span class="keyword">Const</span> DBLSPACE <span class="keyword">As</span> <span class="type">String</span> = vbNewLine & vbNewLine</span><br><span class="line"><span class="keyword">Const</span> AUTHORS <span class="keyword">As</span> <span class="type">String</span> = DBLSPACE & vbNewLine & _</span><br><span class="line"><span class="string">"改编自Bob McCormick的代码。"</span> </span><br><span class="line"><span class="keyword">Const</span> HEADER <span class="keyword">As</span> <span class="type">String</span> = <span class="string">"重置密码"</span></span><br><span class="line"><span class="keyword">Const</span> VERSION <span class="keyword">As</span> <span class="type">String</span> = DBLSPACE & <span class="string">"Version 1.1.1 2003-Apr-04"</span></span><br><span class="line"><span class="keyword">Const</span> REPBACK <span class="keyword">As</span> <span class="type">String</span> = DBLSPACE & <span class="string">"感谢使用!"</span> </span><br><span class="line"><span class="keyword">Const</span> ALLCLEAR <span class="keyword">As</span> <span class="type">String</span> = DBLSPACE & <span class="string">"工作簿现在应该没有任何密码保护,因此请确保:"</span> & _</span><br><span class="line">DBLSPACE & <span class="string">"立即保存!"</span> & DBLSPACE & <span class="string">"并且"</span> & _</span><br><span class="line">DBLSPACE & <span class="string">"备份!, 备份!!, 备份!!!"</span></span><br><span class="line"><span class="keyword">Const</span> MSGNOPWORDS1 <span class="keyword">As</span> <span class="type">String</span> = <span class="string">"工作表、工作簿结构或窗口上没有密码。"</span> & AUTHORS & VERSION</span><br><span class="line"><span class="keyword">Const</span> MSGNOPWORDS2 <span class="keyword">As</span> <span class="type">String</span> = <span class="string">"对工作簿结构或窗口没有保护"</span> & _</span><br><span class="line"><span class="string">"。"</span> & DBLSPACE & _</span><br><span class="line"><span class="string">"继续取消工作表保护。"</span> & AUTHORS & VERSION</span><br><span class="line"><span class="keyword">Const</span> MSGTAKETIME <span class="keyword">As</span> <span class="type">String</span> = <span class="string">"按下OK按钮后,会需要花费一些时间"</span> & _</span><br><span class="line"><span class="string">"。"</span> & DBLSPACE & <span class="string">"这个时间的长短取决于密码的难度和电脑的性能"</span> & _</span><br><span class="line"><span class="string">"。"</span> & DBLSPACE & _</span><br><span class="line"><span class="string">"请耐心等待,或者先去喝杯茶!"</span> & AUTHORS & VERSION</span><br><span class="line"><span class="keyword">Const</span> MSGPWORDFOUND1 <span class="keyword">As</span> <span class="type">String</span> = <span class="string">"您设置了工作表结构或Windows密码"</span> & _</span><br><span class="line"><span class="string">"。"</span> & DBLSPACE & _</span><br><span class="line"><span class="string">"找到的密码是:"</span> & DBLSPACE & <span class="string">"$$"</span> & DBLSPACE & _</span><br><span class="line"><span class="string">"请记下来,以备将来由设置此密码"</span> & _</span><br><span class="line"><span class="string">"的同一个人在其他工作簿中使用"</span> & DBLSPACE & _</span><br><span class="line"><span class="string">"现在检查并清除其他密码"</span> & AUTHORS & VERSION</span><br><span class="line"><span class="keyword">Const</span> MSGPWORDFOUND2 <span class="keyword">As</span> <span class="type">String</span> = <span class="string">"您设置了工作表密码"</span> & _</span><br><span class="line"><span class="string">"。"</span> & DBLSPACE & <span class="string">"找到的密码是:"</span> & _</span><br><span class="line">DBLSPACE & <span class="string">"$$"</span> & DBLSPACE & <span class="string">"请记下来,以备将来由设置此密码"</span> & _</span><br><span class="line"><span class="string">"的同一个人在其他工作簿中使用"</span> & _</span><br><span class="line"><span class="string">"。"</span> & DBLSPACE & <span class="string">"现在检查并清除其他密码"</span> & _</span><br><span class="line"><span class="string">"。"</span> & AUTHORS & VERSION</span><br><span class="line"><span class="keyword">Const</span> MSGONLYONE <span class="keyword">As</span> <span class="type">String</span> = <span class="string">"只有使用刚找到的密码保护的结构/窗口。"</span> & _</span><br><span class="line">ALLCLEAR & AUTHORS & VERSION & REPBACK</span><br><span class="line"><span class="keyword">Dim</span> w1 <span class="keyword">As</span> Worksheet, w2 <span class="keyword">As</span> Worksheet</span><br><span class="line"><span class="keyword">Dim</span> i <span class="keyword">As</span> <span class="type">Integer</span>, j <span class="keyword">As</span> <span class="type">Integer</span>, k <span class="keyword">As</span> <span class="type">Integer</span>, l <span class="keyword">As</span> <span class="type">Integer</span></span><br><span class="line"><span class="keyword">Dim</span> m <span class="keyword">As</span> <span class="type">Integer</span>, n <span class="keyword">As</span> <span class="type">Integer</span>, i1 <span class="keyword">As</span> <span class="type">Integer</span>, i2 <span class="keyword">As</span> <span class="type">Integer</span></span><br><span class="line"><span class="keyword">Dim</span> i3 <span class="keyword">As</span> <span class="type">Integer</span>, i4 <span class="keyword">As</span> <span class="type">Integer</span>, i5 <span class="keyword">As</span> <span class="type">Integer</span>, i6 <span class="keyword">As</span> <span class="type">Integer</span></span><br><span class="line"><span class="keyword">Dim</span> PWord1 <span class="keyword">As</span> <span class="type">String</span></span><br><span class="line"><span class="keyword">Dim</span> ShTag <span class="keyword">As</span> <span class="type">Boolean</span>, WinTag <span class="keyword">As</span> <span class="type">Boolean</span></span><br><span class="line"></span><br><span class="line">Application.ScreenUpdating = <span class="literal">False</span></span><br><span class="line"><span class="keyword">With</span> ActiveWorkbook</span><br><span class="line">WinTag = .ProtectStructure <span class="built_in">Or</span> .ProtectWindows</span><br><span class="line"><span class="keyword">End</span> <span class="keyword">With</span></span><br><span class="line">ShTag = <span class="literal">False</span></span><br><span class="line"><span class="keyword">For</span> <span class="keyword">Each</span> w1 <span class="keyword">In</span> Worksheets</span><br><span class="line">ShTag = ShTag <span class="built_in">Or</span> w1.ProtectContents</span><br><span class="line"><span class="keyword">Next</span> w1</span><br><span class="line"><span class="keyword">If</span> <span class="built_in">Not</span> ShTag <span class="built_in">And</span> <span class="built_in">Not</span> WinTag <span class="keyword">Then</span></span><br><span class="line">MsgBox MSGNOPWORDS1, vbInformation, HEADER</span><br><span class="line"><span class="keyword">Exit</span> <span class="keyword">Sub</span></span><br><span class="line"><span class="keyword">End</span> <span class="keyword">If</span></span><br><span class="line">MsgBox MSGTAKETIME, vbInformation, HEADER</span><br><span class="line"><span class="keyword">If</span> <span class="built_in">Not</span> WinTag <span class="keyword">Then</span></span><br><span class="line">MsgBox MSGNOPWORDS2, vbInformation, HEADER</span><br><span class="line"><span class="keyword">Else</span></span><br><span class="line"><span class="keyword">On</span> <span class="keyword">Error</span> <span class="keyword">Resume</span> <span class="keyword">Next</span></span><br><span class="line"><span class="keyword">Do</span> <span class="comment">'dummy do loop</span></span><br><span class="line"><span class="keyword">For</span> i = <span class="number">65</span> <span class="keyword">To</span> <span class="number">66</span>: <span class="keyword">For</span> j = <span class="number">65</span> <span class="keyword">To</span> <span class="number">66</span>: <span class="keyword">For</span> k = <span class="number">65</span> <span class="keyword">To</span> <span class="number">66</span></span><br><span class="line"><span class="keyword">For</span> l = <span class="number">65</span> <span class="keyword">To</span> <span class="number">66</span>: <span class="keyword">For</span> m = <span class="number">65</span> <span class="keyword">To</span> <span class="number">66</span>: <span class="keyword">For</span> i1 = <span class="number">65</span> <span class="keyword">To</span> <span class="number">66</span></span><br><span class="line"><span class="keyword">For</span> i2 = <span class="number">65</span> <span class="keyword">To</span> <span class="number">66</span>: <span class="keyword">For</span> i3 = <span class="number">65</span> <span class="keyword">To</span> <span class="number">66</span>: <span class="keyword">For</span> i4 = <span class="number">65</span> <span class="keyword">To</span> <span class="number">66</span></span><br><span class="line"><span class="keyword">For</span> i5 = <span class="number">65</span> <span class="keyword">To</span> <span class="number">66</span>: <span class="keyword">For</span> i6 = <span class="number">65</span> <span class="keyword">To</span> <span class="number">66</span>: <span class="keyword">For</span> n = <span class="number">32</span> <span class="keyword">To</span> <span class="number">126</span></span><br><span class="line"><span class="keyword">With</span> ActiveWorkbook</span><br><span class="line">.Unprotect Chr(i) & Chr(j) & Chr(k) & _</span><br><span class="line">Chr(l) & Chr(m) & Chr(i1) & Chr(i2) & _</span><br><span class="line">Chr(i3) & Chr(i4) & Chr(i5) & Chr(i6) & Chr(n)</span><br><span class="line"><span class="keyword">If</span> .ProtectStructure = <span class="literal">False</span> <span class="built_in">And</span> _</span><br><span class="line">.ProtectWindows = <span class="literal">False</span> <span class="keyword">Then</span></span><br><span class="line">PWord1 = Chr(i) & Chr(j) & Chr(k) & Chr(l) & _</span><br><span class="line">Chr(m) & Chr(i1) & Chr(i2) & Chr(i3) & _</span><br><span class="line">Chr(i4) & Chr(i5) & Chr(i6) & Chr(n)</span><br><span class="line">MsgBox Application.Substitute(MSGPWORDFOUND1, _</span><br><span class="line"><span class="string">"$$"</span>, PWord1), vbInformation, HEADER</span><br><span class="line"><span class="keyword">Exit</span> <span class="keyword">Do</span> <span class="comment">'Bypass all for...nexts</span></span><br><span class="line"><span class="keyword">End</span> <span class="keyword">If</span></span><br><span class="line"><span class="keyword">End</span> <span class="keyword">With</span></span><br><span class="line"><span class="symbol">Next:</span> <span class="keyword">Next</span>: <span class="keyword">Next</span>: <span class="keyword">Next</span>: <span class="keyword">Next</span>: <span class="keyword">Next</span></span><br><span class="line"><span class="symbol">Next:</span> <span class="keyword">Next</span>: <span class="keyword">Next</span>: <span class="keyword">Next</span>: <span class="keyword">Next</span>: <span class="keyword">Next</span></span><br><span class="line"><span class="keyword">Loop</span> <span class="keyword">Until</span> <span class="literal">True</span></span><br><span class="line"><span class="keyword">On</span> <span class="keyword">Error</span> <span class="keyword">GoTo</span> <span class="number">0</span></span><br><span class="line"><span class="keyword">End</span> <span class="keyword">If</span></span><br><span class="line"><span class="keyword">If</span> WinTag <span class="built_in">And</span> <span class="built_in">Not</span> ShTag <span class="keyword">Then</span></span><br><span class="line">MsgBox MSGONLYONE, vbInformation, HEADER</span><br><span class="line"><span class="keyword">Exit</span> <span class="keyword">Sub</span></span><br><span class="line"><span class="keyword">End</span> <span class="keyword">If</span></span><br><span class="line"><span class="keyword">On</span> <span class="keyword">Error</span> <span class="keyword">Resume</span> <span class="keyword">Next</span></span><br><span class="line"><span class="keyword">For</span> <span class="keyword">Each</span> w1 <span class="keyword">In</span> Worksheets</span><br><span class="line"><span class="comment">'Attempt clearance with PWord1</span></span><br><span class="line">w1.Unprotect PWord1</span><br><span class="line"><span class="keyword">Next</span> w1</span><br><span class="line"><span class="keyword">On</span> <span class="keyword">Error</span> <span class="keyword">GoTo</span> <span class="number">0</span></span><br><span class="line">ShTag = <span class="literal">False</span></span><br><span class="line"><span class="keyword">For</span> <span class="keyword">Each</span> w1 <span class="keyword">In</span> Worksheets</span><br><span class="line"><span class="comment">'Checks for all clear ShTag triggered to 1 if not.</span></span><br><span class="line">ShTag = ShTag <span class="built_in">Or</span> w1.ProtectContents</span><br><span class="line"><span class="keyword">Next</span> w1</span><br><span class="line"><span class="keyword">If</span> ShTag <span class="keyword">Then</span></span><br><span class="line"><span class="keyword">For</span> <span class="keyword">Each</span> w1 <span class="keyword">In</span> Worksheets</span><br><span class="line"><span class="keyword">With</span> w1</span><br><span class="line"><span class="keyword">If</span> .ProtectContents <span class="keyword">Then</span></span><br><span class="line"><span class="keyword">On</span> <span class="keyword">Error</span> <span class="keyword">Resume</span> <span class="keyword">Next</span></span><br><span class="line"><span class="keyword">Do</span> <span class="comment">'Dummy do loop</span></span><br><span class="line"><span class="keyword">For</span> i = <span class="number">65</span> <span class="keyword">To</span> <span class="number">66</span>: <span class="keyword">For</span> j = <span class="number">65</span> <span class="keyword">To</span> <span class="number">66</span>: <span class="keyword">For</span> k = <span class="number">65</span> <span class="keyword">To</span> <span class="number">66</span></span><br><span class="line"><span class="keyword">For</span> l = <span class="number">65</span> <span class="keyword">To</span> <span class="number">66</span>: <span class="keyword">For</span> m = <span class="number">65</span> <span class="keyword">To</span> <span class="number">66</span>: <span class="keyword">For</span> i1 = <span class="number">65</span> <span class="keyword">To</span> <span class="number">66</span></span><br><span class="line"><span class="keyword">For</span> i2 = <span class="number">65</span> <span class="keyword">To</span> <span class="number">66</span>: <span class="keyword">For</span> i3 = <span class="number">65</span> <span class="keyword">To</span> <span class="number">66</span>: <span class="keyword">For</span> i4 = <span class="number">65</span> <span class="keyword">To</span> <span class="number">66</span></span><br><span class="line"><span class="keyword">For</span> i5 = <span class="number">65</span> <span class="keyword">To</span> <span class="number">66</span>: <span class="keyword">For</span> i6 = <span class="number">65</span> <span class="keyword">To</span> <span class="number">66</span>: <span class="keyword">For</span> n = <span class="number">32</span> <span class="keyword">To</span> <span class="number">126</span></span><br><span class="line">.Unprotect Chr(i) & Chr(j) & Chr(k) & _</span><br><span class="line">Chr(l) & Chr(m) & Chr(i1) & Chr(i2) & Chr(i3) & _</span><br><span class="line">Chr(i4) & Chr(i5) & Chr(i6) & Chr(n)</span><br><span class="line"><span class="keyword">If</span> <span class="built_in">Not</span> .ProtectContents <span class="keyword">Then</span></span><br><span class="line">PWord1 = Chr(i) & Chr(j) & Chr(k) & Chr(l) & _</span><br><span class="line">Chr(m) & Chr(i1) & Chr(i2) & Chr(i3) & _</span><br><span class="line">Chr(i4) & Chr(i5) & Chr(i6) & Chr(n)</span><br><span class="line">MsgBox Application.Substitute(MSGPWORDFOUND2, _</span><br><span class="line"><span class="string">"$$"</span>, PWord1), vbInformation, HEADER</span><br><span class="line"><span class="comment">'leverage finding Pword by trying on other sheets</span></span><br><span class="line"><span class="keyword">For</span> <span class="keyword">Each</span> w2 <span class="keyword">In</span> Worksheets</span><br><span class="line">w2.Unprotect PWord1</span><br><span class="line"><span class="keyword">Next</span> w2</span><br><span class="line"><span class="keyword">Exit</span> <span class="keyword">Do</span> <span class="comment">'Bypass all for...nexts</span></span><br><span class="line"><span class="keyword">End</span> <span class="keyword">If</span></span><br><span class="line"><span class="symbol">Next:</span> <span class="keyword">Next</span>: <span class="keyword">Next</span>: <span class="keyword">Next</span>: <span class="keyword">Next</span>: <span class="keyword">Next</span></span><br><span class="line"><span class="symbol">Next:</span> <span class="keyword">Next</span>: <span class="keyword">Next</span>: <span class="keyword">Next</span>: <span class="keyword">Next</span>: <span class="keyword">Next</span></span><br><span class="line"><span class="keyword">Loop</span> <span class="keyword">Until</span> <span class="literal">True</span></span><br><span class="line"><span class="keyword">On</span> <span class="keyword">Error</span> <span class="keyword">GoTo</span> <span class="number">0</span></span><br><span class="line"><span class="keyword">End</span> <span class="keyword">If</span></span><br><span class="line"><span class="keyword">End</span> <span class="keyword">With</span></span><br><span class="line"><span class="keyword">Next</span> w1</span><br><span class="line"><span class="keyword">End</span> <span class="keyword">If</span></span><br><span class="line">MsgBox ALLCLEAR & AUTHORS & VERSION & REPBACK, vbInformation, HEADER</span><br><span class="line"><span class="keyword">End</span> <span class="keyword">Sub</span></span><br></pre></td></tr></table></figure>]]></content>
<summary type="html"><h1 id="第一种:直接删除密码保护"><a href="#第一种:直接删除密码保护" class="headerlink" title="第一种:直接删除密码保护"></a>第一种:直接删除密码保护</h1><p>来自<code>https://www.excelhome.</summary>
<category term="landv" scheme="https://landv.cn/categories/landv/"/>
<category term="excel" scheme="https://landv.cn/categories/landv/excel/"/>
<category term="landv" scheme="https://landv.cn/tags/landv/"/>
<category term="excle" scheme="https://landv.cn/tags/excle/"/>
</entry>
<entry>
<title>Fedora上使用x11vnc进行远程桌面</title>
<link href="https://landv.cn/p/26f07d70.html"/>
<id>https://landv.cn/p/26f07d70.html</id>
<published>2023-09-19T07:30:02.000Z</published>
<updated>2023-09-19T07:30:02.000Z</updated>
<content type="html"><![CDATA[<p><strong>要在 Fedora 上使用 x11vnc 进行远程桌面访问,可以按照以下步骤进行设置:</strong></p><ol><li><p>安装 x11vnc:打开终端,运行以下命令以安装 x11vnc:</p><figure class="highlight plaintext"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">sudo dnf install x11vnc</span><br></pre></td></tr></table></figure></li><li><p>创建密码文件:执行以下命令创建一个密码文件并设置 VNC 访问密码:</p><figure class="highlight plaintext"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">sudo x11vnc -storepasswd /etc/x11vnc.pass</span><br></pre></td></tr></table></figure><p>在提示下输入密码并确认。</p></li><li><p>启动 x11vnc:运行以下命令以启动 x11vnc 服务,并将其绑定到当前 X 会话(:0):</p><figure class="highlight plaintext"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">sudo x11vnc -auth guess -forever -loop -noxdamage -repeat -rfbauth /etc/x11vnc.pass -rfbport 5900 -shared</span><br></pre></td></tr></table></figure><p>这将在 VNC 默认端口 5900 上启动 x11vnc 服务。</p></li></ol><p>现在,你可以使用任何支持 VNC 协议的客户端连接到你的 Fedora 远程桌面。在 VNC 客户端中填入 IP 地址和端口号(例如:192.168.0.100:5900),然后输入之前设置的 VNC 访问密码即可进行远程桌面访问。</p><p>请注意,这里的配置仅用于基本的远程桌面访问。有关更高级的选项和安全性设置,请参考 x11vnc 的文档和手册。</p><p><strong>若要将 x11vnc 注册为系统服务,以便在启动时自动运行,您可以按照以下步骤进行设置:</strong></p><ol><li><p>创建服务配置文件:使用以下命令创建一个名为 <code>x11vnc.service</code> 的服务配置文件:</p><figure class="highlight plaintext"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">sudo nano /etc/systemd/system/x11vnc.service</span><br></pre></td></tr></table></figure></li><li><p>将以下内容粘贴到文件中:</p><figure class="highlight plaintext"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br><span class="line">7</span><br><span class="line">8</span><br><span class="line">9</span><br><span class="line">10</span><br><span class="line">11</span><br></pre></td><td class="code"><pre><span class="line">[Unit]</span><br><span class="line">Description=x11vnc VNC Server</span><br><span class="line">After=multi-user.target</span><br><span class="line"></span><br><span class="line">[Service]</span><br><span class="line">Type=simple</span><br><span class="line">ExecStart=/usr/bin/x11vnc -auth guess -forever -loop -noxdamage -repeat -rfbauth /etc/x11vnc.pass -rfbport 5900 -shared</span><br><span class="line">Restart=on-failure</span><br><span class="line"></span><br><span class="line">[Install]</span><br><span class="line">WantedBy=multi-user.target</span><br></pre></td></tr></table></figure></li><li><p>保存并关闭文件。</p></li><li><p>启用和启动服务:执行以下命令以启用并启动 x11vnc 服务:</p><figure class="highlight plaintext"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br></pre></td><td class="code"><pre><span class="line">sudo systemctl enable x11vnc.service</span><br><span class="line">sudo systemctl start x11vnc.service</span><br></pre></td></tr></table></figure></li></ol><p>现在,x11vnc 服务已经注册并正在后台运行。它将在系统启动时自动启动,并且可以通过 <code>sudo systemctl stop x11vnc.service</code> 命令停止。</p><p>请注意,确保 <code>/etc/x11vnc.pass</code> 文件存在并包含正确的密码。另外,检查防火墙设置,确保允许 VNC 端口(默认是 5900)的流量通过。</p>]]></content>
<summary type="html"><p><strong>要在 Fedora 上使用 x11vnc 进行远程桌面访问,可以按照以下步骤进行设置:</strong></p>
<ol>
<li><p>安装 x11vnc:打开终端,运行以下命令以安装 x11vnc:</p>
<figure class="highligh</summary>
<category term="landv" scheme="https://landv.cn/categories/landv/"/>
<category term="landv" scheme="https://landv.cn/tags/landv/"/>
</entry>
<entry>
<title>wireguard+win7+无法正常运行或出现错误需要打两个补丁</title>
<link href="https://landv.cn/p/744622f9.html"/>
<id>https://landv.cn/p/744622f9.html</id>
<published>2023-07-13T08:25:49.000Z</published>
<updated>2023-07-13T08:25:49.000Z</updated>
<content type="html"><![CDATA[<h1 id="wireguard-win7-无法正常运行或出现错误需要打两个补丁"><a href="#wireguard-win7-无法正常运行或出现错误需要打两个补丁" class="headerlink" title="wireguard+win7+无法正常运行或出现错误需要打两个补丁"></a>wireguard+win7+无法正常运行或出现错误需要打两个补丁</h1><p><del>wireguard.inf (Code 0xE0000247)</del></p><p><img src="https://imgs.landv.cn/imgs//2023/07/13/17/123101b21a670f0ccfa601d8a7aa705f.png" alt="image-20230713170649570"></p><p>**安装下面两个补丁就可以正常运行,不过最好也安装一下微软常用运行库合集 **</p><p><strong>下载路径</strong></p><p><a href="https://download.wireguard.com/windows-toolchain/distfiles/">https://download.wireguard.com/windows-toolchain/distfiles/</a></p><p><img src="https://imgs.landv.cn/imgs//2023/07/13/16/483d5da6e00ccc93a366233ea7a5775f.png" alt="image-20230713162702333"></p><ul><li>第一个补丁<ul><li>wireguard官方提供了</li><li><a href="https://download.wireguard.com/windows-toolchain/distfiles/Windows6.1-KB2921916-x64.msu">https://download.wireguard.com/windows-toolchain/distfiles/Windows6.1-KB2921916-x64.msu</a></li><li><a href="https://download.wireguard.com/windows-toolchain/distfiles/Windows6.1-KB2921916-x86.msu">https://download.wireguard.com/windows-toolchain/distfiles/Windows6.1-KB2921916-x86.msu</a></li></ul></li><li>第二个补丁<ul><li><a href="https://support.microsoft.com/kb/2533623">https://support.microsoft.com/kb/2533623</a></li></ul></li><li>微软常用运行库合集 2023.05.15 在下面百度网盘里面</li><li>百度网盘缓存<ul><li>链接: <a href="https://pan.baidu.com/s/1ztmAtHHR41t8N5Cxj8FriQ?pwd=i5xh">https://pan.baidu.com/s/1ztmAtHHR41t8N5Cxj8FriQ?pwd=i5xh</a> 提取码: i5xh 复制这段内容后打开百度网盘手机App,操作更方便哦<br>–来自百度网盘超级会员v9的分享</li></ul></li></ul><h1 id="还会出现"><a href="#还会出现" class="headerlink" title="还会出现"></a>还会出现</h1><p><code>unable to create network adapter.</code></p><p><img src="https://imgs.landv.cn/imgs//2023/07/13/16/0270eaafd32a9fd122f8e9e120462014.png" alt="image-20230713165155760"></p><p>安装补丁包集合吧<code>UpdatePack7R2-23.6.20</code></p><p>你也可以用<code>杀毒软件</code>安装更新补丁包,建议使用<code>360</code> <code>火绒</code>。</p><p>链接: <a href="https://pan.baidu.com/s/1y-kf5ZIEq2lObQ5mxbw8Ag?pwd=ytas">https://pan.baidu.com/s/1y-kf5ZIEq2lObQ5mxbw8Ag?pwd=ytas</a> 提取码: ytas 复制这段内容后打开百度网盘手机App,操作更方便哦<br>–来自百度网盘超级会员v9的分享</p>]]></content>
<summary type="html"><h1 id="wireguard-win7-无法正常运行或出现错误需要打两个补丁"><a href="#wireguard-win7-无法正常运行或出现错误需要打两个补丁" class="headerlink" title="wireguard+win7+无法正常运行或出现错误</summary>
<category term="landv" scheme="https://landv.cn/categories/landv/"/>
<category term="wireguard" scheme="https://landv.cn/categories/landv/wireguard/"/>
<category term="landv" scheme="https://landv.cn/tags/landv/"/>
</entry>
<entry>
<title>linux+vcpkg+clion+arm64交叉编译aspia</title>
<link href="https://landv.cn/p/7af5c8b0.html"/>
<id>https://landv.cn/p/7af5c8b0.html</id>
<published>2023-07-10T08:05:12.000Z</published>
<updated>2023-07-10T08:05:12.000Z</updated>
<content type="html"><![CDATA[<h1 id="linux-vcpkg-clion-arm64交叉编译aspia"><a href="#linux-vcpkg-clion-arm64交叉编译aspia" class="headerlink" title="linux+vcpkg+clion+arm64交叉编译aspia"></a>linux+vcpkg+clion+arm64交叉编译aspia</h1><h2 id="arm64编译器下载"><a href="#arm64编译器下载" class="headerlink" title="arm64编译器下载"></a>arm64编译器下载</h2><p><a href="https://developer.arm.com/tools-and-software/open-source-software/developer-tools/gnu-toolchain/gnu-a/downloads">https://developer.arm.com/tools-and-software/open-source-software/developer-tools/gnu-toolchain/gnu-a/downloads</a></p><p><strong>AArch64 GNU/Linux target (aarch64-none-linux-gnu)</strong></p><p><a href="https://armkeil.blob.core.windows.net/developer/Files/downloads/gnu-a/10.3-2021.07/binrel/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu.tar.xz">https://armkeil.blob.core.windows.net/developer/Files/downloads/gnu-a/10.3-2021.07/binrel/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu.tar.xz</a></p><h2 id="clion配置"><a href="#clion配置" class="headerlink" title="clion配置"></a>clion配置</h2><p><img src="https://imgs.landv.cn/imgs//2023/07/10/16/5e4ff86f4e750fcd48dd50d1b14c92f8.png" alt="image-20230710161607160"></p><p><img src="https://imgs.landv.cn/imgs//2023/07/10/16/5ff3fdd2a4737f39c5abc0b9872b48bb.png" alt="image-20230710161627454"></p><h2 id="cmake学习"><a href="#cmake学习" class="headerlink" title="cmake学习"></a>cmake学习</h2><p>用clion创建cmake项目默认会生成<code>CMakeLists.txt</code>文件</p><figure class="highlight cmake"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br><span class="line">7</span><br><span class="line">8</span><br><span class="line">9</span><br></pre></td><td class="code"><pre><span class="line"><span class="comment"># CMake 最低版本号要求</span></span><br><span class="line"><span class="keyword">cmake_minimum_required</span>(VERSION <span class="number">3.23</span>)</span><br><span class="line"><span class="comment"># 项目信息</span></span><br><span class="line"><span class="keyword">project</span>(untitled)</span><br><span class="line"></span><br><span class="line"><span class="keyword">set</span>(CMAKE_CXX_STANDARD <span class="number">20</span>)</span><br><span class="line"><span class="comment"># 指定生成目标</span></span><br><span class="line"><span class="keyword">add_executable</span>(untitled main.cpp)</span><br><span class="line"></span><br></pre></td></tr></table></figure><h3 id="多个源文件"><a href="#多个源文件" class="headerlink" title="多个源文件"></a>多个源文件</h3><figure class="highlight plaintext"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br></pre></td><td class="code"><pre><span class="line"># 指定生成目标</span><br><span class="line">add_executable(Demo main.cc MathFunctions.cc)</span><br></pre></td></tr></table></figure><p>唯一的改动只是在 <code>add_executable</code> 命令中增加了一个 <code>MathFunctions.cc</code> 源文件。这样写当然没什么问题,但是如果源文件很多,把所有源文件的名字都加进去将是一件烦人的工作。更省事的方法是使用 <code>aux_source_directory</code> 命令,该命令会查找指定目录下的所有源文件,然后将结果存进指定变量名。其语法如下:</p><p><code>aux_source_directory(<dir> <variable>)</code></p><figure class="highlight cmake"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br><span class="line">7</span><br><span class="line">8</span><br><span class="line">9</span><br><span class="line">10</span><br><span class="line">11</span><br><span class="line">12</span><br></pre></td><td class="code"><pre><span class="line"><span class="comment"># CMake 最低版本号要求</span></span><br><span class="line"><span class="keyword">cmake_minimum_required</span>(VERSION <span class="number">3.23</span>)</span><br><span class="line"></span><br><span class="line"><span class="comment"># 项目信息</span></span><br><span class="line"><span class="keyword">project</span> (untitled)</span><br><span class="line"></span><br><span class="line"><span class="comment"># 查找当前目录下的所有源文件</span></span><br><span class="line"><span class="comment"># 并将名称保存到 DIR_SRCS 变量</span></span><br><span class="line"><span class="keyword">aux_source_directory</span>(. DIR_SRCS)</span><br><span class="line"></span><br><span class="line"><span class="comment"># 指定生成目标</span></span><br><span class="line"><span class="keyword">add_executable</span>(untitled <span class="variable">${DIR_SRCS}</span>)</span><br></pre></td></tr></table></figure><p>这样,CMake 会将当前目录所有源文件的文件名赋值给变量 <code>DIR_SRCS</code> ,再指示变量 <code>DIR_SRCS</code> 中的源文件需要编译成一个名称为 <code>untitled</code> 的可执行文件。</p><h3 id="多目录"><a href="#多目录" class="headerlink" title="多目录"></a>多目录</h3><figure class="highlight cmake"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br><span class="line">7</span><br><span class="line">8</span><br><span class="line">9</span><br><span class="line">10</span><br><span class="line">11</span><br><span class="line">12</span><br><span class="line">13</span><br><span class="line">14</span><br><span class="line">15</span><br><span class="line">16</span><br><span class="line">17</span><br></pre></td><td class="code"><pre><span class="line"><span class="comment"># CMake 最低版本号要求</span></span><br><span class="line"><span class="keyword">cmake_minimum_required</span>(VERSION <span class="number">3.23</span>)</span><br><span class="line"><span class="comment"># 项目信息</span></span><br><span class="line"><span class="keyword">project</span> (untitled)</span><br><span class="line"></span><br><span class="line"><span class="comment"># 查找当前目录下的所有源文件</span></span><br><span class="line"><span class="comment"># 并将名称保存到 DIR_SRCS 变量</span></span><br><span class="line"><span class="keyword">aux_source_directory</span>(. DIR_SRCS)</span><br><span class="line"></span><br><span class="line"><span class="comment"># 添加 math 子目录</span></span><br><span class="line"><span class="keyword">add_subdirectory</span>(<span class="keyword">math</span>)</span><br><span class="line"></span><br><span class="line"><span class="comment"># 指定生成目标 </span></span><br><span class="line"><span class="keyword">add_executable</span>(untitled main.cc)</span><br><span class="line"></span><br><span class="line"><span class="comment"># 添加链接库</span></span><br><span class="line"><span class="keyword">target_link_libraries</span>(untitled MathFunctions)</span><br></pre></td></tr></table></figure><p>该文件添加了下面的内容: 第3行,使用命令 <code>add_subdirectory</code> 指明本项目包含一个子目录 math,这样 math 目录下的 CMakeLists.txt 文件和源代码也会被处理 。第6行,使用命令 <code>target_link_libraries</code> 指明可执行文件 main 需要连接一个名为 MathFunctions 的链接库 。子目录中的 CMakeLists.txt:</p><figure class="highlight plaintext"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br></pre></td><td class="code"><pre><span class="line"># 查找当前目录下的所有源文件</span><br><span class="line"># 并将名称保存到 DIR_LIB_SRCS 变量</span><br><span class="line">aux_source_directory(. DIR_LIB_SRCS)</span><br><span class="line"></span><br><span class="line"># 生成链接库</span><br><span class="line">add_library (MathFunctions ${DIR_LIB_SRCS})</span><br></pre></td></tr></table></figure><p>在该文件中使用命令 <code>add_library</code> 将 src 目录中的源文件编译为静态链接库。</p><h2 id="CMake语法"><a href="#CMake语法" class="headerlink" title="CMake语法"></a>CMake语法</h2><h3 id="CMakeLists-详解"><a href="#CMakeLists-详解" class="headerlink" title="CMakeLists 详解"></a>CMakeLists 详解</h3><h4 id="CMakeLists-变量篇"><a href="#CMakeLists-变量篇" class="headerlink" title="CMakeLists 变量篇"></a>CMakeLists 变量篇</h4><p>我们可以使用 <code>SET(set)</code> 来定义变量</p><p><strong>语法</strong> :<code>SET(VAR [VALUE] [CACHE TYPE DOCSTRING [FORCE]]) </code><strong>指令功能</strong> : 用来显式的定义变量 <strong>例子</strong> : <code>SET (SRC_LST main.c other.c)</code> <strong>说明</strong>: 用变量代替值,例子中定义 <code>SRC_LST</code> 代替后面的字符串。</p><p>我们可以使用 <code>${NAME}</code> 来获取变量的名称。</p><p><strong>cmake 常用变量</strong></p><table><thead><tr><th align="left">环境变量名</th><th align="left">描述</th></tr></thead><tbody><tr><td align="left">CMAKE_BINARY_DIR, PROJECT_BINARY_DIR, <code><projectname></code>_BINARY_DIR</td><td align="left">如果是 <code>in source</code> 编译,指得就是工程顶层目录,如果是 <code>out-of-source</code> 编译,指的是工程编译发生的目录。PROJECT_BINARY_DIR 跟其他指令稍有区别,现在,你可以理解为他们是一致的。</td></tr><tr><td align="left">CMAKE_SOURCE_DIR, PROJECT_SOURCE_DIR, <code><projectname></code>_SOURCE_DIR</td><td align="left">工程顶层目录。</td></tr><tr><td align="left">CMAKE_CURRENT_SOURCE_DIR</td><td align="left">当前处理的 CMakeLists.txt 所在的路径,比如上面我们提到的 src 子目录。</td></tr><tr><td align="left">CMAKE_CURRRENT_BINARY_DIR</td><td align="left">如果是 <code>in-source</code> 编译,它跟 CMAKE_CURRENT_SOURCE_DIR 一致,如果是 <code>out-of-source</code> 编译,他指的是 target 编译目录。</td></tr><tr><td align="left">EXECUTABLE_OUTPUT_PATH , LIBRARY_OUTPUT_PATH</td><td align="left">最终目标文件存放的路径。</td></tr><tr><td align="left">PROJECT_NAME</td><td align="left">通过 PROJECT 指令定义的项目名称。</td></tr></tbody></table><p><strong>cmake 系统信息</strong></p><table><thead><tr><th align="left">系统信息变量名</th><th align="left">描述</th></tr></thead><tbody><tr><td align="left">CMAKE_MAJOR_VERSION</td><td align="left">CMAKE 主版本号,比如 2.4.6 中的 2</td></tr><tr><td align="left">CMAKE_MINOR_VERSION</td><td align="left">CMAKE 次版本号,比如 2.4.6 中的 4</td></tr><tr><td align="left">CMAKE_PATCH_VERSION</td><td align="left">CMAKE 补丁等级,比如 2.4.6 中的 6</td></tr><tr><td align="left">CMAKE_SYSTEM</td><td align="left">系统名称,比如 Linux-2.6.22</td></tr><tr><td align="left">CMAKE_SYSTEM_NAME</td><td align="left">不包含版本的系统名,比如 Linux</td></tr><tr><td align="left">CMAKE_SYSTEM_VERSION</td><td align="left">系统版本,比如 2.6.22</td></tr><tr><td align="left">CMAKE_SYSTEM_PROCESSOR</td><td align="left">处理器名称,比如 i686.</td></tr><tr><td align="left">UNIX</td><td align="left">在所有的类 UNIX 平台为 TRUE,包括 OS X 和 cygwin</td></tr><tr><td align="left">WIN32</td><td align="left">在所有的 win32 平台为 TRUE,包括 cygwin</td></tr></tbody></table><p><strong>cmake 编译选项</strong></p><table><thead><tr><th align="left">编译控制开关名</th><th align="left">描述</th></tr></thead><tbody><tr><td align="left">BUILD_SHARED_LIBS</td><td align="left">使用 <code>ADD_LIBRARY</code> 时生成动态库</td></tr><tr><td align="left">BUILD_STATIC_LIBS</td><td align="left">使用 <code>ADD_LIBRARY</code> 时生成静态库</td></tr><tr><td align="left">CMAKE_C_FLAGS</td><td align="left">设置 C 编译选项,也可以通过指令 ADD_DEFINITIONS()添加。</td></tr><tr><td align="left">CMAKE_CXX_FLAGS</td><td align="left">设置 C++编译选项,也可以通过指令 ADD_DEFINITIONS()添加。</td></tr></tbody></table><h4 id="CMake-常用指令"><a href="#CMake-常用指令" class="headerlink" title="CMake 常用指令"></a>CMake 常用指令</h4><ul><li><strong>ADD_DEFINITIONS</strong></li></ul><p>语法 : <code>ADD_DEFINITIONS(-DENABLE_DEBUG -DABC)</code></p><p>向 C/C++编译器添加 <code>-D</code> 定义. 如果你的代码中定义了<code>#ifdef ENABLE_DEBUG #endif</code>,这个代码块就会生效。</p><ul><li><strong>ADD_DEPENDENCIES</strong></li></ul><p>语法: <code>ADD_DEPENDENCIES(target-name depend-target1 depend-target2 ...)</code></p><p>定义 target 依赖的其他 target, 确保在编译本 target 之前,其他的 target 已经被构建。</p><ul><li><strong>AUX_SOURCE_DIRECTORY</strong></li></ul><p>语法 : <code>AUX_SOURCE_DIRECTORY(dir VARIABLE)</code></p><p>作用是发现一个目录下所有的源代码文件并将列表存储在一个变量中,这个指令临时被用来自动构建源文件列表。因为目前 cmake 还不能自动发现新添加的源文件。</p><p>比如 :</p><figure class="highlight cmake"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br></pre></td><td class="code"><pre><span class="line"><span class="keyword">AUX_SOURCE_DIRECTORY</span>(. SRC_LIST)</span><br><span class="line"><span class="keyword">ADD_EXECUTABLE</span>(main <span class="variable">${SRC_LIST}</span>)</span><br></pre></td></tr></table></figure><ul><li><strong>ADD_SUBDIRECTORY</strong></li></ul><p>语法 : <code>ADD_SUBDIRECTORY(NAME)</code> 添加一个文件夹进行编译,该文件夹下的 CMakeLists.txt 负责编译该文件夹下的源码. NAME是想对于调用add_subdirectory的CMakeListst.txt的相对路径.</p><ul><li><strong>find_package</strong></li></ul><p>语法 : <code>find_package(<PackageName> [version] [EXACT] [QUIET] [MODULE] [REQUIRED] [[COMPONENTS] [components...]] [OPTIONAL_COMPONENTS components...] [NO_POLICY_SCOPE])</code></p><p>查找并从外部项目加载设置。 <code><PackageName>_FOUND</code> 将设置为指示是否找到该软件包。 找到软件包后,将通过软件包本身记录的变量和“导入的目标”提供特定于软件包的信息。 该<code>QUIET</code>选项禁用信息性消息,包括那些如果未找到则表示无法找到软件包的消息<code>REQUIRED``。REQUIRED</code>如果找不到软件包,该选项将停止处理并显示一条错误消息。</p><p><code>COMPONENTS</code>选件后(或<code>REQUIRED</code>选件后,如果有的话)可能会列出所需组件的特定于包装的列表 。后面可能会列出其他可选组件<code>OPTIONAL_COMPONENTS</code>。可用组件及其对是否认为找到包的影响由目标包定义。</p><ul><li><strong>include_directories</strong></li></ul><p>语法 : <code>include_directories([AFTER|BEFORE] [SYSTEM] dir1 [dir2 ...])</code></p><p>将给定目录添加到编译器用来搜索包含文件的目录中。相对路径被解释为相对于当前源目录。</p><p>包含目录添加到 <code>INCLUDE_DIRECTORIES</code> 当前<code>CMakeLists</code>文件的目录属性。它们也被添加到<code>INCLUDE_DIRECTORIES</code>当前<code>CMakeLists</code>文件中每个目标的target属性。目标属性值是生成器使用的属性值。</p><ul><li><strong>link_libraries</strong></li></ul><p>语法 : <code>link_libraries([item1 [item2 [...]]] [[debug|optimized|general] <item>] ...)</code></p><p>将库链接到以后添加的所有目标。</p><ul><li><strong>ADD_EXECUTABLE</strong></li></ul><p>语法 : <code>ADD_EXECUTABLE(<name> [source1] [source2 ...])</code></p><p>利用源码文件生成目标可执行程序。</p><ul><li><strong>ADD_LIBRARY</strong></li></ul><p>语法 : <code>ADD_LIBRARY(<name> [STATIC | SHARED | MODULE] [source1] [source2 ...])</code></p><p>根据源码文件生成目标库。</p><p><code>STATIC</code>,<code>SHARED</code> 或者 <code>MODULE</code> 可以指定要创建的库的类型。 STATIC库是链接其他目标时使用的目标文件的存档。 SHARED库是动态链接的,并在运行时加载</p><ul><li><strong>ENABLE_TESTING</strong></li></ul><p>语法: <code>ENABLE_TESTING()</code>.</p><p>控制 Makefile 是否构建 test 目标,涉及工程所有目录。 一般情况这个指令放在工程的主CMakeLists.txt 中.</p><ul><li><strong>ADD_TEST</strong></li></ul><p>语法 : <code>ADD_TEST(testname Exename arg1 arg2 ...)</code></p><p><code>testname</code> 是自定义的 test 名称,<code>Exename</code> 可以是构建的目标文件也可以是外部脚本等等。 后面连接传递给可执行文件的参数。 如果没有在同一个 CMakeLists.txt 中打开<code>ENABLE_TESTING()</code>指令, 任何 <code>ADD_TEST</code> 都是无效的。</p><ul><li><strong>CMAKE_MINIMUM_REQUIRED</strong></li></ul><p>语法 : <code>CMAKE_MINIMUM_REQUIRED</code> 定义 cmake 的最低兼容版本 比如 <code>CMAKE_MINIMUM_REQUIRED(VERSION 2.5 FATAL_ERROR)</code> 如果 cmake 版本小与 2.5,则出现严重错误,整个过程中止。</p><ul><li><strong>EXEC_PROGRAM</strong></li></ul><p>在 CMakeLists.txt 处理过程中执行命令,并不会在生成的 Makefile 中执行。 具体语法为:</p><figure class="highlight cmake"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br></pre></td><td class="code"><pre><span class="line"><span class="keyword">EXEC_PROGRAM</span>(Executable [directory in which to run]</span><br><span class="line"> [ARGS <arguments to executable>]</span><br><span class="line"> [OUTPUT_VARIABLE <var>]</span><br><span class="line"> [RETURN_VALUE <var>])</span><br></pre></td></tr></table></figure><p>用于在指定的目录运行某个程序,通过 ARGS 添加参数,如果要获取输出和返回值,可通过OUTPUT_VARIABLE 和 RETURN_VALUE 分别定义两个变量.</p><p>这个指令可以帮助你在 CMakeLists.txt 处理过程中支持任何命令,比如根据系统情况去修改代码文件等等。</p><ul><li><strong>FILE 指令</strong></li></ul><p>文件操作指令</p><p>语法:</p><figure class="highlight cmake"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br><span class="line">7</span><br><span class="line">8</span><br><span class="line">9</span><br><span class="line">10</span><br><span class="line">11</span><br></pre></td><td class="code"><pre><span class="line"><span class="keyword">FILE</span>(WRITE filename <span class="string">"message to write"</span>... )</span><br><span class="line"><span class="keyword">FILE</span>(APPEND filename <span class="string">"message to write"</span>... )</span><br><span class="line"><span class="keyword">FILE</span>(READ filename variable)</span><br><span class="line"><span class="keyword">FILE</span>(GLOB variable [RELATIVE path] [globbing expression_r_rs]...)</span><br><span class="line"><span class="keyword">FILE</span>(GLOB_RECURSE variable [RELATIVE path] [globbing expression_r_rs]...)</span><br><span class="line"><span class="keyword">FILE</span>(<span class="keyword">REMOVE</span> [directory]...)</span><br><span class="line"><span class="keyword">FILE</span>(REMOVE_RECURSE [directory]...)</span><br><span class="line"><span class="keyword">FILE</span>(<span class="keyword">MAKE_DIRECTORY</span> [directory]...)</span><br><span class="line"><span class="keyword">FILE</span>(RELATIVE_PATH variable directory <span class="keyword">file</span>)</span><br><span class="line"><span class="keyword">FILE</span>(TO_CMAKE_PATH path result)</span><br><span class="line"><span class="keyword">FILE</span>(TO_NATIVE_PATH path result)</span><br></pre></td></tr></table></figure><h4 id="CMake-控制指令"><a href="#CMake-控制指令" class="headerlink" title="CMake 控制指令"></a>CMake 控制指令</h4><ul><li><strong>IF 指令</strong></li></ul><figure class="highlight cmake"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br><span class="line">7</span><br><span class="line">8</span><br><span class="line">9</span><br><span class="line">10</span><br><span class="line">11</span><br><span class="line">12</span><br><span class="line">13</span><br><span class="line">14</span><br><span class="line">15</span><br><span class="line">16</span><br><span class="line">17</span><br><span class="line">18</span><br><span class="line">19</span><br><span class="line">20</span><br></pre></td><td class="code"><pre><span class="line"><span class="keyword">if</span>(<condition>)</span><br><span class="line"> <commands></span><br><span class="line"><span class="keyword">elseif</span>(<condition>) <span class="comment"># optional block, can be repeated</span></span><br><span class="line"> <commands></span><br><span class="line"><span class="keyword">else</span>() <span class="comment"># optional block</span></span><br><span class="line"> <commands></span><br><span class="line"><span class="keyword">endif</span>()</span><br><span class="line"></span><br><span class="line"><span class="comment">#####</span></span><br><span class="line"></span><br><span class="line"><span class="keyword">IF</span>(var),如果变量不是:空,<span class="number">0</span>,N, NO, <span class="keyword">OFF</span>, <span class="keyword">FALSE</span>, NOTFOUND 或<var>_NOTFOUND 时,表达式为真。</span><br><span class="line"><span class="keyword">IF</span>(<span class="keyword">NOT</span> var ),与上述条件相反。</span><br><span class="line"><span class="keyword">IF</span>(var1 <span class="keyword">AND</span> var2),当两个变量都为真是为真。</span><br><span class="line"><span class="keyword">IF</span>(var1 <span class="keyword">OR</span> var2),当两个变量其中一个为真时为真。</span><br><span class="line"><span class="keyword">IF</span>(<span class="keyword">COMMAND</span> cmd),当给定的 cmd 确实是命令并可以调用是为真。</span><br><span class="line"><span class="keyword">IF</span>(<span class="keyword">EXISTS</span> dir)或者 <span class="keyword">IF</span>(<span class="keyword">EXISTS</span> <span class="keyword">file</span>),当目录名或者文件名存在时为真。</span><br><span class="line"><span class="keyword">IF</span>(file1 <span class="keyword">IS_NEWER_THAN</span> file2),当 file1 比 file2 新,或者 file1/file2 其中有一个不存在时为真,文件名请使用完整路径。</span><br><span class="line"><span class="keyword">IF</span>(<span class="keyword">IS_DIRECTORY</span> dirname),当 dirname 是目录时,为真。</span><br><span class="line"><span class="keyword">IF</span>(variable <span class="keyword">MATCHES</span> regex)</span><br><span class="line"><span class="keyword">IF</span>(<span class="keyword">string</span> <span class="keyword">MATCHES</span> regex)</span><br></pre></td></tr></table></figure><ul><li><strong>FOREACH 指令</strong></li></ul><p>语法:</p><figure class="highlight cmake"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br></pre></td><td class="code"><pre><span class="line"><span class="keyword">foreach</span>(<loop_var> <items>)</span><br><span class="line"> <commands></span><br><span class="line"><span class="keyword">endforeach</span>()</span><br></pre></td></tr></table></figure><p>其中<code><items></code>是以分号或空格分隔的项目列表。记录foreach匹配和匹配之间的所有命令endforeach而不调用。 一旦endforeach评估,命令的记录列表中的每个项目调用一次<code><items></code>。在每次迭代开始时,变量loop_var将设置为当前项的值。</p><ul><li><strong>WHILE 指令</strong></li></ul><p>语法:</p><figure class="highlight cmake"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br></pre></td><td class="code"><pre><span class="line"><span class="keyword">while</span>(<condition>)</span><br><span class="line"> <commands></span><br><span class="line"><span class="keyword">endwhile</span>()</span><br></pre></td></tr></table></figure><p>while和匹配之间的所有命令 endwhile()被记录而不被调用。 一旦endwhile()如果被评估,则只要为<code><condition></code>真,就会调用记录的命令列表。</p><hr><h3 id="实战"><a href="#实战" class="headerlink" title="实战"></a>实战</h3><h4 id="多个目录,多个源文件"><a href="#多个目录,多个源文件" class="headerlink" title="多个目录,多个源文件"></a>多个目录,多个源文件</h4><ul><li>文件部署:</li></ul><figure class="highlight plaintext"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br><span class="line">7</span><br><span class="line">8</span><br><span class="line">9</span><br></pre></td><td class="code"><pre><span class="line">./Demo3</span><br><span class="line"> |</span><br><span class="line"> +--- main.cc</span><br><span class="line"> |</span><br><span class="line"> +--- math/</span><br><span class="line"> |</span><br><span class="line"> +--- MathFunctions.cc</span><br><span class="line"> |</span><br><span class="line"> +--- MathFunctions.h</span><br></pre></td></tr></table></figure><ul><li>顶层的 <code>CMakeLists.txt</code></li></ul><figure class="highlight cmake"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br><span class="line">7</span><br><span class="line">8</span><br><span class="line">9</span><br><span class="line">10</span><br><span class="line">11</span><br><span class="line">12</span><br><span class="line">13</span><br></pre></td><td class="code"><pre><span class="line"><span class="comment"># CMake 最低版本号要求</span></span><br><span class="line"><span class="keyword">cmake_minimum_required</span> (VERSION <span class="number">2.8</span>)</span><br><span class="line"><span class="comment"># 项目信息</span></span><br><span class="line"><span class="keyword">project</span> (Demo3)</span><br><span class="line"><span class="comment"># 查找当前目录下的所有源文件</span></span><br><span class="line"><span class="comment"># 并将名称保存到 DIR_SRCS 变量</span></span><br><span class="line"><span class="keyword">aux_source_directory</span>(. DIR_SRCS)</span><br><span class="line"><span class="comment"># 添加 math 子目录</span></span><br><span class="line"><span class="keyword">add_subdirectory</span>(<span class="keyword">math</span>)</span><br><span class="line"><span class="comment"># 指定生成目标 </span></span><br><span class="line"><span class="keyword">add_executable</span>(Demo main.cc)</span><br><span class="line"><span class="comment"># 添加链接库</span></span><br><span class="line"><span class="keyword">target_link_libraries</span>(Demo MathFunctions)</span><br></pre></td></tr></table></figure><ul><li>math 中使用<code>CMakeLists.txt</code> 生成静态库文件:</li></ul><figure class="highlight cmake"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br></pre></td><td class="code"><pre><span class="line"><span class="comment"># 查找当前目录下的所有源文件</span></span><br><span class="line"><span class="comment"># 并将名称保存到 DIR_LIB_SRCS 变量</span></span><br><span class="line"><span class="keyword">aux_source_directory</span>(. DIR_LIB_SRCS)</span><br><span class="line"><span class="comment"># 生成链接库</span></span><br><span class="line"><span class="keyword">add_library</span> (MathFunctions <span class="variable">${DIR_LIB_SRCS}</span>)</span><br></pre></td></tr></table></figure><h4 id="添加第三方依赖库"><a href="#添加第三方依赖库" class="headerlink" title="添加第三方依赖库"></a>添加第三方依赖库</h4><p>现在工程需要第三方依赖库 <code>jsoncpp</code> :</p><figure class="highlight plaintext"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br><span class="line">7</span><br><span class="line">8</span><br></pre></td><td class="code"><pre><span class="line">./cmake-start</span><br><span class="line"> | </span><br><span class="line"> +---src/main.cc</span><br><span class="line"> +---ext/jsoncpp/</span><br><span class="line"> |</span><br><span class="line"> + ---include/</span><br><span class="line"> + ---lib/</span><br><span class="line"> +---CMakeLists.txt</span><br></pre></td></tr></table></figure><p>CMakeLists :</p><figure class="highlight cmake"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br><span class="line">7</span><br><span class="line">8</span><br><span class="line">9</span><br><span class="line">10</span><br><span class="line">11</span><br><span class="line">12</span><br><span class="line">13</span><br><span class="line">14</span><br><span class="line">15</span><br><span class="line">16</span><br></pre></td><td class="code"><pre><span class="line"><span class="keyword">cmake_minimum_required</span> (VERSION <span class="number">2.8</span>)</span><br><span class="line"></span><br><span class="line"><span class="keyword">project</span>(cmake)</span><br><span class="line"></span><br><span class="line"><span class="keyword">add_definitions</span>(-std=gnu++<span class="number">11</span>)</span><br><span class="line"></span><br><span class="line"><span class="keyword">set</span>(EXECUTABLE_OUTPUT_PATH <span class="variable">${PROJECT_BINARY_DIR}</span>/bin)</span><br><span class="line"></span><br><span class="line"><span class="keyword">include_directories</span>(<span class="variable">${CMAKE_SOURCE_DIR}</span>/ext/jsoncpp/<span class="keyword">include</span>)</span><br><span class="line"><span class="keyword">link_directories</span>(<span class="variable">${CMAKE_SOURCE_DIR}</span>/ext/jsoncpp/lib)</span><br><span class="line"></span><br><span class="line"><span class="keyword">aux_source_directory</span>(src SRC)</span><br><span class="line"></span><br><span class="line"><span class="keyword">add_executable</span>(demon <span class="variable">${SRC}</span>)</span><br><span class="line"></span><br><span class="line"><span class="keyword">target_link_libraries</span>(demon kmsjsoncpp)</span><br></pre></td></tr></table></figure><h4 id="自定义编译选项"><a href="#自定义编译选项" class="headerlink" title="自定义编译选项"></a>自定义编译选项</h4><p>CMake 允许为项目增加编译选项,从而可以根据用户的环境和需求选择最合适的编译方案。</p><p>例如,可以将 MathFunctions 库设为一个可选的库,如果该选项为 <code>ON</code> ,就使用该库定义的数学函数来进行运算。否则就调用标准库中的数学函数库。</p><p><strong>修改 CMakeLists 文件</strong> 我们要做的第一步是在顶层的 CMakeLists.txt 文件中添加该选项:</p><figure class="highlight cmake"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br><span class="line">7</span><br><span class="line">8</span><br><span class="line">9</span><br><span class="line">10</span><br><span class="line">11</span><br><span class="line">12</span><br><span class="line">13</span><br><span class="line">14</span><br><span class="line">15</span><br><span class="line">16</span><br><span class="line">17</span><br><span class="line">18</span><br><span class="line">19</span><br><span class="line">20</span><br><span class="line">21</span><br><span class="line">22</span><br><span class="line">23</span><br><span class="line">24</span><br></pre></td><td class="code"><pre><span class="line"><span class="comment"># CMake 最低版本号要求</span></span><br><span class="line"><span class="keyword">cmake_minimum_required</span> (VERSION <span class="number">2.8</span>)</span><br><span class="line"><span class="comment"># 项目信息</span></span><br><span class="line"><span class="keyword">project</span> (Demo4)</span><br><span class="line"><span class="comment"># 加入一个配置头文件,用于处理 CMake 对源码的设置</span></span><br><span class="line"><span class="keyword">configure_file</span> (</span><br><span class="line"> <span class="string">"${PROJECT_SOURCE_DIR}/config.h.in"</span></span><br><span class="line"> <span class="string">"${PROJECT_BINARY_DIR}/config.h"</span></span><br><span class="line"> )</span><br><span class="line"><span class="comment"># 是否使用自己的 MathFunctions 库</span></span><br><span class="line"><span class="keyword">option</span> (USE_MYMATH</span><br><span class="line"> <span class="string">"Use provided math implementation"</span> <span class="keyword">ON</span>)</span><br><span class="line"><span class="comment"># 是否加入 MathFunctions 库</span></span><br><span class="line"><span class="keyword">if</span> (USE_MYMATH)</span><br><span class="line"> <span class="keyword">include_directories</span> (<span class="string">"${PROJECT_SOURCE_DIR}/math"</span>)</span><br><span class="line"> <span class="keyword">add_subdirectory</span> (<span class="keyword">math</span>) </span><br><span class="line"> <span class="keyword">set</span> (EXTRA_LIBS <span class="variable">${EXTRA_LIBS}</span> MathFunctions)</span><br><span class="line"><span class="keyword">endif</span> (USE_MYMATH)</span><br><span class="line"><span class="comment"># 查找当前目录下的所有源文件</span></span><br><span class="line"><span class="comment"># 并将名称保存到 DIR_SRCS 变量</span></span><br><span class="line"><span class="keyword">aux_source_directory</span>(. DIR_SRCS)</span><br><span class="line"><span class="comment"># 指定生成目标</span></span><br><span class="line"><span class="keyword">add_executable</span>(Demo <span class="variable">${DIR_SRCS}</span>)</span><br><span class="line"><span class="keyword">target_link_libraries</span> (Demo <span class="variable">${EXTRA_LIBS}</span>)</span><br></pre></td></tr></table></figure><hr><h3 id="参考资料"><a href="#参考资料" class="headerlink" title="参考资料"></a>参考资料</h3><blockquote><p><a href="https://www.hahack.com/codes/cmake/">CMake 入门实战 HaHack</a></p><p><a href="https://www.cnblogs.com/xianghang123/p/3556425.html">cmake 常用变量和常用环境变量查表手册 - 博客园</a></p><p><a href="https://cmake.org/cmake/help/latest/manual/cmake-env-variables.7.html">cmake-env-variables(7) — CMake 3.15.0 Documentation</a></p></blockquote><h2 id="aspia-router-amp-relay"><a href="#aspia-router-amp-relay" class="headerlink" title="aspia-router&relay"></a>aspia-router&relay</h2><ul><li>将router&relay单独摘出来进行arm64编译,以便适配到机顶盒设备运行。</li></ul><h2 id="关于在linux上编译aspia等问题"><a href="#关于在linux上编译aspia等问题" class="headerlink" title="关于在linux上编译aspia等问题"></a>关于在linux上编译aspia等问题</h2><p>因为作者是基于<code>Ubuntu 20.04 and Debian 11.0</code>这两个系统上进行测试和编译的。</p><p>博主我只能使用docker进行编译了,博主使用的是<code>Fedora Linux 37</code> 。在使用vcpkg安装asio出现错误。所以需要一个干净的系统环境进行部署aspia需要的依赖。</p><ul><li><input checked="" disabled="" type="checkbox"> windows编译aspia</li><li><input disabled="" type="checkbox"> windows aspia_host 修改为单文件绿色版。</li><li><input disabled="" type="checkbox"> linux编译aspia</li><li><input disabled="" type="checkbox"> linux-arm64 编译router&relay</li><li><input disabled="" type="checkbox"> aspia 无人值守模式,无界面和GUI版本两种</li><li><input disabled="" type="checkbox"> <del>aspia后端优化,增加多租户和多用户模式,网络传输速度控制。</del></li><li><input disabled="" type="checkbox"> 数字证书自签</li></ul><p>aspia非常适合企业内部使用,也就是只开放客户端:如XXX酒店管理程序绑定aspia,方便进行远程协助。</p><h1 id="ubuntu-编译aspia"><a href="#ubuntu-编译aspia" class="headerlink" title="ubuntu 编译aspia"></a>ubuntu 编译aspia</h1><p>Ubuntu 20.04<br><code>sudo apt update</code></p><figure class="highlight shell"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">sudo apt install ninja-build autoconf autoconf-archive autopoint python3 bison gperf libgl1-mesa-dev libglu1-mesa-dev libharfbuzz-dev libfontconfig1-dev libfreetype6-dev libx11-dev libx11-xcb-dev libxext-dev libxfixes-dev libxi-dev libxrender-dev libxcb1-dev libxcb-glx0-dev libxcb-keysyms1-dev libxcb-image0-dev libxcb-shm0-dev libxcb-icccm4-dev libxcb-sync-dev libxcb-xfixes0-dev libxcb-shape0-dev libxcb-randr0-dev libxcb-render-util0-dev libxcb-xinerama0-dev libxcb-util-dev libxkbcommon-dev libxkbcommon-x11-dev libatspi2.0-dev libprocps-dev libxdamage-dev libxrandr-dev libpulse-dev flite1-dev libspeechd-dev speech-dispatcher nasm gcc g++ qtcreator</span><br></pre></td></tr></table></figure><figure class="highlight shell"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">sudo apt-get install curl zip unzip tar</span><br></pre></td></tr></table></figure><figure class="highlight shell"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">git clone https://github.com/microsoft/vcpkg.git --depth 1</span><br></pre></td></tr></table></figure><p><strong>出现下面的错误</strong></p><h2 id="openssl错误"><a href="#openssl错误" class="headerlink" title="openssl错误"></a>openssl错误</h2><figure class="highlight shell"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br><span class="line">7</span><br><span class="line">8</span><br><span class="line">9</span><br><span class="line">10</span><br></pre></td><td class="code"><pre><span class="line">-- Using source at /root/vcpkg/buildtrees/openssl/src/nssl-3.1.1-53a8e40f57.clean</span><br><span class="line">openssl requires Linux kernel headers from the system package manager.</span><br><span class="line"> They can be installed on Alpine systems via `apk add linux-headers`.</span><br><span class="line"> They can be installed on Ubuntu systems via `apt install linux-libc-dev`.</span><br><span class="line"></span><br><span class="line">CMake Error at ports/openssl/unix/portfile.cmake:16 (message):</span><br><span class="line"> Could not find make. Please install it through your package manager.</span><br><span class="line">Call Stack (most recent call first):</span><br><span class="line"> ports/openssl/portfile.cmake:71 (include)</span><br><span class="line"> scripts/ports.cmake:147 (include)</span><br></pre></td></tr></table></figure><p>根据错误信息,在编译 OpenSSL 时遇到了以下问题:</p><ol><li><p>缺少 Linux 内核头文件:在 Alpine 系统上,可以使用 <code>apk add linux-headers</code> 命令安装;在 Ubuntu 系统上,可以使用 <code>apt install linux-libc-dev</code> 命令安装。</p></li><li><p>缺少 make 工具:请通过你的软件包管理器安装 make。在大多数 Linux 发行版上,可以使用 <code>apt install make</code> 命令来安装 make。</p></li></ol><p>请按以下步骤解决这些问题:</p><ol><li><p>首先,安装 Linux 内核头文件。如果你正在使用的是 Alpine 系统,请运行 <code>apk add linux-headers</code> 命令。如果你正在使用的是 Ubuntu 系统,请运行 <code>apt install linux-libc-dev</code> 命令。</p></li><li><p>其次,在确保已安装 make 工具后,重新编译 OpenSSL。</p></li></ol><figure class="highlight shell"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br></pre></td><td class="code"><pre><span class="line">sudo apt update</span><br><span class="line">sudo apt install make</span><br><span class="line">cd /root/vcpkg</span><br><span class="line">./bootstrap-vcpkg.sh</span><br><span class="line">./vcpkg integrate install</span><br><span class="line">./vcpkg install openssl</span><br></pre></td></tr></table></figure><p>运行这些命令将更新软件包列表、安装 make 工具,并重新编译并安装 OpenSSL。</p><h2 id="ICU错误"><a href="#ICU错误" class="headerlink" title="ICU错误"></a>ICU错误</h2><figure class="highlight shell"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br><span class="line">7</span><br><span class="line">8</span><br><span class="line">9</span><br><span class="line">10</span><br><span class="line">11</span><br><span class="line">12</span><br><span class="line">13</span><br><span class="line">14</span><br><span class="line">15</span><br><span class="line">16</span><br><span class="line">17</span><br><span class="line">18</span><br><span class="line">19</span><br><span class="line">20</span><br></pre></td><td class="code"><pre><span class="line">CMake Error at scripts/cmake/vcpkg_execute_required_process.cmake:112 (message):</span><br><span class="line"> Command failed: /usr/bin/autoreconf -vfi</span><br><span class="line"> Working Directory: /root/vcpkg/buildtrees/icu/src/c-73_1-src-3575e21c7c.clean/source</span><br><span class="line"> Error code: 2</span><br><span class="line"> See logs for more information:</span><br><span class="line"> /root/vcpkg/buildtrees/icu/autoconf-x64-linux-err.log</span><br><span class="line"></span><br><span class="line">Call Stack (most recent call first):</span><br><span class="line"> scripts/cmake/vcpkg_configure_make.cmake:630 (vcpkg_execute_required_process)</span><br><span class="line"> ports/icu/portfile.cmake:54 (vcpkg_configure_make)</span><br><span class="line"> scripts/ports.cmake:147 (include)</span><br><span class="line"></span><br><span class="line"></span><br><span class="line">error: building icu:x64-linux failed with: BUILD_FAILED</span><br><span class="line">Elapsed time to handle icu:x64-linux: 4.5 s</span><br><span class="line">Please ensure you're using the latest port files with `git pull` and `vcpkg update`.</span><br><span class="line">Then check for known issues at:</span><br><span class="line"> https://github.com/microsoft/vcpkg/issues?q=is%3Aissue+is%3Aopen+in%3Atitle+icu</span><br><span class="line">You can submit a new issue at:</span><br><span class="line"> https://github.com/microsoft/vcpkg/issues/new?title=[icu]+Build+error&body=Copy+issue+body+from+%2Froot%2Fvcpkg%2Finstalled%2Fvcpkg%2Fissue_body.md</span><br></pre></td></tr></table></figure><p>下载依赖组件</p><p>``autoreconf<code>isn't magic (though I encounter package maintainers who obviously believe this). When you ran</code>autoreconf<code>, it failed to find the </code>AX_CHECK_COMPILE_FLAG<code>macro, and produced a corrupt</code>configure` script. Usually that produces an error/diagnostic message at the same time.</p><p>‘AX_CHECK_COMPILE_FLAG` comes from the <a href="http://www.gnu.org/software/autoconf-archive/ax_check_compile_flag.html">autoconf archive</a> project, and Debian has a package which provides this, named <a href="https://packages.debian.org/search?keywords=autoconf-archive">autoconf-archive</a>. Likely, you forgot to install it:</p><figure class="highlight shell"><table><tr><td class="gutter"><pre><span class="line">1</span><br></pre></td><td class="code"><pre><span class="line">sudo apt-get install autoconf-archive</span><br></pre></td></tr></table></figure><p><a href="https://github.com/microsoft/vcpkg/pull/24512">https://github.com/microsoft/vcpkg/pull/24512</a></p><p>仍然错误无法继续编译。</p><p>其实是缺少<code>autoconf-archive</code></p><p><code>./vcpkg remove asio</code></p><p><code>./vcpkg install asio</code></p><p>经过上面的步骤即可进行编译成功。</p>]]></content>
<summary type="html"><h1 id="linux-vcpkg-clion-arm64交叉编译aspia"><a href="#linux-vcpkg-clion-arm64交叉编译aspia" class="headerlink" title="linux+vcpkg+clion+arm64交叉编译a</summary>
<category term="landv" scheme="https://landv.cn/categories/landv/"/>
<category term="aspia" scheme="https://landv.cn/categories/landv/aspia/"/>
<category term="landv" scheme="https://landv.cn/tags/landv/"/>
</entry>
<entry>
<title>win7+vcpkg+vs2019安装用于编译aspia</title>
<link href="https://landv.cn/p/76035fa8.html"/>
<id>https://landv.cn/p/76035fa8.html</id>
<published>2023-07-07T00:24:58.000Z</published>
<updated>2023-07-07T00:24:58.000Z</updated>
<content type="html"><![CDATA[<h1 id="win7-vcpkg-vs2019安装用于编译aspia"><a href="#win7-vcpkg-vs2019安装用于编译aspia" class="headerlink" title="win7+vcpkg+vs2019安装用于编译aspia"></a>win7+vcpkg+vs2019安装用于编译aspia</h1><h2 id="powershell升级"><a href="#powershell升级" class="headerlink" title="powershell升级"></a>powershell升级</h2><p>powershell在win7上需要安装一个升级包</p><p><strong>Windows Management Framework 5.1</strong></p><p><a href="https://www.microsoft.com/en-us/download/details.aspx?id=54616">https://www.microsoft.com/en-us/download/details.aspx?id=54616</a></p><p>ps升级到5以上就可以运行vcpkg下载内容了</p><h2 id="代理工具"><a href="#代理工具" class="headerlink" title="代理工具"></a>代理工具</h2><p><a href="https://www.mustdown.com/software/13717.html">https://www.mustdown.com/software/13717.html</a> </p><p>使用Proxifier进行代理</p><h2 id="vcpkg"><a href="#vcpkg" class="headerlink" title="vcpkg"></a>vcpkg</h2><p><a href="https://github.com/microsoft/vcpkg">https://github.com/microsoft/vcpkg</a></p><p><a href="https://github.com/dchapyshev/vcpkg4aspia">https://github.com/dchapyshev/vcpkg4aspia</a></p><h2 id="vs2019"><a href="#vs2019" class="headerlink" title="vs2019"></a>vs2019</h2><p>旧版本下载</p><p><a href="https://visualstudio.microsoft.com/zh-hans/vs/older-downloads/">https://visualstudio.microsoft.com/zh-hans/vs/older-downloads/</a></p><p><a href="https://my.visualstudio.com/Downloads?q=visual%20studio%202019&wt.mc_id=o~msft~vscom~older-downloads">https://my.visualstudio.com/Downloads?q=visual%20studio%202019&wt.mc_id=o~msft~vscom~older-downloads</a></p><h2 id="编译"><a href="#编译" class="headerlink" title="编译"></a>编译</h2><p><a href="https://github.com/dchapyshev/aspia/blob/master/doc/building.md">https://github.com/dchapyshev/aspia/blob/master/doc/building.md</a></p><h1 id="Instructions-for-building-the-project"><a href="#Instructions-for-building-the-project" class="headerlink" title="Instructions for building the project"></a>Instructions for building the project</h1><h2 id="Windows"><a href="#Windows" class="headerlink" title="Windows"></a>Windows</h2><ol><li><p>You must use Windows 10/11 x64 to build the project. Build in other versions of Windows is not guaranteed.</p></li><li><p>Download and install <a href="https://www.visualstudio.com/downloads">Visual Studio Community 2019</a>.</p><p>2.1. <strong>Desktop development with C++</strong> workload should be selected when installing.</p><p>2.2. <strong>SDK 10.0.18362.0</strong> should be selected when installing.</p><p>2.3. <strong>ATL/MFC</strong> libraries should be selected when installing.</p><p>2.4. <strong>English language pack</strong> (required for vcpkg).</p></li><li><p>Download and install <a href="https://cmake.org/download">CMake</a> (version >= 3.17.0).</p></li><li><p>Download and install <a href="https://github.com/dchapyshev/vcpkg4aspia">vcpkg4aspia</a> (forked from Microsoft repository).</p></li><li><p>In vcpkg, you need to install the following libraries (use triplet <strong>x86-windows-static</strong> in all cases):</p></li></ol><ul><li>asio</li><li>curl</li><li>gtest</li><li>libvpx</li><li>libyuv</li><li>mimalloc</li><li>openssl</li><li>opus</li><li>protobuf</li><li>qt5-base</li><li>qt5-translations</li><li>qt5-winextras</li><li>rapidjson</li><li>sqlite3</li><li>zstd</li></ul><ol start="6"><li><p>Go to the directory with source code (root directory) and run the following commands:</p><p><code>mkdir build cd build cmake ..\ -G "Visual Studio 16 2019" -A Win32 -DCMAKE_TOOLCHAIN_FILE=<vcpkg_path>\scripts\buildsystems\vcpkg.cmake -DVCPKG_TARGET_TRIPLET=x86-windows-static (replace <vcpkg_path> with real path to vcpkg)</code></p><p>You can also use CMake GUI for these purposes.</p><p>After these actions, the <strong>aspia.sln</strong> file will be generated in directory “build”.</p></li><li><p>Open <strong>aspia.sln</strong> in Visual Studio and build the project.</p></li></ol><h2 id="Linux"><a href="#Linux" class="headerlink" title="Linux"></a>Linux</h2><p>The build for Linux was tested only in Ubuntu 20.04 and Debian 11.0. If you have a different distribution kit or its version, then additional steps may be required.</p><ol><li>Install the following packages in your package manager (<strong>packages must be installed before installing vcpkg and its packages</strong>):</li></ol><ul><li>ninja-build</li><li>autoconf</li><li>autoconf-archive</li><li>autopoint</li><li>python</li><li>bison</li><li>gperf</li><li>libgl1-mesa-dev</li><li>libglu1-mesa-dev</li><li>libharfbuzz-dev</li><li>libfontconfig1-dev</li><li>libfreetype6-dev</li><li>libx11-dev</li><li>libx11-xcb-dev</li><li>libxext-dev</li><li>libxfixes-dev</li><li>libxi-dev</li><li>libxrender-dev</li><li>libxcb1-dev</li><li>libxcb-glx0-dev</li><li>libxcb-keysyms1-dev</li><li>libxcb-image0-dev</li><li>libxcb-shm0-dev</li><li>libxcb-icccm4-dev</li><li>libxcb-sync0-dev</li><li>libxcb-xfixes0-dev</li><li>libxcb-shape0-dev</li><li>libxcb-randr0-dev</li><li>libxcb-render-util0-dev</li><li>libxcb-xinerama-dev</li><li>libxcb-util-dev</li><li>libxkbcommon-dev</li><li>libxkbcommon-x11-dev</li><li>libatspi2.0-dev</li><li>libprocps-dev</li><li>libxdamage-dev</li><li>libxrandr-dev</li><li>libpulse-dev</li><li>flite1-dev</li><li>libspeechd-dev</li><li>speech-dispatcher</li><li>nasm</li><li>gcc</li><li>g++</li><li>qtcreator</li></ul><ol start="2"><li>In vcpkg, you need to install the following libraries (use triplet <strong>x64-linux</strong> in all cases):</li></ol><ul><li>asio</li><li>curl</li><li>gtest</li><li>icu</li><li>libvpx</li><li>libyuv</li><li>mimalloc</li><li>openssl</li><li>opus</li><li>protobuf</li><li>qt5-base</li><li>qt5-translations</li><li>rapidjson</li><li>sqlite3</li><li>zstd</li></ul><ol start="3"><li>Open <strong>QtCreator -> Tools -> Options -> Kits -> Qt Versions</strong>. Click the Add button and specify the path to <strong><vcpkg_path>/installed/x64-linux/tools/qt5/bin/qmake</strong>.</li><li>Open <strong>QtCreator -> Tools -> Options -> Kits -> Kits</strong>. Click the Add button. Enter a display name for the profile, specify the compilers (gcc/g++), and the Qt profile you added earlier.</li><li>Open <strong>CMakeLists.txt</strong> from the Aspia root directory in QtCreator and configure the build using the previously added profile.</li></ol><h2 id="Alternative-instructions-SW-build-system"><a href="#Alternative-instructions-SW-build-system" class="headerlink" title="Alternative instructions (SW build system)"></a>Alternative instructions (SW build system)</h2><ol><li>Download, unpack and add to PATH <code>sw</code> tool from <a href="https://github.com/SoftwareNetwork/binaries">https://github.com/SoftwareNetwork/binaries</a></li><li>Run <code>sw build source</code> in the project root (<a href="https://github.com/dchapyshev/aspia/blob/master/.github/workflows/sw.yml">example</a>).<br>Binaries will be available under <code>.sw/out</code> directory.</li><li>To generate VS solution, run <code>sw generate source</code>.</li></ol><h2 id="win7-python"><a href="#win7-python" class="headerlink" title="win7-python"></a>win7-python</h2><p><a href="https://github.com/landv/PythonWin7">https://github.com/landv/PythonWin7</a></p><p><strong>python-3.10.7-embed-amd64</strong></p><p><a href="https://github.com/landv/PythonWin7/blob/master/3.10.7/python-3.10.7-embed-amd64.zip">https://github.com/landv/PythonWin7/blob/master/3.10.7/python-3.10.7-embed-amd64.zip</a></p><p>在win7上使用vcpkg install qt5之类的时候会出现调用python错误,使用上面的重新适配win7以后的版本进行覆盖掉vcpkg tools文件夹里面的python即可编译成功。</p>]]></content>
<summary type="html"><h1 id="win7-vcpkg-vs2019安装用于编译aspia"><a href="#win7-vcpkg-vs2019安装用于编译aspia" class="headerlink" title="win7+vcpkg+vs2019安装用于编译aspia"></a>wi</summary>
<category term="landv" scheme="https://landv.cn/categories/landv/"/>
<category term="aspia" scheme="https://landv.cn/categories/landv/aspia/"/>
<category term="landv" scheme="https://landv.cn/tags/landv/"/>
</entry>
<entry>
<title>捷信达根据昆仑会员系统结算单据号获取捷信达主单详细信息和手牌号</title>
<link href="https://landv.cn/p/c9a8aa0c.html"/>
<id>https://landv.cn/p/c9a8aa0c.html</id>
<published>2023-06-06T10:12:19.000Z</published>
<updated>2023-06-06T10:12:19.000Z</updated>
<content type="html"><![CDATA[<h1 id="捷信达根据昆仑会员系统结算单据号获取捷信达主单详细信息和手牌号"><a href="#捷信达根据昆仑会员系统结算单据号获取捷信达主单详细信息和手牌号" class="headerlink" title="捷信达根据昆仑会员系统结算单据号获取捷信达主单详细信息和手牌号"></a>捷信达根据昆仑会员系统结算单据号获取捷信达主单详细信息和手牌号</h1><figure class="highlight sql"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br><span class="line">7</span><br></pre></td><td class="code"><pre><span class="line"><span class="comment">--SNB2305208010072</span></span><br><span class="line"><span class="comment">-- 通过会员系统查看结算单据号,根据单据号进行查询明细,获取手牌号。</span></span><br><span class="line"><span class="keyword">execute</span> dbo.up_snRptBillItem <span class="variable">@as</span>_sDate <span class="operator">=</span> <span class="string">'2023-05-20'</span>, <span class="variable">@as</span>_eDate <span class="operator">=</span> <span class="string">'2023-05-20'</span> </span><br><span class="line"><span class="keyword">SELECT</span> <span class="operator">*</span> <span class="keyword">FROM</span> snBillMast sbm <span class="keyword">where</span> v_PaidNo<span class="operator">=</span><span class="string">'SNB2305208010072'</span></span><br><span class="line"><span class="keyword">select</span> <span class="operator">*</span> <span class="keyword">from</span> snBillDetail <span class="keyword">where</span> v_PaidNo<span class="operator">=</span><span class="string">'SNB2305208010072'</span></span><br><span class="line"><span class="keyword">SELECT</span> <span class="operator">*</span> <span class="keyword">from</span> v_snTabMast <span class="keyword">where</span> v_billno <span class="operator">=</span><span class="string">'3052000223'</span></span><br><span class="line"></span><br></pre></td></tr></table></figure>]]></content>
<summary type="html"><h1 id="捷信达根据昆仑会员系统结算单据号获取捷信达主单详细信息和手牌号"><a href="#捷信达根据昆仑会员系统结算单据号获取捷信达主单详细信息和手牌号" class="headerlink" title="捷信达根据昆仑会员系统结算单据号获取捷信达主单详细信息和手牌</summary>
<category term="landv" scheme="https://landv.cn/categories/landv/"/>
<category term="捷信达" scheme="https://landv.cn/categories/landv/%E6%8D%B7%E4%BF%A1%E8%BE%BE/"/>
<category term="landv" scheme="https://landv.cn/tags/landv/"/>
</entry>
<entry>
<title>webHackersWeapons</title>
<link href="https://landv.cn/p/624e4de9.html"/>
<id>https://landv.cn/p/624e4de9.html</id>
<published>2023-06-05T01:32:25.000Z</published>
<updated>2023-06-05T01:32:25.000Z</updated>
<content type="html"><![CDATA[<h1 align="center"><br><a href=""><img src="https://user-images.githubusercontent.com/13212227/104400969-9f3d9280-5596-11eb-80f4-864effae95fc.png" alt="" width="500px;"></a><br><img src="https://img.shields.io/github/last-commit/hahwul/WebHackersWeapons?style=flat"> <img src="https://img.shields.io/badge/PRs-welcome-cyan"><img src="https://github.com/hahwul/WebHackersWeapons/actions/workflows/deploy.yml/badge.svg"><a href="https://twitter.com/intent/follow?screen_name=hahwul"><img src="https://img.shields.io/twitter/follow/hahwul?style=flat&logo=twitter"></a></h1>A collection of awesome tools used by Web hackers. Happy hacking , Happy bug-hunting<p><strong><a href="https://github.com/hahwul/WebHackersWeapons">https://github.com/hahwul/WebHackersWeapons</a></strong></p><h2 id="Family-project"><a href="#Family-project" class="headerlink" title="Family project"></a>Family project</h2><p><a href="https://github.com/hahwul/WebHackersWeapons"><img src="https://img.shields.io/github/stars/hahwul/WebHackersWeapons?label=WebHackersWeapons" alt="WebHackersWeapons"></a><br><a href="https://github.com/hahwul/MobileHackersWeapons"><img src="https://img.shields.io/github/stars/hahwul/MobileHackersWeapons?label=MobileHackersWeapons" alt="MobileHackersWeapons"></a></p><h2 id="Table-of-Contents"><a href="#Table-of-Contents" class="headerlink" title="Table of Contents"></a>Table of Contents</h2><ul><li><a href="#weapons">Weapons</a><ul><li><a href="#tools">Tools</a></li><li><a href="#bookmarklets">Bookmarklets</a></li><li><a href="#browser-addons">Browser Addons</a></li><li><a href="#burpsuite-and-zap-addons">Burp and ZAP Addons</a></li></ul></li><li><a href="CONTRIBUTING.md">Contribute</a> </li><li><a href="#thanks-to-contributor">Thanks to contributor</a></li></ul><h2 id="Weapons"><a href="#Weapons" class="headerlink" title="Weapons"></a>Weapons</h2><p><em>Attributes</em></p><table><thead><tr><th></th><th>Attributes</th></tr></thead><tbody><tr><td>Types</td><td><code>Army-Knife</code> <code>Proxy</code> <code>Recon</code> <code>Fuzzer</code> <code>Scanner</code> <code>Exploit</code> <code>Env</code> <code>Utils</code> <code>Etc</code></td></tr><tr><td>Tags</td><td><a href="/categorize/tags/infra.md"><code>infra</code></a> <a href="/categorize/tags/live-audit.md"><code>live-audit</code></a> <a href="/categorize/tags/mitmproxy.md"><code>mitmproxy</code></a> <a href="/categorize/tags/crawl.md"><code>crawl</code></a> <a href="/categorize/tags/pentest.md"><code>pentest</code></a> <a href="/categorize/tags/subdomains.md"><code>subdomains</code></a> <a href="/categorize/tags/domain.md"><code>domain</code></a> <a href="/categorize/tags/url.md"><code>url</code></a> <a href="/categorize/tags/dns.md"><code>dns</code></a> <a href="/categorize/tags/port.md"><code>port</code></a> <a href="/categorize/tags/osint.md"><code>osint</code></a> <a href="/categorize/tags/apk.md"><code>apk</code></a> <a href="/categorize/tags/portscan.md"><code>portscan</code></a> <a href="/categorize/tags/endpoint.md"><code>endpoint</code></a> <a href="/categorize/tags/param.md"><code>param</code></a> <a href="/categorize/tags/online.md"><code>online</code></a> <a href="/categorize/tags/takeover.md"><code>takeover</code></a> <a href="/categorize/tags/graphql.md"><code>graphql</code></a> <a href="/categorize/tags/ssrf.md"><code>ssrf</code></a> <a href="/categorize/tags/cache-vuln.md"><code>cache-vuln</code></a> <a href="/categorize/tags/jwt.md"><code>jwt</code></a> <a href="/categorize/tags/crlf.md"><code>crlf</code></a> <a href="/categorize/tags/path-traversal.md"><code>path-traversal</code></a> <a href="/categorize/tags/dependency-confusion.md"><code>dependency-confusion</code></a> <a href="/categorize/tags/s3.md"><code>s3</code></a> <a href="/categorize/tags/broken-link.md"><code>broken-link</code></a> <a href="/categorize/tags/xss.md"><code>xss</code></a> <a href="/categorize/tags/oast.md"><code>oast</code></a> <a href="/categorize/tags/smuggle.md"><code>smuggle</code></a> <a href="/categorize/tags/403.md"><code>403</code></a> <a href="/categorize/tags/ssl.md"><code>ssl</code></a> <a href="/categorize/tags/sqli.md"><code>sqli</code></a> <a href="/categorize/tags/cors.md"><code>cors</code></a> <a href="/categorize/tags/aaa.md"><code>aaa</code></a> <a href="/categorize/tags/csp.md"><code>csp</code></a> <a href="/categorize/tags/exploit.md"><code>exploit</code></a> <a href="/categorize/tags/lfi.md"><code>lfi</code></a> <a href="/categorize/tags/xxe.md"><code>xxe</code></a> <a href="/categorize/tags/rop.md"><code>rop</code></a> <a href="/categorize/tags/RMI.md"><code>RMI</code></a> <a href="/categorize/tags/blind-xss.md"><code>blind-xss</code></a> <a href="/categorize/tags/nuclei-templates.md"><code>nuclei-templates</code></a> <a href="/categorize/tags/fuzz.md"><code>fuzz</code></a> <a href="/categorize/tags/zipbomb.md"><code>zipbomb</code></a> <a href="/categorize/tags/wordlist.md"><code>wordlist</code></a> <a href="/categorize/tags/documents.md"><code>documents</code></a> <a href="/categorize/tags/darkmode.md"><code>darkmode</code></a> <a href="/categorize/tags/report.md"><code>report</code></a> <a href="/categorize/tags/payload.md"><code>payload</code></a> <a href="/categorize/tags/notify.md"><code>notify</code></a> <a href="/categorize/tags/deserialize.md"><code>deserialize</code></a> <a href="/categorize/tags/http.md"><code>http</code></a> <a href="/categorize/tags/clipboard.md"><code>clipboard</code></a> <a href="/categorize/tags/cookie.md"><code>cookie</code></a> <a href="/categorize/tags/diff.md"><code>diff</code></a> <a href="/categorize/tags/web3.md"><code>web3</code></a></td></tr><tr><td>Langs</td><td><a href="/categorize/langs/Shell.md"><code>Shell</code></a> <a href="/categorize/langs/Go.md"><code>Go</code></a> <a href="/categorize/langs/Java.md"><code>Java</code></a> <a href="/categorize/langs/Ruby.md"><code>Ruby</code></a> <a href="/categorize/langs/Python.md"><code>Python</code></a> <a href="/categorize/langs/Rust.md"><code>Rust</code></a> <a href="/categorize/langs/JavaScript.md"><code>JavaScript</code></a> <a href="/categorize/langs/C.md"><code>C</code></a> <a href="/categorize/langs/Kotlin.md"><code>Kotlin</code></a> <a href="/categorize/langs/Perl.md"><code>Perl</code></a> <a href="/categorize/langs/TypeScript.md"><code>TypeScript</code></a> <a href="/categorize/langs/BlitzBasic.md"><code>BlitzBasic</code></a> <a href="/categorize/langs/CSS.md"><code>CSS</code></a> <a href="/categorize/langs/C++.md"><code>C++</code></a> <a href="/categorize/langs/Txt.md"><code>Txt</code></a> <a href="/categorize/langs/PHP.md"><code>PHP</code></a> <a href="/categorize/langs/C#.md"><code>C#</code></a> <a href="/categorize/langs/HTML.md"><code>HTML</code></a></td></tr></tbody></table><h3 id="Tools"><a href="#Tools" class="headerlink" title="Tools"></a>Tools</h3><table><thead><tr><th>Type</th><th>Name</th><th>Description</th><th>Star</th><th>Tags</th><th>Badges</th></tr></thead><tbody><tr><td>Army-Knife</td><td><a href="https://github.com/pry0cc/axiom">axiom</a></td><td>A dynamic infrastructure toolkit for red teamers and bug bounty hunters!</td><td><img src="https://img.shields.io/github/stars/pry0cc/axiom?label=%20"></td><td><a href="/categorize/tags/infra.md"><code>infra</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Shell.md"><img src="/images/shell.png" alt="Shell"></a></td></tr><tr><td>Army-Knife</td><td><a href="https://github.com/jaeles-project/jaeles">jaeles</a></td><td>The Swiss Army knife for automated Web Application Testing</td><td><img src="https://img.shields.io/github/stars/jaeles-project/jaeles?label=%20"></td><td><a href="/categorize/tags/live-audit.md"><code>live-audit</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Army-Knife</td><td><a href="https://github.com/zaproxy/zaproxy">ZAP</a></td><td>The OWASP ZAP core project</td><td><img src="https://img.shields.io/github/stars/zaproxy/zaproxy?label=%20"></td><td><a href="/categorize/tags/mitmproxy.md"><code>mitmproxy</code></a> <a href="/categorize/tags/live-audit.md"><code>live-audit</code></a> <a href="/categorize/tags/crawl.md"><code>crawl</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/zap.png" alt="zap"><a href="/categorize/langs/Java.md"><img src="/images/java.png" alt="Java"></a></td></tr><tr><td>Army-Knife</td><td><a href="https://github.com/rapid7/metasploit-framework">Metasploit</a></td><td>The world’s most used penetration testing framework</td><td><img src="https://img.shields.io/github/stars/rapid7/metasploit-framework?label=%20"></td><td><a href="/categorize/tags/pentest.md"><code>pentest</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Ruby.md"><img src="/images/ruby.png" alt="Ruby"></a></td></tr><tr><td>Army-Knife</td><td><a href="https://portswigger.net/burp">BurpSuite</a></td><td>The BurpSuite Project</td><td></td><td><a href="/categorize/tags/mitmproxy.md"><code>mitmproxy</code></a> <a href="/categorize/tags/live-audit.md"><code>live-audit</code></a> <a href="/categorize/tags/crawl.md"><code>crawl</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/Java.md"><img src="/images/java.png" alt="Java"></a></td></tr><tr><td>Proxy</td><td><a href="https://github.com/denandz/glorp">Glorp</a></td><td>A CLI-based HTTP intercept and replay proxy</td><td><img src="https://img.shields.io/github/stars/denandz/glorp?label=%20"></td><td><a href="/categorize/tags/mitmproxy.md"><code>mitmproxy</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Proxy</td><td><a href="https://github.com/mitmproxy/mitmproxy">mitmproxy</a></td><td>An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.</td><td><img src="https://img.shields.io/github/stars/mitmproxy/mitmproxy?label=%20"></td><td><a href="/categorize/tags/mitmproxy.md"><code>mitmproxy</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Proxy</td><td><a href="https://github.com/projectdiscovery/proxify">proxify</a></td><td>Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation and replay</td><td><img src="https://img.shields.io/github/stars/projectdiscovery/proxify?label=%20"></td><td><a href="/categorize/tags/mitmproxy.md"><code>mitmproxy</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Proxy</td><td><a href="https://github.com/bbtfr/evil-proxy">EvilProxy</a></td><td>A ruby http/https proxy to do EVIL things.</td><td><img src="https://img.shields.io/github/stars/bbtfr/evil-proxy?label=%20"></td><td><a href="/categorize/tags/mitmproxy.md"><code>mitmproxy</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Ruby.md"><img src="/images/ruby.png" alt="Ruby"></a></td></tr><tr><td>Proxy</td><td><a href="https://github.com/dstotijn/hetty">hetty</a></td><td>Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp Suite Pro, with powerful features tailored to the needs of the infosec and bug bounty community.</td><td><img src="https://img.shields.io/github/stars/dstotijn/hetty?label=%20"></td><td><a href="/categorize/tags/mitmproxy.md"><code>mitmproxy</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Proxy</td><td><a href="https://caido.io/">Caido</a></td><td>A lightweight web security auditing toolkit</td><td></td><td><a href="/categorize/tags/mitmproxy.md"><code>mitmproxy</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Rust.md"><img src="/images/rust.png" alt="Rust"></a></td></tr><tr><td>Proxy</td><td><a href="https://sourceforge.net/projects/echomirage.oldbutgold.p/">Echo Mirage</a></td><td>A generic network proxy that uses DLL injection to capture and alter TCP traffic.</td><td></td><td><a href="/categorize/tags/mitmproxy.md"><code>mitmproxy</code></a></td><td><img src="/images/windows.png" alt="windows"></td></tr><tr><td>Recon</td><td><a href="https://github.com/emadshanab/subs_all">subs_all</a></td><td>Subdomain Enumeration Wordlist. 8956437 unique words. Updated.</td><td><img src="https://img.shields.io/github/stars/emadshanab/subs_all?label=%20"></td><td><a href="/categorize/tags/subdomains.md"><code>subdomains</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"></td></tr><tr><td>Recon</td><td><a href="https://github.com/michenriksen/aquatone">aquatone</a></td><td>A Tool for Domain Flyovers</td><td><img src="https://img.shields.io/github/stars/michenriksen/aquatone?label=%20"></td><td><a href="/categorize/tags/domain.md"><code>domain</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/si9int/cc.py">cc.py</a></td><td>Extracting URLs of a specific target based on the results of “commoncrawl.org”</td><td><img src="https://img.shields.io/github/stars/si9int/cc.py?label=%20"></td><td><a href="/categorize/tags/url.md"><code>url</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/zmap/zdns">zdns</a></td><td>Fast CLI DNS Lookup Tool</td><td><img src="https://img.shields.io/github/stars/zmap/zdns?label=%20"></td><td><a href="/categorize/tags/dns.md"><code>dns</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/aboul3la/Sublist3r">SubBrute</a></td><td><a href="https://github.com/TheRook/subbrute">https://github.com/TheRook/subbrute</a></td><td><img src="https://img.shields.io/github/stars/aboul3la/Sublist3r?label=%20"></td><td><a href="/categorize/tags/subdomains.md"><code>subdomains</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/s0md3v/Silver">Silver</a></td><td>Mass scan IPs for vulnerable services</td><td><img src="https://img.shields.io/github/stars/s0md3v/Silver?label=%20"></td><td><a href="/categorize/tags/port.md"><code>port</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/edoardottt/scilla">scilla</a></td><td>🏴☠️ Information Gathering tool 🏴☠️ dns/subdomain/port enumeration</td><td><img src="https://img.shields.io/github/stars/edoardottt/scilla?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/devanshbatham/FavFreak">FavFreak</a></td><td>Making Favicon.ico based Recon Great again !</td><td><img src="https://img.shields.io/github/stars/devanshbatham/FavFreak?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/yogeshojha/rengine">rengine</a></td><td>reNgine is an automated reconnaissance framework meant for gathering information during penetration testing of web applications. reNgine has customizable scan engines, which can be used to scan the websites, endpoints, and gather information.</td><td><img src="https://img.shields.io/github/stars/yogeshojha/rengine?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/JavaScript.md"><img src="/images/javascript.png" alt="JavaScript"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/EasyRecon/Hunt3r">Hunt3r</a></td><td>Made your bugbounty subdomains reconnaissance easier with Hunt3r the web application reconnaissance framework</td><td><img src="https://img.shields.io/github/stars/EasyRecon/Hunt3r?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Ruby.md"><img src="/images/ruby.png" alt="Ruby"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/maurosoria/dirsearch">dirsearch</a></td><td>Web path scanner</td><td><img src="https://img.shields.io/github/stars/maurosoria/dirsearch?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/smicallef/spiderfoot">spiderfoot</a></td><td>SpiderFoot automates OSINT collection so that you can focus on analysis.</td><td><img src="https://img.shields.io/github/stars/smicallef/spiderfoot?label=%20"></td><td><a href="/categorize/tags/osint.md"><code>osint</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/vortexau/dnsvalidator">dnsvalidator</a></td><td>Maintains a list of IPv4 DNS servers by verifying them against baseline servers, and ensuring accurate responses.</td><td><img src="https://img.shields.io/github/stars/vortexau/dnsvalidator?label=%20"></td><td><a href="/categorize/tags/dns.md"><code>dns</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/dwisiswant0/apkleaks">apkleaks</a></td><td>Scanning APK file for URIs, endpoints & secrets.</td><td><img src="https://img.shields.io/github/stars/dwisiswant0/apkleaks?label=%20"></td><td><a href="/categorize/tags/apk.md"><code>apk</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/aboul3la/Sublist3r">Sublist3r</a></td><td>Fast subdomains enumeration tool for penetration testers</td><td><img src="https://img.shields.io/github/stars/aboul3la/Sublist3r?label=%20"></td><td><a href="/categorize/tags/subdomains.md"><code>subdomains</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/darryllane/Bluto">BLUTO</a></td><td>DNS Analysis Tool</td><td><img src="https://img.shields.io/github/stars/darryllane/Bluto?label=%20"></td><td><a href="/categorize/tags/dns.md"><code>dns</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/projectdiscovery/chaos-client">chaos-client</a></td><td>Go client to communicate with Chaos DNS API.</td><td><img src="https://img.shields.io/github/stars/projectdiscovery/chaos-client?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/robertdavidgraham/masscan">masscan</a></td><td>TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.</td><td><img src="https://img.shields.io/github/stars/robertdavidgraham/masscan?label=%20"></td><td><a href="/categorize/tags/portscan.md"><code>portscan</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/C.md"><img src="/images/c.png" alt="C"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/intrigueio/intrigue-core">intrigue-core</a></td><td>Discover Your Attack Surface</td><td><img src="https://img.shields.io/github/stars/intrigueio/intrigue-core?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Ruby.md"><img src="/images/ruby.png" alt="Ruby"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/Qianlitp/crawlergo">crawlergo</a></td><td>A powerful browser crawler for web vulnerability scanners</td><td><img src="https://img.shields.io/github/stars/Qianlitp/crawlergo?label=%20"></td><td><a href="/categorize/tags/crawl.md"><code>crawl</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/xnl-h4ck3r/xnLinkFinder">xnLinkFinder</a></td><td>A python tool used to discover endpoints (and potential parameters) for a given target</td><td><img src="https://img.shields.io/github/stars/xnl-h4ck3r/xnLinkFinder?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/projectdiscovery/httpx">httpx</a></td><td>httpx is a fast and multi-purpose HTTP toolkit allow to run multiple probers using retryablehttp library, it is designed to maintain the result reliability with increased threads.</td><td><img src="https://img.shields.io/github/stars/projectdiscovery/httpx?label=%20"></td><td><a href="/categorize/tags/url.md"><code>url</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/shmilylty/OneForAll">OneForAll</a></td><td>OneForAll是一款功能强大的子域收集工具</td><td><img src="https://img.shields.io/github/stars/shmilylty/OneForAll?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/michenriksen/gitrob">gitrob</a></td><td>Reconnaissance tool for GitHub organizations</td><td><img src="https://img.shields.io/github/stars/michenriksen/gitrob?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/s0md3v/Arjun">Arjun</a></td><td>HTTP parameter discovery suite.</td><td><img src="https://img.shields.io/github/stars/s0md3v/Arjun?label=%20"></td><td><a href="/categorize/tags/param.md"><code>param</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/KathanP19/JSFScan.sh">JSFScan.sh</a></td><td>Automation for javascript recon in bug bounty.</td><td><img src="https://img.shields.io/github/stars/KathanP19/JSFScan.sh?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Shell.md"><img src="/images/shell.png" alt="Shell"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/lc/gau">gau</a></td><td>Fetch known URLs from AlienVault’s Open Threat Exchange, the Wayback Machine, and Common Crawl.</td><td><img src="https://img.shields.io/github/stars/lc/gau?label=%20"></td><td><a href="/categorize/tags/url.md"><code>url</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/UnkL4b/GitMiner">GitMiner</a></td><td>Tool for advanced mining for content on Github</td><td><img src="https://img.shields.io/github/stars/UnkL4b/GitMiner?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/internetwache/CT_subdomains">CT_subdomains</a></td><td>An hourly updated list of subdomains gathered from certificate transparency logs</td><td><img src="https://img.shields.io/github/stars/internetwache/CT_subdomains?label=%20"></td><td><a href="/categorize/tags/subdomains.md"><code>subdomains</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"></td></tr><tr><td>Recon</td><td><a href="https://github.com/PalindromeLabs/STEWS">STEWS</a></td><td>A Security Tool for Enumerating WebSockets</td><td><img src="https://img.shields.io/github/stars/PalindromeLabs/STEWS?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/s0md3v/Parth">Parth</a></td><td>Heuristic Vulnerable Parameter Scanner</td><td><img src="https://img.shields.io/github/stars/s0md3v/Parth?label=%20"></td><td><a href="/categorize/tags/param.md"><code>param</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Recon</td><td><a href="https://dnsdumpster.com/">DNSDumpster</a></td><td>Online dns recon & research, find & lookup dns records</td><td></td><td><a href="/categorize/tags/dns.md"><code>dns</code></a> <a href="/categorize/tags/online.md"><code>online</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"></td></tr><tr><td>Recon</td><td><a href="https://github.com/tomnomnom/waybackurls">waybackurls</a></td><td>Fetch all the URLs that the Wayback Machine knows about for a domain</td><td><img src="https://img.shields.io/github/stars/tomnomnom/waybackurls?label=%20"></td><td><a href="/categorize/tags/url.md"><code>url</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/jaeles-project/gospider">gospider</a></td><td>Gospider - Fast web spider written in Go</td><td><img src="https://img.shields.io/github/stars/jaeles-project/gospider?label=%20"></td><td><a href="/categorize/tags/crawl.md"><code>crawl</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/projectdiscovery/katana">katana</a></td><td>A next-generation crawling and spidering framework.</td><td><img src="https://img.shields.io/github/stars/projectdiscovery/katana?label=%20"></td><td><a href="/categorize/tags/crawl.md"><code>crawl</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/nahamsec/lazyrecon">lazyrecon</a></td><td>This script is intended to automate your reconnaissance process in an organized fashion</td><td><img src="https://img.shields.io/github/stars/nahamsec/lazyrecon?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Shell.md"><img src="/images/shell.png" alt="Shell"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/GerbenJavado/LinkFinder">LinkFinder</a></td><td>A python script that finds endpoints in JavaScript files</td><td><img src="https://img.shields.io/github/stars/GerbenJavado/LinkFinder?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/j3ssie/Osmedeus">Osmedeus</a></td><td>Fully automated offensive security framework for reconnaissance and vulnerability scanning</td><td><img src="https://img.shields.io/github/stars/j3ssie/Osmedeus?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/kpcyrd/sn0int">sn0int</a></td><td>Semi-automatic OSINT framework and package manager</td><td><img src="https://img.shields.io/github/stars/kpcyrd/sn0int?label=%20"></td><td><a href="/categorize/tags/osint.md"><code>osint</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Rust.md"><img src="/images/rust.png" alt="Rust"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/r3curs1v3-pr0xy/sub404">Sub404</a></td><td>A python tool to check subdomain takeover vulnerability</td><td><img src="https://img.shields.io/github/stars/r3curs1v3-pr0xy/sub404?label=%20"></td><td><a href="/categorize/tags/subdomains.md"><code>subdomains</code></a> <a href="/categorize/tags/takeover.md"><code>takeover</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/Edu4rdSHL/rusolver">rusolver</a></td><td>Fast and accurate DNS resolver.</td><td><img src="https://img.shields.io/github/stars/Edu4rdSHL/rusolver?label=%20"></td><td><a href="/categorize/tags/dns.md"><code>dns</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Rust.md"><img src="/images/rust.png" alt="Rust"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/htcat/htcat">htcat</a></td><td>Parallel and Pipelined HTTP GET Utility</td><td><img src="https://img.shields.io/github/stars/htcat/htcat?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/hakluke/haktrails">haktrails</a></td><td>Golang client for querying SecurityTrails API data</td><td><img src="https://img.shields.io/github/stars/hakluke/haktrails?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://securitytrails.com/">SecurityTrails</a></td><td>Online dns / subdomain / recon tool</td><td></td><td><a href="/categorize/tags/subdomains.md"><code>subdomains</code></a> <a href="/categorize/tags/online.md"><code>online</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"></td></tr><tr><td>Recon</td><td><a href="https://github.com/edoardottt/cariddi">cariddi</a></td><td>Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more</td><td><img src="https://img.shields.io/github/stars/edoardottt/cariddi?label=%20"></td><td><a href="/categorize/tags/crawl.md"><code>crawl</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/Sh1Yo/x8">x8</a></td><td>Hidden parameters discovery suite</td><td><img src="https://img.shields.io/github/stars/Sh1Yo/x8?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Rust.md"><img src="/images/rust.png" alt="Rust"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/six2dez/reconftw">reconftw</a></td><td>reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities</td><td><img src="https://img.shields.io/github/stars/six2dez/reconftw?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Shell.md"><img src="/images/shell.png" alt="Shell"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/projectdiscovery/uncover">uncover</a></td><td>Quickly discover exposed hosts on the internet using multiple search engine.</td><td><img src="https://img.shields.io/github/stars/projectdiscovery/uncover?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/dwisiswant0/go-dork">go-dork</a></td><td>The fastest dork scanner written in Go.</td><td><img src="https://img.shields.io/github/stars/dwisiswant0/go-dork?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/projectdiscovery/dnsprobe">dnsprobe</a></td><td>DNSProb (beta) is a tool built on top of retryabledns that allows you to perform multiple dns queries of your choice with a list of user supplied resolvers.</td><td><img src="https://img.shields.io/github/stars/projectdiscovery/dnsprobe?label=%20"></td><td><a href="/categorize/tags/dns.md"><code>dns</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/Edu4rdSHL/fhc">fhc</a></td><td>Fast HTTP Checker.</td><td><img src="https://img.shields.io/github/stars/Edu4rdSHL/fhc?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Rust.md"><img src="/images/rust.png" alt="Rust"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/s0md3v/uro">uro</a></td><td>declutters url lists for crawling/pentesting</td><td><img src="https://img.shields.io/github/stars/s0md3v/uro?label=%20"></td><td><a href="/categorize/tags/url.md"><code>url</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/j3ssie/goverview">goverview</a></td><td>goverview - Get an overview of the list of URLs</td><td><img src="https://img.shields.io/github/stars/j3ssie/goverview?label=%20"></td><td><a href="/categorize/tags/url.md"><code>url</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/brandonskerritt/RustScan">RustScan</a></td><td>Faster Nmap Scanning with Rust</td><td><img src="https://img.shields.io/github/stars/brandonskerritt/RustScan?label=%20"></td><td><a href="/categorize/tags/portscan.md"><code>portscan</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Rust.md"><img src="/images/rust.png" alt="Rust"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/hakluke/hakrawler">hakrawler</a></td><td>Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application</td><td><img src="https://img.shields.io/github/stars/hakluke/hakrawler?label=%20"></td><td><a href="/categorize/tags/crawl.md"><code>crawl</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/guelfoweb/knock">knock</a></td><td>Knock Subdomain Scan</td><td><img src="https://img.shields.io/github/stars/guelfoweb/knock?label=%20"></td><td><a href="/categorize/tags/subdomains.md"><code>subdomains</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/sensepost/gowitness">gowitness</a></td><td>🔍 gowitness - a golang, web screenshot utility using Chrome Headless</td><td><img src="https://img.shields.io/github/stars/sensepost/gowitness?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/m4ll0k/SecretFinder">SecretFinder</a></td><td>SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files</td><td><img src="https://img.shields.io/github/stars/m4ll0k/SecretFinder?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/aufzayed/HydraRecon">HydraRecon</a></td><td>All In One, Fast, Easy Recon Tool</td><td><img src="https://img.shields.io/github/stars/aufzayed/HydraRecon?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/projectdiscovery/naabu">naabu</a></td><td>A fast port scanner written in go with focus on reliability and simplicity. Designed to be used in combination with other tools for attack surface discovery in bug bounties and pentests</td><td><img src="https://img.shields.io/github/stars/projectdiscovery/naabu?label=%20"></td><td><a href="/categorize/tags/portscan.md"><code>portscan</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://chaos.projectdiscovery.io/">Chaos Web</a></td><td>actively scan and maintain internet-wide assets’ data. enhance research and analyse changes around DNS for better insights.</td><td></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"></td></tr><tr><td>Recon</td><td><a href="https://github.com/gwen001/github-endpoints">github-endpoints</a></td><td>Find endpoints on GitHub.</td><td><img src="https://img.shields.io/github/stars/gwen001/github-endpoints?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/maK-/parameth">parameth</a></td><td>This tool can be used to brute discover GET and POST parameters</td><td><img src="https://img.shields.io/github/stars/maK-/parameth?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/tomnomnom/meg">meg</a></td><td>Fetch many paths for many hosts - without killing the hosts</td><td><img src="https://img.shields.io/github/stars/tomnomnom/meg?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/utkusen/urlhunter">urlhunter</a></td><td>a recon tool that allows searching on URLs that are exposed via shortener services</td><td><img src="https://img.shields.io/github/stars/utkusen/urlhunter?label=%20"></td><td><a href="/categorize/tags/url.md"><code>url</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/Edu4rdSHL/findomain">findomain</a></td><td>The fastest and cross-platform subdomain enumerator, do not waste your time.</td><td><img src="https://img.shields.io/github/stars/Edu4rdSHL/findomain?label=%20"></td><td><a href="/categorize/tags/subdomains.md"><code>subdomains</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Rust.md"><img src="/images/rust.png" alt="Rust"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/s0md3v/Photon">Photon</a></td><td>Incredibly fast crawler designed for OSINT.</td><td><img src="https://img.shields.io/github/stars/s0md3v/Photon?label=%20"></td><td><a href="/categorize/tags/osint.md"><code>osint</code></a> <a href="/categorize/tags/crawl.md"><code>crawl</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/lc/subjs">subjs</a></td><td>Fetches javascript file from a list of URLS or subdomains.</td><td><img src="https://img.shields.io/github/stars/lc/subjs?label=%20"></td><td><a href="/categorize/tags/url.md"><code>url</code></a> <a href="/categorize/tags/subdomains.md"><code>subdomains</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/eslam3kl/3klCon">3klCon</a></td><td>Automation Recon tool which works with Large & Medium scopes. It performs more than 20 tasks and gets back all the results in separated files.</td><td><img src="https://img.shields.io/github/stars/eslam3kl/3klCon?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/OJ/gobuster">gobuster</a></td><td>Directory/File, DNS and VHost busting tool written in Go</td><td><img src="https://img.shields.io/github/stars/OJ/gobuster?label=%20"></td><td><a href="/categorize/tags/subdomains.md"><code>subdomains</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/Ice3man543/SubOver">SubOver</a></td><td>A Powerful Subdomain Takeover Tool</td><td><img src="https://img.shields.io/github/stars/Ice3man543/SubOver?label=%20"></td><td><a href="/categorize/tags/subdomains.md"><code>subdomains</code></a> <a href="/categorize/tags/takeover.md"><code>takeover</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/projectdiscovery/dnsx">dnsx</a></td><td>dnsx is a fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers.</td><td><img src="https://img.shields.io/github/stars/projectdiscovery/dnsx?label=%20"></td><td><a href="/categorize/tags/dns.md"><code>dns</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/bp0lr/dmut">dmut</a></td><td>A tool to perform permutations, mutations and alteration of subdomains in golang.</td><td><img src="https://img.shields.io/github/stars/bp0lr/dmut?label=%20"></td><td><a href="/categorize/tags/subdomains.md"><code>subdomains</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/haccer/subjack">subjack</a></td><td>Subdomain Takeover tool written in Go</td><td><img src="https://img.shields.io/github/stars/haccer/subjack?label=%20"></td><td><a href="/categorize/tags/subdomains.md"><code>subdomains</code></a> <a href="/categorize/tags/takeover.md"><code>takeover</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/dolevf/graphw00f">graphw00f</a></td><td>GraphQL Server Engine Fingerprinting utility</td><td><img src="https://img.shields.io/github/stars/dolevf/graphw00f?label=%20"></td><td><a href="/categorize/tags/graphql.md"><code>graphql</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/LukaSikic/subzy">subzy</a></td><td>Subdomain takeover vulnerability checker</td><td><img src="https://img.shields.io/github/stars/LukaSikic/subzy?label=%20"></td><td><a href="/categorize/tags/subdomains.md"><code>subdomains</code></a> <a href="/categorize/tags/takeover.md"><code>takeover</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/gfek/Lepus">Lepus</a></td><td>Subdomain finder</td><td><img src="https://img.shields.io/github/stars/gfek/Lepus?label=%20"></td><td><a href="/categorize/tags/subdomains.md"><code>subdomains</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/EdOverflow/megplus">megplus</a></td><td>Automated reconnaissance wrapper — TomNomNom’s meg on steroids. [DEPRECATED]</td><td><img src="https://img.shields.io/github/stars/EdOverflow/megplus?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Shell.md"><img src="/images/shell.png" alt="Shell"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/infosec-au/altdns">altdns</a></td><td>Generates permutations, alterations and mutations of subdomains and then resolves them</td><td><img src="https://img.shields.io/github/stars/infosec-au/altdns?label=%20"></td><td><a href="/categorize/tags/dns.md"><code>dns</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/projectdiscovery/shuffledns">shuffledns</a></td><td>shuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard handling and easy input-output support.</td><td><img src="https://img.shields.io/github/stars/projectdiscovery/shuffledns?label=%20"></td><td><a href="/categorize/tags/dns.md"><code>dns</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/tomnomnom/assetfinder">assetfinder</a></td><td>Find domains and subdomains related to a given domain</td><td><img src="https://img.shields.io/github/stars/tomnomnom/assetfinder?label=%20"></td><td><a href="/categorize/tags/subdomains.md"><code>subdomains</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/projectdiscovery/subfinder">subfinder</a></td><td>Subfinder is a subdomain discovery tool that discovers valid subdomains for websites. Designed as a passive framework to be useful for bug bounties and safe for penetration testing.</td><td><img src="https://img.shields.io/github/stars/projectdiscovery/subfinder?label=%20"></td><td><a href="/categorize/tags/subdomains.md"><code>subdomains</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/OWASP/Amass">Amass</a></td><td>In-depth Attack Surface Mapping and Asset Discovery</td><td><img src="https://img.shields.io/github/stars/OWASP/Amass?label=%20"></td><td><a href="/categorize/tags/subdomains.md"><code>subdomains</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/edoardottt/longtongue">longtongue</a></td><td>Customized Password/Passphrase List inputting Target Info</td><td><img src="https://img.shields.io/github/stars/edoardottt/longtongue?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/pry0cc/subgen">subgen</a></td><td>A really simple utility to concate wordlists to a domain name - to pipe into your favourite resolver!</td><td><img src="https://img.shields.io/github/stars/pry0cc/subgen?label=%20"></td><td><a href="/categorize/tags/subdomains.md"><code>subdomains</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/gwen001/github-subdomains">github-subdomains</a></td><td>Find subdomains on GitHub</td><td><img src="https://img.shields.io/github/stars/gwen001/github-subdomains?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/003random/getJS">getJS</a></td><td>A tool to fastly get all javascript sources/files</td><td><img src="https://img.shields.io/github/stars/003random/getJS?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/s0md3v/smap/">Smap</a></td><td>a drop-in replacement for Nmap powered by shodan.io</td><td><img src="https://img.shields.io/github/stars/s0md3v/smap/?label=%20"></td><td><a href="/categorize/tags/port.md"><code>port</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://www.shodan.io/">Shodan</a></td><td>World’s first search engine for Internet-connected devices</td><td></td><td><a href="/categorize/tags/osint.md"><code>osint</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"></td></tr><tr><td>Recon</td><td><a href="https://github.com/d3mondev/puredns">puredns</a></td><td>Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned entries.</td><td><img src="https://img.shields.io/github/stars/d3mondev/puredns?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/bp0lr/gauplus">gauplus</a></td><td>A modified version of gau for personal usage. Support workers, proxies and some extra things.</td><td><img src="https://img.shields.io/github/stars/bp0lr/gauplus?label=%20"></td><td><a href="/categorize/tags/url.md"><code>url</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/opsdisk/pagodo">pagodo</a></td><td>pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching</td><td><img src="https://img.shields.io/github/stars/opsdisk/pagodo?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/hakluke/hakrevdns">hakrevdns</a></td><td>Small, fast tool for performing reverse DNS lookups en masse.</td><td><img src="https://img.shields.io/github/stars/hakluke/hakrevdns?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/devanshbatham/ParamSpider">ParamSpider</a></td><td>Mining parameters from dark corners of Web Archives</td><td><img src="https://img.shields.io/github/stars/devanshbatham/ParamSpider?label=%20"></td><td><a href="/categorize/tags/param.md"><code>param</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/nahamsec/recon_profile">recon_profile</a></td><td>Recon profile (bash profile) for bugbounty</td><td><img src="https://img.shields.io/github/stars/nahamsec/recon_profile?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Shell.md"><img src="/images/shell.png" alt="Shell"></a></td></tr><tr><td>Fuzzer</td><td><a href="https://github.com/ksharinarayanan/SSRFire">SSRFire</a></td><td>An automated SSRF finder. Just give the domain name and your server and chill</td><td><img src="https://img.shields.io/github/stars/ksharinarayanan/SSRFire?label=%20"></td><td><a href="/categorize/tags/ssrf.md"><code>ssrf</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><a href="/categorize/langs/Shell.md"><img src="/images/shell.png" alt="Shell"></a></td></tr><tr><td>Fuzzer</td><td><a href="https://github.com/hashcat/hashcat/">hashcat</a></td><td>World’s fastest and most advanced password recovery utility</td><td><img src="https://img.shields.io/github/stars/hashcat/hashcat/?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/C.md"><img src="/images/c.png" alt="C"></a></td></tr><tr><td>Fuzzer</td><td><a href="https://github.com/1N3/BruteX">BruteX</a></td><td>Automatically brute force all services running on a target.</td><td><img src="https://img.shields.io/github/stars/1N3/BruteX?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Shell.md"><img src="/images/shell.png" alt="Shell"></a></td></tr><tr><td>Fuzzer</td><td><a href="https://github.com/nicholasaleks/CrackQL">CrackQL</a></td><td>CrackQL is a GraphQL password brute-force and fuzzing utility.</td><td><img src="https://img.shields.io/github/stars/nicholasaleks/CrackQL?label=%20"></td><td><a href="/categorize/tags/graphql.md"><code>graphql</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Fuzzer</td><td><a href="https://github.com/swisskyrepo/GraphQLmap">GraphQLmap</a></td><td>GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes.</td><td><img src="https://img.shields.io/github/stars/swisskyrepo/GraphQLmap?label=%20"></td><td><a href="/categorize/tags/graphql.md"><code>graphql</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Fuzzer</td><td><a href="https://github.com/assetnote/kiterunner">kiterunner</a></td><td>Contextual Content Discovery Tool</td><td><img src="https://img.shields.io/github/stars/assetnote/kiterunner?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Fuzzer</td><td><a href="https://github.com/brendan-rius/c-jwt-cracker">c-jwt-cracker</a></td><td>JWT brute force cracker written in C</td><td><img src="https://img.shields.io/github/stars/brendan-rius/c-jwt-cracker?label=%20"></td><td><a href="/categorize/tags/jwt.md"><code>jwt</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/C.md"><img src="/images/c.png" alt="C"></a></td></tr><tr><td>Fuzzer</td><td><a href="https://github.com/assetnote/batchql">BatchQL</a></td><td>GraphQL security auditing script with a focus on performing batch GraphQL queries and mutations</td><td><img src="https://img.shields.io/github/stars/assetnote/batchql?label=%20"></td><td><a href="/categorize/tags/graphql.md"><code>graphql</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Fuzzer</td><td><a href="https://github.com/xmendez/wfuzz">wfuzz</a></td><td>Web application fuzzer</td><td><img src="https://img.shields.io/github/stars/xmendez/wfuzz?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Fuzzer</td><td><a href="https://github.com/Bo0oM/ParamPamPam">ParamPamPam</a></td><td>This tool for brute discover GET and POST parameters.</td><td><img src="https://img.shields.io/github/stars/Bo0oM/ParamPamPam?label=%20"></td><td><a href="/categorize/tags/param.md"><code>param</code></a> <a href="/categorize/tags/cache-vuln.md"><code>cache-vuln</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Fuzzer</td><td><a href="https://github.com/dwisiswant0/crlfuzz">crlfuzz</a></td><td>A fast tool to scan CRLF vulnerability written in Go</td><td><img src="https://img.shields.io/github/stars/dwisiswant0/crlfuzz?label=%20"></td><td><a href="/categorize/tags/crlf.md"><code>crlf</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Shell.md"><img src="/images/shell.png" alt="Shell"></a></td></tr><tr><td>Fuzzer</td><td><a href="https://github.com/hahwul/jwt-hack">jwt-hack</a></td><td>🔩 jwt-hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and very fast cracking(dict/brutefoce)</td><td><img src="https://img.shields.io/github/stars/hahwul/jwt-hack?label=%20"></td><td><a href="/categorize/tags/jwt.md"><code>jwt</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Fuzzer</td><td><a href="https://github.com/riza/medusa">medusa</a></td><td>Fastest recursive HTTP fuzzer, like a Ferrari.</td><td><img src="https://img.shields.io/github/stars/riza/medusa?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Fuzzer</td><td><a href="https://github.com/dwisiswant0/ppfuzz">ppfuzz</a></td><td>A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀</td><td><img src="https://img.shields.io/github/stars/dwisiswant0/ppfuzz?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Rust.md"><img src="/images/rust.png" alt="Rust"></a></td></tr><tr><td>Fuzzer</td><td><a href="https://github.com/ffuf/ffuf">ffuf</a></td><td>Fast web fuzzer written in Go</td><td><img src="https://img.shields.io/github/stars/ffuf/ffuf?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Fuzzer</td><td><a href="https://github.com/swisskyrepo/SSRFmap">SSRFmap</a></td><td>Automatic SSRF fuzzer and exploitation tool</td><td><img src="https://img.shields.io/github/stars/swisskyrepo/SSRFmap?label=%20"></td><td><a href="/categorize/tags/ssrf.md"><code>ssrf</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Fuzzer</td><td><a href="https://github.com/0xsapra/fuzzparam">fuzzparam</a></td><td>A fast go based param miner to fuzz possible parameters a URL can have.</td><td><img src="https://img.shields.io/github/stars/0xsapra/fuzzparam?label=%20"></td><td><a href="/categorize/tags/param.md"><code>param</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Fuzzer</td><td><a href="https://github.com/wireghoul/dotdotpwn">dotdotpwn</a></td><td>DotDotPwn - The Directory Traversal Fuzzer</td><td><img src="https://img.shields.io/github/stars/wireghoul/dotdotpwn?label=%20"></td><td><a href="/categorize/tags/path-traversal.md"><code>path-traversal</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Perl.md"><img src="/images/perl.png" alt="Perl"></a></td></tr><tr><td>Fuzzer</td><td><a href="https://github.com/vanhauser-thc/thc-hydra">thc-hydra</a></td><td>hydra</td><td><img src="https://img.shields.io/github/stars/vanhauser-thc/thc-hydra?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/C.md"><img src="/images/c.png" alt="C"></a></td></tr><tr><td>Fuzzer</td><td><a href="https://github.com/lmammino/jwt-cracker">jwt-cracker</a></td><td>Simple HS256 JWT token brute force cracker</td><td><img src="https://img.shields.io/github/stars/lmammino/jwt-cracker?label=%20"></td><td><a href="/categorize/tags/jwt.md"><code>jwt</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/JavaScript.md"><img src="/images/javascript.png" alt="JavaScript"></a></td></tr><tr><td>Fuzzer</td><td><a href="https://github.com/epi052/feroxbuster">feroxbuster</a></td><td>A fast, simple, recursive content discovery tool written in Rust.</td><td><img src="https://img.shields.io/github/stars/epi052/feroxbuster?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Rust.md"><img src="/images/rust.png" alt="Rust"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/tismayil/fockcache">FockCache</a></td><td>Minimalized Test Cache Poisoning</td><td><img src="https://img.shields.io/github/stars/tismayil/fockcache?label=%20"></td><td><a href="/categorize/tags/cache-vuln.md"><code>cache-vuln</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/visma-prodsec/confused">confused</a></td><td>Tool to check for dependency confusion vulnerabilities in multiple package management systems</td><td><img src="https://img.shields.io/github/stars/visma-prodsec/confused?label=%20"></td><td><a href="/categorize/tags/dependency-confusion.md"><code>dependency-confusion</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/tomnomnom/httprobe">httprobe</a></td><td>Take a list of domains and probe for working HTTP and HTTPS servers</td><td><img src="https://img.shields.io/github/stars/tomnomnom/httprobe?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/fngoo/web_cache_poison">web_cache_poison</a></td><td>web cache poison - Top 1 web hacking technique of 2019</td><td><img src="https://img.shields.io/github/stars/fngoo/web_cache_poison?label=%20"></td><td><a href="/categorize/tags/cache-vuln.md"><code>cache-vuln</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Shell.md"><img src="/images/shell.png" alt="Shell"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/skavngr/rapidscan">rapidscan</a></td><td>The Multi-Tool Web Vulnerability Scanner.</td><td><img src="https://img.shields.io/github/stars/skavngr/rapidscan?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/Th0h0/autopoisoner">autopoisoner</a></td><td>Web cache poisoning vulnerability scanner.</td><td><img src="https://img.shields.io/github/stars/Th0h0/autopoisoner?label=%20"></td><td><a href="/categorize/tags/cache-vuln.md"><code>cache-vuln</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/sa7mon/S3Scanner">S3Scanner</a></td><td>Scan for open AWS S3 buckets and dump the contents</td><td><img src="https://img.shields.io/github/stars/sa7mon/S3Scanner?label=%20"></td><td><a href="/categorize/tags/s3.md"><code>s3</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/butuzov/deadlinks">deadlinks</a></td><td>Health checks for your documentation links.</td><td><img src="https://img.shields.io/github/stars/butuzov/deadlinks?label=%20"></td><td><a href="/categorize/tags/broken-link.md"><code>broken-link</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/Eilonh/s3crets_scanner">S3cret Scanner</a></td><td>Hunting For Secrets Uploaded To Public S3 Buckets</td><td><img src="https://img.shields.io/github/stars/Eilonh/s3crets_scanner?label=%20"></td><td><a href="/categorize/tags/s3.md"><code>s3</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/RUB-NDS/xsinator.com">xsinator.com</a></td><td>XS-Leak Browser Test Suite</td><td><img src="https://img.shields.io/github/stars/RUB-NDS/xsinator.com?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/JavaScript.md"><img src="/images/javascript.png" alt="JavaScript"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/teknogeek/ssrf-sheriff">ssrf-sheriff</a></td><td>A simple SSRF-testing sheriff written in Go</td><td><img src="https://img.shields.io/github/stars/teknogeek/ssrf-sheriff?label=%20"></td><td><a href="/categorize/tags/ssrf.md"><code>ssrf</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/s0md3v/XSStrike">XSStrike</a></td><td>Most advanced XSS scanner.</td><td><img src="https://img.shields.io/github/stars/s0md3v/XSStrike?label=%20"></td><td><a href="/categorize/tags/xss.md"><code>xss</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/kleiton0x00/ppmap">ppmap</a></td><td>A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.</td><td><img src="https://img.shields.io/github/stars/kleiton0x00/ppmap?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/epinna/tplmap">tplmap</a></td><td>Server-Side Template Injection and Code Injection Detection and Exploitation Tool</td><td><img src="https://img.shields.io/github/stars/epinna/tplmap?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/r0075h3ll/Oralyzer">Oralyzer</a></td><td>Open Redirection Analyzer</td><td><img src="https://img.shields.io/github/stars/r0075h3ll/Oralyzer?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/hahwul/ws-smuggler">ws-smuggler</a></td><td>WebSocket Connection Smuggler</td><td><img src="https://img.shields.io/github/stars/hahwul/ws-smuggler?label=%20"></td><td><a href="/categorize/tags/smuggle.md"><code>smuggle</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/devploit/dontgo403">dontgo403</a></td><td>Tool to bypass 40X response codes.</td><td><img src="https://img.shields.io/github/stars/devploit/dontgo403?label=%20"></td><td><a href="/categorize/tags/403.md"><code>403</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/DanMcInerney/xsscrapy">xsscrapy</a></td><td>XSS/SQLi spider. Give it a URL and it’ll test every link it finds for XSS and some SQLi.</td><td><img src="https://img.shields.io/github/stars/DanMcInerney/xsscrapy?label=%20"></td><td><a href="/categorize/tags/xss.md"><code>xss</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/Arachni/arachni">arachni</a></td><td>Web Application Security Scanner Framework</td><td><img src="https://img.shields.io/github/stars/Arachni/arachni?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Ruby.md"><img src="/images/ruby.png" alt="Ruby"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/devanshbatham/OpenRedireX">OpenRedireX</a></td><td>A Fuzzer for OpenRedirect issues</td><td><img src="https://img.shields.io/github/stars/devanshbatham/OpenRedireX?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/cure53/DOMPurify">DOMPurify</a></td><td>DOMPurify - a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMPurify works with a secure default, but offers a lot of configurability and hooks. Demo:</td><td><img src="https://img.shields.io/github/stars/cure53/DOMPurify?label=%20"></td><td><a href="/categorize/tags/xss.md"><code>xss</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/JavaScript.md"><img src="/images/javascript.png" alt="JavaScript"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/drwetter/testssl.sh">testssl.sh</a></td><td>Testing TLS/SSL encryption anywhere on any port</td><td><img src="https://img.shields.io/github/stars/drwetter/testssl.sh?label=%20"></td><td><a href="/categorize/tags/ssl.md"><code>ssl</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Shell.md"><img src="/images/shell.png" alt="Shell"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/M4DM0e/DirDar">DirDar</a></td><td>DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it</td><td><img src="https://img.shields.io/github/stars/M4DM0e/DirDar?label=%20"></td><td><a href="/categorize/tags/403.md"><code>403</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/anshumanpattnaik/http-request-smuggling">http-request-smuggling</a></td><td>HTTP Request Smuggling Detection Tool</td><td><img src="https://img.shields.io/github/stars/anshumanpattnaik/http-request-smuggling?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/gwen001/github-search">github-search</a></td><td>Tools to perform basic search on GitHub.</td><td><img src="https://img.shields.io/github/stars/gwen001/github-search?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/JavaScript.md"><img src="/images/javascript.png" alt="JavaScript"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/hahwul/dalfox">dalfox</a></td><td>🌘🦊 Dalfox is a powerful open-source XSS scanner and utility focused on automation.</td><td><img src="https://img.shields.io/github/stars/hahwul/dalfox?label=%20"></td><td><a href="/categorize/tags/xss.md"><code>xss</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/dpnishant/jsprime">jsprime</a></td><td>a javascript static security analysis tool</td><td><img src="https://img.shields.io/github/stars/dpnishant/jsprime?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/JavaScript.md"><img src="/images/javascript.png" alt="JavaScript"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/sqlmapproject/sqlmap">sqlmap</a></td><td>Automatic SQL injection and database takeover tool</td><td><img src="https://img.shields.io/github/stars/sqlmapproject/sqlmap?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/Charlie-belmer/nosqli">nosqli</a></td><td>NoSql Injection CLI tool</td><td><img src="https://img.shields.io/github/stars/Charlie-belmer/nosqli?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/SafeBreach-Labs/HRS">HRS</a></td><td>HTTP Request Smuggling demonstration Perl script, for variants 1, 2 and 5 in my BlackHat US 2020 paper HTTP Request Smuggling in 2020.</td><td><img src="https://img.shields.io/github/stars/SafeBreach-Labs/HRS?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Perl.md"><img src="/images/perl.png" alt="Perl"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/D35m0nd142/LFISuite">LFISuite</a></td><td>Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner</td><td><img src="https://img.shields.io/github/stars/D35m0nd142/LFISuite?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/hahwul/a2sv">a2sv</a></td><td>Auto Scanning to SSL Vulnerability</td><td><img src="https://img.shields.io/github/stars/hahwul/a2sv?label=%20"></td><td><a href="/categorize/tags/ssl.md"><code>ssl</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/wpscanteam/wpscan">wpscan</a></td><td>WPScan is a free, for non-commercial use, black box WordPress Vulnerability Scanner written for security professionals and blog maintainers to test the security of their WordPress websites.</td><td><img src="https://img.shields.io/github/stars/wpscanteam/wpscan?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Ruby.md"><img src="/images/ruby.png" alt="Ruby"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/blackcrw/wprecon">wprecon</a></td><td>Hello! Welcome. Wprecon (Wordpress Recon), is a vulnerability recognition tool in CMS Wordpress, 100% developed in Go.</td><td><img src="https://img.shields.io/github/stars/blackcrw/wprecon?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/codingo/NoSQLMap">NoSQLMap</a></td><td>Automated NoSQL database enumeration and web application exploitation tool.</td><td><img src="https://img.shields.io/github/stars/codingo/NoSQLMap?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/epsylon/xsser">xsser</a></td><td>Cross Site “Scripter” (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications.</td><td><img src="https://img.shields.io/github/stars/epsylon/xsser?label=%20"></td><td><a href="/categorize/tags/xss.md"><code>xss</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/jordanpotti/AWSBucketDump">AWSBucketDump</a></td><td>Security Tool to Look For Interesting Files in S3 Buckets</td><td><img src="https://img.shields.io/github/stars/jordanpotti/AWSBucketDump?label=%20"></td><td><a href="/categorize/tags/s3.md"><code>s3</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/neex/http2smugl">http2smugl</a></td><td>This tool helps to detect and exploit HTTP request smuggling in cases it can be achieved via HTTP/2 -> HTTP/1.1 conversion by the frontend server.</td><td><img src="https://img.shields.io/github/stars/neex/http2smugl?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/stamparm/DSSS">DSSS</a></td><td>Damn Small SQLi Scanner</td><td><img src="https://img.shields.io/github/stars/stamparm/DSSS?label=%20"></td><td><a href="/categorize/tags/sqli.md"><code>sqli</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/hahwul/XSpear">XSpear</a></td><td>Powerfull XSS Scanning and Parameter analysis tool&gem</td><td><img src="https://img.shields.io/github/stars/hahwul/XSpear?label=%20"></td><td><a href="/categorize/tags/xss.md"><code>xss</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Ruby.md"><img src="/images/ruby.png" alt="Ruby"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/zricethezav/gitleaks">gitleaks</a></td><td>Scan git repos (or files) for secrets using regex and entropy 🔑</td><td><img src="https://img.shields.io/github/stars/zricethezav/gitleaks?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/mlcsec/headi">headi</a></td><td>Customisable and automated HTTP header injection</td><td><img src="https://img.shields.io/github/stars/mlcsec/headi?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/v8blink/Chromium-based-XSS-Taint-Tracking">Chromium-based-XSS-Taint-Tracking</a></td><td>Cyclops is a web browser with XSS detection feature, it is chromium-based xss detection that used to find the flows from a source to a sink.</td><td><img src="https://img.shields.io/github/stars/v8blink/Chromium-based-XSS-Taint-Tracking?label=%20"></td><td><a href="/categorize/tags/xss.md"><code>xss</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"></td></tr><tr><td>Scanner</td><td><a href="https://github.com/Grunny/zap-cli">zap-cli</a></td><td>A simple tool for interacting with OWASP ZAP from the commandline.</td><td><img src="https://img.shields.io/github/stars/Grunny/zap-cli?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/zap.png" alt="zap"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/dwisiswant0/hinject">hinject</a></td><td>Host Header Injection Checker</td><td><img src="https://img.shields.io/github/stars/dwisiswant0/hinject?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/Shivangx01b/CorsMe">CorsMe</a></td><td>Cross Origin Resource Sharing MisConfiguration Scanner</td><td><img src="https://img.shields.io/github/stars/Shivangx01b/CorsMe?label=%20"></td><td><a href="/categorize/tags/cors.md"><code>cors</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/the-robot/sqliv">sqliv</a></td><td>massive SQL injection vulnerability scanner</td><td><img src="https://img.shields.io/github/stars/the-robot/sqliv?label=%20"></td><td><a href="/categorize/tags/sqli.md"><code>sqli</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner">Web-Cache-Vulnerability-Scanner</a></td><td>Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (<a href="http://hackmanit.de/">http://hackmanit.de/</a>).</td><td><img src="https://img.shields.io/github/stars/Hackmanit/Web-Cache-Vulnerability-Scanner?label=%20"></td><td><a href="/categorize/tags/cache-vuln.md"><code>cache-vuln</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/hisxo/gitGraber">gitGraber</a></td><td>gitGraber</td><td><img src="https://img.shields.io/github/stars/hisxo/gitGraber?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/Santandersecurityresearch/corsair_scan">corsair_scan</a></td><td>Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).</td><td><img src="https://img.shields.io/github/stars/Santandersecurityresearch/corsair_scan?label=%20"></td><td><a href="/categorize/tags/cors.md"><code>cors</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/assetnote/h2csmuggler">h2csmuggler</a></td><td>HTTP Request Smuggling Detection Tool</td><td><img src="https://img.shields.io/github/stars/assetnote/h2csmuggler?label=%20"></td><td><a href="/categorize/tags/smuggle.md"><code>smuggle</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/evilsocket/ditto">ditto</a></td><td>A tool for IDN homograph attacks and detection.</td><td><img src="https://img.shields.io/github/stars/evilsocket/ditto?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/enkomio/Taipan">Taipan</a></td><td>Web application vulnerability scanner</td><td><img src="https://img.shields.io/github/stars/enkomio/Taipan?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"></td></tr><tr><td>Scanner</td><td><a href="https://github.com/raverrr/plution">plution</a></td><td>Prototype pollution scanner using headless chrome</td><td><img src="https://img.shields.io/github/stars/raverrr/plution?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/projectdiscovery/nuclei">nuclei</a></td><td>Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use.</td><td><img src="https://img.shields.io/github/stars/projectdiscovery/nuclei?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/defparam/smuggler">smuggler</a></td><td>Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3</td><td><img src="https://img.shields.io/github/stars/defparam/smuggler?label=%20"></td><td><a href="/categorize/tags/smuggle.md"><code>smuggle</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/codingo/VHostScan">VHostScan</a></td><td>A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.</td><td><img src="https://img.shields.io/github/stars/codingo/VHostScan?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/hahwul/deadfinder">DeadFinder</a></td><td>Find dead-links (broken links)</td><td><img src="https://img.shields.io/github/stars/hahwul/deadfinder?label=%20"></td><td><a href="/categorize/tags/broken-link.md"><code>broken-link</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Ruby.md"><img src="/images/ruby.png" alt="Ruby"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/nmap/nmap">nmap</a></td><td>Nmap - the Network Mapper. Github mirror of official SVN repository.</td><td><img src="https://img.shields.io/github/stars/nmap/nmap?label=%20"></td><td><a href="/categorize/tags/portscan.md"><code>portscan</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/C.md"><img src="/images/c.png" alt="C"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/hahwul/websocket-connection-smuggler">websocket-connection-smuggler</a></td><td>websocket-connection-smuggler</td><td><img src="https://img.shields.io/github/stars/hahwul/websocket-connection-smuggler?label=%20"></td><td><a href="/categorize/tags/smuggle.md"><code>smuggle</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/msrkp/PPScan">PPScan</a></td><td>Client Side Prototype Pollution Scanner</td><td><img src="https://img.shields.io/github/stars/msrkp/PPScan?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/JavaScript.md"><img src="/images/javascript.png" alt="JavaScript"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/commixproject/commix">commix</a></td><td>Automated All-in-One OS Command Injection Exploitation Tool.</td><td><img src="https://img.shields.io/github/stars/commixproject/commix?label=%20"></td><td><a href="/categorize/tags/exploit.md"><code>exploit</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/s0md3v/Striker">Striker</a></td><td>Striker is an offensive information and vulnerability scanner.</td><td><img src="https://img.shields.io/github/stars/s0md3v/Striker?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/dwisiswant0/findom-xss">findom-xss</a></td><td>A fast DOM based XSS vulnerability scanner with simplicity.</td><td><img src="https://img.shields.io/github/stars/dwisiswant0/findom-xss?label=%20"></td><td><a href="/categorize/tags/xss.md"><code>xss</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Shell.md"><img src="/images/shell.png" alt="Shell"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/sullo/nikto">nikto</a></td><td>Nikto web server scanner</td><td><img src="https://img.shields.io/github/stars/sullo/nikto?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Perl.md"><img src="/images/perl.png" alt="Perl"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/spoofzu/DeepViolet">DeepViolet</a></td><td>Tool for introspection of SSL\TLS sessions</td><td><img src="https://img.shields.io/github/stars/spoofzu/DeepViolet?label=%20"></td><td><a href="/categorize/tags/ssl.md"><code>ssl</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Java.md"><img src="/images/java.png" alt="Java"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/s0md3v/Corsy">Corsy</a></td><td>CORS Misconfiguration Scanner</td><td><img src="https://img.shields.io/github/stars/s0md3v/Corsy?label=%20"></td><td><a href="/categorize/tags/cors.md"><code>cors</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/fcavallarin/domdig">domdig</a></td><td>DOM XSS scanner for Single Page Applications</td><td><img src="https://img.shields.io/github/stars/fcavallarin/domdig?label=%20"></td><td><a href="/categorize/tags/xss.md"><code>xss</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/JavaScript.md"><img src="/images/javascript.png" alt="JavaScript"></a></td></tr><tr><td>Exploit</td><td><a href="https://github.com/beefproject/beef">beef</a></td><td>The Browser Exploitation Framework Project</td><td><img src="https://img.shields.io/github/stars/beefproject/beef?label=%20"></td><td><a href="/categorize/tags/xss.md"><code>xss</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Ruby.md"><img src="/images/ruby.png" alt="Ruby"></a></td></tr><tr><td>Exploit</td><td><a href="https://github.com/tarunkant/Gopherus">Gopherus</a></td><td>This tool generates gopher link for exploiting SSRF and gaining RCE in various servers</td><td><img src="https://img.shields.io/github/stars/tarunkant/Gopherus?label=%20"></td><td><a href="/categorize/tags/ssrf.md"><code>ssrf</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Exploit</td><td><a href="https://github.com/1N3/Sn1per">Sn1per</a></td><td>Automated pentest framework for offensive security experts</td><td><img src="https://img.shields.io/github/stars/1N3/Sn1per?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Shell.md"><img src="/images/shell.png" alt="Shell"></a></td></tr><tr><td>Exploit</td><td><a href="https://github.com/t3l3machus/toxssin">toxssin</a></td><td>An XSS exploitation command-line interface and payload generator.</td><td><img src="https://img.shields.io/github/stars/t3l3machus/toxssin?label=%20"></td><td><a href="/categorize/tags/xss.md"><code>xss</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Exploit</td><td><a href="https://github.com/staaldraad/xxeserv">xxeserv</a></td><td>A mini webserver with FTP support for XXE payloads</td><td><img src="https://img.shields.io/github/stars/staaldraad/xxeserv?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Exploit</td><td><a href="https://github.com/nccgroup/singularity">singularity</a></td><td>A DNS rebinding attack framework.</td><td><img src="https://img.shields.io/github/stars/nccgroup/singularity?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/JavaScript.md"><img src="/images/javascript.png" alt="JavaScript"></a></td></tr><tr><td>Exploit</td><td><a href="https://github.com/r0oth3x49/ghauri">ghauri</a></td><td>An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws</td><td><img src="https://img.shields.io/github/stars/r0oth3x49/ghauri?label=%20"></td><td><a href="/categorize/tags/sqli.md"><code>sqli</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Exploit</td><td><a href="https://github.com/mzfr/liffy">Liffy</a></td><td>Local file inclusion exploitation tool</td><td><img src="https://img.shields.io/github/stars/mzfr/liffy?label=%20"></td><td><a href="/categorize/tags/lfi.md"><code>lfi</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Exploit</td><td><a href="https://github.com/trufflesecurity/of-CORS">of-CORS</a></td><td>Identifying and exploiting CORS misconfigurations on the internal networks</td><td><img src="https://img.shields.io/github/stars/trufflesecurity/of-CORS?label=%20"></td><td><a href="/categorize/tags/cors.md"><code>cors</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Exploit</td><td><a href="https://gitlab.com/kalilinux/packages/sqlninja">SQLNinja</a></td><td>Sqlninja is a tool targeted to exploit SQL Injection vulnerabilities.</td><td></td><td><a href="/categorize/tags/sqli.md"><code>sqli</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><a href="/categorize/langs/Perl.md"><img src="/images/perl.png" alt="Perl"></a></td></tr><tr><td>Exploit</td><td><a href="https://github.com/luisfontes19/xxexploiter">XXExploiter</a></td><td>Tool to help exploit XXE vulnerabilities</td><td><img src="https://img.shields.io/github/stars/luisfontes19/xxexploiter?label=%20"></td><td><a href="/categorize/tags/xxe.md"><code>xxe</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/TypeScript.md"><img src="/images/typescript.png" alt="TypeScript"></a></td></tr><tr><td>Exploit</td><td><a href="https://github.com/Ben-Lichtman/ropr">ropr</a></td><td>A blazing fast™ multithreaded ROP Gadget finder. ropper</td><td><img src="https://img.shields.io/github/stars/Ben-Lichtman/ropr?label=%20"></td><td><a href="/categorize/tags/rop.md"><code>rop</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Rust.md"><img src="/images/rust.png" alt="Rust"></a></td></tr><tr><td>Exploit</td><td><a href="https://github.com/NickstaDB/BaRMIe">BaRMIe</a></td><td>Java RMI enumeration and attack tool.</td><td><img src="https://img.shields.io/github/stars/NickstaDB/BaRMIe?label=%20"></td><td><a href="/categorize/tags/RMI.md"><code>RMI</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Java.md"><img src="/images/java.png" alt="Java"></a></td></tr><tr><td>Exploit</td><td><a href="https://github.com/0xInfection/XSRFProbe">XSRFProbe</a></td><td>The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.</td><td><img src="https://img.shields.io/github/stars/0xInfection/XSRFProbe?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Exploit</td><td><a href="https://github.com/enjoiz/XXEinjector">XXEinjector</a></td><td>Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.</td><td><img src="https://img.shields.io/github/stars/enjoiz/XXEinjector?label=%20"></td><td><a href="/categorize/tags/xxe.md"><code>xxe</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Ruby.md"><img src="/images/ruby.png" alt="Ruby"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/ArturSS7/TukTuk">TukTuk</a></td><td>Tool for catching and logging different types of requests.</td><td><img src="https://img.shields.io/github/stars/ArturSS7/TukTuk?label=%20"></td><td><a href="/categorize/tags/oast.md"><code>oast</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/daxAKAhackerman/XSS-Catcher">XSS-Catcher</a></td><td>Find blind XSS but why not gather data while you’re at it.</td><td><img src="https://img.shields.io/github/stars/daxAKAhackerman/XSS-Catcher?label=%20"></td><td><a href="/categorize/tags/xss.md"><code>xss</code></a> <a href="/categorize/tags/blind-xss.md"><code>blind-xss</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/curl/curl">curl</a></td><td>A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, MQTT, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features</td><td><img src="https://img.shields.io/github/stars/curl/curl?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/C.md"><img src="/images/c.png" alt="C"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/knqyf263/pet">pet</a></td><td>Simple command-line snippet manager, written in Go.</td><td><img src="https://img.shields.io/github/stars/knqyf263/pet?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/xm1k3/cent">cent</a></td><td>Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one place.</td><td><img src="https://img.shields.io/github/stars/xm1k3/cent?label=%20"></td><td><a href="/categorize/tags/nuclei-templates.md"><code>nuclei-templates</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/allyomalley/dnsobserver">dnsobserver</a></td><td>A handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities. It monitors a pentester’s server for out-of-band DNS interactions and sends lookup notifications via Slack.</td><td><img src="https://img.shields.io/github/stars/allyomalley/dnsobserver?label=%20"></td><td><a href="/categorize/tags/oast.md"><code>oast</code></a> <a href="/categorize/tags/dns.md"><code>dns</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/gchq/CyberChef">CyberChef</a></td><td>The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis</td><td><img src="https://img.shields.io/github/stars/gchq/CyberChef?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/JavaScript.md"><img src="/images/javascript.png" alt="JavaScript"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/wallarm/gotestwaf">gotestwaf</a></td><td>An open-source project in Golang to test different web application firewalls (WAF) for detection logic and bypasses</td><td><img src="https://img.shields.io/github/stars/wallarm/gotestwaf?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/tomnomnom/gf">gf</a></td><td>A wrapper around grep, to help you grep for things</td><td><img src="https://img.shields.io/github/stars/tomnomnom/gf?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/swisskyrepo/PayloadsAllTheThings">PayloadsAllTheThings</a></td><td>A list of useful payloads and bypass for Web Application Security and Pentest/CTF</td><td><img src="https://img.shields.io/github/stars/swisskyrepo/PayloadsAllTheThings?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/1N3/IntruderPayloads">IntruderPayloads</a></td><td></td><td><img src="https://img.shields.io/github/stars/1N3/IntruderPayloads?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/BlitzBasic.md"><img src="/images/blitzbasic.png" alt="BlitzBasic"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/0xacb/recollapse">REcollapse</a></td><td>REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications</td><td><img src="https://img.shields.io/github/stars/0xacb/recollapse?label=%20"></td><td><a href="/categorize/tags/fuzz.md"><code>fuzz</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/PortSwigger/xss-cheatsheet-data">xss-cheatsheet-data</a></td><td>This repository contains all the XSS cheatsheet data to allow contributions from the community.</td><td><img src="https://img.shields.io/github/stars/PortSwigger/xss-cheatsheet-data?label=%20"></td><td><a href="/categorize/tags/xss.md"><code>xss</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"></td></tr><tr><td>Utils</td><td><a href="https://github.com/1N3/Findsploit">Findsploit</a></td><td>Find exploits in local and online databases instantly</td><td><img src="https://img.shields.io/github/stars/1N3/Findsploit?label=%20"></td><td><a href="/categorize/tags/exploit.md"><code>exploit</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Shell.md"><img src="/images/shell.png" alt="Shell"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/abdulfatir/ZipBomb">ZipBomb</a></td><td>A simple implementation of ZipBomb in Python</td><td><img src="https://img.shields.io/github/stars/abdulfatir/ZipBomb?label=%20"></td><td><a href="/categorize/tags/zipbomb.md"><code>zipbomb</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/tomnomnom/gron">gron</a></td><td>Make JSON greppable!</td><td><img src="https://img.shields.io/github/stars/tomnomnom/gron?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/fyxme/blistener">blistener</a></td><td>Blind-XSS listener with payloads</td><td><img src="https://img.shields.io/github/stars/fyxme/blistener?label=%20"></td><td><a href="/categorize/tags/xss.md"><code>xss</code></a> <a href="/categorize/tags/blind-xss.md"><code>blind-xss</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Utils</td><td><a href="https://www.hahwul.com/phoenix/">Phoenix</a></td><td>hahwul’s online tools</td><td></td><td><a href="/categorize/tags/online.md"><code>online</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/JavaScript.md"><img src="/images/javascript.png" alt="JavaScript"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/whitel1st/docem">docem</a></td><td>Uility to embed XXE and XSS payloads in docx,odt,pptx,etc (OXML_XEE on steroids)</td><td><img src="https://img.shields.io/github/stars/whitel1st/docem?label=%20"></td><td><a href="/categorize/tags/xxe.md"><code>xxe</code></a> <a href="/categorize/tags/xss.md"><code>xss</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/assetnote/wordlists">Assetnote Wordlists</a></td><td>Automated & Manual Wordlists provided by Assetnote</td><td><img src="https://img.shields.io/github/stars/assetnote/wordlists?label=%20"></td><td><a href="/categorize/tags/wordlist.md"><code>wordlist</code></a> <a href="/categorize/tags/documents.md"><code>documents</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/CSS.md"><img src="/images/css.png" alt="CSS"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/projectdiscovery/nuclei-templates">nuclei-templates</a></td><td>Community curated list of templates for the nuclei engine to find security vulnerabilities.</td><td><img src="https://img.shields.io/github/stars/projectdiscovery/nuclei-templates?label=%20"></td><td><a href="/categorize/tags/nuclei-templates.md"><code>nuclei-templates</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/Josue87/gotator">gotator</a></td><td>Gotator is a tool to generate DNS wordlists through permutations.</td><td><img src="https://img.shields.io/github/stars/Josue87/gotator?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/hahwul/s3reverse">s3reverse</a></td><td>The format of various s3 buckets is convert in one format. for bugbounty and security testing.</td><td><img src="https://img.shields.io/github/stars/hahwul/s3reverse?label=%20"></td><td><a href="/categorize/tags/s3.md"><code>s3</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/cytopia/pwncat">pwncat</a></td><td>pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE)</td><td><img src="https://img.shields.io/github/stars/cytopia/pwncat?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Shell.md"><img src="/images/shell.png" alt="Shell"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/fransr/bountyplz">bountyplz</a></td><td>Automated security reporting from markdown templates (HackerOne and Bugcrowd are currently the platforms supported)</td><td><img src="https://img.shields.io/github/stars/fransr/bountyplz?label=%20"></td><td><a href="/categorize/tags/report.md"><code>report</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Shell.md"><img src="/images/shell.png" alt="Shell"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/0dayCTF/reverse-shell-generator">reverse-shell-generator</a></td><td>Hosted Reverse Shell generator with a ton of functionality. – (Great for CTFs)</td><td><img src="https://img.shields.io/github/stars/0dayCTF/reverse-shell-generator?label=%20"></td><td><a href="/categorize/tags/payload.md"><code>payload</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/JavaScript.md"><img src="/images/javascript.png" alt="JavaScript"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/BountyStrike/Emissary">Emissary</a></td><td>Send notifications on different channels such as Slack, Telegram, Discord etc.</td><td><img src="https://img.shields.io/github/stars/BountyStrike/Emissary?label=%20"></td><td><a href="/categorize/tags/notify.md"><code>notify</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/httptoolkit/httptoolkit">httptoolkit</a></td><td>HTTP Toolkit is a beautiful & open-source tool for debugging, testing and building with HTTP(S) on Windows, Linux & Mac</td><td><img src="https://img.shields.io/github/stars/httptoolkit/httptoolkit?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"></td></tr><tr><td>Utils</td><td><a href="https://github.com/lc/230-OOB">230-OOB</a></td><td>An Out-of-Band XXE server for retrieving file contents over FTP.</td><td><img src="https://img.shields.io/github/stars/lc/230-OOB?label=%20"></td><td><a href="/categorize/tags/xxe.md"><code>xxe</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/kitabisa/mubeng">mubeng</a></td><td>An incredibly fast proxy checker & IP rotator with ease.</td><td><img src="https://img.shields.io/github/stars/kitabisa/mubeng?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/BishopFox/GadgetProbe">GadgetProbe</a></td><td>Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.</td><td><img src="https://img.shields.io/github/stars/BishopFox/GadgetProbe?label=%20"></td><td><a href="/categorize/tags/deserialize.md"><code>deserialize</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Java.md"><img src="/images/java.png" alt="Java"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/dwisiswant0/cf-check">cf-check</a></td><td>Cloudflare Checker written in Go</td><td><img src="https://img.shields.io/github/stars/dwisiswant0/cf-check?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/mazen160/xless">xless</a></td><td>The Serverless Blind XSS App</td><td><img src="https://img.shields.io/github/stars/mazen160/xless?label=%20"></td><td><a href="/categorize/tags/xss.md"><code>xss</code></a> <a href="/categorize/tags/blind-xss.md"><code>blind-xss</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/JavaScript.md"><img src="/images/javascript.png" alt="JavaScript"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/fransr/template-generator">template-generator</a></td><td>A simple variable based template editor using handlebarjs+strapdownjs. The idea is to use variables in markdown based files to easily replace the variables with content. Data is saved temporarily in local storage. PHP is only needed to generate the list of files in the dropdown of templates.</td><td><img src="https://img.shields.io/github/stars/fransr/template-generator?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/JavaScript.md"><img src="/images/javascript.png" alt="JavaScript"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/tomnomnom/burl">burl</a></td><td>A Broken-URL Checker</td><td><img src="https://img.shields.io/github/stars/tomnomnom/burl?label=%20"></td><td><a href="/categorize/tags/url.md"><code>url</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/tomnomnom/hacks">hacks</a></td><td>A collection of hacks and one-off scripts</td><td><img src="https://img.shields.io/github/stars/tomnomnom/hacks?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/gwen001/github-regexp">github-regexp</a></td><td>Basically a regexp over a GitHub search.</td><td><img src="https://img.shields.io/github/stars/gwen001/github-regexp?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/asciimoo/wuzz">wuzz</a></td><td>Interactive cli tool for HTTP inspection</td><td><img src="https://img.shields.io/github/stars/asciimoo/wuzz?label=%20"></td><td><a href="/categorize/tags/http.md"><code>http</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/frohoff/ysoserial">ysoserial</a></td><td>A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.</td><td><img src="https://img.shields.io/github/stars/frohoff/ysoserial?label=%20"></td><td><a href="/categorize/tags/deserialize.md"><code>deserialize</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Java.md"><img src="/images/java.png" alt="Java"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/tomnomnom/fff">fff</a></td><td>The Fairly Fast Fetcher. Requests a bunch of URLs provided on stdin fairly quickly.</td><td><img src="https://img.shields.io/github/stars/tomnomnom/fff?label=%20"></td><td><a href="/categorize/tags/url.md"><code>url</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/Slackadays/Clipboard">Clipboard</a></td><td>An external brain that remembers anything, anytime, anywhere.</td><td><img src="https://img.shields.io/github/stars/Slackadays/Clipboard?label=%20"></td><td><a href="/categorize/tags/clipboard.md"><code>clipboard</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/C++.md"><img src="/images/c++.png" alt="C++"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/edoardottt/missing-cve-nuclei-templates">missing-cve-nuclei-templates</a></td><td>Weekly updated list of missing CVEs in nuclei templates official repository</td><td><img src="https://img.shields.io/github/stars/edoardottt/missing-cve-nuclei-templates?label=%20"></td><td><a href="/categorize/tags/nuclei-templates.md"><code>nuclei-templates</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Txt.md"><img src="/images/txt.png" alt="Txt"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/evilcos/xssor2">xssor2</a></td><td>XSS’OR - Hack with JavaScript.</td><td><img src="https://img.shields.io/github/stars/evilcos/xssor2?label=%20"></td><td><a href="/categorize/tags/xss.md"><code>xss</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/JavaScript.md"><img src="/images/javascript.png" alt="JavaScript"></a></td></tr><tr><td>Utils</td><td><a href="https://sequencediagram.org/">SequenceDiagram</a></td><td>Online tool for creating UML sequence diagrams</td><td></td><td><a href="/categorize/tags/online.md"><code>online</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"></td></tr><tr><td>Utils</td><td><a href="https://github.com/1ndianl33t/Gf-Patterns">Gf-Patterns</a></td><td>GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic) parameters grep</td><td><img src="https://img.shields.io/github/stars/1ndianl33t/Gf-Patterns?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"></td></tr><tr><td>Utils</td><td><a href="https://github.com/tomnomnom/qsreplace">qsreplace</a></td><td>Accept URLs on stdin, replace all query string values with a user-supplied value</td><td><img src="https://img.shields.io/github/stars/tomnomnom/qsreplace?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/openbridge/ob_hacky_slack">ob_hacky_slack</a></td><td>Hacky Slack - a bash script that sends beautiful messages to Slack</td><td><img src="https://img.shields.io/github/stars/openbridge/ob_hacky_slack?label=%20"></td><td><a href="/categorize/tags/notify.md"><code>notify</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Shell.md"><img src="/images/shell.png" alt="Shell"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/khast3x/Redcloud">Redcloud</a></td><td>Automated Red Team Infrastructure deployement using Docker</td><td><img src="https://img.shields.io/github/stars/khast3x/Redcloud?label=%20"></td><td><a href="/categorize/tags/infra.md"><code>infra</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/rverton/gxss">gxss</a></td><td>Blind XSS service alerting over slack or email</td><td><img src="https://img.shields.io/github/stars/rverton/gxss?label=%20"></td><td><a href="/categorize/tags/xss.md"><code>xss</code></a> <a href="/categorize/tags/blind-xss.md"><code>blind-xss</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/gwen001/pentest-tools">pentest-tools</a></td><td>Custom pentesting tools</td><td><img src="https://img.shields.io/github/stars/gwen001/pentest-tools?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/Wilfred/difftastic">difftastic</a></td><td>a structural diff that understands syntax</td><td><img src="https://img.shields.io/github/stars/Wilfred/difftastic?label=%20"></td><td><a href="/categorize/tags/diff.md"><code>diff</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Rust.md"><img src="/images/rust.png" alt="Rust"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/BuffaloWill/oxml_xxe">oxml_xxe</a></td><td>A tool for embedding XXE/XML exploits into different filetypes</td><td><img src="https://img.shields.io/github/stars/BuffaloWill/oxml_xxe?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Ruby.md"><img src="/images/ruby.png" alt="Ruby"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/tomnomnom/anew">anew</a></td><td>A tool for adding new lines to files, skipping duplicates</td><td><img src="https://img.shields.io/github/stars/tomnomnom/anew?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/marcoagner/boast">boast</a></td><td>The BOAST Outpost for AppSec Testing (v0.1.0)</td><td><img src="https://img.shields.io/github/stars/marcoagner/boast?label=%20"></td><td><a href="/categorize/tags/oast.md"><code>oast</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/ronin-rb/ronin">Ronin</a></td><td>Ronin is a free and Open Source Ruby toolkit for security research and development.</td><td><img src="https://img.shields.io/github/stars/ronin-rb/ronin?label=%20"></td><td><a href="/categorize/tags/payload.md"><code>payload</code></a> <a href="/categorize/tags/http.md"><code>http</code></a> <a href="/categorize/tags/pentest.md"><code>pentest</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Ruby.md"><img src="/images/ruby.png" alt="Ruby"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/bcicen/slackcat">slackcat</a></td><td>CLI utility to post files and command output to slack</td><td><img src="https://img.shields.io/github/stars/bcicen/slackcat?label=%20"></td><td><a href="/categorize/tags/notify.md"><code>notify</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/ssl/ezXSS">ezXSS</a></td><td>ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.</td><td><img src="https://img.shields.io/github/stars/ssl/ezXSS?label=%20"></td><td><a href="/categorize/tags/xss.md"><code>xss</code></a> <a href="/categorize/tags/blind-xss.md"><code>blind-xss</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/PHP.md"><img src="/images/php.png" alt="PHP"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/garabik/grc">grc</a></td><td>generic colouriser</td><td><img src="https://img.shields.io/github/stars/garabik/grc?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/NotSoSecure/Blacklist3r">Blacklist3r</a></td><td>project-blacklist3r</td><td><img src="https://img.shields.io/github/stars/NotSoSecure/Blacklist3r?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/C#.md"><img src="/images/c#.png" alt="C#"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/APIs-guru/graphql-voyager">graphql-voyager</a></td><td>🛰️ Represent any GraphQL API as an interactive graph</td><td><img src="https://img.shields.io/github/stars/APIs-guru/graphql-voyager?label=%20"></td><td><a href="/categorize/tags/graphql.md"><code>graphql</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/TypeScript.md"><img src="/images/typescript.png" alt="TypeScript"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/EdOverflow/can-i-take-over-xyz">can-i-take-over-xyz</a></td><td>“Can I take over XYZ?” — a list of services and how to claim (sub)domains with dangling DNS records.</td><td><img src="https://img.shields.io/github/stars/EdOverflow/can-i-take-over-xyz?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"></td></tr><tr><td>Utils</td><td><a href="https://github.com/nomi-sec/PoC-in-GitHub">PoC-in-GitHub</a></td><td>📡 PoC auto collect from GitHub. Be careful malware.</td><td><img src="https://img.shields.io/github/stars/nomi-sec/PoC-in-GitHub?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"></td></tr><tr><td>Utils</td><td><a href="https://github.com/hahwul/hbxss">hbxss</a></td><td>Security test tool for Blind XSS</td><td><img src="https://img.shields.io/github/stars/hahwul/hbxss?label=%20"></td><td><a href="/categorize/tags/xss.md"><code>xss</code></a> <a href="/categorize/tags/blind-xss.md"><code>blind-xss</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Ruby.md"><img src="/images/ruby.png" alt="Ruby"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/m4ll0k/Atlas">Atlas</a></td><td>Quick SQLMap Tamper Suggester</td><td><img src="https://img.shields.io/github/stars/m4ll0k/Atlas?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/hahwul/gitls">gitls</a></td><td>Listing git repository from URL/User/Org</td><td><img src="https://img.shields.io/github/stars/hahwul/gitls?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/c3l3si4n/godeclutter">godeclutter</a></td><td>Declutters URLs in a fast and flexible way, for improving input for web hacking automations such as crawlers and vulnerability scans.</td><td><img src="https://img.shields.io/github/stars/c3l3si4n/godeclutter?label=%20"></td><td><a href="/categorize/tags/url.md"><code>url</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/samyk/quickjack">quickjack</a></td><td>Quickjack is a point-and-click tool for intuitively producing advanced clickjacking and frame slicing attacks.</td><td><img src="https://img.shields.io/github/stars/samyk/quickjack?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/JavaScript.md"><img src="/images/javascript.png" alt="JavaScript"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/m4ll0k/Bug-Bounty-Toolz">Bug-Bounty-Toolz</a></td><td>BBT - Bug Bounty Tools</td><td><img src="https://img.shields.io/github/stars/m4ll0k/Bug-Bounty-Toolz?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/tomnomnom/unfurl">unfurl</a></td><td>Pull out bits of URLs provided on stdin</td><td><img src="https://img.shields.io/github/stars/tomnomnom/unfurl?label=%20"></td><td><a href="/categorize/tags/url.md"><code>url</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/IAmStoxe/urlgrab">urlgrab</a></td><td>A golang utility to spider through a website searching for additional links.</td><td><img src="https://img.shields.io/github/stars/IAmStoxe/urlgrab?label=%20"></td><td><a href="/categorize/tags/url.md"><code>url</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/topscoder/nuclei-wordfence-cve">nuclei-wordfence-cve</a></td><td>Every single day new templates are added to this repo based on updates on Wordfence.com</td><td><img src="https://img.shields.io/github/stars/topscoder/nuclei-wordfence-cve?label=%20"></td><td><a href="/categorize/tags/nuclei-templates.md"><code>nuclei-templates</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/google/security-crawl-maze">security-crawl-maze</a></td><td>Security Crawl Maze is a comprehensive testbed for web security crawlers. It contains pages representing many ways in which one can link resources from a valid HTML document.</td><td><img src="https://img.shields.io/github/stars/google/security-crawl-maze?label=%20"></td><td><a href="/categorize/tags/crawl.md"><code>crawl</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/HTML.md"><img src="/images/html.png" alt="HTML"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/trickest/dsieve">dsieve</a></td><td>Filter and enrich a list of subdomains by level</td><td><img src="https://img.shields.io/github/stars/trickest/dsieve?label=%20"></td><td><a href="/categorize/tags/subdomains.md"><code>subdomains</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/hahwul/gee">gee</a></td><td>🏵 Gee is tool of stdin to each files and stdout. It is similar to the tee command, but there are more functions for convenience. In addition, it was written as go</td><td><img src="https://img.shields.io/github/stars/hahwul/gee?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/hakluke/hakcheckurl">hakcheckurl</a></td><td>Takes a list of URLs and returns their HTTP response codes</td><td><img src="https://img.shields.io/github/stars/hakluke/hakcheckurl?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/httpie/httpie">httpie</a></td><td>As easy as /aitch-tee-tee-pie/ 🥧 Modern, user-friendly command-line HTTP client for the API era. JSON support, colors, sessions, downloads, plugins & more. <a href="https://twitter.com/httpie">https://twitter.com/httpie</a></td><td><img src="https://img.shields.io/github/stars/httpie/httpie?label=%20"></td><td><a href="/categorize/tags/http.md"><code>http</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/Orange-OpenSource/hurl">hurl</a></td><td>Hurl, run and test HTTP requests.</td><td><img src="https://img.shields.io/github/stars/Orange-OpenSource/hurl?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Rust.md"><img src="/images/rust.png" alt="Rust"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/defparam/tiscripts">tiscripts</a></td><td>Turbo Intruder Scripts</td><td><img src="https://img.shields.io/github/stars/defparam/tiscripts?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/google/security-research-pocs">security-research-pocs</a></td><td>Proof-of-concept codes created as part of security research done by Google Security Team.</td><td><img src="https://img.shields.io/github/stars/google/security-research-pocs?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/C++.md"><img src="/images/c++.png" alt="C++"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/aemkei/jsfuck">jsfuck</a></td><td>Write any JavaScript with 6 Characters</td><td><img src="https://img.shields.io/github/stars/aemkei/jsfuck?label=%20"></td><td><a href="/categorize/tags/xss.md"><code>xss</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/JavaScript.md"><img src="/images/javascript.png" alt="JavaScript"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/hakluke/weaponised-XSS-payloads">weaponised-XSS-payloads</a></td><td>XSS payloads designed to turn alert(1) into P1</td><td><img src="https://img.shields.io/github/stars/hakluke/weaponised-XSS-payloads?label=%20"></td><td><a href="/categorize/tags/xss.md"><code>xss</code></a> <a href="/categorize/tags/documents.md"><code>documents</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/JavaScript.md"><img src="/images/javascript.png" alt="JavaScript"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/sharkdp/bat">bat</a></td><td>A cat(1) clone with wings.</td><td><img src="https://img.shields.io/github/stars/sharkdp/bat?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Rust.md"><img src="/images/rust.png" alt="Rust"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/pemistahl/grex">grex</a></td><td>A command-line tool and library for generating regular expressions from user-provided test cases</td><td><img src="https://img.shields.io/github/stars/pemistahl/grex?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Rust.md"><img src="/images/rust.png" alt="Rust"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/damianrusinek/zip-bomb">zip-bomb</a></td><td>Create a ZIPBomb for a given uncompressed size (flat and nested modes).</td><td><img src="https://img.shields.io/github/stars/damianrusinek/zip-bomb?label=%20"></td><td><a href="/categorize/tags/zipbomb.md"><code>zipbomb</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/NickstaDB/SerializationDumper">SerializationDumper</a></td><td>A tool to dump Java serialization streams in a more human readable form.</td><td><img src="https://img.shields.io/github/stars/NickstaDB/SerializationDumper?label=%20"></td><td><a href="/categorize/tags/deserialize.md"><code>deserialize</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Java.md"><img src="/images/java.png" alt="Java"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/junegunn/fzf">fzf</a></td><td>A command-line fuzzy finder</td><td><img src="https://img.shields.io/github/stars/junegunn/fzf?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/nccgroup/autochrome">autochrome</a></td><td>This tool downloads, installs, and configures a shiny new copy of Chromium.</td><td><img src="https://img.shields.io/github/stars/nccgroup/autochrome?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/HTML.md"><img src="/images/html.png" alt="HTML"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/nccgroup/wssip">wssip</a></td><td>Application for capturing, modifying and sending custom WebSocket data from client to server and vice versa.</td><td><img src="https://img.shields.io/github/stars/nccgroup/wssip?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/JavaScript.md"><img src="/images/javascript.png" alt="JavaScript"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/1ndianl33t/urlprobe">urlprobe</a></td><td>Urls status code & content length checker</td><td><img src="https://img.shields.io/github/stars/1ndianl33t/urlprobe?label=%20"></td><td><a href="/categorize/tags/url.md"><code>url</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/projectdiscovery/interactsh">interactsh</a></td><td>An OOB interaction gathering server and client library</td><td><img src="https://img.shields.io/github/stars/projectdiscovery/interactsh?label=%20"></td><td><a href="/categorize/tags/oast.md"><code>oast</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Go.md"><img src="/images/go.png" alt="Go"></a></td></tr><tr><td>Utils</td><td><a href="https://csp-evaluator.withgoogle.com/">CSP Evaluator</a></td><td>Online CSP Evaluator from google</td><td></td><td><a href="/categorize/tags/csp.md"><code>csp</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"></td></tr><tr><td>Utils</td><td><a href="https://github.com/danielmiessler/SecLists">SecLists</a></td><td>SecLists is the security tester’s companion. It’s a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.</td><td><img src="https://img.shields.io/github/stars/danielmiessler/SecLists?label=%20"></td><td><a href="/categorize/tags/wordlist.md"><code>wordlist</code></a> <a href="/categorize/tags/documents.md"><code>documents</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/PHP.md"><img src="/images/php.png" alt="PHP"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/pwntester/ysoserial.net">ysoserial.net</a></td><td>Deserialization payload generator for a variety of .NET formatters</td><td><img src="https://img.shields.io/github/stars/pwntester/ysoserial.net?label=%20"></td><td><a href="/categorize/tags/deserialize.md"><code>deserialize</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/C#.md"><img src="/images/c#.png" alt="C#"></a></td></tr><tr><td>Env</td><td><a href="https://github.com/OWASP/glue">Glue</a></td><td>Application Security Automation</td><td><img src="https://img.shields.io/github/stars/OWASP/glue?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Ruby.md"><img src="/images/ruby.png" alt="Ruby"></a></td></tr><tr><td>Env</td><td><a href="https://github.com/Sliim/pentest-env">pentest-env</a></td><td>Pentest environment deployer (kali linux + targets) using vagrant and chef.</td><td><img src="https://img.shields.io/github/stars/Sliim/pentest-env?label=%20"></td><td><a href="/categorize/tags/pentest.md"><code>pentest</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Ruby.md"><img src="/images/ruby.png" alt="Ruby"></a></td></tr><tr><td>Env</td><td><a href="https://github.com/Karmaz95/crimson">Crimson</a></td><td>Web Application Security Testing automation.</td><td><img src="https://img.shields.io/github/stars/Karmaz95/crimson?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr></tbody></table><h3 id="Bookmarklets"><a href="#Bookmarklets" class="headerlink" title="Bookmarklets"></a>Bookmarklets</h3><table><thead><tr><th>Type</th><th>Name</th><th>Description</th><th>Star</th><th>Tags</th><th>Badges</th></tr></thead></table><h3 id="Browser-Addons"><a href="#Browser-Addons" class="headerlink" title="Browser Addons"></a>Browser Addons</h3><table><thead><tr><th>Type</th><th>Name</th><th>Description</th><th>Star</th><th>Tags</th><th>Badges</th></tr></thead><tbody><tr><td>Recon</td><td><a href="https://apps.apple.com/us/app/wayback-machine/id1472432422">Wayback Machine</a></td><td>History of website</td><td></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/safari.png" alt="safari"></td></tr><tr><td>Recon</td><td><a href="https://github.com/davtur19/DotGit">DotGit</a></td><td>An extension for checking if .git is exposed in visited websites</td><td><img src="https://img.shields.io/github/stars/davtur19/DotGit?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/JavaScript.md"><img src="/images/javascript.png" alt="JavaScript"></a></td></tr><tr><td>Utils</td><td><a href="https://proxy-offline-browser.com/ProxySwitch/">MM3 ProxySwitch</a></td><td>Proxy Switch in Firefox and Chrome</td><td></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/firefox.png" alt="firefox"><img src="/images/chrome.png" alt="chrome"><a href="/categorize/langs/JavaScript.md"><img src="/images/javascript.png" alt="JavaScript"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/LasCC/Hack-Tools">Hack-Tools</a></td><td>The all-in-one Red Team extension for Web Pentester 🛠</td><td><img src="https://img.shields.io/github/stars/LasCC/Hack-Tools?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/TypeScript.md"><img src="/images/typescript.png" alt="TypeScript"></a></td></tr><tr><td>Utils</td><td><a href="https://addons.mozilla.org/ko/firefox/addon/user-agent-switcher-revived/">User-Agent Switcher</a></td><td>quick and easy way to switch between user-agents.</td><td></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/firefox.png" alt="firefox"></td></tr><tr><td>Utils</td><td><a href="https://github.com/swoops/eval_villain">eval_villain</a></td><td>A Firefox Web Extension to improve the discovery of DOM XSS.</td><td><img src="https://img.shields.io/github/stars/swoops/eval_villain?label=%20"></td><td><a href="/categorize/tags/xss.md"><code>xss</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/JavaScript.md"><img src="/images/javascript.png" alt="JavaScript"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/darkreader/darkreader">Dark Reader</a></td><td>Dark mode to any site</td><td><img src="https://img.shields.io/github/stars/darkreader/darkreader?label=%20"></td><td><a href="/categorize/tags/darkmode.md"><code>darkmode</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/firefox.png" alt="firefox"><img src="/images/chrome.png" alt="chrome"><a href="/categorize/langs/TypeScript.md"><img src="/images/typescript.png" alt="TypeScript"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/fransr/postMessage-tracker">postMessage-tracker</a></td><td>A Chrome Extension to track postMessage usage (url, domain and stack) both by logging using CORS and also visually as an extension-icon</td><td><img src="https://img.shields.io/github/stars/fransr/postMessage-tracker?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/JavaScript.md"><img src="/images/javascript.png" alt="JavaScript"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/yeswehack/PwnFox">PwnFox</a></td><td>Firefox/Burp extension that provide usefull tools for your security audit.</td><td><img src="https://img.shields.io/github/stars/yeswehack/PwnFox?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/firefox.png" alt="firefox"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/JavaScript.md"><img src="/images/javascript.png" alt="JavaScript"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/ysard/cookie-quick-manager">cookie-quick-manager</a></td><td>An addon to manage (view, search, create, edit, remove, backup, restore) cookies on Firefox.</td><td><img src="https://img.shields.io/github/stars/ysard/cookie-quick-manager?label=%20"></td><td><a href="/categorize/tags/cookie.md"><code>cookie</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/JavaScript.md"><img src="/images/javascript.png" alt="JavaScript"></a></td></tr><tr><td>Utils</td><td><a href="https://apps.apple.com/us/app/dark-reader-for-safari/id1438243180">Dark Reader for Safari</a></td><td>Dark mode to any site</td><td></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/safari.png" alt="safari"></td></tr><tr><td>Utils</td><td><a href="https://github.com/bekh6ex/firefox-container-proxy">firefox-container-proxy</a></td><td>Assign a proxy to a Firefox container</td><td><img src="https://img.shields.io/github/stars/bekh6ex/firefox-container-proxy?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/firefox.png" alt="firefox"><a href="/categorize/langs/JavaScript.md"><img src="/images/javascript.png" alt="JavaScript"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/TenSoja/clear-cache">clear-cache</a></td><td>Add-on to clear browser cache with a single click or via the F9 key.</td><td><img src="https://img.shields.io/github/stars/TenSoja/clear-cache?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/JavaScript.md"><img src="/images/javascript.png" alt="JavaScript"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/ETCExtensions/Edit-This-Cookie">Edit-This-Cookie</a></td><td>EditThisCookie is the famous Google Chrome/Chromium extension for editing cookies</td><td><img src="https://img.shields.io/github/stars/ETCExtensions/Edit-This-Cookie?label=%20"></td><td><a href="/categorize/tags/cookie.md"><code>cookie</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/JavaScript.md"><img src="/images/javascript.png" alt="JavaScript"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/jsonwebtoken/jsonwebtoken.github.io">jsonwebtoken.github.io</a></td><td>JWT En/Decode and Verify</td><td><img src="https://img.shields.io/github/stars/jsonwebtoken/jsonwebtoken.github.io?label=%20"></td><td><a href="/categorize/tags/jwt.md"><code>jwt</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/JavaScript.md"><img src="/images/javascript.png" alt="JavaScript"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/mozilla/multi-account-containers">Firefox Multi-Account Containers</a></td><td>Firefox Multi-Account Containers lets you keep parts of your online life separated into color-coded tabs</td><td><img src="https://img.shields.io/github/stars/mozilla/multi-account-containers?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/firefox.png" alt="firefox"><a href="/categorize/langs/JavaScript.md"><img src="/images/javascript.png" alt="JavaScript"></a></td></tr></tbody></table><h3 id="Burpsuite-and-ZAP-Addons"><a href="#Burpsuite-and-ZAP-Addons" class="headerlink" title="Burpsuite and ZAP Addons"></a>Burpsuite and ZAP Addons</h3><table><thead><tr><th>Type</th><th>Name</th><th>Description</th><th>Star</th><th>Tags</th><th>Badges</th></tr></thead><tbody><tr><td>Recon</td><td><a href="https://github.com/InitRoot/BurpJSLinkFinder">BurpJSLinkFinder</a></td><td></td><td><img src="https://img.shields.io/github/stars/InitRoot/BurpJSLinkFinder?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/secdec/attack-surface-detector-zap">attack-surface-detector-zap</a></td><td>The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters</td><td><img src="https://img.shields.io/github/stars/secdec/attack-surface-detector-zap?label=%20"></td><td><a href="/categorize/tags/endpoint.md"><code>endpoint</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/zap.png" alt="zap"><a href="/categorize/langs/Java.md"><img src="/images/java.png" alt="Java"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/m4ll0k/BurpSuite-Secret_Finder">BurpSuite-Secret_Finder</a></td><td></td><td><img src="https://img.shields.io/github/stars/m4ll0k/BurpSuite-Secret_Finder?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"></td></tr><tr><td>Recon</td><td><a href="https://github.com/PortSwigger/reflected-parameters">reflected-parameters</a></td><td></td><td><img src="https://img.shields.io/github/stars/PortSwigger/reflected-parameters?label=%20"></td><td><a href="/categorize/tags/param.md"><code>param</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/Java.md"><img src="/images/java.png" alt="Java"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/h3xstream/burp-retire-js">burp-retire-js</a></td><td></td><td><img src="https://img.shields.io/github/stars/h3xstream/burp-retire-js?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/JavaScript.md"><img src="/images/javascript.png" alt="JavaScript"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/prodigysml/Dr.-Watson">Dr. Watson</a></td><td>Dr. Watson is a simple Burp Suite extension that helps find assets, keys, subdomains, IP addresses, and other useful information</td><td><img src="https://img.shields.io/github/stars/prodigysml/Dr.-Watson?label=%20"></td><td><a href="/categorize/tags/param.md"><code>param</code></a> <a href="/categorize/tags/subdomains.md"><code>subdomains</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/secdec/attack-surface-detector-burp">attack-surface-detector-burp</a></td><td>The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters</td><td><img src="https://img.shields.io/github/stars/secdec/attack-surface-detector-burp?label=%20"></td><td><a href="/categorize/tags/endpoint.md"><code>endpoint</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/Java.md"><img src="/images/java.png" alt="Java"></a></td></tr><tr><td>Recon</td><td><a href="https://github.com/bugcrowd/HUNT">HUNT</a></td><td>Identifies common parameters vulnerable to certain vulnerability classes</td><td><img src="https://img.shields.io/github/stars/bugcrowd/HUNT?label=%20"></td><td><a href="/categorize/tags/param.md"><code>param</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/zap.png" alt="zap"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/Kotlin.md"><img src="/images/kotlin.png" alt="Kotlin"></a></td></tr><tr><td>Fuzzer</td><td><a href="https://github.com/PortSwigger/param-miner">param-miner</a></td><td>Param Miner</td><td><img src="https://img.shields.io/github/stars/PortSwigger/param-miner?label=%20"></td><td><a href="/categorize/tags/param.md"><code>param</code></a> <a href="/categorize/tags/cache-vuln.md"><code>cache-vuln</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/Java.md"><img src="/images/java.png" alt="Java"></a></td></tr><tr><td>Fuzzer</td><td><a href="https://github.com/xnl-h4ck3r/GAP-Burp-Extension">GAP</a></td><td>This is an evolution of the original getAllParams extension for Burp. Not only does it find more potential parameters for you to investigate, but it also finds potential links to try these parameters on.</td><td><img src="https://img.shields.io/github/stars/xnl-h4ck3r/GAP-Burp-Extension?label=%20"></td><td><a href="/categorize/tags/param.md"><code>param</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/PortSwigger/collaborator-everywhere">collaborator-everywhere</a></td><td></td><td><img src="https://img.shields.io/github/stars/PortSwigger/collaborator-everywhere?label=%20"></td><td><a href="/categorize/tags/oast.md"><code>oast</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/Java.md"><img src="/images/java.png" alt="Java"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/nccgroup/BurpSuiteHTTPSmuggler">BurpSuiteHTTPSmuggler</a></td><td></td><td><img src="https://img.shields.io/github/stars/nccgroup/BurpSuiteHTTPSmuggler?label=%20"></td><td><a href="/categorize/tags/smuggle.md"><code>smuggle</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/Java.md"><img src="/images/java.png" alt="Java"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/Quitten/Autorize">Autorize</a></td><td></td><td><img src="https://img.shields.io/github/stars/Quitten/Autorize?label=%20"></td><td><a href="/categorize/tags/aaa.md"><code>aaa</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/SecurityInnovation/AuthMatrix">AuthMatrix</a></td><td></td><td><img src="https://img.shields.io/github/stars/SecurityInnovation/AuthMatrix?label=%20"></td><td><a href="/categorize/tags/aaa.md"><code>aaa</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/PortSwigger/http-request-smuggler">http-request-smuggler</a></td><td></td><td><img src="https://img.shields.io/github/stars/PortSwigger/http-request-smuggler?label=%20"></td><td><a href="/categorize/tags/smuggle.md"><code>smuggle</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/Java.md"><img src="/images/java.png" alt="Java"></a></td></tr><tr><td>Scanner</td><td><a href="https://github.com/GoSecure/csp-auditor">csp-auditor</a></td><td></td><td><img src="https://img.shields.io/github/stars/GoSecure/csp-auditor?label=%20"></td><td><a href="/categorize/tags/csp.md"><code>csp</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/zap.png" alt="zap"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/Java.md"><img src="/images/java.png" alt="Java"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/SecurityInnovation/AuthMatrix">AuthMatrix</a></td><td>Automated HTTP Request Repeating With Burp Suite</td><td><img src="https://img.shields.io/github/stars/SecurityInnovation/AuthMatrix?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/Java.md"><img src="/images/java.png" alt="Java"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/PortSwigger/turbo-intruder">turbo-intruder</a></td><td></td><td><img src="https://img.shields.io/github/stars/PortSwigger/turbo-intruder?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/Kotlin.md"><img src="/images/kotlin.png" alt="Kotlin"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/nccgroup/argumentinjectionhammer">argumentinjectionhammer</a></td><td>A Burp Extension designed to identify argument injection vulnerabilities.</td><td><img src="https://img.shields.io/github/stars/nccgroup/argumentinjectionhammer?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/nccgroup/Decoder-Improved">Decoder-Improved</a></td><td>Improved decoder for Burp Suite</td><td><img src="https://img.shields.io/github/stars/nccgroup/Decoder-Improved?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/Java.md"><img src="/images/java.png" alt="Java"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/zaproxy/zap-hud">zap-hud</a></td><td></td><td><img src="https://img.shields.io/github/stars/zaproxy/zap-hud?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/zap.png" alt="zap"><a href="/categorize/langs/Java.md"><img src="/images/java.png" alt="Java"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/wagiro/BurpBounty">BurpBounty</a></td><td></td><td><img src="https://img.shields.io/github/stars/wagiro/BurpBounty?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/BlitzBasic.md"><img src="/images/blitzbasic.png" alt="BlitzBasic"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/CoreyD97/BurpCustomizer">BurpCustomizer</a></td><td>Because just a dark theme wasn’t enough!</td><td><img src="https://img.shields.io/github/stars/CoreyD97/BurpCustomizer?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/Java.md"><img src="/images/java.png" alt="Java"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/h3xstream/http-script-generator">http-script-generator</a></td><td></td><td><img src="https://img.shields.io/github/stars/h3xstream/http-script-generator?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/zap.png" alt="zap"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/Java.md"><img src="/images/java.png" alt="Java"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/doyensec/inql">inql</a></td><td></td><td><img src="https://img.shields.io/github/stars/doyensec/inql?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/nccgroup/HTTPSignatures">HTTPSignatures</a></td><td>A Burp Suite extension implementing the Signing HTTP Messages draft-ietf-httpbis-message-signatures-01 draft.</td><td><img src="https://img.shields.io/github/stars/nccgroup/HTTPSignatures?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/Java.md"><img src="/images/java.png" alt="Java"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/zaproxy/community-scripts">community-scripts</a></td><td></td><td><img src="https://img.shields.io/github/stars/zaproxy/community-scripts?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/zap.png" alt="zap"><a href="/categorize/langs/JavaScript.md"><img src="/images/javascript.png" alt="JavaScript"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/artssec/burp-exporter">burp-exporter</a></td><td></td><td><img src="https://img.shields.io/github/stars/artssec/burp-exporter?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/silentsignal/burp-piper">burp-piper</a></td><td></td><td><img src="https://img.shields.io/github/stars/silentsignal/burp-piper?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/Kotlin.md"><img src="/images/kotlin.png" alt="Kotlin"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/NetSPI/AWSSigner">AWSSigner</a></td><td>Burp Extension for AWS Signing</td><td><img src="https://img.shields.io/github/stars/NetSPI/AWSSigner?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/Java.md"><img src="/images/java.png" alt="Java"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/wish-i-was/femida">femida</a></td><td></td><td><img src="https://img.shields.io/github/stars/wish-i-was/femida?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/nccgroup/Berserko">Berserko</a></td><td>Burp Suite extension to perform Kerberos authentication</td><td><img src="https://img.shields.io/github/stars/nccgroup/Berserko?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/Java.md"><img src="/images/java.png" alt="Java"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/yashrs/safecopy">safecopy</a></td><td></td><td><img src="https://img.shields.io/github/stars/yashrs/safecopy?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/Java.md"><img src="/images/java.png" alt="Java"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/cak/reflect">reflect</a></td><td></td><td><img src="https://img.shields.io/github/stars/cak/reflect?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/zap.png" alt="zap"><a href="/categorize/langs/Kotlin.md"><img src="/images/kotlin.png" alt="Kotlin"></a></td></tr><tr><td>utils</td><td><a href="https://github.com/kingthorin/neonmarker">Neonmarker</a></td><td></td><td><img src="https://img.shields.io/github/stars/kingthorin/neonmarker?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/zap.png" alt="zap"><a href="/categorize/langs/Java.md"><img src="/images/java.png" alt="Java"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/nccgroup/pcap-burp">pcap-burp</a></td><td>Pcap importer for Burp</td><td><img src="https://img.shields.io/github/stars/nccgroup/pcap-burp?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/Java.md"><img src="/images/java.png" alt="Java"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/nccgroup/blackboxprotobuf">blackboxprotobuf</a></td><td>Blackbox protobuf is a Burp Suite extension for decoding and modifying arbitrary protobuf messages without the protobuf type definition.</td><td><img src="https://img.shields.io/github/stars/nccgroup/blackboxprotobuf?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/Python.md"><img src="/images/python.png" alt="Python"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/nccgroup/web3-decoder">Web3 Decoder</a></td><td>Burp Extension for Web3</td><td><img src="https://img.shields.io/github/stars/nccgroup/web3-decoder?label=%20"></td><td><a href="/categorize/tags/web3.md"><code>web3</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/Java.md"><img src="/images/java.png" alt="Java"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/bit4woo/knife">knife</a></td><td>A burp extension that add some useful function to Context Menu 添加一些右键菜单让burp用起来更顺畅</td><td><img src="https://img.shields.io/github/stars/bit4woo/knife?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><a href="/categorize/langs/Java.md"><img src="/images/java.png" alt="Java"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/CoreyD97/Stepper">Stepper</a></td><td></td><td><img src="https://img.shields.io/github/stars/CoreyD97/Stepper?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/Java.md"><img src="/images/java.png" alt="Java"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/bytebutcher/burp-send-to">burp-send-to</a></td><td></td><td><img src="https://img.shields.io/github/stars/bytebutcher/burp-send-to?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/Java.md"><img src="/images/java.png" alt="Java"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/nccgroup/BurpSuiteLoggerPlusPlus">BurpSuiteLoggerPlusPlus</a></td><td></td><td><img src="https://img.shields.io/github/stars/nccgroup/BurpSuiteLoggerPlusPlus?label=%20"></td><td></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/Java.md"><img src="/images/java.png" alt="Java"></a></td></tr><tr><td>Utils</td><td><a href="https://github.com/hackvertor/taborator">taborator</a></td><td></td><td><img src="https://img.shields.io/github/stars/hackvertor/taborator?label=%20"></td><td><a href="/categorize/tags/oast.md"><code>oast</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/burp.png" alt="burp"><a href="/categorize/langs/Java.md"><img src="/images/java.png" alt="Java"></a></td></tr><tr><td>utils</td><td><a href="https://github.com/SasanLabs/owasp-zap-jwt-addon">owasp-zap-jwt-addon</a></td><td></td><td><img src="https://img.shields.io/github/stars/SasanLabs/owasp-zap-jwt-addon?label=%20"></td><td><a href="/categorize/tags/jwt.md"><code>jwt</code></a></td><td><img src="/images/linux.png" alt="linux"><img src="/images/apple.png" alt="macos"><img src="/images/windows.png" alt="windows"><img src="/images/zap.png" alt="zap"><a href="/categorize/langs/Java.md"><img src="/images/java.png" alt="Java"></a></td></tr></tbody></table>]]></content>
<summary type="html"><h1 align="center">
<br>
<a href=""><img src="https://user-images.githubusercontent.com/13212227/104400969-9f3d9280-5596-11eb-80f4-864effae9</summary>
<category term="landv" scheme="https://landv.cn/categories/landv/"/>
<category term="黑客工具" scheme="https://landv.cn/categories/landv/%E9%BB%91%E5%AE%A2%E5%B7%A5%E5%85%B7/"/>
<category term="landv" scheme="https://landv.cn/tags/landv/"/>
</entry>
<entry>
<title>从零开始编写会员管理系统-01</title>
<link href="https://landv.cn/p/fda31f1e.html"/>
<id>https://landv.cn/p/fda31f1e.html</id>
<published>2023-05-31T07:00:14.000Z</published>
<updated>2023-05-31T07:00:14.000Z</updated>
<content type="html"><![CDATA[<h1 id="从零开始编写会员管理系统"><a href="#从零开始编写会员管理系统" class="headerlink" title="从零开始编写会员管理系统"></a>从零开始编写会员管理系统</h1><blockquote><p>先说说为什么有这个念头要从零开始编写会员管理系统,当你进行维护七八种系统,各自系统上面都有会员,也做过顶层设计,通过各种接口进行连接。就如同手指一样,各自实现的参差不齐。又涉及到多方系统,互相扯皮的事情经常有,接口实现的效果很差。但是多业态会员系统,又没有一家提供完整的解决方案。即使是现在也是,只有PC端,没有手机移动端。即使花几百万上了他们的全面解决方案也是用各种厂商拼凑的,效果一样很差。也就是说酒店业没有一家能够完整提供全面解决方案,即使提供了也是功能薄弱,没有后劲儿。和纯餐饮业没有办法比,餐饮业软件想找全面解决方案很好找到。酒店业,就不点名了。虽然是上市公司,也有很多财力进行收购,但是研发能力确实不够呀。</p></blockquote><blockquote><p>说是会员管理系统,也可以说不是打着做会员管理系统的方向做的,单独运转肯定无法融入。说白了就是一个结算系统,逐步侵入式实现各种支付结算。也就是不仅仅是会员卡支付了,微信、支付宝、银联、QQ等多种支付渠道进行支付,类似支付网关。同时也要加强与业务系统的联动,最终要替代绝大部分业务系统,从而统一起来。</p></blockquote><h2 id="下面是一些零散的笔记内容了"><a href="#下面是一些零散的笔记内容了" class="headerlink" title="下面是一些零散的笔记内容了"></a>下面是一些零散的笔记内容了</h2><p>多业态消费,也需要单独的表单去记录:<br>如:客房,需要记录房间信息,主要还是主单信息。<br>温泉,记录门票信息,也是主单信息。<br>餐饮也一样,都需要记录主单信息。</p><p>前期消费上传消费主单截图就好。(强提示进行截图+自动截图)</p><p>下一步可以通过会员消费界面进行勾选房间、门票、桌台、零售信息等,但仍然需要在原有结算系统进行操作结算。<br>会员卡消费界面只是用来结算会员卡内余额,以及计算折扣使用。</p><p>最终实现通过会员消费界面可以进行结算客房、餐饮、温泉、零售等业态,然后反写回原有业务系统。</p><p>可以通过网页方式,并且通过账号绑定消费点,或者勾选消费点。以及根据消费类型自动勾稽消费点。<br>如:温泉酒店可能存在餐饮、温泉、客房,三种业态情况,又是在一个地方进行结算,所以需要自动勾稽。</p><p>如果使用electron开发的客户端,可以获取PC名称、MAC地址、IP地址等信息。<br>也就是说会员结算系统需要逐步实现各业态业务系统的功能。不过只是单纯结算并反写回原有业务系统,也无需完整实现业态业务系统。</p><p>还是需要使用electron开发的客户端,这样通过内网进行连接业务系统的数据库,不然需要通过WG vpn进行连接数据库。<br>其他零散业态,在没有业务系统的情况下,可以直接使用会员系统进行结算,同时支持现金结算。</p><p>这是一个寄生类系统,前期寄生于sjkl系统、xr、jxd、hq。<br>然后逐步统一各类业务系统。<br>现在使用的系统软件有:(这些涉及会员卡结算问题)<br>酒店类:<br> sjkl、xr、jxd<br>票务:<br> hq、pft<br>其他:<br> yz</p><p>如果只是单纯的快速扣减卡内余额,这个只需要一个小工具就好,但是为了后期数据分析,这样就需要准确获取主单信息。目前各个业务系统是通过昆仑API进行扣减,并上传消费情况。但很多信息不够完整,需要进行二次通过业务系统进行获取并整理。</p><p>实现了会员卡多业态并可以勾选各类主单信息(勾选主单信息就是完整的开发了一个收银系统)<br>基本上就完成了一期,就是一个典型的寄生系统。</p><p>如果向对外开放,就需要继续逐步替代各类业务系统完整功能,包括各类硬件的连接。</p><h2 id="技术栈"><a href="#技术栈" class="headerlink" title="技术栈"></a>技术栈</h2><blockquote><p>因属于个人项目,尽量保持单一语言进行开发,且能够兼容web、pc、H5、app</p></blockquote><ul><li>后端:<code>node.js</code> <code> midway.js</code> <code>egg.js</code> <code>mysql</code> <code>sqlite </code> <code>typescript</code></li><li>前端:<code>vue.js</code> <code>element-ui</code> <code>jsx</code> <code>electron-vite</code> <code>vuex</code> <code>vue-router</code></li></ul><p><code>Typescript</code>的语法和java、php类似。</p><blockquote><p>为毛要用js系列解决方案,首先可以在多种平台运行,最主要是颜值呀。其他编程语言颜值搞起来有点费劲儿。js就随便cv吧。毕竟<code>颜值即正义</code>嘛</p></blockquote><p><a href="https://github.com/cool-team-official">https://github.com/cool-team-official</a></p><p><a href="https://admin.cool-js.com/">https://admin.cool-js.com/</a></p><p><a href="https://show.cool-admin.com/">https://show.cool-admin.com/</a></p><ul><li>cool-admin(midway版)一个很酷的后台权限管理框架,模块化、插件化、CRUD极速开发,永久开源免费,基于midway.js 3.x、typescript、typeorm、mysql、jwt、vue3、vite、element-ui等构建。</li><li>cool-admin一个很酷的后台权限管理框架,模块化、插件化、CRUD极速开发,永久开源免费,基于midway.js 3.0、typeorm、mysql、jwt、element-ui、vuex、vue-router、vue等构建。</li></ul><p><img src="https://imgs.landv.cn/imgs//2023/05/31/15/e52483980a9fb3a739f2852fd3c244fd.png" alt="image-20230531155338545"></p><blockquote><p>下一篇继续研究js系列,至于业务系统账单数据,数据库在本地的可以通过主单单号进行获取。数据库不在的只能通过截图OCR识别了。</p></blockquote>]]></content>
<summary type="html"><h1 id="从零开始编写会员管理系统"><a href="#从零开始编写会员管理系统" class="headerlink" title="从零开始编写会员管理系统"></a>从零开始编写会员管理系统</h1><blockquote>
<p>先说说为什么有这个念头要从零开始编</summary>
<category term="landv" scheme="https://landv.cn/categories/landv/"/>
<category term="从零开始编写会员管理系统" scheme="https://landv.cn/categories/landv/%E4%BB%8E%E9%9B%B6%E5%BC%80%E5%A7%8B%E7%BC%96%E5%86%99%E4%BC%9A%E5%91%98%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F/"/>
<category term="landv" scheme="https://landv.cn/tags/landv/"/>
</entry>
<entry>
<title>vb6OCX许可证算法分析</title>
<link href="https://landv.cn/p/f225098e.html"/>
<id>https://landv.cn/p/f225098e.html</id>
<published>2023-05-19T00:40:42.000Z</published>
<updated>2023-05-19T00:40:42.000Z</updated>
<content type="html"><![CDATA[<p>TX_Text_Control.NET_for_Windows_Forms_ActiveX_WPF_2019_6</p><p><a href="https://landv.cn/p/1656f0cc.html">https://landv.cn/p/1656f0cc.html</a></p><p>作者: landv<br>链接: <a href="https://landv.cn/p/1656f0cc.html">https://landv.cn/p/1656f0cc.html</a><br>来源: landv<br>著作权归作者所有。商业转载请联系作者获得授权,非商业转载请注明出处。</p><p>注册表信息</p><p>在VB6 IDE中提示开发者授权证书过期,或者无开发者证书,导入下面的注册表信息即可。</p><figure class="highlight plaintext"><table><tr><td class="gutter"><pre><span class="line">1</span><br><span class="line">2</span><br><span class="line">3</span><br><span class="line">4</span><br><span class="line">5</span><br><span class="line">6</span><br><span class="line">7</span><br><span class="line">8</span><br></pre></td><td class="code"><pre><span class="line">Windows Registry Editor Version 5.00</span><br><span class="line"></span><br><span class="line">[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Licenses\e7711be0-3eea-11e8-8294-a0481c909ac9]</span><br><span class="line">@="uoojtlthlhuhomjhumkhohhmtinmtmjhmiviumhhhmtilhlhkmnolhlhknho"</span><br><span class="line"></span><br><span class="line">[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Licenses\e7711be3-3eea-11e8-8294-a0481c909ac9]</span><br><span class="line">@="smmhrjrfjfsfmkhfskifmffkrglkrkgfkgtgskfffkrglhlhkmnolhlhkmno"</span><br><span class="line"></span><br></pre></td></tr></table></figure><h1 id="vb6OCX许可证算法分析"><a href="#vb6OCX许可证算法分析" class="headerlink" title="vb6OCX许可证算法分析"></a>vb6OCX许可证算法分析</h1><blockquote><p>这个是通用VB6 OCX许可证算法,大部分ocx是通用的,但是对TX_Text是无效的,有可能是C++写的问题。</p></blockquote><p><img src="https://imgs.landv.cn/imgs//2023/05/19/08/b2e5d1b9fa1281b3f7d93cdaefc688d3.png" alt="image-20230519085205365"></p><p>蓝奏云:<a href="https://landv.lanzouw.com/ig7je0wjxwkh">https://landv.lanzouw.com/ig7je0wjxwkh</a></p><p>链接: <a href="https://pan.baidu.com/s/1lWJyFLDgXdDPtfHxoMRqEw?pwd=kuyc">https://pan.baidu.com/s/1lWJyFLDgXdDPtfHxoMRqEw?pwd=kuyc</a> 提取码: kuyc 复制这段内容后打开百度网盘手机App,操作更方便哦<br>–来自百度网盘超级会员v9的分享</p>]]></content>
<summary type="html"><p>TX_Text_Control.NET_for_Windows_Forms_ActiveX_WPF_2019_6</p>
<p><a href="https://landv.cn/p/1656f0cc.html">https://landv.cn/p/1656f0cc.ht</summary>
<category term="landv" scheme="https://landv.cn/categories/landv/"/>
<category term="vb" scheme="https://landv.cn/categories/landv/vb/"/>
<category term="ocx" scheme="https://landv.cn/categories/landv/vb/ocx/"/>
<category term="landv" scheme="https://landv.cn/tags/landv/"/>
<category term="vb" scheme="https://landv.cn/tags/vb/"/>
<category term="ocx" scheme="https://landv.cn/tags/ocx/"/>
</entry>
<entry>
<title>SQLServer服务器对象之链接服务器</title>
<link href="https://landv.cn/p/711f9251.html"/>
<id>https://landv.cn/p/711f9251.html</id>
<published>2023-05-15T09:01:09.000Z</published>
<updated>2023-05-15T09:01:09.000Z</updated>
<content type="html"><![CDATA[<h1 id="方法一"><a href="#方法一" class="headerlink" title="方法一"></a>方法一</h1><blockquote><p>只能用ip访问,没有自定义名称</p></blockquote><p>打开SSMS,服务器对象–链接服务器,右键“新建链接服务器”,常规选项,输入链接服务器名称或IP地址,服务器类型选择SQL Server</p><p><img src="https://imgs.landv.cn/imgs//2023/05/15/17/96538efbbc08179af8687f2a680005d9.png" alt="image"></p><p>在安全性选项,选择下面的选项,输入账号和密码,然后点确定即可。</p><p><img src="https://imgs.landv.cn/imgs//2023/05/15/17/6ec6d066c30de8158c033886dfe1a6c1.png" alt="image"></p><p>在SSMS中,服务器对象–链接服务器,就会出现刚刚你建立的链接服务器名称。</p><p>假设刚刚建立的链接服务器名称为10.10.0.1</p><p>测试:</p><p>select top 10 * from [10.10.0.1].[test].[dbo].[test]</p><p>即可查看test数据库中test表的前10行数据。</p><blockquote><p>关于上面的方括号,只有ip地址需要特别括起来,其他随意。</p></blockquote><p>SQL Server之间建立链接服务器和SSMS中连接数据库引擎,服务器名称输入远程SQL Server的IP或名称功能是一样的,估计只是细节和界面不同。</p><p>链接服务器主要用途应该是为了<strong>不同数据库</strong>之间的连接。</p><p>也就说,不仅仅可以连接sql server,Oracle和mysql 之类的都可以。</p><h2 id="方法二"><a href="#方法二" class="headerlink" title="方法二"></a>方法二</h2><p>选择其他数据源,这个就可以自定义名字了。</p><blockquote><p>不要在乎截图上面的错别字,我是偷懒截图的别人的。</p></blockquote><p><img src="https://imgs.landv.cn/imgs//2023/05/15/17/3f81a26286a13c24ce4afc28cba7873e.png" alt="image-20230515170930121"></p><p><img src="https://imgs.landv.cn/imgs//2023/05/15/17/51c0e4e4a1c22668b5bcdbb5c318107d.png" alt="image-20230515171008176"></p>]]></content>
<summary type="html"><h1 id="方法一"><a href="#方法一" class="headerlink" title="方法一"></a>方法一</h1><blockquote>
<p>只能用ip访问,没有自定义名称</p>
</blockquote>
<p>打开SSMS,服务器对象–链接服</summary>
<category term="landv" scheme="https://landv.cn/categories/landv/"/>
<category term="landv" scheme="https://landv.cn/tags/landv/"/>
<category term="sql" scheme="https://landv.cn/tags/sql/"/>
<category term="SSMS" scheme="https://landv.cn/tags/SSMS/"/>
<category term="数据库" scheme="https://landv.cn/tags/%E6%95%B0%E6%8D%AE%E5%BA%93/"/>
</entry>
</feed>