id
int64
0
3.46k
description
stringlengths
5
3.38k
readme
stringlengths
6
512k
500
Throw in the towel.
<p align="center"> <a href="#"><img src="https://github.com/ZacharyPatten/Towel/blob/main/.github/Resources/Logo.svg?raw=true" height="150"></a> </p> <h1 align="center"> Towel </h1> <p align="center"> A .NET library intended to make coding a bit more towelerable: data structures, algorithms, mathematics, metadata, extensions, console, and more. :) </p> > "It's a tough galaxy. If you want to survive, you've gotta know... where your towel is." - Ford Prefect <p align="center"> <a href="https://github.com/ZacharyPatten/Towel"><img src="https://img.shields.io/badge/github-repo-%2324292e?logo=github" title="Go To Github Repo"></a> <a href="https://docs.microsoft.com/en-us/dotnet/csharp/"><img src="https://img.shields.io/badge/language-C%23-%23178600" title="Go To C# Documentation"></a> <a href="https://dotnet.microsoft.com/download"><img src="https://img.shields.io/badge/dynamic/xml?color=%23512bd4&label=target&query=%2F%2FTargetFramework%5B1%5D&url=https%3A%2F%2Fraw.githubusercontent.com%2FZacharyPatten%2FTowel%2Fmain%2FSources%2FTowel%2FTowel.csproj&logo=.net" title="Go To .NET Download"></a> <a href="https://www.nuget.org/packages/Towel"><img src="https://img.shields.io/nuget/v/Towel.svg?logo=nuget" title="Go To Nuget Package" /></a> <a href="https://zacharypatten.github.io/Towel/index.html"><img src="https://github.com/ZacharyPatten/Towel/blob/main/.github/Resources/docfx-badge.svg?raw=true" title="Go To Docfx Documentation"></a> <a href="https://github.com/ZacharyPatten/Towel/actions/workflows/Continuous%20Integration.yml"><img src="https://github.com/ZacharyPatten/Towel/actions/workflows/Continuous%20Integration.yml/badge.svg" title="Go To Action"></a> <a href="https://zacharypatten.github.io/Towel/coveragereport/index.html"><img src="https://img.shields.io/badge/dynamic/xml?color=yellow&label=coverage&query=%2F%2Fcoverage%5B1%5D%2F%40line-rate-percentage&url=https%3A%2F%2Fraw.githubusercontent.com%2FZacharyPatten%2FTowel%2Fgh-pages%2Fcoveragereport%2Fcoverage.xml" title="Go Test Coverage Report" /></a> <a href="https://discord.gg/4XbQbwF"><img src="https://img.shields.io/discord/557244925712924684?logo=discord&logoColor=ffffff&color=7389D8" title="Go To Discord Server" /></a> <a href="https://github.com/ZacharyPatten/Towel/blob/main/License.md"><img src="https://img.shields.io/badge/license-MIT-green.svg" title="Go To License" /></a> </p> > _**Note** This project has a goal of keeping up-to-date on modern coding practices rather than maintaining backwards compatibility such as targetting the latest non-preview version of .NET and embracing favorable breaking changes ("Semantic Versioning" is not being respected at this time)._ ## Getting Started <details> <summary> Run The Included Examples <sub>[Expand]</sub> </summary> <p> > Towel has [Examples](https://github.com/ZacharyPatten/Towel/tree/main/Examples) included in this repository. > > [Download](https://github.com/ZacharyPatten/Towel/archive/main.zip) this repository and unzip the contents. > > There are no custom build processes. Towel should build with any standard .NET build process, but one of the following is recommended: > > <details> > <summary> > Visual Studio <sub>[Expand]</sub> > </summary> > <p> > > > 1. Install [Visual Studio](https://visualstudio.microsoft.com/) if not already installed. > > > > 2. Open the <sub><a href="Towel.sln"><img src="https://raw.githubusercontent.com/ZacharyPatten/Towel/main/.github/Resources/file-16.svg" title="File"></a></sub> **`Towel.sln`** file in Visual Studio. > > > > - _(optional) [Here are some settings you change in Visual Studio](https://gist.github.com/ZacharyPatten/693f35653f6c21fbe6c85444792e524b)._ > > </p> > </details> > > <details> > <summary> > Visual Studio Code <sub>[Expand]</sub> > </summary> > <p> > > > 1. Install the [.NET SDK](https://dotnet.microsoft.com/download) if not already installed. > > > > 2. Install [Visual Studio Code](https://visualstudio.microsoft.com/) if not already installed. > > > > 3. Open the <sub><a href="#"><img src="https://raw.githubusercontent.com/ZacharyPatten/Towel/main/.github/Resources/file-directory-16.svg" title="Directory"></a></sub> **`root folder`** of the repository in Visual Studio Code. > > > > _The following files are included in the repository:_ > > - `.vscode/extensions.json` <sub>recommends Vistual Studio Code extension dependencies</sub> > > - `.vscode/launch.json` <sub>includes the configurations for debugging the examples</sub> > > - `.vscode/settings.json` <sub>automatically applies settings to the workspace</sub> > > - `.vscode/tasks.json` <sub>includes the commands to build the projects</sub> > > > > _Visual Studio Code Extensions (will be prompted to install these when you open the folder):_ > > - `ms-vscode.csharp` <sub>C# support</sub> > > - `formulahendry.dotnet-test-explorer` _(optional)_ <sub>MSTest unit testing support</sub> > > - `aisoftware.tt-processor` _(optional)_ <sub>T4 Template support</sub> > > - `zbecknell.t4-support` _(optional)_ <sub>T4 Template syntax highlighting</sub> > > </p> > </details> </p> </details> <details> <summary> Use Towel In Your .NET Projects <sub>[Expand]</sub> </summary> <p> > - Your project must target the same or newer version of .NET as Towel. [See this documentation on how to check the current target of your project](https://docs.microsoft.com/en-us/dotnet/standard/frameworks). Towel targets the following version of .NET: <sub><sub><a href="https://dotnet.microsoft.com/download"><img src="https://img.shields.io/badge/dynamic/xml?color=%23512bd4&label=target&query=%2F%2FTargetFramework%5B1%5D&url=https%3A%2F%2Fraw.githubusercontent.com%2FZacharyPatten%2FTowel%2Fmain%2FSources%2FTowel%2FTowel.csproj&logo=.net" title="Go To .NET Download"></a></sub></sub> > > - Towel has a nuget package: <sub><sub><a href="https://www.nuget.org/packages/Towel"><img src="https://img.shields.io/nuget/v/Towel.svg?logo=nuget" title="Go To Nuget Package"/></a></sub></sub><br/>Instructions on how to reference the package are included on nuget.org _(click the badge)_. > > - If you use Towel and would be willing to show it, here is a badge you can copy-paste into your readme: <sub><sub><a href="#"><img src="https://github.com/ZacharyPatten/Towel/blob/main/.github/Resources/UsingTowel.svg?raw=true" title="Go To Towel"></a></sub></sub> > ```html > <a href="https://github.com/ZacharyPatten/Towel"><img src="https://github.com/ZacharyPatten/Towel/blob/main/.github/Resources/UsingTowel.svg?raw=true" title="Go To Towel"></a> > ``` > > - Share your work. If you use Towel in one of your projects we want to hear about it. :) </p> </details> <details> <summary> View Documentation <sub>[Expand]</sub> </summary> <p> > - Change Log: https://github.com/ZacharyPatten/Towel/releases > - [docfx](https://github.com/dotnet/docfx) generated API documentation reference: <sub><sub><a href="https://zacharypatten.github.io/Towel/index.html"><img src="https://github.com/ZacharyPatten/Towel/blob/main/.github/Resources/docfx-badge.svg?raw=true" title="Go To Docfx Documentation"></a></sub></sub> > - [Coverlet](https://github.com/coverlet-coverage/coverlet) + [ReportGenerator](https://github.com/danielpalme/ReportGenerator) generated test coverage report: <sub><sub><a href="https://zacharypatten.github.io/Towel/coveragereport/index.html"><img src="https://img.shields.io/badge/dynamic/xml?color=yellow&label=coverage&query=%2F%2Fcoverage%5B1%5D%2F%40line-rate-percentage&url=https%3A%2F%2Fraw.githubusercontent.com%2FZacharyPatten%2FTowel%2Fgh-pages%2Fcoveragereport%2Fcoverage.xml" title="Go Test Coverage Report"/></a></sub></sub> > - [BenchmarkDotNet](https://github.com/dotnet/BenchmarkDotNet) generated benchmarking: https://zacharypatten.github.io/Towel/articles/benchmarks.html > > Relevant Articles: > > - [MSDN Accessing XML Documentation Via Reflection](https://docs.microsoft.com/en-us/archive/msdn-magazine/2019/october/csharp-accessing-xml-documentation-via-reflection)</br> > - [Beginner's Guide To Console Input In C#](https://gist.github.com/ZacharyPatten/798ed612d692a560bdd529367b6a7dbd)</br> > - [Generating Unique Random Data](https://gist.github.com/ZacharyPatten/c9b43a2c9e8a5a5523883e77410f742d)</br> > - [Random Generation (with efficient exclusions)](https://gist.github.com/ZacharyPatten/8de188b2bd358ab5c3517cbb55e83632)</br> > - [Omnitree](https://gist.github.com/ZacharyPatten/f21fc5c6835faea9be8ae4baab4e294e)</br> > - [C# Generic Math](https://gist.github.com/ZacharyPatten/8e1395a94928f2c7715cf939b0d0389c)</br> > > File Structure Overview _(except for <sub><a href="https://github.com/ZacharyPatten/Towel/tree/gh-pages"><img src="https://raw.githubusercontent.com/ZacharyPatten/Towel/main/.github/Resources/git-branch-16.svg" title="Branch"></a></sub> `gh-pages`)_: > > - <sub><a href=".github"><img src="https://raw.githubusercontent.com/ZacharyPatten/Towel/main/.github/Resources/file-directory-16.svg" title="Directory"></a></sub> `.github` <sub>content regarding the GitHub repoistory.</sub> > - <sub><a href=".github/ISSUE_TEMPLATE"><img src="https://raw.githubusercontent.com/ZacharyPatten/Towel/main/.github/Resources/file-directory-16.svg" title="Directory"></a></sub> `ISSUE_TEMPLATE` <sub>templates for issue submissions to the GitHub repository</sub> > - <sub><a href=".github/Resources"><img src="https://raw.githubusercontent.com/ZacharyPatten/Towel/main/.github/Resources/file-directory-16.svg" title="Directory"></a></sub> `Resources` <sub>resources such as image files</sub> > - <sub><a href=".github/workflows"><img src="https://raw.githubusercontent.com/ZacharyPatten/Towel/main/.github/Resources/file-directory-16.svg" title="Directory"></a></sub> `workflows` <sub>[GitHub Actions](https://github.com/ZacharyPatten/Towel/actions) workflows</sub> > - <sub><a href=".github/workflows/Continuous Integration.yml"><img src="https://raw.githubusercontent.com/ZacharyPatten/Towel/main/.github/Resources/play-16.svg" title="Action"></a></sub> `Continuous Integration.yml` <sub>workflow for checking that code compiles and unit tests pass</sub> > - <sub><a href=".github/workflows/Towel Deployment.yml"><img src="https://raw.githubusercontent.com/ZacharyPatten/Towel/main/.github/Resources/play-16.svg" title="Action"></a></sub> `Towel Deployment.yml` <sub>workflow to manage [releases](https://github.com/ZacharyPatten/Towel/releases) and deploy [nuget packages](https://www.nuget.org/packages/Towel)</sub> > - <sub><a href=".github/workflows/Documentation.yml"><img src="https://raw.githubusercontent.com/ZacharyPatten/Towel/main/.github/Resources/play-16.svg" title="Action"></a></sub> `Documentation.yml` <sub>workflow that runs [docfx](https://github.com/dotnet/docfx) + [Coverlet](https://github.com/coverlet-coverage/coverlet) + [ReportGenerator](https://github.com/danielpalme/ReportGenerator) to output [GitHub Pages](https://pages.github.com/) to <sub><a href="https://github.com/ZacharyPatten/Towel/tree/gh-pages"><img src="https://raw.githubusercontent.com/ZacharyPatten/Towel/main/.github/Resources/git-branch-16.svg" title="Branch"></a></sub> `gh-pages`</sub> > - <sub><a href=".github/pull_request_template.md"><img src="https://raw.githubusercontent.com/ZacharyPatten/Towel/main/.github/Resources/file-16.svg" title="File"></a></sub> `pull_request_template.md` <sub>template for when pull requests are created</sub> > - <sub><a href=".vscode"><img src="https://raw.githubusercontent.com/ZacharyPatten/Towel/main/.github/Resources/file-directory-16.svg" title="Directory"></a></sub> `.vscode` <sub>confirguration files for if the code is opened in [Visual Studio Code](https://visualstudio.microsoft.com/)</sub> > - <sub><a href="Examples"><img src="https://raw.githubusercontent.com/ZacharyPatten/Towel/main/.github/Resources/file-directory-16.svg" title="Directory"></a></sub> `Examples` <sub>root folder for all the example projects</sub> > - <sub><a href="Sources"><img src="https://raw.githubusercontent.com/ZacharyPatten/Towel/main/.github/Resources/file-directory-16.svg" title="Directory"></a></sub> `Sources` <sub>root folder for the source code of released nuget packages</sub> > - <sub><a href="Sources/Towel"><img src="https://raw.githubusercontent.com/ZacharyPatten/Towel/main/.github/Resources/file-directory-16.svg" title="Directory"></a></sub> **`Towel` <sub>the root folder for all source code in the Towel nuget package</sub>** > - <sub><a href="Tools"><img src="https://raw.githubusercontent.com/ZacharyPatten/Towel/main/.github/Resources/file-directory-16.svg" title="Directory"></a></sub> `Tools` <sub>root folder for all support projects (not included in nuget packages)</sub> > - <sub><a href="Tools/docfx_project"><img src="https://raw.githubusercontent.com/ZacharyPatten/Towel/main/.github/Resources/file-directory-16.svg" title="Directory"></a></sub> `docfx_project` <sub>root folder for [docfx](https://github.com/dotnet/docfx) project (used in <sub><a href=".github/workflows/Documentation.yml"><img src="https://raw.githubusercontent.com/ZacharyPatten/Towel/main/.github/Resources/play-16.svg" title="Action"></a></sub> `Documentation.yml`)</sub> > - <sub><a href="Tools/docfx_project/articles"><img src="https://raw.githubusercontent.com/ZacharyPatten/Towel/main/.github/Resources/file-directory-16.svg" title="Directory"></a></sub> `articles` <sub>root folder for all articless of the [docfx](https://github.com/dotnet/docfx) generated [GitHub Pages](https://pages.github.com/) website</sub> > - <sub><a href="Tools/docfx_project/apidoc"><img src="https://raw.githubusercontent.com/ZacharyPatten/Towel/main/.github/Resources/file-directory-16.svg" title="Directory"></a></sub> `apidoc` <sub>root folder for all api overrides of the [docfx](https://github.com/dotnet/docfx) generated [GitHub Pages](https://pages.github.com/) website</sub> > - <sub><a href="Tools/docfx_project/docfx.json"><img src="https://raw.githubusercontent.com/ZacharyPatten/Towel/main/.github/Resources/file-16.svg" title="File"></a></sub> `docfx.json` <sub>configuration file that controls [docfx](https://github.com/dotnet/docfx)</sub> > - <sub><a href="Tools/docfx_project/index.md"><img src="https://raw.githubusercontent.com/ZacharyPatten/Towel/main/.github/Resources/file-16.svg" title="File"></a></sub> `index.md` <sub>home page of the [docfx](https://github.com/dotnet/docfx) generated [GitHub Pages](https://pages.github.com/) website</sub> > - <sub><a href="Tools/docfx_project/toc.yml"><img src="https://raw.githubusercontent.com/ZacharyPatten/Towel/main/.github/Resources/file-16.svg" title="File"></a></sub> `toc.yml` <sub>primary navigation for the [docfx](https://github.com/dotnet/docfx) generated [GitHub Pages](https://pages.github.com/) website</sub> > - <sub><a href="Tools/Towel_Benchmarking"><img src="https://raw.githubusercontent.com/ZacharyPatten/Towel/main/.github/Resources/file-directory-16.svg" title="Directory"></a></sub> `Towel_Benchmarking` <sub>project with all the benchmarking for the Towel project</sub> > - <sub><a href="Tools/Towel_Generating"><img src="https://raw.githubusercontent.com/ZacharyPatten/Towel/main/.github/Resources/file-directory-16.svg" title="Directory"></a></sub> `Towel_Generating` <sub>project with code generation for the Towel Project</sub> > - <sub><a href="Tools/Towel_Testing"><img src="https://raw.githubusercontent.com/ZacharyPatten/Towel/main/.github/Resources/file-directory-16.svg" title="Directory"></a></sub> `Towel_Testing` <sub>project with all unit tests for the Towel project (used in <sub><a href=".github/workflows/Continuous Integration.yml"><img src="https://raw.githubusercontent.com/ZacharyPatten/Towel/main/.github/Resources/play-16.svg" title="Action"></a></sub> `Continuous Integration.yml` and <sub><a href=".github/workflows/Documentation.yml"><img src="https://raw.githubusercontent.com/ZacharyPatten/Towel/main/.github/Resources/play-16.svg" title="Action"></a></sub> `Documentation.yml`)</sub> </p> </details> <details> <summary> Get Involved <sub>[Expand]</sub> </summary> <p> > - The easiest way to support Towel is to star the github repository. > > - If you have any questions, you can [start a new discussion](https://github.com/ZacharyPatten/Towel/discussions/new). > > - If you notice anything in Towel that may be improved, please [create a new issue](https://github.com/ZacharyPatten/Towel/issues/new/choose).<br/> > Feature requests are welcome. > > - You can chat with the developer(s) on discord: <sub><sub><a href="https://discord.gg/4XbQbwF"><img src="https://img.shields.io/discord/557244925712924684?logo=discord&logoColor=ffffff&color=7389D8" title="Go To Discord Server"/></a></sub></sub> > > - If you want to contribute to Towel:<br/>&nbsp;&nbsp;1. Fork this repository<br/>&nbsp;&nbsp;2. Make some changes<br/>&nbsp;&nbsp;3. Open a pull request </p> </details> ## Overview <details> <summary> Algorithms <sub>[Expand]</sub> </summary> <p> > ```cs > // supports System.Span<T> and any (non ref struct) int-indexed type > IsPalindrome<...>(...); > > // supports System.ReadOnlySpan<T> > IsInterleavedRecursive<...>(...); > IsInterleavedIterative<...>(...); > > IsReorderOf<...>(...); // aka "anagrams" > > // supports System.Span<T> and any (non ref struct) int-indexed type > SortShuffle<T>(...); > SortBubble<T>(...); > SortSelection<T>(...); > SortInsertion<T>(...); > SortQuick<T>(...); > SortMerge<T>(...); > SortHeap<T>(...); > SortOddEven<T>(...); > SortCocktail<T>(...); > SortComb<T>(...); > SortGnome<T>(...); > SortShell<T>(...); > SortBogo<T>(...); > SortSlow<T>(...); > SortCycle<T>(...); > SortPancake<T>(...); > SortStooge<T>(...); > SortTim<T>(...); > SortIntro<T>(...); > SortCounting<T>(...); // uint-based (non-comparative sort) > SortRadix<T>(...); // uint-based (non-comparative sort) > SortPidgeonHole<T>(...); // int-based (non-comparative sort) > > // supports System.ReadOnlySpan<T> and any (non ref struct) int-indexed type > SearchBinary<T>(...); > > // supports System.ReadOnlySpan<T> and any (non ref struct) int-indexed type > int HammingDistanceIterative<...>(...); > int LevenshteinDistanceRecursive<...>(...); > int LevenshteinDistanceIterative<...>(...); > > // Permutations of sequences > // supports System.Span<T> and any (non ref struct) int-indexed type > void PermuteRecursive<...>(...); > void PermuteIterative<...>(...); > > // Combinations of sequences > void Combinations<...>(...); > > // Path Finding (Graph Search) > // overloads for A*, Dijkstra, and Breadth-First-Search algorithms > SearchGraph<...>(...); > > // Combines ranges without gaps between them > IEnumerable<(T A, T B)> CombineRanges<T>(IEnumerable<(T A, T B)> ranges) > ``` > > > [Sorting Algorithm Benchmarks](https://zacharypatten.github.io/Towel/benchmarks/SortBenchmarks.html) <sub>Note: not all permuations of the input are benchmarked, so take with a grain of salt.</sub><br/> > > [Permute Benchmarks](https://zacharypatten.github.io/Towel/benchmarks/PermuteBenchmarks.html) </p> </details> <details> <summary> Extensions <sub>[Expand]</sub> </summary> <p> > ```cs > // System.Random extensions to generate more random types > // there are overloads to specify possible ranges > string NextString(this Random random, int length); > char NextChar(this Random random); > decimal NextDecimal(this Random random); > DateTime DateTime(this Random random); > TimeSpan TimeSpan(this Random random); > long NextLong(this Random random); > int[] Next(this Random random, int count, int minValue, int maxValue, Span<T> excluded); // with exclusions > int[] NextUnique(this Random random, int count, int minValue, int maxValue); // unique values > int[] NextUnique(this Random random, int count, int minValue, int maxValue, Span<T> excluded); // unique values with exclusions > T Next<T>(this Random random, IEnumerable<(T Value, double Weight)> pool); // weighted values > void Shuffle<T>(this Random random, T[] array); // randomize arrays > > // Type conversion to string definition as appears in C# source code > string ConvertToCSharpSourceDefinition(this Type type); > // Example: typeof(List<int>) -> "System.Collections.Generic.List<int>" > > string ToEnglishWords(this decimal @decimal); > // Example: 42 -> "Forty-Two" > (bool Success, decimal Value) TryParseEnglishWordsToDecimal(string words); > // Example: "Forty-Two" -> 42 > > int TryParseRomanNumeral(string @string); > // Example: "XLII" -> 42 > int TryToRomanNumeral(int value); > // Example: 42 -> "XLII" > > // Reflection Extensions To Access XML Documentation > string GetDocumentation(this Type type); > string GetDocumentation(this FieldInfo fieldInfo); > string GetDocumentation(this PropertyInfo propertyInfo); > string GetDocumentation(this EventInfo eventInfo); > string GetDocumentation(this ConstructorInfo constructorInfo); > string GetDocumentation(this MethodInfo methodInfo); > string GetDocumentation(this MemberInfo memberInfo); > string GetDocumentation(this ParameterInfo parameterInfo); > ``` > > > [Weighted Random Benchmarks](https://zacharypatten.github.io/Towel/benchmarks/WeightedRandomBenchmarks.html)<br/> > > [Random With Exclusions Benchmarks](https://zacharypatten.github.io/Towel/benchmarks/RandomWithExclusionsBenchmarks.html)<br/> > > [decimal To English Words Benchmarks](https://zacharypatten.github.io/Towel/benchmarks/ToEnglishWordsBenchmarks.html) </p> </details> <details> <summary> Data Structures <sub>[Expand]</sub> </summary> <p> > <details> > <summary> > Heap <sub>[Expand]</sub> > </summary> > <p> > > > ```cs > > // A heap is a binary tree that is sorted vertically using comparison methods. This is different > > // from AVL Trees or Red-Black Trees that keep their contents stored horizontally. The rule > > // of a heap is that no parent can be less than either of its children. A Heap using "sifting up" > > // and "sifting down" algorithms to move values vertically through the tree to keep items sorted. > > > > IHeap<T> heap = HeapArray.New<T>(); > > > > // Visualization: > > // > > // Binary Tree > > // > > // -7 > > // / \ > > // / \ > > // / \ > > // / \ > > // / \ > > // / \ > > // / \ > > // / \ > > // -4 1 > > // / \ / \ > > // / \ / \ > > // / \ / \ > > // -1 3 6 4 > > // / \ / \ / \ / \ > > // 30 10 17 51 45 22 19 7 > > // > > // Flattened into an Array > > // > > // Root = 1 > > // Left Child = 2 * Index > > // Right Child = 2* Index + 1 > > // __________________________________________________________________________ > > // |0 |-7 |-4 |1 |-1 |3 |6 |4 |30 |10 |17 |51 |45 |22 |19 |7 |0 |0 |0 ... > > // ‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾ > > // 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 > > ``` > > </p> > </details> > > <details> > <summary> > AVL Tree <sub>[Expand]</sub> > </summary> > <p> > > > ```cs > > // An AVL tree is a binary tree that is sorted using comparison methods and automatically balances > > // itself by tracking the heights of nodes and performing one of four specific algorithms: rotate > > // right, rotate left, double rotate right, or double rotate left. Any parent in an AVL Tree must > > // be greater than its left child but less than its right child (if the children exist). An AVL > > // tree is sorted in the same manor as a Red-Black Tree, but uses different algorithms to maintain > > // the balance of the tree. > > > > IAvlTree<T> avlTree = AvlTreeLinked.New<T>(); > > > > // Visualization: > > // > > // Binary Tree > > // > > // Depth 0 ------------------> 7 > > // / \ > > // / \ > > // / \ > > // / \ > > // / \ > > // / \ > > // / \ > > // / \ > > // Depth 1 ---------> 1 22 > > // / \ / \ > > // / \ / \ > > // / \ / \ > > // Depth 2 ----> -4 4 17 45 > > // / \ / \ / \ / \ > > // Depth 3 ---> -7 -1 3 6 10 19 30 51 > > // > > // Flattened into an Array > > // > > // Root = 1 > > // Left Child = 2 * Index > > // Right Child = 2* Index + 1 > > // __________________________________________________________________________ > > // |0 |7 |1 |22 |-4 |4 |17 |45 |-7 |-1 |3 |6 |10 |19 |30 |51 |0 |0 |0 ... > > // ‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾ > > // 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 > > ``` > > </p> > </details> > > <details> > <summary> > Red Black Tree <sub>[Expand]</sub> > </summary> > <p> > > > ```cs > > // A Red-Black treeis a binary tree that is sorted using comparison methods and automatically > > // balances itself. Any parent in an Red-Black Tree must be greater than its left child but less > > // than its right child (if the children exist). A Red-Black tree is sorted in the same manor as > > // an AVL Tree, but uses different algorithms to maintain the balance of the tree. > > > > IRedBlackTree<T> redBlackTree = RedBlackTreeLinked.New<T>(); > > > > // Visualization: > > // > > // Binary Tree > > // > > // Color Black ----------------> 7 > > // / \ > > // / \ > > // / \ > > // / \ > > // / \ > > // / \ > > // / \ > > // / \ > > // Color Red ---------> 1 22 > > // / \ / \ > > // / \ / \ > > // / \ / \ > > // Color Black ---> -4 4 17 45 > > // / \ / \ / \ / \ > > // Color Red ---> -7 -1 3 6 10 19 30 51 > > // > > // Flattened into an Array > > // > > // Root = 1 > > // Left Child = 2 * Index > > // Right Child = 2* Index + 1 > > // __________________________________________________________________________ > > // |0 |7 |1 |22 |-4 |4 |17 |45 |-7 |-1 |3 |6 |10 |19 |30 |51 |0 |0 |0 ... > > // ‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾ > > // 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 > > ``` > > </p> > </details> > > <details> > <summary> > Omnitree <sub>[Expand]</sub> > </summary> > <p> > > > ```cs > > // An Omnitree is a Spacial Partitioning Tree (SPT) that works on an arbitrary number of dimensions. > > // It stores items sorted along multiple dimensions by dividing spaces into sub-spaces. A 3D > > // version of an SPT is often called an "Octree" and a 2D version of an SPT is often called a > > // "Quadtree." There are two versions of the Omnitree: Points and Bounds. The Points version stores > > // vectors while the Bounds version stores spaces with a minimum and maximum vector. > > > > IOmnitreePoints<T, A1, A2, A3...> omnitreePoints = > > new OmnitreePointsLinked<T, A1, A2, A3...>( > > (T value, out A1 a1, out A2 a2, out A3 a3...) => { ... }); > > > > IOmnitreeBounds<T, A1, A2, A3...> omnitreeBounds = > > new OmnitreeBoundsLinked<T, A1, A2, A3...>( > > (T value, > > out A1 min1, out A1 max1, > > out A2 min2, out A2 max2, > > out A3 min3, out A3 max3...) => { ... }); > > > > // The maximum number of children any node can have is 2 ^ N where N is the number > > // of dimensions of the tree. > > // > > // ------------------------------- > > // | Dimensions | Max # Children | > > // |============|================| > > // | 1 | 2 ^ 1 = 2 | > > // | 2 | 2 ^ 2 = 4 | > > // | 3 | 2 ^ 3 = 8 | > > // | 4 | 2 ^ 4 = 16 | > > // | ... | ... | > > // ------------------------------- > > // > > // Visualizations > > // > > // 1 Dimensional: > > // > > // -1D |-----------|-----------| +1D Children Indexes: > > // -1D: 0 > > // <--- 0 ---> <--- 1 ---> +1D: 1 > > // > > // 2 Dimensional: > > // _____________________ > > // | | | +2D > > // | | | ^ > > // | 2 | 3 | | Children Indexes: > > // | | | | -2D -1D: 0 > > // |----------|----------| | -2D +1D: 1 > > // | | | | +2D -1D: 2 > > // | | | | +2D +1D: 3 > > // | 0 | 1 | | > > // | | | v > > // |__________|__________| -2D > > // > > // -1D <-----------> +1D > > // > > // 3 Dimensional: > > // > > // +3D _____________________ > > // 7 / / /| > > // / / 6 / 7 / | > > // / /---------/----------/ | Children Indexes: > > // / / 2 / 3 /| | -3D -2D -1D: 0 > > // L /_________/__________/ | | -3D -2D +1D: 1 > > // -3D | | | | /| +2D -3D +2D -1D: 2 > > // | | | |/ | ^ -3D +2D +1D: 3 > > // | 2 | 3 | / | | +3D -2D -1D: 4 > > // | | |/| | <-- 5 | +3D -2D +1D: 5 > > // |----------|----------| | | | +3D +2D -1D: 6 > > // | | | | / | +3D +2D +1D: 7 > > // | | | | / | > > // | 0 | 1 | |/ | > > // | | | / v > > // |__________|__________|/ -2D > > // > > // ^ > > // | > > // 4 (behind 0) > > // > > // -1D <-----------> +1D > > // > > // 4 Dimensional: > > // > > // +1D +2D +3D +4D Children Indexes: > > // ^ ^ ^ ^ > > // | | | | -4D -3D -2D -1D: 0 +4D -3D -2D -1D: 8 > > // | | | | -4D -3D -2D +1D: 1 +4D -3D -2D +1D: 9 > > // | | | | -4D -3D +2D -1D: 2 +4D -3D +2D -1D: 10 > > // | | | | -4D -3D +2D +1D: 3 +4D -3D +2D +1D: 11 > > // | | | | -4D +3D -2D -1D: 4 +4D +3D -2D -1D: 12 > > // --- --- --- --- -4D +3D -2D +1D: 5 +4D +3D -2D +1D: 13 > > // | | | | -4D +3D +2D -1D: 6 +4D +3D +2D -1D: 14 > > // | | | | -4D +3D +2D +1D: 7 +4D +3D +2D +1D: 15 > > // | | | | > > // | | | | > > // | | | | > > // v v v v > > // -1D -2D -3D -4D > > // > > // With a value that is in the (+1D, -2D, -3D, +4D)[Index 9] child: > > // > > // +1D +2D +3D +4D > > // ^ ^ ^ ^ > > // | | | | > > // | | | | > > // O--- | | ---O > > // | \ | | / | > > // | \ | | / | > > // --- \ --- --- / --- > > // | \ | | / | > > // | \ | | / | > > // | ---O-----------O--- | > > // | | | | > > // | | | | > > // v v v v > > // -1D -2D -3D -4D > > > > // By default, the omnitree will sort items along each axis and use the median algorithm to determine > > // the point of divisions. However, you can override the subdivision algorithm. For numerical values, > > // the mean algorithm can be used (and is much faster than median). If you know the data set will be > > // relatively evenly distributed within a sub-space, you can even set the subdivision algorithm to > > // calculate the subdivision from parent spaces rather than looking at the current contents of the > > // space. > > > > // The depth of the omnitree is bounded by "ln(count)" the natural log of the current count. When adding > > // and item to the tree, if the number of items in the respective child is greater than ln(count) and > > // the depth bounding has not been reached, then the child will be subdivided. The goal is to achieve > > // Ω(ln(count)) runtime complexity when looking up values. > > ``` > > </p> > </details> > > <details> > <summary> > B-Tree <sub>[Expand]</sub> > </summary> > <p> > > > ```cs > > // a B-tree is a self-balancing tree data structure that maintains > > // sorted data and allows searches, sequential access, insertions, > > // and deletions in logarithmic time. The B-tree generalizes the > > // binary search tree, allowing for nodes with more than two children. > > > > // There are two ways to Add and Remove elements in a B-Tree > > // 1) Pre-emptive: Search the tree from top to bottom (for place to add/ > > // node to delete) and perform fixing of the B-Tree (Splitting > > // or Merging) in a single pass > > // 2) Non Pre-emptive: Add/Remove the required node and go up the tree to > > // fix the tree as needed > > // > > // Pre-emptive methods are optimal, especially if the Maximum Degree of > > // a node is set to an even number. This implementation of B-Tree > > // uses Pre-emptive modes of Add/Removal methods and therefore the > > // value of Maximum Degree is mandated to be even > > > > // This implementation is taken from Thomas H. Cormen's book "Introduction > > // to Algorithms, 3rd edition", Chapter 18: B-Trees > > > > BTree<int> tree = new BTree<int>(4); > > > > tree.Add(20); > > tree.Add(10); > > tree.Add(30); > > tree.Add(50); > > tree.Add(40); > > tree.Add(5); > > tree.Add(15); > > // > > // [20] > > // / \ > > // / \ > > // [5, 10, 15] [30, 40, 50] > > // > > // All elements added in the BTree, where each node can have a maximum > > // of 4 children (and therefore, a maximum of 3 elements) > > > > bool r1 = tree.TryRemove(50).Success; // r1 = true > > bool r2 = tree.TryRemove(50).Success; // r2 = false, 50 is no longer in the tree > > > > // > > // [20] > > // / \ > > // / \ > > // [5, 10, 15] [30, 40] > > > > int[] array = tree.ToArray(); // array = [5, 10, 15, 20, 30, 40] > > ``` > > > </p> > </details> > > <details> > <summary> > Tree <sub>[Expand]</sub> > </summary> > <p> > > > ```cs > > ITree<T> treeMap = TreeMap.New<T>(...); > > ``` > > </p> > </details> > > <details> > <summary> > Graph <sub>[Expand]</sub> > </summary> > <p> > > > ```cs > > // A graph is a data structure that contains nodes and edges. They are useful > > // when you need to model real world scenarios. They also are generally used > > // for particular algorithms such as path finding. The GraphSetOmnitree is a > > // graph that stores nodes in a hashed set and the edges in a 2D omnitree (aka > > // quadtree). > > > > IGraph<int> graph = GraphSetOmnitree.New<int>(); > > // add nodes > > graph.Add(0); > > graph.Add(1); > > graph.Add(2); > > graph.Add(3); > > // add edges > > graph.Add(0, 1); > > graph.Add(1, 2); > > graph.Add(2, 3); > > graph.Add(0, 3); > > // visualization > > // > > // 0 --------> 1 > > // | | > > // | | > > // | | > > // v v > > // 3 <-------- 2 > > ``` > > </p> > </details> > > <details> > <summary> > SkipList <sub>[Expand]</sub> > </summary> > <p> > > > ```cs > > // A skip list is a probabilistic data structure that stores data > > // similar to a Linked List, but has additional layers which allow > > // the list to perform basic operations (add/search/delete) in > > // O(log n) average complexity > > > > SkipList<int, SFunc<int, int, CompareResult>>? list = SkipList.New<int>(5); // create a list with 5 levels > > list.Add(60); > > list.Add(20); > > list.Add(30); > > list.Add(40); > > list.Add(20); > > list.Add(90); > > list.Add(80); > > // #-------------------->| |--------------------------------->NULL > > // #-------------------->| |--------------------------->| |->NULL > > // # ------------------->| |------------------->| |--->| |->NULL > > // # ----------->| |--->| |--->| |----------->| |--->| |->NULL > > // # --->|20|--->|20|--->|30|--->|40|--->|60|--->|80|--->|90|->NULL > > // > > // PS: SkipList nodes are assigned levels randomly, so this is one of the possible configurations obtainable > > bool result; > > result = list.Contains(40); //result = true > > result = list.Remove(40).Suceess; // result = true > > result = list.Contains(40); //result = false > > ``` > > </p> > </details> > > <details> > <summary> > Trie <sub>[Expand]</sub> > </summary> > <p> > > > ```cs > > // A trie is a tree that stores values in a way that partial keys may be shared > > // amongst values to reduce redundant memory usage. They are generally used with > > // large data sets such as storing all the words in the English language. For > > // example, the words "farm" and "fart" both have the letters "far" in common. > > // A trie takes advantage of that and only stores the necessary letters for > > // those words ['f'->'a'->'r'->('t'||'m')]. A trie is not limited to string > > // values though. Any key type that can be broken into pieces (and shared), > > // could be used in a trie. > > // > > // There are two versions. One that only stores the values of the trie (ITrie<T>) > > // and one that stores the values of the trie plus an additional generic value > > // on the leaves (ITrie<T, D>). > > > > ITrie<T> trie = TrieLinkedHashLinked.New<T>(); > > > > ITrie<T, D> trie = TrieLinkedHashLinked.New<T, D>(); > > ``` > > </p> > </details> </p> </details> <details> <summary> Generic Mathematics & Logic <sub>[Expand]</sub> </summary> <p> > <details> > <summary> > How It Works <sub>[Expand]</sub> > </summary> > <p> > > > ```cs > > public static T Addition<T>(T a, T b) > > { > > return AdditionImplementation<T>.Function(a, b); > > } > > > > internal static class AdditionImplementation<T> > > { > > internal static Func<T, T, T> Function = (T a, T b) => > > { > > var A = Expression.Parameter(typeof(T)); > > var B = Expression.Parameter(typeof(T)); > > var BODY = Expression.Add(A, B); > > Function = Expression.Lambda<Func<T, T, T>>(BODY, A, B).Compile(); > > return Function(a, b); > > }; > > } > > ``` > > > > You can break type safe-ness using generic types and runtime compilation, and you can store the runtime compilation in a delegate so the only overhead is the invocation of the delegate. > > </p> > </details> > > ```cs > // Logic Fundamentals > bool Equate<T>(T a , T b); > bool LessThan<T>(T a, T b); > bool GreaterThan<T>(T a, T b); > CompareResult Compare<T>(T a, T b); > > // Mathematics Fundamentals > T Negation<T>(T a); > T Addition<T>(T a, T b); > T Subtraction<T>(T a, T b); > T Multiplication<T>(T a, T b); > T Division<T>(T a, T b); > T Remainder<T>(T a, T b); > > // More Logic > bool IsPrime<T>(T a); > bool IsEven<T>(T a); > bool IsOdd<T>(T a); > T Minimum<T>(T a, T b); > T Maximum<T>(T a, T b); > T Clamp<T>(T value, T floor, T ceiling); > T AbsoluteValue<T>(T a); > bool EqualityLeniency<T>(T a, T b, T leniency); > > // More Numerics > void FactorPrimes<T>(T a, ...); > T Factorial<T>(T a); > T LinearInterpolation<T>(T x, T x0, T x1, T y0, T y1); > T LeastCommonMultiple<T>(T a, T b, params T[] c); > T GreatestCommonFactor<T>(T a, T b, params T[] c); > LinearRegression2D<T>(..., out T slope, out T y_intercept); > > // Statistics > T Mean<T>(T a, params T[] b); > T Median<T>(params T[] values); > Heap<Link<T, int>> Mode<T>(T a, params T[] b); > void Range<T>(out T minimum, out T maximum, ...); > T[] Quantiles<T>(int quantiles, ...); > T GeometricMean<T>(...); > T Variance<T>(...); > T StandardDeviation<T>(...); > T MeanDeviation<T>(...); > > // Vectors > Vector<T> V1 = new Vector<T>(params T[] vector); > Vector<T> V2 = new Vector<T>(params T[] vector); > Vector<T> V3; > T scalar; > V3 = -V1; // Negate > V3 = V1 + V2; // Add > V3 = V1 - V2; // Subtract > V3 = V1 * scalar; // Multiply > V3 = V1 / scalar; // Divide > scalar = V1.DotProduct(V2); // Dot Product > V3 = V1.CrossProduct(V2); // Cross Product > V1.Magnitude; // Magnitude > V3 = V1.Normalize(); // Normalize > bool equal = V1 == V2; // Equal > > // Matrices > Matrix<T> M1 = new Matrix<T>(int rows, int columns); > Matrix<T> M2 = new Matrix<T>(int rows, int columns); > Matrix<T> M3; > Vector<T> V2 = new Vector<T>(params T[] vector); > Vector<T> V3; > T scalar; > M3 = -M1; // Negate > M3 = M1 + M2; // Add > M3 = M1 - M2; // Subtract > M3 = M1 * M2; // Multiply > V3 = M1 * V2; // Multiply (vector) > M3 = M1 * scalar; // Multiply (scalar) > M3 = M1 / scalar; // Divide > M3 = M1 ^ 3; // Power > scalar = M1.Determinent(); // Determinent > M3 = M1.Minor(int row, int column); // Minor > M3 = M1.Echelon(); // Echelon Form (REF) > M3 = M1.ReducedEchelon(); // Reduced Echelon Form (RREF) > M3 = M1.Inverse(); // Inverse > M1.DecomposeLowerUpper(ref M2, ref M3); // Lower Upper Decomposition > bool equal = M1 == M2; // Equal > ``` </p> </details> <details> <summary> Symbolic Mathematics <sub>[Expand]</sub> </summary> <p> > ```cs > // Parsing From Linq Expression > Expression<Func<double, double>> exp1 = (x) => 2 * (x / 7); > Symbolics.Expression symExp1 = Symbolics.Parse(exp1); > > // Parsing From String > Symbolics.Expression symExp2 = Symbolics.Parse("2 * ([x] / 7)"); > > // Mathematical Simplification > Symbolics.Expression simplified = symExp1.Simplify(); > > // Variable Substitution > symExp1.Substitute("x", 5); > ``` </p> </details> <details> <summary> Measurement Mathematics <sub>[Expand]</sub> </summary> <p> > <details> > <summary> > Supported Measurements <sub>[Expand]</sub> > </summary> > <p> > > > Here are the currently supported measurement types: > > > > ```cs > > // Acceleration: Length/Time/Time > > // AngularAcceleration: Angle/Time/Time > > // Angle: Angle > > // AngularSpeed: Angle/Time > > // Area: Length*Length > > // AreaDensity: Mass/Length/Length > > // Density: Mass/Length/Length/Length > > // ElectricCharge: ElectricCharge > > // ElectricCurrent: ElectricCharge/Time > > // Energy: Mass*Length*Length/Time/Time > > // Force: Mass*Length/Time/Time > > // Length: Length > > // LinearDensity: Mass/Length > > // LinearMass: Mass*Length > > // LinearMassFlow: Mass*Length/Time > > // Mass: Mass > > // MassRate: Mass/Time > > // Power: Mass*Length*Length/Time/Time/Time > > // Pressure: Mass/Length/Time/Time > > // Speed: Length/Time > > // Tempurature: Tempurature > > // Time: Time > > // TimeArea: Time*Time > > // Volume: Length*Length*Length > > // VolumeRate: Length*Length*Length/Time > > ``` > > > > The measurement types are generated in the *Towel/Measurements/MeasurementTypes.tt* T4 text template file. The unit (enum) definitions are in the *Towel/Measurements/MeasurementUnitDefinitions.cs* file. Both measurment types and unit definitions can be easily added. If you think a measurement type or unit type should be added, please [submit an enhancement issue](https://github.com/ZacharyPatten/Towel/issues/new/choose). > > </p> > </details> > > ```cs > // Towel has measurement types to help write scientific code: Acceleration<T>, Angle<T>, Area<T>, > // Density<T>, Length<T>, Mass<T>, Speed<T>, Time<T>, Volume<T>, etc. > > // Automatic Unit Conversion > // When you perform mathematical operations on measurements, any necessary unit conversions will > // be automatically performed by the relative measurement type (in this case "Angle<T>"). > Angle<double> angle1 = (90d, Degrees); > Angle<double> angle2 = (.5d, Turns); > Angle<double> result1 = angle1 + angle2; // 270° > > // Type Safeness > // The type safe-ness of the measurement types prevents the miss-use of the measurements. You cannot > // add "Length<T>" to "Angle<T>" because that is mathematically invalid (no operator exists). > Length<double> length1 = (2d, Yards); > object result2 = angle1 + length1; // WILL NOT COMPILE!!! > > // Simplify The Syntax Even Further > // You can use alias to remove the generic type if you want to simplify the syntax even further. > using Speedf = Towel.Measurements.Speed<float>; // at top of file > Speedf speed1 = (5, Meters / Seconds); > > // Vector + Measurements > // You can use the measurement types inside Towel Vectors. > Vector<Speed<float>> velocity1 = new Vector<Speed<float>>( > (1f, Meters / Seconds), > (2f, Meters / Seconds), > (3f, Meters / Seconds)); > Vector<Speedf> velocity2 = new Vector<Speedf>( > (1f, Centimeters / Seconds), > (2f, Centimeters / Seconds), > (3f, Centimeters / Seconds)); > Vector<Speed<float>> velocity3 = velocity1 + velocity2; > > // Manual Unit Conversions > // 1. Index Operator On Measurement Type > double angle1_inRadians = angle1[Radians]; > float speed1_inMilesPerHour = speed1[Miles / Hours]; > // 2. Static Conversion Methods > double angle3 = Angle<double>.Convert(7d, > Radians, // from > Degrees); // to > double speed2 = Speed<double>.Convert(8d, > Meters / Seconds, // from > Miles / Hours); // to > double force1 = Force<double>.Convert(9d, > Kilograms * Meters / Seconds / Seconds, // from > Grams * Miles / Hours / Hours); // to > double angle4 = Measurement.Convert(10d, > Radians, // from > Degrees); // to > // The unit conversion on the Measurement class > // is still compile-time-safe. > > // Measurement Parsing > Speed<float>.TryParse("20.5 Meters / Seconds", > out Speed<float> parsedSpeed); > Force<decimal>.TryParse(".1234 Kilograms * Meters / Seconds / Seconds", > out Force<decimal> parsedForce); > ``` </p> </details> <details> <summary> Console Helpers <sub>[Expand]</sub> </summary> <p> > ```cs > // Just some helper methods for console applications... > > // wait for keypress to continue an intercept input > ConsoleHelper.PromptPressToContinue(...); > // generic method for retrieving validated console input > ConsoleHelper.GetInput<T>(...); > // animated ellipsis character to show processing > ConsoleHelper.AnimatedEllipsis(...); > // render progress bar in console > ConsoleHelper.ProgressBar(...); > // Console.ReadLine() with hidden input characters > ConsoleHelper.HiddenReadLine(); > // easily manage int-based console menus > ConsoleHelper.IntMenu(...); > // preventing console input > ConsoleHelper.FlushInputBuffer(); > ``` </p> </details> <details> <summary> TagAttribute <sub>[Expand]</sub> </summary> <p> > ```cs > // With TagAttribute's you can make value-based attributes so > // you don't always have to make your own custom attribute types. > // Just "tag" a code member with constant values. > > using System; > using Towel; > > var (Found, Value) = typeof(MyClass).GetTag("My Tag"); > Console.WriteLine("My Tag..."); > Console.WriteLine("Found: " + Found); > Console.WriteLine("Value: " + Value); > > [Tag("My Tag", "hello world")] > public class MyClass { } > ``` </p> </details> <details> <summary> SLazy&lt;T&gt; + ValueLazy&lt;T&gt; <sub>[Expand]</sub> </summary> <p> > ```cs > // SLazy<T> is a faster Lazy<T> when using the default > // LazyThreadSafetyMode.ExecutionAndPublication setting. > > SLazy<string> slazy = new(() => "hello world"); > Console.WriteLine(slazy.IsValueCreated); // False > Console.WriteLine(slazy.Value); // hello world > Console.WriteLine(slazy.IsValueCreated); // True > > // ValueLazy<T> is even faster than SLazy<T> but it > // is unsafe as it will potentially call the factory > // delegate multiple times if the struct is copied. > // So please use ValueLazy<T> with caution. > > // There are various types for supporting no multithread lock, > // no exception caching, and publication only locks. > ``` > > > [Initialization Benchmarks](https://zacharypatten.github.io/Towel/benchmarks/LazyInitializationBenchmarks.html)<br/> > > [Caching Benchmarks](https://zacharypatten.github.io/Towel/benchmarks/LazyCachingBenchmarks.html)<br/> > > [Construction Benchmarks](https://zacharypatten.github.io/Towel/benchmarks/LazyConstructionBenchmarks.html) </p> </details> <details> <summary> SpanBuilder&lt;T&gt; + SStringBuilder <sub>[Expand]</sub> </summary> <p> > ```cs > // SpanBuilder<char> is a small helper for initializing > // stack allocated spans. > SpanBuilder<char> span = stackalloc char[10]; > span.AppendLine("ab"); > > // SStringBuilder is a small helper for initializing strings. > // It will append to the span until the capacity is reached > // and then it will revert to a StringBuilder if necessary > // rather than throwing like SpanBuilder<T> does. > SStringBuilder<char> span = stackalloc char[10]; > span.AppendLine("abcdefghijklmnopqrstuvwxyz"); > ``` </p> </details> <details> <summary> Command Line Parser <sub>[Expand]</sub> </summary> <p> > ```cs > // Just put the [Command] attribute on any method you want to call > // from the command line, and call the "HandleArguments" method. > > using System; > using static Towel.CommandLine; > > public static class Program > { > public static void Main(string[] args) > { > HandleArguments(args); > } > > [Command] > public static void A(int a) > { > Console.WriteLine(nameof(A) + " called"); > Console.WriteLine(nameof(a) + ": " + a); > } > } > > // output: > // dotnet run A --a 7 > // A called > // a: 7 > ``` </p> </details>
501
We have made you a wrapper you can't refuse
null
502
一个方便安全研究人员获取每日安全日报的爬虫和推送程序,目前爬取范围包括先知社区、安全客、Seebug Paper、跳跳糖、奇安信攻防社区、棱角社区以及绿盟、腾讯玄武、天融信、360等实验室博客,持续更新中。
<h1 align="center"> SecCrawler </h1> ![SecCrawler](https://socialify.git.ci/Le0nsec/SecCrawler/image?font=Inter&language=1&logo=https%3A%2F%2Favatars.githubusercontent.com%2Fu%2F66706544&owner=1&pattern=Floating%20Cogs&theme=Dark) <h4 align="center"> 一个方便安全研究人员获取每日安全日报的爬虫和推送程序,目前爬取范围包括先知社区、安全客、Seebug Paper、跳跳糖、奇安信攻防社区、棱角社区以及绿盟、腾讯玄武、天融信、360等实验室博客,持续更新中。 </h4> <p align="center"> <a href="https://github.com/Le0nsec/SecCrawler/issues"> <img src="https://img.shields.io/github/issues/Le0nsec/SecCrawler?style=flat-square"> </a> <a href="https://github.com/Le0nsec/SecCrawler/network/members"> <img src="https://img.shields.io/github/forks/Le0nsec/SecCrawler?style=flat-square"> </a> <a href="https://github.com/Le0nsec/SecCrawler/stargazers"> <img src="https://img.shields.io/github/stars/Le0nsec/SecCrawler?style=flat-square"> </a> <a href="https://github.com/Le0nsec/SecCrawler/blob/master/LICENSE"> <img src="https://img.shields.io/github/license/Le0nsec/SecCrawler?style=flat-square"> </a> <a href="https://github.com/RichardLitt/standard-readme"> <img src="https://img.shields.io/badge/readme%20style-standard-brightgreen.svg?style=flat-square"> </a> <a href="https://github.com/Le0nsec/SecCrawler/releases"> <img src="https://img.shields.io/github/v/release/Le0nsec/SecCrawler?include_prereleases&style=flat-square"> </a> <a href="https://github.com/Le0nsec/SecCrawler/releases"> <img src="https://img.shields.io/github/downloads/Le0nsec/SecCrawler/total?color=red&style=flat-square"> </a> </p> ## Table of Contents - [Introduction](#introduction) - [Usage](#usage) - [守护进程](#守护进程配置) - [API](#api) - [先知社区相关配置说明](#先知社区相关配置说明) - [ChromeDriver](#chromedriver) - [微信或QQ推送群](#微信或QQ推送群) - [Features](#features) - [Install](#install) - [Config](#config) - [Demo](#demo) - [Contributing](#contributing) - [License](#license) ## Introduction SecCrawler 是一个跨平台的方便安全研究人员获取每日安全日报的爬虫和机器人推送程序,目前爬取范围包括先知社区、安全客、Seebug Paper、跳跳糖、奇安信攻防社区、棱角社区,机器人推送范围包括企业微信机器人、飞书机器人、钉钉机器人、Server酱、HexQBot(QQ群机器人)、WgpSecBot(微信机器人),持续更新中。 ### Usage 程序使用yml格式的配置文件,第一次使用时请使用`-init`参数在当前文件夹生成默认配置文件,在配置文件中设置爬取的网站和推送机器人相关配置,目前包括在内的网站和推送的机器人在[Features](#features)中可以查看,可以设置每日推送的整点时间以及是否开启API。 ```text _____ _____ _ / ____| / ____| | | | (___ ___ ___| | _ __ __ ___ _| | ___ _ __ \___ \ / _ \/ __| | | '__/ _ \ \ /\ / / |/ _ \ '__| ____) | __/ (__| |____| | | (_| |\ V V /| | __/ | |_____/ \___|\___|\_____|_| \__,_| \_/\_/ |_|\___|_| SecCrawler dev Options: -c file the config file to be used, or generate a config file with the specified name with -init (default "config.yml") -help print help info -init generate a config file -test stop after running once -version print version info ``` - 使用`-h/-help`查看详细命令 - 使用`-c`指定使用的配置文件,或者在生成配置文件时配合`-init`生成指定文件名的配置文件 - 使用`-test`参数执行一次程序后退出 - 使用`-version`输出详细版本信息 如果开启了定时任务(Cron),程序使用定时任务每天根据设置好的时间整点自动运行,编辑好相关配置后后台运行即可。 简单运行命令: ```sh $ nohup ./SecCrawler >> run.log 2>&1 & ``` 或者使用screen ```sh $ screen ./SecCrawler $ ctrl a+d / control a+d # 回到主会话 ``` 如果长期使用,建议配置[守护进程](#守护进程配置)。 ### 守护进程配置 首先执行`vim /etc/systemd/system/SecCrawler.service`输入以下内容: ``` [Unit] Description=SecCrawler After=network.target [Service] Type=simple WorkingDirectory=<SecCrawler Path> ExecStart=<SecCrawler Path>/SecCrawler -c config.yml Restart=on-failure [Install] WantedBy=multi-user.target ``` 其中`<SecCrawler Path>`为SecCrawler可执行文件存放的路径。 保存后执行`systemctl daemon-reload`,现在你就可以使用以下命令来管理程序了: - 启动: systemctl start SecCrawler - 关闭: systemctl stop SecCrawler - 自启: systemctl enable SecCrawler - 状态: systemctl status SecCrawler - 重启: systemctl restart SecCrawler - **查看日志**: journalctl -u SecCrawler 程序旨在帮助安全研究者自动化获取每日更新的安全文章,适用于每日安全日报推送,爬取的安全社区网站范围和支持推送的机器人持续增加中,欢迎在[issues](https://github.com/Le0nsec/SecCrawler/issues)中提供宝贵的建议。 :rocket: 目前 SecCrawler 已在MacOS Apple silicon 、Ubuntu 20.04运行测试通过。 ### API SecCrawler提供了Web API,配合其他工具可以主动调用API进行爬取或推送。 - [API文档](https://www.apifox.cn/apidoc/shared-b613c4fc-56a6-4724-831f-4c1ac5547ab5) - 注意请求API需要带上Authorization头,在配置文件中配置`auth`值 ### 先知社区相关配置说明 先知安全社区设置有反爬措施,官方RSS需要使用 Selenium 调用浏览器进行渲染,SecCrawler 提供了两种方法: - 配置文件中`XianZhi.UseChromeDriver`设置为true:使用 Selenium 调用浏览器渲染,需要用户自行下载对应版本的`ChromeDriver`和`Chrome`,并且在配置文件中指定`ChromeDriver`的路径 - `XianZhi.UseChromeDriver`设置为false:需要用户设置`XianZhi.CustomRSSURL`为无反爬措施的先知社区RSS镜像站地址,如https://xianzhi2rss.xlab.app/feed.xml (笔者不保证无害,这里只做示例,请自行判断是否使用) ### ChromeDriver ChromeDriver镜像站:http://npm.taobao.org/mirrors/chromedriver/ - Windows和Mac用户在[下载Chrome](https://www.google.cn/chrome/)并安装后,下载对应chrome版本的ChromeDriver并在配置文件`config.yml`中指定ChromeDriver的路径 - Linux用户在下载Chrome(链接如下)并安装后,同上编辑配置文件 - [Debian/Ubuntu(64位.deb)](https://dl.google.com/linux/direct/google-chrome-stable_current_amd64.deb) - [Fedora/openSUSE(64位.rpm)](https://dl.google.com/linux/direct/google-chrome-stable_current_x86_64.rpm) > Chrome浏览器可以访问`chrome://version/`查看版本 > 命令行可以使用`google-chrome-stable --version`查看版本 ### 微信或QQ推送群 如果不想自己配置环境,只想获取每日推送,可以扫码加推送群: 如果微信群二维码失效或者人数已满,可以添加微信号:WgpSecBot,然后私聊发送 SecCrawler 进群。 <img src="https://user-images.githubusercontent.com/66706544/161177856-28747b34-c6bc-4048-8ec4-1f3ae7ad1452.jpg" width = "300" alt="" align=center /><img src="https://user-images.githubusercontent.com/66706544/161190566-96e23bb6-c7f8-4811-a52c-fc175b341cfc.jpg" width = "300" alt="" align=center /> ## Features 支持的爬取网站列表: - [x] [先知安全社区](https://xz.aliyun.com/) - [x] [安全客](https://www.anquanke.com/knowledge) (安全知识专区) - [x] [Seebug Paper](https://paper.seebug.org/) - [x] [棱角安全社区](https://forum.ywhack.com/forum-59-1.html) - [x] [跳跳糖](https://tttang.com/) - [x] [奇安信攻防社区](https://forum.butian.net/community/all/newest) - [x] ~~[洞见微信聚合](http://wechat.doonsec.com/)~~ 暂时注释,有需要可自行编译 - [x] 实验室 - [x] [Noah Lab](http://noahblog.360.cn/) - [x] [360 核心安全技术博客](https://blogs.360.net/) - [x] [绿盟科技技术博客](http://blog.nsfocus.net/) - [x] [腾讯安全玄武实验室](https://xlab.tencent.com/) - [x] [天融信阿尔法实验室](http://blog.topsec.com.cn) - [x] [360 Netlab](https://blog.netlab.360.com/) - [x] [斗象能力中心](https://blog.riskivy.com/) - [x] [腾讯安全响应中心](https://security.tencent.com/index.php/blog) - [x] [南京邮电大学小绿草信息安全实验室](https://ctf.njupt.edu.cn/) 支持的推送机器人列表: - [x] [企业微信群机器人](https://work.weixin.qq.com/api/doc/90000/90136/91770) - [x] [HexQBot](https://github.com/Am473ur/HexQBot) (QQ群机器人 自建) - [x] [Server酱](https://sct.ftqq.com/) - [x] [飞书群机器人](https://open.feishu.cn/document/ukTMukTMukTM/ucTM5YjL3ETO24yNxkjN) - [x] [钉钉群机器人](https://open.dingtalk.com/document/robots/custom-robot-access) - [x] [WgpSecBot](https://bot.wgpsec.org) - [ ] [pushplus](http://pushplus.hxtrip.com/) ## Install 你可以在[Releases](https://github.com/Le0nsec/SecCrawler/releases)下载最新的SecCrawler。 或者从源码编译: ```sh $ git clone https://github.com/Le0nsec/SecCrawler.git $ cd SecCrawler $ go build . ``` ## Config `config.yml`配置文件模板注释: ```yml # 设置Selenium使用的ChromeDriver路径,支持相对路径或绝对路径(如果不爬取先知社区可以不用设置) ChromeDriver: ./chromedriver/linux64 Proxy: ProxyUrl: http://127.0.0.1:7890 # 代理地址,支持http/https/socks协议 CrawlerProxyEnabled: false # 是否开启爬虫代理 BotProxyEnabled: false # 是否开启请求机器人代理 Cron: enabled: false # 是否开启定时任务,开启后每天按照指定的时间爬取并推送 time: 11 # 设置定时任务每天整点爬取推送时间,范围 0 ~ 23(整数) Api: enabled: false # 是否开启API debug: false # 是否开启Gin-DEBUG模式 host: 127.0.0.1 port: 8080 auth: auth_key_here # 请求api需要带上Authorization头 Crawler: # 棱角社区 # https://forum.ywhack.com/forum-59-1.html EdgeForum: enabled: false # 先知安全技术社区 # https://xz.aliyun.com/ XianZhi: enabled: false UseChromeDriver: true # 是否使用selenium调用浏览器爬取,设置为true需要指定ChromeDriver地址,为false需要指定没有反爬措施的自定义网址CustomRSSURL CustomRSSURL: "" # SeebugPaper(知道创宇404实验室) # https://paper.seebug.org/ SeebugPaper: enabled: false # 安全客 # https://www.anquanke.com/ Anquanke: enabled: false # 跳跳糖 # http://tttang.com/ Tttang: enabled: false # 奇安信攻防社区 # https://forum.butian.net/community/all/newest QiAnXin: enabled: false # 洞见微信聚合 # http://wechat.doonsec.com/ # DongJian: # enabled: false Lab: enabled: true # 是否开启各大实验室文章爬取 NoahLab: enabled: true Blog360: enabled: true Nsfocus: enabled: true Xlab: enabled: true AlphaLab: enabled: true Netlab: enabled: true RiskivyBlog: enabled: true TSRCBlog: enabled: true X1cT34m: enabled: true Bot: # 企业微信群机器人 # https://work.weixin.qq.com/api/doc/90000/90136/91770 WecomBot: enabled: false key: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx timeout: 2 # 飞书群机器人 # https://open.feishu.cn/document/ukTMukTMukTM/ucTM5YjL3ETO24yNxkjN FeishuBot: enabled: false key: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx timeout: 2 # 钉钉群机器人 # https://open.dingtalk.com/document/robots/custom-robot-access DingBot: enabled: false token: xxxxxxxxxxxxxxxxxxxx timeout: 2 # HexQBot # https://github.com/Am473ur/HexQBot HexQBot: enabled: false api: http://xxxxxx.com/send qqgroup: 0 key: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx timeout: 2 # Server酱 # https://sct.ftqq.com/ ServerChan: enabled: false sendkey: xxxxxxxxxxxxxxxxxxxx timeout: 2 # WgpSecBot # https://bot.wgpsec.org/ WgpSecBot: enabled: false key: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx timeout: 2 ``` ## Demo <p align="center"> <img src="https://user-images.githubusercontent.com/66706544/146009777-d64c1ae8-03b6-4da3-82ff-a4a47b17dcf9.png" /> <img src="https://user-images.githubusercontent.com/66706544/154257622-6d8bb37e-e312-48b8-a4f3-96b145a32555.png" /> </p> ## Contributing 如果您有高质量的安全社区网站希望被爬取,或者想推荐被广泛使用的推送机器人,欢迎联系我微信和邮箱:`leonsec[at]h4ck.fun`或提交[issue](https://github.com/Le0nsec/SecCrawler/issues)和[PR](https://github.com/Le0nsec/SecCrawler/pulls)。 <img src="https://user-images.githubusercontent.com/66706544/155312764-6baef289-7490-43f7-a64f-48b576ab6675.jpg" width = "300" alt="" align=center /> ## License [GNU General Public License v3.0](https://github.com/Le0nsec/SecCrawler/blob/master/LICENSE)
503
An NLP library for building bots, with entity extraction, sentiment analysis, automatic language identify, and so more
![NLPjs logo](screenshots/nlplogo.gif) # NLP.js [![](https://github.com/axa-group/nlp.js/actions/workflows/node.js.yml/badge.svg?branch=master)](https://github.com/axa-group/nlp.js/actions/workflows/node.js.yml) [![Coverage Status](https://coveralls.io/repos/github/axa-group/nlp.js/badge.svg?branch=master)](https://coveralls.io/github/axa-group/nlp.js?branch=master) [![NPM version](https://img.shields.io/npm/v/node-nlp.svg?style=flat)](https://www.npmjs.com/package/node-nlp) [![NPM downloads](https://img.shields.io/npm/dm/node-nlp.svg?style=flat)](https://www.npmjs.com/package/node-nlp) [![Sonarcloud Status](https://sonarcloud.io/api/project_badges/measure?project=axa-group_nlp.js&metric=alert_status)](https://sonarcloud.io/dashboard?id=axa-group_nlp.js) [![Maintainability Rating](https://sonarcloud.io/api/project_badges/measure?project=axa-group_nlp.js&metric=sqale_rating)](https://sonarcloud.io/dashboard?id=axa-group_nlp.js) [![Reliability Rating](https://sonarcloud.io/api/project_badges/measure?project=axa-group_nlp.js&metric=reliability_rating)](https://sonarcloud.io/dashboard?id=axa-group_nlp.js) [![Security Rating](https://sonarcloud.io/api/project_badges/measure?project=axa-group_nlp.js&metric=security_rating)](https://sonarcloud.io/dashboard?id=axa-group_nlp.js) *If you're looking for the version 3 docs, you can find them here* [Version 3](docs/v3/README.md) "NLP.js" is a general natural language utility for nodejs. Currently supporting: - Guess the language of a phrase - Fast _Levenshtein_ distance of two strings - Search the best substring of a string with less _Levenshtein_ distance to a given pattern. - Get stemmers and tokenizers for several languages. - Sentiment Analysis for phrases (with negation support). - Named Entity Recognition and management, multi-language support, and acceptance of similar strings, so the introduced text does not need to be exact. - Natural Language Processing Classifier, to classify an utterance into intents. - NLP Manager: a tool able to manage several languages, the Named Entities for each language, the utterances, and intents for the training of the classifier, and for a given utterance return the entity extraction, the intent classification and the sentiment analysis. Also, it is able to maintain a Natural Language Generation Manager for the answers. - 40 languages natively supported, 104 languages supported with BERT integration - Any other language is supported through tokenization, even fantasy languages ![Hybrid bot](screenshots/hybridbot.gif) ## New in version 4`!` Version 4 is very different from previous versions. Before this version, NLP.js was a monolithic library. The big changes: - Now the library is split into small independent packages. - So every language has its own package - It provides a plugin system, so you can provide your own plugins or replace the existing ones. - It provides a container system for the plugins, settings for the plugins and also pipelines - A pipeline is code defining how the plugins interact. Usually it is linear: there is an input into the plugin, and this generates the input for the next one. As an example, the preparation of a utterance (the process to convert the utterance to a hashmap of stemmed features) is now a pipeline like this: `normalize -> tokenize -> removeStopwords -> stem -> arrToObj` - There is a simple compiler for the pipelines, but they can also be built using a modified version of javascript and python (compilers are also included as plugins, so other languages can be added as a plugin). - NLP.js now includes connectors, a connector is understood to be something that has at least 2 methods: `hear` and `say`. Examples of connectors included: Console Connector, Microsoft Bot Framework Connector and a Direct Line Offline Connector (this one allows you to build a web chatbot using the Microsoft Webchat, but without having to deploy anything in Azure). - Some plugins can be registered by language, so for different languages different plugins will be used. Also some plugins, like NLU, can be registered not only by language but also by domain (a functional set of intents that can be trained separately) - As an example of per-language/domain plugins, a Microsoft LUIS NLU plugin is provided. You can configure your chatbot to use the NLU from NLP.js for some languages/domains, and LUIS for other languages/domains. - Having plugins and pipelines makes it possible to write chatbots by only modifying the configuration and the pipelines file, without modifying the code. ### TABLE OF CONTENTS <!--ts--> - [Installation](#installation) - [QuickStart](docs/v4/quickstart.md) - [Install the library](docs/v4/quickstart.md#install-the-library) - [Create the code](docs/v4/quickstart.md#create-the-code) - [Extracting the corpus into a file](docs/v4/quickstart.md#extracting-the-corpus-into-a-file) - [Extracting the configuration into a file](docs/v4/quickstart.md#extracting-the-configuration-into-a-file) - [Creating your first pipeline](docs/v4/quickstart.md#creating-your-first-pipeline) - [Console Connector](docs/v4/quickstart.md#adding-your-first-connector) - [Extending your bot with the pipeline](docs/v4/quickstart.md#extending-your-bot-with-the-pipeline) - [Adding multiple languages](docs/v4/quickstart.md#adding-multilanguage) - [Adding API and WebChat](docs/v4/quickstart.md#adding-api-and-webchat) - [Using Microsoft Bot Framework](docs/v4/quickstart.md#using-microsoft-bot-framework) - [Recognizing the bot name and the channel](docs/v4/quickstart.md#recognizing-the-bot-name-and-the-channel) - [One bot per connector](docs/v4/quickstart.md#one-bot-per-connector) - [Different port for Microsoft Bot Framework and Webchat](docs/v4/quickstart.md#different-port-for-microsoft-bot-framework-and-webchat) - [Adding logic to an intent](docs/v4/quickstart.md#adding-logic-to-an-intent) - [Mini FAQ](docs/v4/mini-faq.md) - [Web and React Native](docs/v4/webandreact.md) - [Preparing to generate a bundle](docs/v4/webandreact.md#preparing-to-generate-a-bundle) - [Your first web NLP](docs/v4/webandreact.md#your-first-web-nlp) - [Creating a distributable version](docs/v4/webandreact.md#creating-a-distributable-version) - [Load corpus from URL](docs/v4/webandreact.md#load-corpus-from-url) - [QnA](docs/v4/qna.md) - [Install the library and the qna plugin](docs/v4/qna.md#install-the-library-and-the-qna-plugin) - [Train and test a QnA file](docs/v4/qna.md#train-and-test-a-qna-file) - [Extracting the configuration into a file](docs/v4/qna.md#extracting-the-configuration-into-a-file) - [Exposing the bot with a Web and API](docs/v4/qna.md#exposing-the-bot-with-a-web-and-api) - [NER Quickstart](docs/v4/ner-quickstart.md) - [Install the needed packages](docs/v4/ner-quickstart.md#install-the-needed-packages) - [Create the conf.json](docs/v4/ner-quickstart.md#create-the-confjson) - [Create the corpus.json](docs/v4/ner-quickstart.md#create-the-corpusjson) - [Create the heros.json](docs/v4/ner-quickstart.md#create-the-herosjson) - [Create the index.js](docs/v4/ner-quickstart.md#create-the-indexjs) - [Start the application](docs/v4/ner-quickstart.md#start-the-application) - [Stored context](docs/v4/ner-quickstart.md#stored-context) - [NeuralNetwork](docs/v4/neural.md) - [Introduction](docs/v4/neural.md#introduction) - [Installing](docs/v4/neural.md#installing) - [Corpus Format](docs/v4/neural.md#corpus-format) - [Example of use](docs/v4/neural.md#example-of-use) - [Exporting trained model to JSON and importing](docs/v4/neural.md#exporting-trained-model-to-json-and-importing) - [Options](docs/v4/neural.md#options) - [Logger](docs/v4/logger.md) - [Introduction](docs/v4/logger.md#introduction) - [Default logger in @nlpjs/core](docs/v4/logger.md#default-logger-in-nlpjscore) - [Default logger in @nlpjs/basic](docs/v4/logger.md#default-logger-in-nlpjsbasic) - [Adding your own logger to the container](docs/v4/logger.md#adding-your-own-logger-to-the-container) - [@nlpjs/emoji](docs/v4/emoji.md) - [Introduction](docs/v4/emoji.md#introduction) - [Installing](docs/v4/emoji.md#installing) - [Example of use](docs/v4/emoji.md#example-of-use) - [@nlpjs/console-connector](docs/v4/console-connector.md) - [Installation](docs/v4/console-connector.md#installation) - [Example of use inside NLP.js](docs/v4/console-connector.md#example-of-use-inside-nlpjs) - [Example of use of the package](docs/v4/console-connector.md#example-of-use-of-the-package) - [Example of use with @nlpjs/basic](docs/v4/console-connector.md#example-of-use-with-nlpjsbasic) - [@nlpjs/similarity](docs/v4/similarity.md) - [Installation](docs/v4/similarity.md#installation) - [leven](docs/v4/similarity.md#leven) - [similarity](docs/v4/similarity.md#similarity) - [SpellCheck](docs/v4/similarity.md#spellcheck) - [SpellCheck trained with words trained from a text](docs/v4/similarity.md#spellcheck-trained-with-words-trained-from-a-text) - [@nlpjs/nlu](docs/v4/nlu.md) - [Installation](docs/v4/nlu.md#installation) - [NluNeural](docs/v4/nlu.md#nluneural) - [DomainManager](docs/v4/nlu.md#domainmanager) - [NluManager](docs/v4/nlu.md#nlumanager) - [React Native](#react-native) - [Example of use](#example-of-use) - [False Positives](#false-positives) - [Log Training Progress](#log-training-progress) - [Benchmarking](docs/v3/benchmarking.md) - [Language Support](docs/v4/language-support.md) - [Supported languages](docs/v4/language-support.md#supported-languages) - [Sentiment Analysis](docs/v4/language-support.md#sentiment-analysis) - [Comparision with other NLP products](docs/v4/language-support.md#comparision-with-other-nlp-products) - [Example with several languages](docs/v4/language-support.md#example-with-several-languages) - [Language Guesser](docs/v3/language-guesser.md) - [Similar Search](docs/v3/similar-search.md) - [NLU](docs/v3/nlu-manager.md) - [NLU Manager](docs/v3/nlu-manager.md) - [Brain NLU](docs/v3/brain-nlu.md) - [Bayes NLU](docs/v3/bayes-nlu.md) - [Binary Relevance NLU](docs/v3/binary-relevance-nlu.md) - [Logistic Regression NLU](docs/v3/logistic-regression-nlu.md) - [NER Manager](docs/v4/ner-manager.md) - [Enum Named Entities](docs/v4/ner-manager.md#enum-entities) - [Regular Expression Named Entities](docs/v4/ner-manager.md#regex-entities) - [Trim Named Entities](docs/v4/ner-manager.md#trim-entities) - [Utterances with duplicated Entities](docs/v4/ner-manager.md#enum-entities) - [Integration with Duckling](docs/v3/builtin-duckling.md) - [Language support](docs/v3/builtin-duckling.md#language-support) - [How to integrate with duckling](docs/v3/builtin-duckling.md#how-to-integrate-with-duckling) - [Email Extraction](docs/v3/builtin-duckling.md#email-extraction) - [Phone Number Extraction](docs/v3/builtin-duckling.md#phone-number-extraction) - [URL Extraction](docs/v3/builtin-duckling.md#url-extraction) - [Number Extraction](docs/v3/builtin-duckling.md#number-extraction) - [Ordinal Extraction](docs/v3/builtin-duckling.md#ordinal-extraction) - [Dimension Extraction](docs/v3/builtin-duckling.md#dimension-extraction) - [Quantity Extraction](docs/v3/builtin-duckling.md#quantity-extraction) - [Amount of Money Extraction](docs/v3/builtin-duckling.md#amount-of-money-extraction) - [Date Extraction](docs/v3/builtin-duckling.md#date-extraction) - [Builtin Entity Extraction](docs/v3/builtin-entity-extraction.md) - [Email Extraction](docs/v3/builtin-entity-extraction.md#email-extraction) - [IP Extraction](docs/v3/builtin-entity-extraction.md#ip-extraction) - [Hashtag Extraction](docs/v3/builtin-entity-extraction.md#hashtag-extraction) - [Phone Number Extraction](docs/v3/builtin-entity-extraction.md#phone-number-extraction) - [URL Extraction](docs/v3/builtin-entity-extraction.md#url-extraction) - [Number Extraction](docs/v3/builtin-entity-extraction.md#number-extraction) - [Ordinal Extraction](docs/v3/builtin-entity-extraction.md#ordinal-extraction) - [Percentage Extraction](docs/v3/builtin-entity-extraction.md#percentage-extraction) - [Age Extraction](docs/v3/builtin-entity-extraction.md#age-extraction) - [Currency Extraction](docs/v3/builtin-entity-extraction.md#currency-extraction) - [Date Extraction](docs/v3/builtin-entity-extraction.md#date-extraction) - [Duration Extraction](docs/v3/builtin-entity-extraction.md#duration-extraction) - [Sentiment Analysis](docs/v3/sentiment-analysis.md) - [NLP Manager](docs/v4/nlp-manager.md) - [Load/Save](docs/v4/nlp-manager.md#loadsave) - [Import/Export](docs/v4/nlp-manager.md#importexport) - [Context](docs/v4/nlp-manager.md#context) - [Intent Logic (Actions, Pipelines)](docs/v4/nlp-intent-logics.md) - [Slot Filling](docs/v4/slot-filling.md) - [Loading from Excel](docs/v3/loading-from-excel.md) - [Microsoft Bot Framework](docs/v3/microsoft-bot-framework.md) - [Introduction](docs/v3/microsoft-bot-framework.md#introduction) - [Example of use](docs/v3/microsoft-bot-framework.md#example-of-use) - [Recognizer and Slot filling](docs/v3/microsoft-bot-framework.md#recognizer-and-slot-filling) - Languages - [English](https://github.com/axa-group/nlp.js/blob/master/packages/lang-en/README.md) - [Indonesian](https://github.com/axa-group/nlp.js/blob/master/packages/lang-id/README.md) - [Italian](https://github.com/axa-group/nlp.js/blob/master/packages/lang-it/README.md) - [Spanish](https://github.com/axa-group/nlp.js/blob/master/packages/lang-es/README.md) - [Contributing](#contributing) - [Contributors](#contributors) - [Code of Conduct](#code-of-conduct) - [Who is behind it](#who-is-behind-it) - [License](#license) <!--te--> ## Installation If you're looking to use NLP.js in your Node application, you can install via NPM like so: ```bash npm install node-nlp ``` ## React Native There is a version of NLP.js that works in React Native, so you can build chatbots that can be trained and executed on the mobile even without the internet. You can install it via NPM: ```bash npm install node-nlp-rn ``` Some limitations: - No Chinese - The Japanese stemmer is not the complete one - No Excel import - No loading from a file, or saving to a file, but it can still import from JSON and export to JSON. ## Example of use You can see a great example of use in the folder [`/examples/02-qna-classic`](https://github.com/axa-group/nlp.js/tree/master/examples/02-qna-classic). This example is able to train the bot and save the model to a file, so when the bot is started again, the model is loaded instead of being trained again. You can start to build your NLP from scratch with a few lines: ```javascript const { NlpManager } = require('node-nlp'); const manager = new NlpManager({ languages: ['en'], forceNER: true }); // Adds the utterances and intents for the NLP manager.addDocument('en', 'goodbye for now', 'greetings.bye'); manager.addDocument('en', 'bye bye take care', 'greetings.bye'); manager.addDocument('en', 'okay see you later', 'greetings.bye'); manager.addDocument('en', 'bye for now', 'greetings.bye'); manager.addDocument('en', 'i must go', 'greetings.bye'); manager.addDocument('en', 'hello', 'greetings.hello'); manager.addDocument('en', 'hi', 'greetings.hello'); manager.addDocument('en', 'howdy', 'greetings.hello'); // Train also the NLG manager.addAnswer('en', 'greetings.bye', 'Till next time'); manager.addAnswer('en', 'greetings.bye', 'see you soon!'); manager.addAnswer('en', 'greetings.hello', 'Hey there!'); manager.addAnswer('en', 'greetings.hello', 'Greetings!'); // Train and save the model. (async() => { await manager.train(); manager.save(); const response = await manager.process('en', 'I should go now'); console.log(response); })(); ``` This produces the following result in a console: ```bash { utterance: 'I should go now', locale: 'en', languageGuessed: false, localeIso2: 'en', language: 'English', domain: 'default', classifications: [ { label: 'greetings.bye', value: 0.698219120207268 }, { label: 'None', value: 0.30178087979273216 }, { label: 'greetings.hello', value: 0 } ], intent: 'greetings.bye', score: 0.698219120207268, entities: [ { start: 12, end: 14, len: 3, accuracy: 0.95, sourceText: 'now', utteranceText: 'now', entity: 'datetime', resolution: [Object] } ], sentiment: { score: 1, comparative: 0.25, vote: 'positive', numWords: 4, numHits: 2, type: 'senticon', language: 'en' }, actions: [], srcAnswer: 'Till next time', answer: 'Till next time' } ``` ## False Positives By default, the neural network tries to avoid false positives. To achieve that, one of the internal processes is that words never seen by the network are represented as a feature that gives some weight to the `None` intent. So, if you try the previous example with "_I have to go_" it will return the `None` intent because 2 of the 4 words have never been seen while training. If you don't want to avoid those false positives, and you feel more comfortable with classifications into the intents that you declare, then you can disable this behavior by setting the `useNoneFeature` to false: ```javascript const manager = new NlpManager({ languages: ['en'], nlu: { useNoneFeature: false } }); ``` ## Log Training Progress You can also add a log progress, so you can trace what is happening during the training. You can log the progress to the console: ```javascript const nlpManager = new NlpManager({ languages: ['en'], nlu: { log: true } }); ``` Or you can provide your own log function: ```javascript const logfn = (status, time) => console.log(status, time); const nlpManager = new NlpManager({ languages: ['en'], nlu: { log: logfn } }); ``` ## Contributing You can read the guide for how to contribute at [Contributing](CONTRIBUTING.md). ## Contributors [![Contributors](https://contributors-img.firebaseapp.com/image?repo=axa-group/nlp.js)](https://github.com/axa-group/nlp.js/graphs/contributors) Made with [contributors-img](https://contributors-img.firebaseapp.com). ## Code of Conduct You can read the Code of Conduct at [Code of Conduct](CODE_OF_CONDUCT.md). ## Who is behind it`?` This project is developed by AXA Group Operations Spain S.A. If you need to contact us, you can do it at the email [email protected] ## License Copyright (c) AXA Group Operations Spain S.A. Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
504
.NET Client for Telegram Bot API
# .NET Client for Telegram Bot API [![package](https://img.shields.io/nuget/vpre/Telegram.Bot.svg?label=Telegram.Bot&style=flat-square)](https://www.nuget.org/packages/Telegram.Bot) [![Bot API Version](https://img.shields.io/badge/Bot%20API-6.4%20(December%2030,%202022)-f36caf.svg?style=flat-square)](https://core.telegram.org/bots/api#december-30-2022) [![documentations](https://img.shields.io/badge/Documentations-Book-orange.svg?style=flat-square)](https://telegrambots.github.io/book/) [![telegram chat](https://img.shields.io/badge/Support_Chat-Telegram-blue.svg?style=flat-square)](https://t.me/joinchat/B35YY0QbLfd034CFnvCtCA) [![build](https://img.shields.io/azure-devops/build/tgbots/14f9ab3f-313a-4339-8534-e8b96c7763cc/6?style=flat-square&label=master)](https://dev.azure.com/tgbots/Telegram.Bot/_build/latest?definitionId=6&branchName=master) [![build](https://img.shields.io/azure-devops/build/tgbots/14f9ab3f-313a-4339-8534-e8b96c7763cc/10/develop?style=flat-square&label=develop)](https://dev.azure.com/tgbots/Telegram.Bot/_build/latest?definitionId=10&branchName=develop) [![downloads](https://img.shields.io/nuget/dt/Telegram.Bot.svg?style=flat-square&label=Package%20Downloads)](https://www.nuget.org/packages/Telegram.Bot) [![contributors](https://img.shields.io/github/contributors/TelegramBots/Telegram.Bot.svg?style=flat-square&label=Contributors)](https://github.com/TelegramBots/Telegram.Bot/graphs/contributors) [![license](https://img.shields.io/github/license/TelegramBots/telegram.bot.svg?style=flat-square&maxAge=2592000&label=License)](https://raw.githubusercontent.com/TelegramBots/telegram.bot/master/LICENSE) [![Gitpod Ready-to-Code](https://gitpod.io/button/open-in-gitpod.svg)](https://gitpod.io/from-referrer/) **Telegram.Bot** is the most popular .NET Client for 🤖 [Telegram Bot API]. The Bot API is an HTTP-based interface created for developers keen on building bots for [Telegram]. Check 👉 [_Bots: An introduction for developers_] 👈 to understand what a Telegram bot is and what it can do. We, the [Telegram Bots team], mainly focus on developing multiple [NuGet packages] for creating chatbots. > ➡️ If Bot API is too limited for your use cases you can try Telegram Client API implementation written 100% in C# > <https://github.com/wiz0u/WTelegramClient> |Package|Documentation|News Channel|Team|Group Chat| |:-----:|:-----------:|:----------:|:--:|:--------:| | [![package](docs/logo-nuget.png)](https://www.nuget.org/packages/Telegram.Bot) | [![documentations](docs/logo-docs.png)](https://telegrambots.github.io/book/) | [![News Channel](docs/logo-channel.jpg)](https://t.me/tgbots_dotnet) | [![Team](docs/logo-gh.png)](https://github.com/orgs/TelegramBots/people) | [![Group Chat](docs/logo-chat.jpg)](https://t.me/joinchat/B35YY0QbLfd034CFnvCtCA) | | This package on NuGet | Telegram bots book | Subscribe to 📣 [`@tgbots_dotnet`] channel to get our latest news | The team contributing to this work | [Join our chat] 💬 to talk about bots and ask questions | ## 🔨 Getting Started Please check ➡️ [the Quickstart guide]. ## 🚧 Supported Platforms Project targets **.NET Standard 2.0** and **.NET 6** at minimum. ## 📦 Extension Packages This project is referred to as the core package and is always required for developing Telegram bots. There are extension packages that you can include in your bot projects for additional functionality: - [Telegram.Bot.Extensions.LoginWidget] - [Telegram.Bot.Extensions.Passport] ## ✅ Correctness & Testing This project is fully tested using Unit tests and Systems Integration tests before each release. In fact, our test cases are self-documenting and serve as examples for Bot API methods. Once you learn the basics of Telegram chatbots, you will be able to easily understand the code in examples and use it in your own bot projects. ## 🗂 References - [Changelog](CHANGELOG.md) - [Documentation](https://telegrambots.github.io/book/) - [Examples](https://github.com/TelegramBots/telegram.bot.examples) <!-- ---- --> [Telegram Bot API]: https://core.telegram.org/bots/api [Telegram]: https://www.telegram.org/ [_Bots: An introduction for developers_]: https://core.telegram.org/bots [Telegram Bots team]: https://github.com/orgs/TelegramBots/people [NuGet packages]: https://www.nuget.org/profiles/TelegramBots [`@tgbots_dotnet`]: https://t.me/tgbots_dotnet [Join our chat]: https://t.me/joinchat/B35YY0QbLfd034CFnvCtCA [the Quickstart guide]: https://telegrambots.github.io/book/1/quickstart.html [Telegram.Bot.Extensions.LoginWidget]: https://github.com/TelegramBots/Telegram.Bot.Extensions.LoginWidget [Telegram.Bot.Extensions.Passport]: https://github.com/TelegramBots/Telegram.Bot.Extensions.Passport
505
LINE Messaging API SDK for Node.js
# LINE Messaging API SDK for nodejs [![Github Action](https://github.com/line/line-bot-sdk-nodejs/actions/workflows/test.yml/badge.svg)](https://github.com/line/line-bot-sdk-nodejs/actions/workflows/test.yml) [![npmjs](https://badge.fury.io/js/%40line%2Fbot-sdk.svg)](https://www.npmjs.com/package/@line/bot-sdk) ## Introduction The LINE Messaging API SDK for nodejs makes it easy to develop bots using LINE Messaging API, and you can create a sample bot within minutes. ## Documentation See the official API documentation for more information - English: https://developers.line.biz/en/docs/messaging-api/overview/ - Japanese: https://developers.line.biz/ja/docs/messaging-api/overview/ line-bot-sdk-nodejs documentation: https://line.github.io/line-bot-sdk-nodejs/#getting-started ## Requirements * **Node.js** 10 or higher ## Installation Using [npm](https://www.npmjs.com/): ``` bash $ npm install @line/bot-sdk --save ``` ## Help and media FAQ: https://developers.line.biz/en/faq/ Community Q&A: https://www.line-community.me/questions News: https://developers.line.biz/en/news/ Twitter: @LINE_DEV ## Versioning This project respects semantic versioning See http://semver.org/ ## Contributing Please check [CONTRIBUTING](CONTRIBUTING.md) before making a contribution. ## License ``` Copyright (C) 2016 LINE Corp. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. ```
506
A guide to creating Steam bots and websites using Node.js
# Andrew's Guide to Steam Bots [![Codacy][codacy-img]][codacy-url] [![PayPal][paypal-img]][paypal-url] [![Steam Donate][steam-img]][steam-url] [![Creative Commons][cc-img]][cc-url] A complete guide to building Steam bots using Node.js. ## Table of Contents - [Chapter 1 - Basics](./Chapter%201%20-%20Basics) - [Chapter 1.1 - Introduction](./Chapter%201%20-%20Basics/Chapter%201.1%20-%20Introduction) - [Chapter 1.2 - Prerequisites](./Chapter%201%20-%20Basics/Chapter%201.2%20-%20Prerequisites) - [Chapter 1.3 - Starting to Code](./Chapter%201%20-%20Basics/Chapter%201.3%20-%20Starting%20to%20Code) - [Chapter 1.4 - TOTP](./Chapter%201%20-%20Basics/Chapter%201.4%20-%20TOTP) - [Chapter 1.5 - Errors](./Chapter%201%20-%20Basics/Chapter%201.5%20-%20Errors) - [Chapter 2 - Trading](./Chapter%202%20-%20Trading) - [Chapter 2.1 - Prerequisites](./Chapter%202%20-%20Trading/Chapter%202.1%20-%20Prerequisites) - [Chapter 2.2 - Handling Trade Offers](./Chapter%202%20-%20Trading/Chapter%202.2%20-%20Handling%20Trade%20Offers) - [Chapter 2.3 - Sending Trade Offers](./Chapter%202%20-%20Trading/Chapter%202.3%20-%20Sending%20Trade%20Offers) - [Chapter 2.4 - Accepting Donations](./Chapter%202%20-%20Trading/Chapter%202.4%20-%20Accepting%20Donations) - [Chapter 3 - User Interaction](./Chapter%203%20-%20User%20Interaction) - [Chapter 3.1 - Friend Requests](./Chapter%203%20-%20User%20Interaction/Chapter%203.1%20-%20Friend%20Requests) - [Chapter 4 - Basics of Web Development](./Chapter%204%20-%20Basics%20of%20Web%20Development) - [Chapter 4.1 - Prerequisites](./Chapter%204%20-%20Basics%20of%20Web%20Development/Chapter%204.1%20-%20Prerequisites) - [Chapter 4.2 - Base App](./Chapter%204%20-%20Basics%20of%20Web%20Development/Chapter%204.2%20-%20Base%20App) - [Chapter 4.3 - Templates](./Chapter%204%20-%20Basics%20of%20Web%20Development/Chapter%204.3%20-%20Templates) - [Chapter 4.4 - Databases](./Chapter%204%20-%20Basics%20of%20Web%20Development/Chapter%204.4%20-%20Databases) - [Chapter 4.5 - WebSockets](./Chapter%204%20-%20Basics%20of%20Web%20Development/Chapter%204.5%20-%20WebSockets) - [Chapter 5 - Advanced Web Development](./Chapter%205%20-%20Advanced%20Web%20Development) - [Chapter 5.1 - Prerequisites](./Chapter%205%20-%20Advanced%20Web%20Development/Chapter%205.1%20-%20Prerequisites) - [Chapter 5.2 - Authentication](./Chapter%205%20-%20Advanced%20Web%20Development/Chapter%205.2%20-%20Authentication) - [Chapter 6 - Connecting Sites and Bots](./Chapter%206%20-%20Connecting%20Sites%20and%20Bots) - [Chapter 6.1 - Prerequisites](./Chapter%206%20-%20Connecting%20Sites%20and%20Bots/Chapter%206.1%20-%20Prerequisites) - [Chapter 6.2 - Getting Started](./Chapter%206%20-%20Connecting%20Sites%20and%20Bots/Chapter%206.2%20-%20Getting%20Started) - [Chapter 6.3 - Beginning the Connection](./Chapter%206%20-%20Connecting%20Sites%20and%20Bots/Chapter%206.3%20-%20Beginning%20the%20Connection) *(more chapters to come)* ## Inspiration Many people in the [/r/SteamBot](https://reddit.com/r/SteamBot) and [/r/SteamBotMarket](https://reddit.com/r/SteamBotMarket) communities have been looking for a complete guide to building Node.js Steam bots, but there really isn't a complete, up-to-date tutorial online anywhere. This guide is here to help out anyone and everyone who wants to learn about creating Steam bots. When I first started creating Steam bots in the early ages about 2 years ago, it was fairly overwhelming. Trying to piece together different modules in order to form a functioning bot was a real struggle – but I'm looking help save new-comers the struggle of learning the new and modern Steam technologies. Together, we'll learn how to make bots and connect them to websites in this multi-chapter guide. ## Projects In this course, you'll be making a number of mini-projects, which will all come together to create the final website. Eventually we'll end up with a site which can be used to make profit by selling and buying TF2 or CS:GO skins, similar to http://cs.money/. ## Contributing Please read the [contribution guidelines](/CONTRIBUTING.md) before creating a Pull Request. ## Donating If you found this guide useful, there are a few ways for you to support me and keep this project going: - [Steam](https://steamcommunity.com/tradeoffer/new/?partner=132224795&token=HuEE9Mk1) - [Patreon](https://www.patreon.com/andrewda) <!-- Badge URLs --> [codacy-img]: https://img.shields.io/codacy/grade/5822ba91cc994725932f71ee6b926400.svg?style=flat-square [codacy-url]: https://www.codacy.com/app/andrewda/node-steam-guide [paypal-img]: https://img.shields.io/badge/donate-PayPal-blue.svg?style=flat-square [paypal-url]: https://www.paypal.me/andrewda/5 [steam-img]: https://img.shields.io/badge/donate-Steam-lightgrey.svg?style=flat-square [steam-url]: https://steamcommunity.com/tradeoffer/new/?partner=132224795&token=HuEE9Mk1 [cc-img]: https://i.creativecommons.org/l/by/4.0/88x31.png [cc-url]: https://creativecommons.org/licenses/by/4.0/
507
LINE Messaging API SDK for Go
# LINE Messaging API SDK for Go [![Build Status](https://github.com/line/line-bot-sdk-go/actions/workflows/go.yml/badge.svg?branch=master)](https://github.com/line/line-bot-sdk-go/actions) [![codecov](https://codecov.io/gh/line/line-bot-sdk-go/branch/master/graph/badge.svg)](https://codecov.io/gh/line/line-bot-sdk-go) [![GoDoc](http://img.shields.io/badge/go-documentation-blue.svg?style=flat-square)](http://godoc.org/github.com/line/line-bot-sdk-go/linebot) [![Go Report Card](https://goreportcard.com/badge/github.com/line/line-bot-sdk-go)](https://goreportcard.com/report/github.com/line/line-bot-sdk-go) ## Introduction The LINE Messaging API SDK for Go makes it easy to develop bots using LINE Messaging API, and you can create a sample bot within minutes. ## Documentation See the official API documentation for more information. - English: https://developers.line.biz/en/docs/messaging-api/overview/ - Japanese: https://developers.line.biz/ja/docs/messaging-api/overview/ ## Requirements This library requires Go 1.11 or later. ## Installation ## ```sh $ go get -u github.com/line/line-bot-sdk-go/v7/linebot ``` ## Configuration ## ```go import ( "github.com/line/line-bot-sdk-go/v7/linebot" ) func main() { bot, err := linebot.New("<channel secret>", "<channel access token>") ... } ``` ### Configuration with http.Client ### ```go client := &http.Client{} bot, err := linebot.New("<channel secret>", "<channel accsss token>", linebot.WithHTTPClient(client)) ... ``` ## How to start ## The LINE Messaging API uses the JSON data format. ```ParseRequest()``` will help you to parse the ```*http.Request``` content and return a slice of Pointer point to Event Object. ```go events, err := bot.ParseRequest(req) if err != nil { // Do something when something bad happened. } ``` The LINE Messaging API defines 7 types of event - ```EventTypeMessage```, ```EventTypeFollow```, ```EventTypeUnfollow```, ```EventTypeJoin```, ```EventTypeLeave```, ```EventTypePostback```, ```EventTypeBeacon```. You can check the event type by using ```event.Type``` ```go for _, event := range events { if event.Type == linebot.EventTypeMessage { // Do Something... } } ``` ### Receiver ### To send a message to a user, group, or room, you need either an ID ```go userID := event.Source.UserID groupID := event.Source.GroupID RoomID := event.Source.RoomID ``` or a reply token. ```go replyToken := event.ReplyToken ``` ### Create message ### The LINE Messaging API provides various types of message. To create a message, use ```New<Type>Message()```. ```go leftBtn := linebot.NewMessageAction("left", "left clicked") rightBtn := linebot.NewMessageAction("right", "right clicked") template := linebot.NewConfirmTemplate("Hello World", leftBtn, rightBtn) message := linebot.NewTemplateMessage("Sorry :(, please update your app.", template) ``` ### Send message ### With an ID, you can send message using ```PushMessage()``` ```go var messages []linebot.SendingMessage // append some message to messages _, err := bot.PushMessage(ID, messages...).Do() if err != nil { // Do something when some bad happened } ``` With a reply token, you can reply to messages using ```ReplyMessage()``` ```go var messages []linebot.SendingMessage // append some message to messages _, err := bot.ReplyMessage(replyToken, messages...).Do() if err != nil { // Do something when some bad happened } ``` ## Help and media FAQ: https://developers.line.biz/en/faq/ Community Q&A: https://www.line-community.me/questions News: https://developers.line.biz/en/news/ Twitter: @LINE_DEV ## Versioning This project respects semantic versioning. See http://semver.org/ ## Contributing Please check [CONTRIBUTING](CONTRIBUTING.md) before making a contribution. ## License ``` Copyright (C) 2016 LINE Corp. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. ```
508
LINE Messaging API SDK for Java
# LINE Messaging API SDK for Java [![Maven Central](https://maven-badges.herokuapp.com/maven-central/com.linecorp.bot/line-bot-model/badge.svg)](https://maven-badges.herokuapp.com/maven-central/com.linecorp.bot/line-bot-model) [![javadoc](https://javadoc.io/badge2/com.linecorp.bot/line-bot-model/javadoc.svg)](https://javadoc.io/doc/com.linecorp.bot/line-bot-model) [![codecov](https://codecov.io/gh/line/line-bot-sdk-java/branch/master/graph/badge.svg)](https://codecov.io/gh/line/line-bot-sdk-java) ## Introduction The LINE Messaging API SDK for Java makes it easy to develop bots using LINE Messaging API, and you can create a sample bot within minutes. ## Documentation See the official API documentation for more information. - English: https://developers.line.biz/en/docs/messaging-api/overview/ - Japanese: https://developers.line.biz/ja/docs/messaging-api/overview/ ## Requirements This library requires Java 8 or later. ## Installation We've uploaded this library to the Maven Central Repository. You can install the modules using Maven or Gradle. http://search.maven.org/#search%7Cga%7C1%7Cg%3A%22com.linecorp.bot%22 ## Modules This project contains the following modules: * line-bot-api-client: API client library for the Messaging API * line-bot-model: Model classes for the Messaging API * line-bot-servlet: Java servlet utilities for bot servers * line-bot-spring-boot: Spring Boot auto configuration library for bot servers This project contains the following sample projects: * sample-spring-boot-echo: A simple echo server. * sample-spring-boot-kitchensink: Full featured sample code. ## Spring Boot integration The line-bot-spring-boot module lets you build a bot application as a Spring Boot application. ```java /* * Copyright 2016 LINE Corporation * * LINE Corporation licenses this file to you under the Apache License, * version 2.0 (the "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at: * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the * License for the specific language governing permissions and limitations * under the License. */ package com.example.bot.spring.echo; import org.springframework.boot.SpringApplication; import org.springframework.boot.autoconfigure.SpringBootApplication; import com.linecorp.bot.model.event.Event; import com.linecorp.bot.model.event.MessageEvent; import com.linecorp.bot.model.event.message.TextMessageContent; import com.linecorp.bot.model.message.TextMessage; import com.linecorp.bot.spring.boot.annotation.EventMapping; import com.linecorp.bot.spring.boot.annotation.LineMessageHandler; @SpringBootApplication @LineMessageHandler public class EchoApplication { public static void main(String[] args) { SpringApplication.run(EchoApplication.class, args); } @EventMapping public TextMessage handleTextMessageEvent(MessageEvent<TextMessageContent> event) { System.out.println("event: " + event); return new TextMessage(event.getMessage().getText()); } @EventMapping public void handleDefaultMessageEvent(Event event) { System.out.println("event: " + event); } } ``` ## How do I use a proxy server? You can use `LineMessagingServiceBuilder` to configure a proxy server. It accepts your own OkHttpBuilder instance. Note: You don't need to use an add-on like Fixie to have static IP addresses for proxy servers. You can make API calls without entering IP addresses on the server IP whitelist. ## Help and media FAQ: https://developers.line.biz/en/faq/ Community Q&A: https://www.line-community.me/questions News: https://developers.line.biz/en/news/ Twitter: [@LINE_DEV](https://twitter.com/LINE_DEV) ## Versioning This project respects semantic versioning. See http://semver.org/. ## Version 5.x and 6.x This library provides the Spring Boot binding. And there are some incompatible changes between Spring Boot 2.x and 3.x. As a result, line-bot-sdk-java maintainers maintain two maintenance lines until the end of the life of Spring Boot 2.x. - line-bot-sdk-java 6.x supports Spring Boot 3.x and Jakarta EE, Java 17+(Branch: master). - line-bot-sdk-java 5.x supports Spring Boot 2.x and Java EE, Java 8+(branch: maint/5.x). Spring Boot 2.x is scheduled for retirement on 2023/11/18. This means that line-bot-sdk-java 5.x will be retired on 2023/11/18. https://endoflife.date/spring-boot We will add new features to line-bot-sdk-java 6.x. But if you send us a backport patch for maint/5.x branch, we might apply it :) ## Contributing Please check [CONTRIBUTING](CONTRIBUTING.md) before making a contribution. ## License Copyright (C) 2016 LINE Corp. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.
509
Modern Telegram Bot Framework for Node.js
null
510
LINE Messaging API SDK for PHP
# LINE Messaging API SDK for PHP [![Build Status](https://github.com/line/line-bot-sdk-php/actions/workflows/php-checks.yml/badge.svg?branch=master)](https://github.com/line/line-bot-sdk-php/actions) ## Introduction The LINE Messaging API SDK for PHP makes it easy to develop bots using LINE Messaging API, and you can create a sample bot within minutes. ## Documentation See the official API documentation for more information. - English: https://developers.line.biz/en/docs/messaging-api/overview/ - Japanese: https://developers.line.biz/ja/docs/messaging-api/overview/ ## Requirements - PHP 7.2 or later ## Installation Install the LINE Messaging API SDK using [Composer](https://getcomposer.org/). ``` $ composer require linecorp/line-bot-sdk ``` ## Getting started ### Create the bot client instance The bot client instance is a handler of the Messaging API. ```php $httpClient = new \LINE\LINEBot\HTTPClient\CurlHTTPClient('<channel access token>'); $bot = new \LINE\LINEBot($httpClient, ['channelSecret' => '<channel secret>']); ``` The constructor of the bot client requires an instance of `HTTPClient`. This library provides `CurlHTTPClient` by default. ### Call API You can call an API through the bot client instance. A very simple example: ```php $response = $bot->replyText('<reply token>', 'hello!'); ``` This procedure sends a message to the destination that is associated with `<reply token>`. A more advanced example: ```php $textMessageBuilder = new \LINE\LINEBot\MessageBuilder\TextMessageBuilder('hello'); $response = $bot->replyMessage('<reply token>', $textMessageBuilder); if ($response->isSucceeded()) { echo 'Succeeded!'; return; } // Failed echo $response->getHTTPStatus() . ' ' . $response->getRawBody(); ``` `LINEBot#replyMessage()` takes the reply token and `MessageBuilder`. The method sends a message that is built by `MessageBuilder` to the destination. ## Components ### MessageBuilder The type of message that is sent depends on the type of instance of `MessageBuilder`. For example, the method sends a text message if you pass `TextMessageBuilder` and it sends an image message if you pass `ImageMessageBuilder`. For more detailed information on `MessageBuilder`, see `\LINE\LINEBot\MessageBuilder` and the namespace. Other methods that take `MessageBuilder` behave in the same way. ### Response Methods that call API returns `Response`. A `Response` instance has following methods: - `Response#isSucceeded()` - `Response#getHTTPStatus()` - `Response#getRawBody()` - `Response#getJSONDecodedBody()` - `Response#getHeader($name)` - `Response#getHeaders()` You can use these methods to check the response status and take response body. #### `Response#isSucceeded()` Returns a Boolean value. The return value represents whether the request succeeded or not. #### `Response#getHTTPStatus()` Returns the HTTP status code of a response. #### `Response#getRawBody()` Returns the body of the response as raw data (a byte string). #### `Response#getJSONDecodedBody()` Returns the body that is decoded in JSON. This body is an array. #### `Response#getHeader($name)` This method returns a response header string, or null if the response does not have a header of that name. #### `Response#getHeaders()` This method returns all of the response headers as string array. ### Webhook LINE's server sends user actions (such as a message, image, or location) to your bot server. Request of that contains event(s); event is action of the user. The following shows how the webhook is handled: 1. Receive webhook from LINE's server. 2. Parse request payload by `LINEBot#parseEventRequest($body, $signature)`. 3. Iterate parsed events and some react as you like. The following examples show how webhooks are handled: - [EchoBot: Route.php](/examples/EchoBot/src/LINEBot/EchoBot/Route.php) - [KitchenSink: Route.php](/examples/KitchenSink/src/LINEBot/KitchenSink/Route.php) More information -- For more information, see the [official API documents](#documentation) and PHPDoc. If it's your first time using this library, we recommend taking a look at `examples` and the PHPDoc of `\LINE\LINEBot`. Hints -- ### Examples This repository contains two examples of how to use the LINE Messaging API. #### [EchoBot](/examples/EchoBot) A simple sample implementation. This application reacts to text messages that are sent from users. #### [KitchenSink](/examples/KitchenSink) A full-stack (and slightly complex) sample implementation. This application demonstrates a practical use of the LINE Messaging API. ### PHPDoc [https://line.github.io/line-bot-sdk-php/](https://line.github.io/line-bot-sdk-php/) This library provides PHPDoc to describe how to use the methods. You can generate the documentation using [phpDocumenter](https://docs.phpdoc.org/) using the following command. ``` $ wget https://github.com/phpDocumentor/phpDocumentor/releases/download/v3.0.0/phpDocumentor.phar $ php phpDocumentor.phar run -d src -t docs ``` The HTML files are generated in `docs/`. ### Official API documentation [Official API documents](#documentation) shows the detail of Messaging API and fundamental usage of SDK. Notes -- ### How to switch the HTTP client implementation 1. Implement `\LINE\LINEBot\HTTPClient` 2. Pass the implementation to the constructor of `\LINE\LINEBot` Please refer [CurlHTTPClient](/src/LINEBot/HTTPClient/CurlHTTPClient.php) that is the default HTTP client implementation. See also -- ### [line-bot-sdk-tiny](./line-bot-sdk-tiny) A very simple SDK (subset) for the LINE Messaging API for PHP. line-bot-sdk-tiny provides a simple interface and functions which makes it a good way to learn how to use the LINE Messaging API. ### Laravel Support Easy to use from Laravel. After installed, add `LINE_BOT_CHANNEL_ACCESS_TOKEN` and `LINE_BOT_CHANNEL_SECRET` to `.env` ``` LINE_BOT_CHANNEL_ACCESS_TOKEN=<Channel Access Token> LINE_BOT_CHANNEL_SECRET=<Channel Secret> ``` then you can use `LINEBot` facade like following. ``` $profile = \LINEBot::getProfile($userId); ``` ## Help and media FAQ: https://developers.line.biz/en/faq/ Community Q&A: https://www.line-community.me/questions News: https://developers.line.biz/en/news/ Twitter: [@LINE_DEV](https://twitter.com/LINE_DEV) ## Versioning This project respects semantic versioning. See http://semver.org/ ## Contributing Please check [CONTRIBUTING](CONTRIBUTING.md) before making a contribution. For hacking instructions, please refer [HACKING.md](/HACKING.md). ## License ``` Copyright 2016 LINE Corporation Licensed under the Apache License, version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at https://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. ```
511
The Telegram Bot Framework.
<div align="center"><a href="https://grammy.dev"><img src="https://raw.githubusercontent.com/grammyjs/website/main/logos/grammY.png" alt="grammY"></a></h1></div> <div align="right"> # The Telegram Bot Framework. </div> <div align="center"> <!-- deno-fmt-ignore-start --> [![Bot API](https://img.shields.io/badge/Bot%20API-6.5-blue?logo=telegram&style=flat&labelColor=000&color=3b82f6)](https://core.telegram.org/bots/api) [![Deno](https://shield.deno.dev/x/grammy)](https://deno.land/x/grammy) [![npm](https://img.shields.io/npm/v/grammy?logo=npm&style=flat&labelColor=000&color=3b82f6)](https://www.npmjs.org/package/grammy) [![All Contributors](https://img.shields.io/github/all-contributors/grammyjs/grammy?style=flat&labelColor=000&color=3b82f6)](#contributors-) <!-- deno-fmt-ignore-end --> ## _[docs.](https://grammy.dev) [reference.](https://deno.land/x/grammy/mod.ts) [chat.](https://telegram.me/grammyjs) [news.](https://telegram.me/grammyjs_news)_ </div> **grammY makes it easy to create Telegram bots.** Both for beginners and at scale. You want grammY because it is easy to use. It is very powerful and always up to date. It has the best [documentation](https://grammy.dev) in town. It is extremely efficient and scales up effortlessly. It has a thriving ecosystem of plugins, a friendly community chat, seamless integrations with web frameworks and databases, and so much more. Are you ready? 🤖🚀 Bots are written in [TypeScript](https://www.typescriptlang.org/) (or JavaScript) and run on [Node.js](https://nodejs.org/) or [Deno](#deno-support). ## Quickstart > If you are new to Telegram bots, read the official [Introduction for Developers](https://core.telegram.org/bots) written by the Telegram team. Visit [@BotFather](https://t.me/BotFather) and create a new bot. You will obtain a **bot token**. Create a new directory and run ```bash npm install grammy ``` inside it. Then create a file `bot.js` with this content: ```ts const { Bot } = require("grammy"); // Create a bot object const bot = new Bot(""); // <-- place your bot token in this string // Register listeners to handle messages bot.on("message:text", (ctx) => ctx.reply("Echo: " + ctx.message.text)); // Start the bot (using long polling) bot.start(); ``` Now you can run the bot via ```bash node bot.js ``` and it will echo all received text messages. Congrats! You just wrote a Telegram bot :) ## Going Further grammY has an excellent [documentation](https://grammy.dev), and an [API Reference](https://doc.deno.land/https://deno.land/x/grammy/mod.ts). It even integrates with your code editor, e.g. [VSCode](https://code.visualstudio.com/). You can hover over any element of grammY to get a detailed description of what that thing does or means. If you are still stuck, just join the [Telegram chat](https://t.me/grammyjs) and ask for help. People are nice there and we appreciate your question, no matter what it is :) Here are some more resources to support you: ## Resources ### [grammY Website](https://grammy.dev) —main project website and documentation. Gets you started and explains all concepts. ### [grammY API Reference](https://doc.deno.land/https://deno.land/x/grammy/mod.ts) —reference of everything that grammY exports. Useful to look up descriptions about any element of grammY. ### [grammY Example Bots](https://github.com/grammyjs/examples) —repository full of example bots. Includes a setup to easily run any of them. ### [Awesome grammY](https://github.com/grammyjs/awesome-grammY) —list of awesome projects built with grammY. Helpful if you want to see some real-world usage. ### [grammY Telegram Chat](https://t.me/grammyjs) —Telegram chat where you can ask any question about grammY or bots in general. We are also open for feedback, ideas, and contributions! The Russian community chat can be found [here](https://t.me/grammyjs_ru). ### [grammY News Channel](https://t.me/grammyjs_news) —Telegram channel where updates to grammY and the ecosystem are posted. We are also [on Twitter](https://twitter.com/grammy_js). ### [Telegram Bot API Reference](https://core.telegram.org/bots/api) —documentation of the API that Telegram offers, and that grammY connects to under the hood. ## Deno Support All grammY packages published by [@grammyjs](https://github.com/grammyjs) run natively on [Deno](https://deno.land). We are compiling every codebase to still run on Node.js. However, given that most bot developers are still using Node.js, all documentation is written Node.js-first. We may migrate it if Deno overtakes Node.js. If you are already on Deno today, import grammY from [`https://deno.land/x/grammy/mod.ts`](https://deno.land/x/grammy). You may also be interested in [why we support Deno](https://grammy.dev/resources/faq.html#why-do-you-support-deno). ## Browser Support The grammY core package in this repository is available as a JavaScript bundle from the CDN at `get.grammy.dev`. Currently, we transpile all stable versions (all releases since v1.0) as well as the current `main` branch to ES6 and ESNext. You can download them from the URL `https://get.grammy.dev/[ES version lowercased]@[grammY version including v-prefix].js`. For example, the most recent source on `main` in ES6 is available from <https://get.grammy.dev/[email protected]>. Being compatible with browsers is especially useful for running bots on Cloudflare Workers. For this reason, we include the web bundle in our npm package. You can simply do `import { Bot } from "grammy/web"`. ## [Contribution Guide »](./CONTRIBUTING.md) ## Contributors ✨ Thanks goes to these wonderful people ([emoji key](https://allcontributors.org/docs/en/emoji-key)): <!-- ALL-CONTRIBUTORS-LIST:START - Do not remove or modify this section --> <!-- prettier-ignore-start --> <!-- markdownlint-disable --> <table> <tbody> <tr> <td align="center" valign="top" width="14.28%"><a href="https://github.com/KnorpelSenf"><img src="https://avatars.githubusercontent.com/u/12952387?v=4?s=100" width="100px;" alt="KnorpelSenf"/><br /><sub><b>KnorpelSenf</b></sub></a><br /><a href="#ideas-KnorpelSenf" title="Ideas, Planning, & Feedback">🤔</a> <a href="https://github.com/grammyjs/grammY/commits?author=KnorpelSenf" title="Code">💻</a> <a href="https://github.com/grammyjs/grammY/commits?author=KnorpelSenf" title="Documentation">📖</a> <a href="#design-KnorpelSenf" title="Design">🎨</a> <a href="#example-KnorpelSenf" title="Examples">💡</a> <a href="https://github.com/grammyjs/grammY/commits?author=KnorpelSenf" title="Tests">⚠️</a> <a href="#plugin-KnorpelSenf" title="Plugin/utility libraries">🔌</a> <a href="#platform-KnorpelSenf" title="Packaging/porting to new platform">📦</a> <a href="https://github.com/grammyjs/grammY/pulls?q=is%3Apr+reviewed-by%3AKnorpelSenf" title="Reviewed Pull Requests">👀</a> <a href="#mentoring-KnorpelSenf" title="Mentoring">🧑‍🏫</a> <a href="#projectManagement-KnorpelSenf" title="Project Management">📆</a> <a href="#infra-KnorpelSenf" title="Infrastructure (Hosting, Build-Tools, etc)">🚇</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/HeeroML"><img src="https://avatars.githubusercontent.com/u/42873000?v=4?s=100" width="100px;" alt="Heero"/><br /><sub><b>Heero</b></sub></a><br /><a href="#plugin-HeeroML" title="Plugin/utility libraries">🔌</a> <a href="#userTesting-HeeroML" title="User Testing">📓</a> <a href="#example-HeeroML" title="Examples">💡</a> <a href="https://github.com/grammyjs/grammY/commits?author=HeeroML" title="Documentation">📖</a> <a href="https://github.com/grammyjs/grammY/pulls?q=is%3Apr+reviewed-by%3AHeeroML" title="Reviewed Pull Requests">👀</a> <a href="https://github.com/grammyjs/grammY/commits?author=HeeroML" title="Code">💻</a> <a href="#ideas-HeeroML" title="Ideas, Planning, & Feedback">🤔</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/wojpawlik"><img src="https://avatars.githubusercontent.com/u/23058303?v=4?s=100" width="100px;" alt="Wojciech Pawlik"/><br /><sub><b>Wojciech Pawlik</b></sub></a><br /><a href="#ideas-wojpawlik" title="Ideas, Planning, & Feedback">🤔</a> <a href="https://github.com/grammyjs/grammY/pulls?q=is%3Apr+reviewed-by%3Awojpawlik" title="Reviewed Pull Requests">👀</a> <a href="#infra-wojpawlik" title="Infrastructure (Hosting, Build-Tools, etc)">🚇</a> <a href="#platform-wojpawlik" title="Packaging/porting to new platform">📦</a> <a href="#tool-wojpawlik" title="Tools">🔧</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/MegaITA"><img src="https://avatars.githubusercontent.com/u/32493080?v=4?s=100" width="100px;" alt="Alessandro Bertozzi"/><br /><sub><b>Alessandro Bertozzi</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=MegaITA" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://trgwii.no/"><img src="https://avatars.githubusercontent.com/u/11262022?v=4?s=100" width="100px;" alt="trgwii"/><br /><sub><b>trgwii</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=trgwii" title="Code">💻</a> <a href="https://github.com/grammyjs/grammY/pulls?q=is%3Apr+reviewed-by%3Atrgwii" title="Reviewed Pull Requests">👀</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/KnightNiwrem"><img src="https://avatars.githubusercontent.com/u/9781814?v=4?s=100" width="100px;" alt="KnightNiwrem"/><br /><sub><b>KnightNiwrem</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=KnightNiwrem" title="Code">💻</a> <a href="https://github.com/grammyjs/grammY/issues?q=author%3AKnightNiwrem" title="Bug reports">🐛</a> <a href="#plugin-KnightNiwrem" title="Plugin/utility libraries">🔌</a> <a href="https://github.com/grammyjs/grammY/commits?author=KnightNiwrem" title="Documentation">📖</a> <a href="#example-KnightNiwrem" title="Examples">💡</a> <a href="https://github.com/grammyjs/grammY/pulls?q=is%3Apr+reviewed-by%3AKnightNiwrem" title="Reviewed Pull Requests">👀</a> <a href="#mentoring-KnightNiwrem" title="Mentoring">🧑‍🏫</a></td> <td align="center" valign="top" width="14.28%"><a href="https://mkr.pw"><img src="https://avatars.githubusercontent.com/u/19621208?v=4?s=100" width="100px;" alt="Muthu Kumar"/><br /><sub><b>Muthu Kumar</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/pulls?q=is%3Apr+reviewed-by%3AMKRhere" title="Reviewed Pull Requests">👀</a></td> </tr> <tr> <td align="center" valign="top" width="14.28%"><a href="https://edjopato.de/"><img src="https://avatars.githubusercontent.com/u/7953011?v=4?s=100" width="100px;" alt="EdJoPaTo"/><br /><sub><b>EdJoPaTo</b></sub></a><br /><a href="#plugin-EdJoPaTo" title="Plugin/utility libraries">🔌</a> <a href="https://github.com/grammyjs/grammY/commits?author=EdJoPaTo" title="Documentation">📖</a> <a href="#ideas-EdJoPaTo" title="Ideas, Planning, & Feedback">🤔</a> <a href="https://github.com/grammyjs/grammY/pulls?q=is%3Apr+reviewed-by%3AEdJoPaTo" title="Reviewed Pull Requests">👀</a> <a href="https://github.com/grammyjs/grammY/issues?q=author%3AEdJoPaTo" title="Bug reports">🐛</a> <a href="https://github.com/grammyjs/grammY/commits?author=EdJoPaTo" title="Code">💻</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/Amir-Zouerami"><img src="https://avatars.githubusercontent.com/u/53701884?v=4?s=100" width="100px;" alt="Amir Zouerami"/><br /><sub><b>Amir Zouerami</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=Amir-Zouerami" title="Documentation">📖</a> <a href="#plugin-Amir-Zouerami" title="Plugin/utility libraries">🔌</a> <a href="#example-Amir-Zouerami" title="Examples">💡</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/roj1512"><img src="https://avatars.githubusercontent.com/u/49933115?v=4?s=100" width="100px;" alt="Roj"/><br /><sub><b>Roj</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=roj1512" title="Documentation">📖</a> <a href="https://github.com/grammyjs/grammY/pulls?q=is%3Apr+reviewed-by%3Aroj1512" title="Reviewed Pull Requests">👀</a> <a href="#infra-roj1512" title="Infrastructure (Hosting, Build-Tools, etc)">🚇</a> <a href="#translation-roj1512" title="Translation">🌍</a> <a href="https://github.com/grammyjs/grammY/commits?author=roj1512" title="Code">💻</a> <a href="#ideas-roj1512" title="Ideas, Planning, & Feedback">🤔</a> <a href="#mentoring-roj1512" title="Mentoring">🧑‍🏫</a> <a href="#example-roj1512" title="Examples">💡</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/jokasimr"><img src="https://avatars.githubusercontent.com/u/20954731?v=4?s=100" width="100px;" alt="jokasimr"/><br /><sub><b>jokasimr</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/issues?q=author%3Ajokasimr" title="Bug reports">🐛</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/CikiMomogi"><img src="https://avatars.githubusercontent.com/u/74030149?v=4?s=100" width="100px;" alt="Ciki Momogi"/><br /><sub><b>Ciki Momogi</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=CikiMomogi" title="Documentation">📖</a> <a href="#translation-CikiMomogi" title="Translation">🌍</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/AndreoliBR"><img src="https://avatars.githubusercontent.com/u/15970011?v=4?s=100" width="100px;" alt="AndreoliBR"/><br /><sub><b>AndreoliBR</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/pulls?q=is%3Apr+reviewed-by%3AAndreoliBR" title="Reviewed Pull Requests">👀</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/Loskir"><img src="https://avatars.githubusercontent.com/u/21295738?v=4?s=100" width="100px;" alt="Kirill Loskutov"/><br /><sub><b>Kirill Loskutov</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=Loskir" title="Documentation">📖</a> <a href="https://github.com/grammyjs/grammY/issues?q=author%3ALoskir" title="Bug reports">🐛</a> <a href="#ideas-Loskir" title="Ideas, Planning, & Feedback">🤔</a> <a href="#design-Loskir" title="Design">🎨</a> <a href="#question-Loskir" title="Answering Questions">💬</a> <a href="https://github.com/grammyjs/grammY/pulls?q=is%3Apr+reviewed-by%3ALoskir" title="Reviewed Pull Requests">👀</a> <a href="https://github.com/grammyjs/grammY/commits?author=Loskir" title="Code">💻</a> <a href="#plugin-Loskir" title="Plugin/utility libraries">🔌</a></td> </tr> <tr> <td align="center" valign="top" width="14.28%"><a href="https://lungers.com/"><img src="https://avatars.githubusercontent.com/u/32808683?v=4?s=100" width="100px;" alt="Andrew Lane"/><br /><sub><b>Andrew Lane</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/issues?q=author%3AAndrewLaneX" title="Bug reports">🐛</a> <a href="https://github.com/grammyjs/grammY/pulls?q=is%3Apr+reviewed-by%3AAndrewLaneX" title="Reviewed Pull Requests">👀</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/code-withAshish"><img src="https://avatars.githubusercontent.com/u/73625149?v=4?s=100" width="100px;" alt="code-withAshish"/><br /><sub><b>code-withAshish</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=code-withAshish" title="Documentation">📖</a> <a href="#question-code-withAshish" title="Answering Questions">💬</a></td> <td align="center" valign="top" width="14.28%"><a href="https://beta.ku-di.com/waptik"><img src="https://avatars.githubusercontent.com/u/1687551?v=4?s=100" width="100px;" alt="Stephane Mensah"/><br /><sub><b>Stephane Mensah</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/issues?q=author%3Awaptik" title="Bug reports">🐛</a> <a href="#plugin-waptik" title="Plugin/utility libraries">🔌</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/Asaku01"><img src="https://avatars.githubusercontent.com/u/29716396?v=4?s=100" width="100px;" alt="Asaku01"/><br /><sub><b>Asaku01</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=Asaku01" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/ppsimn"><img src="https://avatars.githubusercontent.com/u/88509883?v=4?s=100" width="100px;" alt="ppsimn"/><br /><sub><b>ppsimn</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/issues?q=author%3Appsimn" title="Bug reports">🐛</a></td> <td align="center" valign="top" width="14.28%"><a href="https://satont.js.org/"><img src="https://avatars.githubusercontent.com/u/42675886?v=4?s=100" width="100px;" alt="Satont"/><br /><sub><b>Satont</b></sub></a><br /><a href="#plugin-Satont" title="Plugin/utility libraries">🔌</a> <a href="https://github.com/grammyjs/grammY/commits?author=Satont" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/deptyped"><img src="https://avatars.githubusercontent.com/u/26162440?v=4?s=100" width="100px;" alt="deptyped"/><br /><sub><b>deptyped</b></sub></a><br /><a href="#example-deptyped" title="Examples">💡</a> <a href="https://github.com/grammyjs/grammY/commits?author=deptyped" title="Documentation">📖</a> <a href="#tutorial-deptyped" title="Tutorials">✅</a> <a href="https://github.com/grammyjs/grammY/issues?q=author%3Adeptyped" title="Bug reports">🐛</a></td> </tr> <tr> <td align="center" valign="top" width="14.28%"><a href="https://github.com/dzek69"><img src="https://avatars.githubusercontent.com/u/4936805?v=4?s=100" width="100px;" alt="Jacek Nowacki"/><br /><sub><b>Jacek Nowacki</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=dzek69" title="Documentation">📖</a> <a href="https://github.com/grammyjs/grammY/commits?author=dzek69" title="Code">💻</a> <a href="https://github.com/grammyjs/grammY/issues?q=author%3Adzek69" title="Bug reports">🐛</a> <a href="https://github.com/grammyjs/grammY/pulls?q=is%3Apr+reviewed-by%3Adzek69" title="Reviewed Pull Requests">👀</a> <a href="#ideas-dzek69" title="Ideas, Planning, & Feedback">🤔</a></td> <td align="center" valign="top" width="14.28%"><a href="https://blog.outv.im"><img src="https://avatars.githubusercontent.com/u/19144373?v=4?s=100" width="100px;" alt="Outvi V"/><br /><sub><b>Outvi V</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=outloudvi" title="Code">💻</a></td> <td align="center" valign="top" width="14.28%"><a href="https://bandism.net/"><img src="https://avatars.githubusercontent.com/u/22633385?v=4?s=100" width="100px;" alt="Ikko Ashimine"/><br /><sub><b>Ikko Ashimine</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=eltociear" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/amberlionk"><img src="https://avatars.githubusercontent.com/u/29119723?v=4?s=100" width="100px;" alt="Yevhen Denesiuk"/><br /><sub><b>Yevhen Denesiuk</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/pulls?q=is%3Apr+reviewed-by%3Aamberlionk" title="Reviewed Pull Requests">👀</a> <a href="https://github.com/grammyjs/grammY/issues?q=author%3Aamberlionk" title="Bug reports">🐛</a> <a href="https://github.com/grammyjs/grammY/commits?author=amberlionk" title="Code">💻</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/prazedotid"><img src="https://avatars.githubusercontent.com/u/19567624?v=4?s=100" width="100px;" alt="prastian"/><br /><sub><b>prastian</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/issues?q=author%3Aprazedotid" title="Bug reports">🐛</a> <a href="https://github.com/grammyjs/grammY/commits?author=prazedotid" title="Code">💻</a></td> <td align="center" valign="top" width="14.28%"><a href="https://sayem.eu.org/"><img src="https://avatars.githubusercontent.com/u/14138401?v=4?s=100" width="100px;" alt="Sayem Chowdhury"/><br /><sub><b>Sayem Chowdhury</b></sub></a><br /><a href="#ideas-sayem314" title="Ideas, Planning, & Feedback">🤔</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/kospra"><img src="https://avatars.githubusercontent.com/u/42740406?v=4?s=100" width="100px;" alt="kospra"/><br /><sub><b>kospra</b></sub></a><br /><a href="#ideas-kospra" title="Ideas, Planning, & Feedback">🤔</a> <a href="https://github.com/grammyjs/grammY/commits?author=kospra" title="Code">💻</a></td> </tr> <tr> <td align="center" valign="top" width="14.28%"><a href="https://github.com/chimit"><img src="https://avatars.githubusercontent.com/u/839349?v=4?s=100" width="100px;" alt="Chimit"/><br /><sub><b>Chimit</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=chimit" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/CalsiBotDev"><img src="https://avatars.githubusercontent.com/u/55633371?v=4?s=100" width="100px;" alt="Calsi"/><br /><sub><b>Calsi</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=CalsiBotDev" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://zohren.xyz"><img src="https://avatars.githubusercontent.com/u/15788906?v=4?s=100" width="100px;" alt="Jonas Zohren"/><br /><sub><b>Jonas Zohren</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/issues?q=author%3Ajfowl" title="Bug reports">🐛</a> <a href="https://github.com/grammyjs/grammY/commits?author=jfowl" title="Code">💻</a></td> <td align="center" valign="top" width="14.28%"><a href="https://zhemu.buzz/"><img src="https://avatars.githubusercontent.com/u/56839018?v=4?s=100" width="100px;" alt="linbuxiao"/><br /><sub><b>linbuxiao</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=linbuxiao" title="Documentation">📖</a> <a href="#translation-linbuxiao" title="Translation">🌍</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/JiquanWang99"><img src="https://avatars.githubusercontent.com/u/63894579?v=4?s=100" width="100px;" alt="JiquanWang99"/><br /><sub><b>JiquanWang99</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=JiquanWang99" title="Documentation">📖</a> <a href="#translation-JiquanWang99" title="Translation">🌍</a></td> <td align="center" valign="top" width="14.28%"><a href="http://bor691.ir/"><img src="https://avatars.githubusercontent.com/u/4184939?v=4?s=100" width="100px;" alt="Borhan Hafez"/><br /><sub><b>Borhan Hafez</b></sub></a><br /><a href="#plugin-zumoshi" title="Plugin/utility libraries">🔌</a></td> <td align="center" valign="top" width="14.28%"><a href="https://blog.limx.dev/"><img src="https://avatars.githubusercontent.com/u/6434137?v=4?s=100" width="100px;" alt="WingLim"/><br /><sub><b>WingLim</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=WingLim" title="Documentation">📖</a> <a href="#translation-WingLim" title="Translation">🌍</a> <a href="https://github.com/grammyjs/grammY/commits?author=WingLim" title="Code">💻</a> <a href="#plugin-WingLim" title="Plugin/utility libraries">🔌</a> <a href="#ideas-WingLim" title="Ideas, Planning, & Feedback">🤔</a></td> </tr> <tr> <td align="center" valign="top" width="14.28%"><a href="https://github.com/taotie111"><img src="https://avatars.githubusercontent.com/u/44166322?v=4?s=100" width="100px;" alt="taotie111"/><br /><sub><b>taotie111</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=taotie111" title="Documentation">📖</a> <a href="#translation-taotie111" title="Translation">🌍</a></td> <td align="center" valign="top" width="14.28%"><a href="https://www.linkedin.com/in/merlin-brandes-42328717a/"><img src="https://avatars.githubusercontent.com/u/14237330?v=4?s=100" width="100px;" alt="Merlin"/><br /><sub><b>Merlin</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=FatalMerlin" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://darve.sh"><img src="https://avatars.githubusercontent.com/u/22394081?v=4?s=100" width="100px;" alt="Darvesh"/><br /><sub><b>Darvesh</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/issues?q=author%3Adarvesh" title="Bug reports">🐛</a> <a href="https://github.com/grammyjs/grammY/commits?author=darvesh" title="Code">💻</a> <a href="https://github.com/grammyjs/grammY/pulls?q=is%3Apr+reviewed-by%3Adarvesh" title="Reviewed Pull Requests">👀</a></td> <td align="center" valign="top" width="14.28%"><a href="http://telegram.me/dcdunkan"><img src="https://avatars.githubusercontent.com/u/70066170?v=4?s=100" width="100px;" alt="dcdunkan"/><br /><sub><b>dcdunkan</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/issues?q=author%3Adcdunkan" title="Bug reports">🐛</a> <a href="https://github.com/grammyjs/grammY/commits?author=dcdunkan" title="Code">💻</a> <a href="#plugin-dcdunkan" title="Plugin/utility libraries">🔌</a> <a href="https://github.com/grammyjs/grammY/pulls?q=is%3Apr+reviewed-by%3Adcdunkan" title="Reviewed Pull Requests">👀</a> <a href="https://github.com/grammyjs/grammY/commits?author=dcdunkan" title="Documentation">📖</a> <a href="#ideas-dcdunkan" title="Ideas, Planning, & Feedback">🤔</a> <a href="#infra-dcdunkan" title="Infrastructure (Hosting, Build-Tools, etc)">🚇</a> <a href="#tool-dcdunkan" title="Tools">🔧</a></td> <td align="center" valign="top" width="14.28%"><a href="https://xuann.wang/"><img src="https://avatars.githubusercontent.com/u/44045911?v=4?s=100" width="100px;" alt="Kid"/><br /><sub><b>Kid</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=kidonng" title="Documentation">📖</a> <a href="#translation-kidonng" title="Translation">🌍</a></td> <td align="center" valign="top" width="14.28%"><a href="http://slava.fomin.io/"><img src="https://avatars.githubusercontent.com/u/1702725?v=4?s=100" width="100px;" alt="Slava Fomin II"/><br /><sub><b>Slava Fomin II</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/issues?q=author%3Aslavafomin" title="Bug reports">🐛</a> <a href="https://github.com/grammyjs/grammY/commits?author=slavafomin" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://kikobeats.com/"><img src="https://avatars.githubusercontent.com/u/2096101?v=4?s=100" width="100px;" alt="Kiko Beats"/><br /><sub><b>Kiko Beats</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=Kikobeats" title="Documentation">📖</a></td> </tr> <tr> <td align="center" valign="top" width="14.28%"><a href="http://///////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////kraftwerk28.pp.ua"><img src="https://avatars.githubusercontent.com/u/31807671?v=4?s=100" width="100px;" alt="Vsevolod"/><br /><sub><b>Vsevolod</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=kraftwerk28" title="Code">💻</a> <a href="#ideas-kraftwerk28" title="Ideas, Planning, & Feedback">🤔</a> <a href="https://github.com/grammyjs/grammY/pulls?q=is%3Apr+reviewed-by%3Akraftwerk28" title="Reviewed Pull Requests">👀</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/habemuscode"><img src="https://avatars.githubusercontent.com/u/34692207?v=4?s=100" width="100px;" alt="Habemuscode"/><br /><sub><b>Habemuscode</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/pulls?q=is%3Apr+reviewed-by%3Ahabemuscode" title="Reviewed Pull Requests">👀</a> <a href="https://github.com/grammyjs/grammY/commits?author=habemuscode" title="Documentation">📖</a> <a href="#translation-habemuscode" title="Translation">🌍</a></td> <td align="center" valign="top" width="14.28%"><a href="https://borodutch.com/"><img src="https://avatars.githubusercontent.com/u/3192028?v=4?s=100" width="100px;" alt="Nikita Kolmogorov"/><br /><sub><b>Nikita Kolmogorov</b></sub></a><br /><a href="#plugin-backmeupplz" title="Plugin/utility libraries">🔌</a></td> <td align="center" valign="top" width="14.28%"><a href="http://glukki.ru"><img src="https://avatars.githubusercontent.com/u/140462?v=4?s=100" width="100px;" alt="Vitaliy Meshchaninov"/><br /><sub><b>Vitaliy Meshchaninov</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/issues?q=author%3Aglukki" title="Bug reports">🐛</a> <a href="https://github.com/grammyjs/grammY/commits?author=glukki" title="Code">💻</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/dilyanpalauzov"><img src="https://avatars.githubusercontent.com/u/4992947?v=4?s=100" width="100px;" alt="Дилян Палаузов"/><br /><sub><b>Дилян Палаузов</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/issues?q=author%3Adilyanpalauzov" title="Bug reports">🐛</a> <a href="https://github.com/grammyjs/grammY/commits?author=dilyanpalauzov" title="Code">💻</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/lmx-Hexagram"><img src="https://avatars.githubusercontent.com/u/52130356?v=4?s=100" width="100px;" alt="lmx-Hexagram"/><br /><sub><b>lmx-Hexagram</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=lmx-Hexagram" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/IlyaSemenov"><img src="https://avatars.githubusercontent.com/u/128121?v=4?s=100" width="100px;" alt="Ilya Semenov"/><br /><sub><b>Ilya Semenov</b></sub></a><br /><a href="#ideas-IlyaSemenov" title="Ideas, Planning, & Feedback">🤔</a> <a href="https://github.com/grammyjs/grammY/pulls?q=is%3Apr+reviewed-by%3AIlyaSemenov" title="Reviewed Pull Requests">👀</a> <a href="https://github.com/grammyjs/grammY/commits?author=IlyaSemenov" title="Code">💻</a></td> </tr> <tr> <td align="center" valign="top" width="14.28%"><a href="https://github.com/abdollahzadehAli"><img src="https://avatars.githubusercontent.com/u/96317431?v=4?s=100" width="100px;" alt="abdollahzadehAli"/><br /><sub><b>abdollahzadehAli</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=abdollahzadehAli" title="Documentation">📖</a> <a href="#example-abdollahzadehAli" title="Examples">💡</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/MrSaeedNasiri"><img src="https://avatars.githubusercontent.com/u/17780289?v=4?s=100" width="100px;" alt="Saeed Nasiri"/><br /><sub><b>Saeed Nasiri</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=MrSaeedNasiri" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/Scrip7"><img src="https://avatars.githubusercontent.com/u/37535505?v=4?s=100" width="100px;" alt="Hesoyam"/><br /><sub><b>Hesoyam</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=Scrip7" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="http://yrz.am"><img src="https://avatars.githubusercontent.com/u/96742416?v=4?s=100" width="100px;" alt="yrzam"/><br /><sub><b>yrzam</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/issues?q=author%3Ayrzam" title="Bug reports">🐛</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/drmikecrowe"><img src="https://avatars.githubusercontent.com/u/90312?v=4?s=100" width="100px;" alt="drmikecrowe"/><br /><sub><b>drmikecrowe</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/pulls?q=is%3Apr+reviewed-by%3Adrmikecrowe" title="Reviewed Pull Requests">👀</a></td> <td align="center" valign="top" width="14.28%"><a href="https://rys.pw"><img src="https://avatars.githubusercontent.com/u/1641362?v=4?s=100" width="100px;" alt="Martin"/><br /><sub><b>Martin</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=C0rn3j" title="Documentation">📖</a> <a href="https://github.com/grammyjs/grammY/issues?q=author%3AC0rn3j" title="Bug reports">🐛</a> <a href="https://github.com/grammyjs/grammY/pulls?q=is%3Apr+reviewed-by%3AC0rn3j" title="Reviewed Pull Requests">👀</a></td> <td align="center" valign="top" width="14.28%"><a href="http://pavelpolyakov.com/"><img src="https://avatars.githubusercontent.com/u/839290?v=4?s=100" width="100px;" alt="Pavel"/><br /><sub><b>Pavel</b></sub></a><br /><a href="#example-PavelPolyakov" title="Examples">💡</a></td> </tr> <tr> <td align="center" valign="top" width="14.28%"><a href="https://youtube.com/thorwebdev"><img src="https://avatars.githubusercontent.com/u/5748289?v=4?s=100" width="100px;" alt="Thor 雷神 Schaeff"/><br /><sub><b>Thor 雷神 Schaeff</b></sub></a><br /><a href="#example-thorwebdev" title="Examples">💡</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/x066it"><img src="https://avatars.githubusercontent.com/u/75589380?v=4?s=100" width="100px;" alt="x066it"/><br /><sub><b>x066it</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/issues?q=author%3Ax066it" title="Bug reports">🐛</a> <a href="https://github.com/grammyjs/grammY/pulls?q=is%3Apr+reviewed-by%3Ax066it" title="Reviewed Pull Requests">👀</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/kolay-v"><img src="https://avatars.githubusercontent.com/u/49853802?v=4?s=100" width="100px;" alt="kolay"/><br /><sub><b>kolay</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/pulls?q=is%3Apr+reviewed-by%3Akolay-v" title="Reviewed Pull Requests">👀</a></td> <td align="center" valign="top" width="14.28%"><a href="https://enepom.com/"><img src="https://avatars.githubusercontent.com/u/2511553?v=4?s=100" width="100px;" alt="Evgeny Nepomnyashchiy"/><br /><sub><b>Evgeny Nepomnyashchiy</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/pulls?q=is%3Apr+reviewed-by%3Apizzaeater" title="Reviewed Pull Requests">👀</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/anantakrishna"><img src="https://avatars.githubusercontent.com/u/6065071?v=4?s=100" width="100px;" alt="Ananta Krsna dasa"/><br /><sub><b>Ananta Krsna dasa</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=anantakrishna" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/Mi3liX9"><img src="https://avatars.githubusercontent.com/u/26169870?v=4?s=100" width="100px;" alt="Mighty Ali"/><br /><sub><b>Mighty Ali</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=Mi3liX9" title="Code">💻</a> <a href="https://github.com/grammyjs/grammY/pulls?q=is%3Apr+reviewed-by%3AMi3liX9" title="Reviewed Pull Requests">👀</a> <a href="#ideas-Mi3liX9" title="Ideas, Planning, & Feedback">🤔</a></td> <td align="center" valign="top" width="14.28%"><a href="https://oott123.com"><img src="https://avatars.githubusercontent.com/u/905663?v=4?s=100" width="100px;" alt="三三"/><br /><sub><b>三三</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/issues?q=author%3Aoott123" title="Bug reports">🐛</a> <a href="https://github.com/grammyjs/grammY/commits?author=oott123" title="Code">💻</a></td> </tr> <tr> <td align="center" valign="top" width="14.28%"><a href="http://roz.ninja"><img src="https://avatars.githubusercontent.com/u/3948961?v=4?s=100" width="100px;" alt="Roz"/><br /><sub><b>Roz</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/issues?q=author%3Aroziscoding" title="Bug reports">🐛</a> <a href="https://github.com/grammyjs/grammY/commits?author=roziscoding" title="Code">💻</a> <a href="https://github.com/grammyjs/grammY/pulls?q=is%3Apr+reviewed-by%3Aroziscoding" title="Reviewed Pull Requests">👀</a> <a href="#infra-roziscoding" title="Infrastructure (Hosting, Build-Tools, etc)">🚇</a> <a href="#ideas-roziscoding" title="Ideas, Planning, & Feedback">🤔</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/daniharo"><img src="https://avatars.githubusercontent.com/u/47931084?v=4?s=100" width="100px;" alt="Dani Haro"/><br /><sub><b>Dani Haro</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=daniharo" title="Code">💻</a> <a href="#plugin-daniharo" title="Plugin/utility libraries">🔌</a> <a href="https://github.com/grammyjs/grammY/commits?author=daniharo" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/Ryukaizen"><img src="https://avatars.githubusercontent.com/u/55140313?v=4?s=100" width="100px;" alt="Ryukaizen"/><br /><sub><b>Ryukaizen</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=Ryukaizen" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/mcpeblocker"><img src="https://avatars.githubusercontent.com/u/59408255?v=4?s=100" width="100px;" alt="Alisher Ortiqov"/><br /><sub><b>Alisher Ortiqov</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=mcpeblocker" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/tonytkachenko"><img src="https://avatars.githubusercontent.com/u/103267335?v=4?s=100" width="100px;" alt="Tony Tkachenko"/><br /><sub><b>Tony Tkachenko</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=tonytkachenko" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/rainrisa"><img src="https://avatars.githubusercontent.com/u/108156134?v=4?s=100" width="100px;" alt="Ra"/><br /><sub><b>Ra</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=rainrisa" title="Code">💻</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/sartoshi-foot-dao"><img src="https://avatars.githubusercontent.com/u/99770068?v=4?s=100" width="100px;" alt="sartoshi-foot-dao"/><br /><sub><b>sartoshi-foot-dao</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=sartoshi-foot-dao" title="Documentation">📖</a></td> </tr> <tr> <td align="center" valign="top" width="14.28%"><a href="https://github.com/yn4v4s"><img src="https://avatars.githubusercontent.com/u/35275827?v=4?s=100" width="100px;" alt="Yoel Navas E."/><br /><sub><b>Yoel Navas E.</b></sub></a><br /><a href="#ideas-yn4v4s" title="Ideas, Planning, & Feedback">🤔</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/vitorleo"><img src="https://avatars.githubusercontent.com/u/5118352?v=4?s=100" width="100px;" alt="Vitor Gomes"/><br /><sub><b>Vitor Gomes</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/issues?q=author%3Avitorleo" title="Bug reports">🐛</a> <a href="https://github.com/grammyjs/grammY/commits?author=vitorleo" title="Code">💻</a></td> <td align="center" valign="top" width="14.28%"><a href="http://xditya.me/"><img src="https://avatars.githubusercontent.com/u/58950863?v=4?s=100" width="100px;" alt="Aditya"/><br /><sub><b>Aditya</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/issues?q=author%3Axditya" title="Bug reports">🐛</a> <a href="https://github.com/grammyjs/grammY/pulls?q=is%3Apr+reviewed-by%3Axditya" title="Reviewed Pull Requests">👀</a></td> <td align="center" valign="top" width="14.28%"><a href="http://uditkaro.de"><img src="https://avatars.githubusercontent.com/u/30829387?v=4?s=100" width="100px;" alt="Udit Karode"/><br /><sub><b>Udit Karode</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/pulls?q=is%3Apr+reviewed-by%3Auditkarode" title="Reviewed Pull Requests">👀</a></td> <td align="center" valign="top" width="14.28%"><a href="https://rockett.pw"><img src="https://avatars.githubusercontent.com/u/4586280?v=4?s=100" width="100px;" alt="Mike Rockétt"/><br /><sub><b>Mike Rockétt</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/pulls?q=is%3Apr+reviewed-by%3Amikerockett" title="Reviewed Pull Requests">👀</a> <a href="https://github.com/grammyjs/grammY/issues?q=author%3Amikerockett" title="Bug reports">🐛</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/MrVSiK"><img src="https://avatars.githubusercontent.com/u/79159341?v=4?s=100" width="100px;" alt="Srinivasa IK Varanasi"/><br /><sub><b>Srinivasa IK Varanasi</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=MrVSiK" title="Code">💻</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/abdoo9"><img src="https://avatars.githubusercontent.com/u/63903814?v=4?s=100" width="100px;" alt="abdoo9"/><br /><sub><b>abdoo9</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/issues?q=author%3Aabdoo9" title="Bug reports">🐛</a> <a href="https://github.com/grammyjs/grammY/commits?author=abdoo9" title="Code">💻</a></td> </tr> <tr> <td align="center" valign="top" width="14.28%"><a href="http://ak4zh.com"><img src="https://avatars.githubusercontent.com/u/26350053?v=4?s=100" width="100px;" alt="ak4zh"/><br /><sub><b>ak4zh</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/pulls?q=is%3Apr+reviewed-by%3Aak4zh" title="Reviewed Pull Requests">👀</a> <a href="#ideas-ak4zh" title="Ideas, Planning, & Feedback">🤔</a> <a href="https://github.com/grammyjs/grammY/commits?author=ak4zh" title="Code">💻</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/nlapshin"><img src="https://avatars.githubusercontent.com/u/39495311?v=4?s=100" width="100px;" alt="Nikolay Lapshin"/><br /><sub><b>Nikolay Lapshin</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=nlapshin" title="Code">💻</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/Aquathing"><img src="https://avatars.githubusercontent.com/u/81624781?v=4?s=100" width="100px;" alt="Aquatica"/><br /><sub><b>Aquatica</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=Aquathing" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/fadzikri"><img src="https://avatars.githubusercontent.com/u/109416385?v=4?s=100" width="100px;" alt="Fa Dzikri"/><br /><sub><b>Fa Dzikri</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/pulls?q=is%3Apr+reviewed-by%3Afadzikri" title="Reviewed Pull Requests">👀</a> <a href="https://github.com/grammyjs/grammY/commits?author=fadzikri" title="Documentation">📖</a> <a href="#translation-fadzikri" title="Translation">🌍</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/solidprinciples"><img src="https://avatars.githubusercontent.com/u/7939765?v=4?s=100" width="100px;" alt="Chandler Lattin"/><br /><sub><b>Chandler Lattin</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=solidprinciples" title="Code">💻</a> <a href="https://github.com/grammyjs/grammY/pulls?q=is%3Apr+reviewed-by%3Asolidprinciples" title="Reviewed Pull Requests">👀</a> <a href="#plugin-solidprinciples" title="Plugin/utility libraries">🔌</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/sparfenyuk"><img src="https://avatars.githubusercontent.com/u/134065?v=4?s=100" width="100px;" alt="Sergey Parfenyuk"/><br /><sub><b>Sergey Parfenyuk</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/issues?q=author%3Asparfenyuk" title="Bug reports">🐛</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/felinto-dev"><img src="https://avatars.githubusercontent.com/u/32253743?v=4?s=100" width="100px;" alt="Émerson Felinto"/><br /><sub><b>Émerson Felinto</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/issues?q=author%3Afelinto-dev" title="Bug reports">🐛</a></td> </tr> <tr> <td align="center" valign="top" width="14.28%"><a href="https://github.com/stPitty"><img src="https://avatars.githubusercontent.com/u/85024641?v=4?s=100" width="100px;" alt="Petr Stankin"/><br /><sub><b>Petr Stankin</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/issues?q=author%3AstPitty" title="Bug reports">🐛</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/ByMsx"><img src="https://avatars.githubusercontent.com/u/5565836?v=4?s=100" width="100px;" alt="Maxim Lebedev"/><br /><sub><b>Maxim Lebedev</b></sub></a><br /><a href="#ideas-ByMsx" title="Ideas, Planning, & Feedback">🤔</a> <a href="https://github.com/grammyjs/grammY/commits?author=ByMsx" title="Code">💻</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/Madnex"><img src="https://avatars.githubusercontent.com/u/14137610?v=4?s=100" width="100px;" alt="Madnex"/><br /><sub><b>Madnex</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=Madnex" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/tup4ienko"><img src="https://avatars.githubusercontent.com/u/89318613?v=4?s=100" width="100px;" alt="Svyatoslav Tupchienko"/><br /><sub><b>Svyatoslav Tupchienko</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=tup4ienko" title="Code">💻</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/evermake"><img src="https://avatars.githubusercontent.com/u/53311479?v=4?s=100" width="100px;" alt="Vladislav Deryabkin"/><br /><sub><b>Vladislav Deryabkin</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/issues?q=author%3Aevermake" title="Bug reports">🐛</a> <a href="https://github.com/grammyjs/grammY/commits?author=evermake" title="Code">💻</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/kashyapndps00"><img src="https://avatars.githubusercontent.com/u/98746601?v=4?s=100" width="100px;" alt="Kashyap Sharma"/><br /><sub><b>Kashyap Sharma</b></sub></a><br /><a href="#example-kashyapndps00" title="Examples">💡</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/AlexOwl"><img src="https://avatars.githubusercontent.com/u/47189254?v=4?s=100" width="100px;" alt="AlexOwl"/><br /><sub><b>AlexOwl</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/issues?q=author%3AAlexOwl" title="Bug reports">🐛</a> <a href="https://github.com/grammyjs/grammY/commits?author=AlexOwl" title="Code">💻</a></td> </tr> <tr> <td align="center" valign="top" width="14.28%"><a href="https://www.shrimadhavuk.me/"><img src="https://avatars.githubusercontent.com/u/6317196?v=4?s=100" width="100px;" alt="Shrimadhav U K"/><br /><sub><b>Shrimadhav U K</b></sub></a><br /><a href="https://github.com/grammyjs/grammY/commits?author=SpEcHiDe" title="Code">💻</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/binamralamsal"><img src="https://avatars.githubusercontent.com/u/61900781?v=4?s=100" width="100px;" alt="Binamra Lamsal"/><br /><sub><b>Binamra Lamsal</b></sub></a><br /><a href="#ideas-binamralamsal" title="Ideas, Planning, & Feedback">🤔</a></td> </tr> </tbody> </table> <!-- markdownlint-restore --> <!-- prettier-ignore-end --> <!-- ALL-CONTRIBUTORS-LIST:END --> This project follows the [all-contributors](https://github.com/all-contributors/all-contributors) specification. Contributions of any kind welcome!
512
Java wrapper for the popular chat & VOIP service: Discord https://discord.com
[maven-central]: https://img.shields.io/maven-central/v/net.dv8tion/JDA?color=blue [jitpack]: https://img.shields.io/badge/Snapshots-JitPack-blue [download]: #download [discord-invite]: https://discord.gg/0hMr4ce0tIl3SLv5 [migration]: https://jda.wiki/introduction/migration-v3-v4/ [jenkins]: https://ci.dv8tion.net/job/JDA5 [license]: https://github.com/DV8FromTheWorld/JDA/tree/master/LICENSE [faq]: https://jda.wiki/introduction/faq/ [troubleshooting]: https://jda.wiki/using-jda/troubleshooting/ [discord-shield]: https://discord.com/api/guilds/125227483518861312/widget.png [faq-shield]: https://img.shields.io/badge/Wiki-FAQ-blue.svg [troubleshooting-shield]: https://img.shields.io/badge/Wiki-Troubleshooting-darkgreen.svg [jenkins-shield]: https://img.shields.io/badge/Download-Jenkins-purple.svg [license-shield]: https://img.shields.io/badge/License-Apache%202.0-white.svg [migration-shield]: https://img.shields.io/badge/Wiki-Migrating%20from%20V3-darkgreen.svg <img align="right" src="https://github.com/DV8FromTheWorld/JDA/blob/assets/assets/readme/logo.png?raw=true" height="200" width="200"> [ ![maven-central][] ][download] [ ![jitpack][] ](https://jitpack.io/#DV8FromtheWorld/JDA) [ ![jenkins-shield][] ][jenkins] [ ![license-shield][] ][license] [ ![discord-shield][] ][discord-invite] [ ![faq-shield] ][faq] [ ![troubleshooting-shield] ][troubleshooting] [ ![migration-shield][] ][migration] # JDA (Java Discord API) JDA strives to provide a clean and full wrapping of the Discord REST api and its Websocket-Events for Java. This library is a helpful tool that provides the functionality to create a discord bot in java. ## Summary Due to official statements made by the Discord developers we will no longer support unofficial features. These features are undocumented API endpoints or protocols that are not available to bot-accounts. _Please see the [Discord docs](https://discord.com/developers/docs/reference) for more information about bot accounts._ 1. [Introduction](#creating-the-jda-object) 2. [Sharding](#sharding-a-bot) 3. [Entity Lifetimes](#entity-lifetimes) 4. [Download](#download) 5. [Documentation](#documentation) 6. [Support](#getting-help) 7. [Extensions And Plugins](#third-party-recommendations) 8. [Contributing](#contributing-to-jda) 9. [Dependencies](#dependencies) 10. [Other Libraries](#related-projects) ## UserBots and SelfBots Discord is currently prohibiting creation and usage of automated client accounts (AccountType.CLIENT). We have officially dropped support for client login as of version **4.2.0**! Note that JDA is not a good tool to build a custom discord client as it loads all servers/guilds on startup unlike a client which does this via lazy loading instead. If you need a bot, use a bot account from the [Application Dashboard](https://discord.com/developers/applications). [Read More](https://support.discord.com/hc/en-us/articles/115002192352-Automated-user-accounts-self-bots-) ## Creating the JDA Object Creating the JDA Object is done via the JDABuilder class. After setting the token and other options via setters, the JDA Object is then created by calling the `build()` method. When `build()` returns, JDA might not have finished starting up. However, you can use `awaitReady()` on the JDA object to ensure that the entire cache is loaded before proceeding. Note that this method is blocking and will cause the thread to sleep until startup has completed. **Example**: ```java JDA jda = JDABuilder.createDefault("token").build(); ``` ### Configuration Both the `JDABuilder` and the `DefaultShardManagerBuilder` allow a set of configurations to improve the experience. **Example**: ```java public static void main(String[] args) { JDABuilder builder = JDABuilder.createDefault(args[0]); // Disable parts of the cache builder.disableCache(CacheFlag.MEMBER_OVERRIDES, CacheFlag.VOICE_STATE); // Enable the bulk delete event builder.setBulkDeleteSplittingEnabled(false); // Set activity (like "playing Something") builder.setActivity(Activity.watching("TV")); builder.build(); } ``` > See [JDABuilder](https://ci.dv8tion.net/job/JDA5/javadoc/net/dv8tion/jda/api/JDABuilder.html) and [DefaultShardManagerBuilder](https://ci.dv8tion.net/job/JDA5/javadoc/net/dv8tion/jda/api/sharding/DefaultShardManagerBuilder.html) You can configure the memory usage by changing enabled `CacheFlags` on the `JDABuilder`. Additionally, you can change the handling of member/user cache by setting either a `ChunkingFilter`, disabling **intents**, or changing the **member cache policy**. ```java public void configureMemoryUsage(JDABuilder builder) { // Disable cache for member activities (streaming/games/spotify) builder.disableCache(CacheFlag.ACTIVITY); // Only cache members who are either in a voice channel or owner of the guild builder.setMemberCachePolicy(MemberCachePolicy.VOICE.or(MemberCachePolicy.OWNER)); // Disable member chunking on startup builder.setChunkingFilter(ChunkingFilter.NONE); // Disable presence updates and typing events builder.disableIntents(GatewayIntent.GUILD_PRESENCE, GatewayIntent.GUILD_MESSAGE_TYPING); // Consider guilds with more than 50 members as "large". // Large guilds will only provide online members in their setup and thus reduce bandwidth if chunking is disabled. builder.setLargeThreshold(50); } ``` ### Listening to Events The event system in JDA is configured through a hierarchy of classes/interfaces. We offer two implementations for the `IEventManager`: - **InterfacedEventManager** which uses an `EventListener` interface and the `ListenerAdapter` abstract class - **AnnotatedEventManager** which uses the `@SubscribeEvent` annotation that can be applied to methods By default the **InterfacedEventManager** is used. Since you can create your own implementation of `IEventManager` this is a very versatile and configurable system. If the aforementioned implementations don't suit your use-case you can simply create a custom implementation and configure it on the `JDABuilder` with `setEventManager(...)`. #### Examples: **Using EventListener**: ```java public class ReadyListener implements EventListener { public static void main(String[] args) throws InterruptedException { // Note: It is important to register your ReadyListener before building JDA jda = JDABuilder.createDefault("token") .addEventListeners(new ReadyListener()) .build(); // optionally block until JDA is ready jda.awaitReady(); } @Override public void onEvent(GenericEvent event) { if (event instanceof ReadyEvent) System.out.println("API is ready!"); } } ``` **Using ListenerAdapter**: ```java public class MessageListener extends ListenerAdapter { public static void main(String[] args) { JDA jda = JDABuilder.createDefault("token") .enableIntents(GatewayIntent.MESSAGE_CONTENT) // enables explicit access to message.getContentDisplay() .build(); //You can also add event listeners to the already built JDA instance // Note that some events may not be received if the listener is added after calling build() // This includes events such as the ReadyEvent jda.addEventListener(new MessageListener()); } @Override public void onMessageReceived(MessageReceivedEvent event) { if (event.isFromType(ChannelType.PRIVATE)) { System.out.printf("[PM] %s: %s\n", event.getAuthor().getName(), event.getMessage().getContentDisplay()); } else { System.out.printf("[%s][%s] %s: %s\n", event.getGuild().getName(), event.getTextChannel().getName(), event.getMember().getEffectiveName(), event.getMessage().getContentDisplay()); } } } ``` **Slash-Commands**: ```java public class Bot extends ListenerAdapter { public static void main(String[] args) { if (args.length < 1) { System.out.println("You have to provide a token as first argument!"); System.exit(1); } // args[0] would be the token (using an environment variable or config file is preferred for security) // We don't need any intents for this bot. Slash commands work without any intents! JDA jda = JDABuilder.createLight(args[0], Collections.emptyList()) .addEventListeners(new Bot()) .setActivity(Activity.playing("Type /ping")) .build(); // Sets the global command list to the provided commands (removing all others) jda.updateCommands().addCommands( Commands.slash("ping", "Calculate ping of the bot"), Commands.slash("ban", "Ban a user from the server") .setDefaultPermissions(DefaultMemberPermissions.enabledFor(Permission.BAN_MEMBERS)) // only usable with ban permissions .setGuildOnly(true) // Ban command only works inside a guild .addOption(OptionType.USER, "user", "The user to ban", true) // required option of type user (target to ban) .addOption(OptionType.STRING, "reason", "The ban reason") // optional reason ).queue(); } @Override public void onSlashCommandInteraction(SlashCommandInteractionEvent event) { // make sure we handle the right command switch (event.getName()) { case "ping": long time = System.currentTimeMillis(); event.reply("Pong!").setEphemeral(true) // reply or acknowledge .flatMap(v -> event.getHook().editOriginalFormat("Pong: %d ms", System.currentTimeMillis() - time) // then edit original ).queue(); // Queue both reply and edit break; case "ban": // double check permissions, don't trust discord on this! if (!event.getMember().hasPermission(Permission.BAN_MEMBERS)) { event.reply("You cannot ban members! Nice try ;)").setEphemeral(true).queue(); break; } User target = event.getOption("user", OptionMapping::getUser); // optionally check for member information Member member = event.getOption("user", OptionMapping::getMember); if (!event.getMember().canInteract(member)) { event.reply("You cannot ban this user.").setEphemeral(true).queue(); break; } // Before starting our ban request, tell the user we received the command // This sends a "Bot is thinking..." message which is later edited once we finished event.deferReply().queue(); String reason = event.getOption("reason", OptionMapping::getAsString); AuditableRestAction<Void> action = event.getGuild().ban(target, 0); // Start building our ban request if (reason != null) // reason is optional action = action.reason(reason); // set the reason for the ban in the audit logs and ban log action.queue(v -> { // Edit the thinking message with our response on success event.getHook().editOriginal("**" + target.getAsTag() + "** was banned by **" + event.getUser().getAsTag() + "**!").queue(); }, error -> { // Tell the user we encountered some error event.getHook().editOriginal("Some error occurred, try again!").queue(); error.printStackTrace(); }); } } } ``` ### RestAction Through [RestAction](https://ci.dv8tion.net/job/JDA5/javadoc/net/dv8tion/jda/api/requests/RestAction.html) we provide request handling with - [callbacks](https://ci.dv8tion.net/job/JDA5/javadoc/net/dv8tion/jda/api/requests/RestAction.html#queue%28java.util.function.Consumer%29) - [promises](https://ci.dv8tion.net/job/JDA5/javadoc/net/dv8tion/jda/api/requests/RestAction.html#submit%28%29) - and [sync](https://ci.dv8tion.net/job/JDA5/javadoc/net/dv8tion/jda/api/requests/RestAction.html#complete%28%29) and it is up to the user to decide which pattern to utilize. It can be combined with reactive libraries such as [reactor-core](https://github.com/reactor/reactor-core) due to being lazy. The RestAction interface also supports a number of operators to avoid callback hell: - [`map`](https://ci.dv8tion.net/job/JDA5/javadoc/net/dv8tion/jda/api/requests/RestAction.html#map%28java.util.function.Function%29) Convert the result of the `RestAction` to a different value - [`flatMap`](https://ci.dv8tion.net/job/JDA5/javadoc/net/dv8tion/jda/api/requests/RestAction.html#flatMap%28java.util.function.Function%29) Chain another `RestAction` on the result - [`delay`](https://ci.dv8tion.net/job/JDA5/javadoc/net/dv8tion/jda/api/requests/RestAction.html#delay%28java.time.Duration%29) Delay the element of the previous step **Example**: ```java public RestAction<Void> selfDestruct(MessageChannel channel, String content) { return channel.sendMessage("The following message will destroy itself in 1 minute!") .delay(10, SECONDS, scheduler) // edit 10 seconds later .flatMap((it) -> it.editMessage(content)) .delay(1, MINUTES, scheduler) // delete 1 minute later .flatMap(Message::delete); } ``` ### More Examples We provide a small set of Examples in the [Example Directory](https://github.com/DV8FromTheWorld/JDA/tree/master/src/examples/java). <!-- TODO: Find good examples - [JDA Butler](https://github.com/Almighty-Alpaca/JDA-Butler) [And many more!](https://github.com/search?q=JDA+discord+bot&type=Repositories&utf8=%E2%9C%93) --> ## Sharding a Bot Discord allows Bot-accounts to share load across sessions by limiting them to a fraction of the total connected Guilds/Servers of the bot. <br>This can be done using **sharding** which will limit JDA to only a certain amount of Guilds/Servers including events and entities. Sharding will limit the amount of Guilds/Channels/Users visible to the JDA session so it is recommended to have some kind of elevated management to access information of other shards. To use sharding in JDA you will need to use `JDABuilder.useSharding(int shardId, int shardTotal)`. The **shardId** is 0-based which means the first shard has the ID 0. The **shardTotal** is the total amount of shards (not 0-based) which can be seen similar to the length of an array, the last shard has the ID of `shardTotal - 1`. The [`SessionController`](https://ci.dv8tion.net/job/JDA5/javadoc/net/dv8tion/jda/api/utils/SessionController.html) is a tool of the JDABuilder that allows to control state and behaviour between shards (sessions). When using multiple builders to build shards you have to create one instance of this controller and add the same instance to each builder: `builder.setSessionController(controller)` Since version **3.4.0** JDA provides a `ShardManager` which automates this building process. ### Example Sharding - Using JDABuilder ```java public static void main(String[] args) throws Exception { JDABuilder shardBuilder = JDABuilder.createDefault(args[0]); //register your listeners here using shardBuilder.addEventListeners(...) shardBuilder.addEventListeners(new MessageListener()); for (int i = 0; i < 10; i++) { shardBuilder.useSharding(i, 10) .build(); } } ``` > When the `useSharding` method is invoked for the first time, the builder automatically sets a SessionController internally (if none is present) ### Example Sharding - Using DefaultShardManager ```java public static void main(String[] args) throws Exception { DefaultShardManagerBuilder builder = DefaultShardManagerBuilder.createDefault(args[0]); builder.addEventListeners(new MessageListener()); builder.build(); } ``` ## Entity Lifetimes An **Entity** is the term used to describe types such as **GuildChannel**/**Message**/**User** and other entities that Discord provides. Instances of these entities are created and deleted by JDA when Discord instructs it. This means the lifetime depends on signals provided by the Discord API which are used to create/update/delete entities. This is done through Gateway Events known as "dispatches" that are handled by the JDA WebSocket handlers. When Discord instructs JDA to delete entities, they are simply removed from the JDA cache and lose their references. Once that happens, nothing in JDA interacts or updates the instances of those entities, and they become useless. Discord may instruct to delete these entities randomly for cache synchronization with the API. **It is not recommended to store _any_ of these entities for a longer period of time!** Instead of keeping (e.g.) a `User` instance in some field, an ID should be used. With the ID of a user, you can use `getUserById(id)` to get and keep the user reference in a local variable (see below). ### Entity Updates When an entity is updated through its manager, they will send a request to the Discord API which will update the state of the entity. The success of this request **does not** imply the entity has been updated yet. All entities are updated by the aforementioned **Gateway Events** which means you cannot rely on the cache being updated yet once the execution of a RestAction has completed. Some requests rely on the cache being updated to correctly update the entity. An example of this is updating roles of a member which overrides all roles of the member by sending a list of the new set of roles. This is done by first checking the current cache, the roles the member has right now, and appending or removing the requested roles. If the cache has not yet been updated by an event, this will result in unexpected behavior. ### Entity Deletion Discord may request that a client (the JDA session) invalidates its entire cache. When this happens, JDA will remove all of its current entities and reconnect the session. This is signaled through the `ReconnectEvent`. When entities are removed from the JDA cache, they lose access to the encapsulating entities. For instance, a channel loses access to its guild. Once that happens, they are unable to make any API requests through RestAction and instead throw an `IllegalStateException`. It is **highly recommended** to only keep references to entities by storing their **id** and using the respective `get...ById(id)` method when needed. #### Example ```java public class UserLogger extends ListenerAdapter { private final long userId; public UserLogger(User user) { this.userId = user.getIdLong(); } @Override public void onMessageReceived(MessageReceivedEvent event) { User author = event.getAuthor(); Message message = event.getMessage(); if (author.getIdLong() == userId) { // Print the message of the user System.out.println(author.getAsTag() + ": " + message.getContentDisplay()); } } @Override public void onGuildJoin(GuildJoinEvent event) { JDA api = event.getJDA(); User user = api.getUserById(userId); // Acquire a reference to the User instance through the id user.openPrivateChannel().queue((channel) -> { // Send a private message to the user channel.sendMessageFormat("I have joined a new guild: **%s**", event.getGuild().getName()).queue(); }); } } ``` ## Download [ ![maven-central][] ](https://mvnrepository.com/artifact/net.dv8tion/JDA/latest) [ ![jitpack][] ](https://jitpack.io/#DV8FromtheWorld/JDA) Latest Release: [GitHub Release](https://github.com/DV8FromTheWorld/JDA/releases/latest) <br> Be sure to replace the **VERSION** key below with the one of the versions shown above! For snapshots, please use the instructions provided by [JitPack](https://jitpack.io/#DV8FromTheWorld/JDA). **Maven** ```xml <dependency> <groupId>net.dv8tion</groupId> <artifactId>JDA</artifactId> <version>VERSION</version> </dependency> ``` **Maven without Audio** ```xml <dependency> <groupId>net.dv8tion</groupId> <artifactId>JDA</artifactId> <version>VERSION</version> <exclusions> <exclusion> <groupId>club.minnced</groupId> <artifactId>opus-java</artifactId> </exclusion> </exclusions> </dependency> ``` **Gradle** ```gradle repositories { mavenCentral() } dependencies { //Change 'implementation' to 'compile' in old Gradle versions implementation("net.dv8tion:JDA:VERSION") } ``` **Gradle without Audio** ```gradle dependencies { //Change 'implementation' to 'compile' in old Gradle versions implementation("net.dv8tion:JDA:VERSION") { exclude module: 'opus-java' } } ``` The snapshot builds are only available via JitPack and require adding the JitPack resolver, you need to specify specific commits to access those builds. Stable releases are published to [maven-central](https://mvnrepository.com/artifact/net.dv8tion/JDA). If you do not need any opus de-/encoding done by JDA (voice receive/send with PCM) you can exclude `opus-java` entirely. This can be done if you only send audio with an `AudioSendHandler` which only sends opus (`isOpus() = true`). (See [lavaplayer](https://github.com/sedmelluq/lavaplayer)) If you want to use a custom opus library you can provide the absolute path to `OpusLibrary.loadFrom(String)` before using the audio api of JDA. This works without `opus-java-natives` as it only requires `opus-java-api`. <br>_For this setup you should only exclude `opus-java-natives` as `opus-java-api` is a requirement for en-/decoding._ See [opus-java](https://github.com/discord-java/opus-java) ### Logging Framework - SLF4J JDA is using [SLF4J](https://www.slf4j.org/) to log its messages. That means you should add some SLF4J implementation to your build path in addition to JDA. If no implementation is found, following message will be printed to the console on startup: ``` SLF4J: Failed to load class "org.slf4j.impl.StaticLoggerBinder". SLF4J: Defaulting to no-operation (NOP) logger implementation SLF4J: See http://www.slf4j.org/codes.html#StaticLoggerBinder for further details. ``` JDA currently provides a fallback Logger in case that no SLF4J implementation is present. We strongly recommend to use one though, as that can improve speed and allows you to customize the Logger as well as log to files There is a guide for logback-classic available in our wiki: [Logging Setup](https://jda.wiki/setup/logging/) ## Documentation Docs can be found on the [Jenkins][jenkins] or directly [here](https://ci.dv8tion.net/job/JDA5/javadoc/) <br>A simple Wiki can also be found at [jda.wiki](https://jda.wiki/) ### Annotations We use a number of annotations to indicate future plans for implemented functionality such as new features of the Discord API. - [Incubating](https://github.com/DV8FromTheWorld/JDA/blob/master/src/main/java/net/dv8tion/jda/annotations/Incubating.java) <br>This annotation is used to indicate that functionality may change in the future. Often used when a new feature is added. - [ReplaceWith](https://github.com/DV8FromTheWorld/JDA/blob/master/src/main/java/net/dv8tion/jda/annotations/ReplaceWith.java) <br>Paired with `@Deprecated` this is used to inform you how the new code-fragment is supposed to look once the hereby annotated functionality is removed. - [ForRemoval](https://github.com/DV8FromTheWorld/JDA/blob/master/src/main/java/net/dv8tion/jda/annotations/ForRemoval.java) <br>Paired with `@Deprecated` this indicates that we plan to entirely remove the hereby annotated functionality in the future. - [DeprecatedSince](https://github.com/DV8FromTheWorld/JDA/blob/master/src/main/java/net/dv8tion/jda/annotations/DeprecatedSince.java) <br>Paired with `@Deprecated` this specifies when a feature was marked as deprecated. [Sources](https://github.com/DV8FromTheWorld/JDA/tree/master/src/main/java/net/dv8tion/jda/annotations) ## Getting Help For general troubleshooting you can visit our wiki [Troubleshooting][troubleshooting] and [FAQ][faq]. <br>If you need help, or just want to talk with the JDA or other Devs, you can join the [Official JDA Discord Guild][discord-invite]. Alternatively you can also join the [Unofficial Discord API Guild](https://discord.gg/discord-api). Once you joined, you can find JDA-specific help in the `#java_jda` channel. For guides and setup help you can also take a look at the [wiki](https://jda.wiki/) <br>Especially interesting are the [Getting Started](https://jda.wiki/introduction/jda/) and [Setup](https://jda.wiki/setup/intellij/) Pages. ## Third Party Recommendations ### [LavaPlayer](https://github.com/sedmelluq/lavaplayer) Created and maintained by [sedmelluq](https://github.com/sedmelluq) <br>LavaPlayer is the most popular library used by Music Bots created in Java. It is highly compatible with JDA and Discord4J and allows to play audio from Youtube, Soundcloud, Twitch, Bandcamp and [more providers](https://github.com/sedmelluq/lavaplayer#supported-formats). <br>The library can easily be expanded to more services by implementing your own AudioSourceManager and registering it. It is recommended to read the [Usage](https://github.com/sedmelluq/lavaplayer#usage) section of LavaPlayer to understand a proper implementation. <br>Sedmelluq provided a demo in his repository which presents an example implementation for JDA: https://github.com/sedmelluq/lavaplayer/tree/master/demo-jda ### [Lavalink](https://github.com/freyacodes/Lavalink) Maintained by [Freya Arbjerg](https://github.com/freyacodes). Lavalink is a popular standalone audio sending node based on Lavaplayer. Lavalink was built with scalability in mind, and allows streaming music via many servers. It supports most of Lavaplayer's features. Lavalink is used by many large bots, as well as bot developers who can not use a Java library like Lavaplayer. If you plan on serving music on a smaller scale with JDA it is often preferable to just use Lavaplayer directly as it is easier. [Lavalink-Client](https://github.com/FredBoat/Lavalink-Client) is the official Lavalink client for JDA. ### [jda-nas](https://github.com/sedmelluq/jda-nas) Created and maintained by [sedmelluq](https://github.com/sedmelluq) <br>Provides a native implementation for the JDA Audio Send-System to avoid GC pauses. Note that this send system creates an extra UDP-Client which causes audio receive to no longer function properly since discord identifies the sending UDP-Client as the receiver. ```java JDABuilder builder = JDABuilder.createDefault(BOT_TOKEN) .setAudioSendFactory(new NativeAudioSendFactory()); ``` ### [jda-ktx](https://github.com/MinnDevelopment/jda-ktx) Created and maintained by [MinnDevelopment](https://github.com/MinnDevelopment). <br>Provides [Kotlin](https://kotlinlang.org/) extensions for **RestAction** and events that provide a more idiomatic Kotlin experience. ```kotlin fun main() { val jda = light(BOT_TOKEN) jda.onCommand("ping") { event -> val time = measureTime { event.reply("Pong!").await() // suspending }.inWholeMilliseconds event.hook.editOriginal("Pong: $time ms").queue() } } ``` There is a number of examples available in the [README](https://github.com/MinnDevelopment/jda-ktx/#jda-ktx). ------ More can be found in our github organization: [JDA-Applications](https://github.com/JDA-Applications) ## Contributing to JDA If you want to contribute to JDA, make sure to base your branch off of our **development** branch (or a feature-branch) and create your PR into that **same** branch. **We will be rejecting any PRs between branches or into release branches!** It is very possible that your change might already be in development or you missed something. More information can be found at the wiki page [Contributing](https://github.com/DV8FromTheWorld/JDA/wiki/5\)-Contributing) ### Deprecation Policy When a feature is introduced to replace or enhance existing functionality we might deprecate old functionality. A deprecated method/class usually has a replacement mentioned in its documentation which should be switched to. Deprecated functionality might or might not exist in the next minor release. (Hint: The minor version is the `MM` of `XX.MM.RR` in our version format) It is possible that some features are deprecated without replacement, in this case the functionality is no longer supported by either the JDA structure due to fundamental changes (for example automation of a feature) or due to Discord API changes that cause it to be removed. We highly recommend discontinuing usage of deprecated functionality and update by going through each minor release instead of jumping. For instance, when updating from version 3.3.0 to version 3.5.1 you should do the following: - Update to `3.4.RR` and check for deprecation, replace - Update to `3.5.1` and check for deprecation, replace The `RR` in version `3.4.RR` should be replaced by the latest version that was published for `3.4`, you can find out which the latest version was by looking at the [release page](https://github.com/DV8FromTheWorld/JDA/releases) ## Dependencies: This project requires **Java 8+**.<br> All dependencies are managed automatically by Gradle. * NV Websocket Client * Version: **2.14** * [Github](https://github.com/TakahikoKawasaki/nv-websocket-client) * OkHttp * Version: **4.10.0** * [Github](https://github.com/square/okhttp) * Apache Commons Collections4 * Version: **4.4** * [Website](https://commons.apache.org/proper/commons-collections) * jackson * Version: **2.14.1** * [Github](https://github.com/FasterXML/jackson) * Trove4j * Version: **3.0.3** * [BitBucket](https://bitbucket.org/trove4j/trove) * slf4j-api * Version: **1.7.36** * [Website](https://www.slf4j.org/) * opus-java (optional) * Version: **1.1.1** * [GitHub](https://github.com/discord-java/opus-java) ## Related Projects - [Discord4J](https://github.com/Discord4J/Discord4J) - [Discord.NET](https://github.com/discord-net/Discord.Net) - [discord.py](https://github.com/Rapptz/discord.py) - [serenity](https://github.com/serenity-rs/serenity) **See also:** [Discord API Community Libraries](https://github.com/apacheli/discord-api-libs)
513
💎 Cross platform Web debugging proxy
![Build](https://github.com/alibaba/lightproxy/workflows/Build/badge.svg) ![Build doc and Deploy](https://github.com/alibaba/lightproxy/workflows/Build%20and%20Deploy/badge.svg) ![Stable version](https://img.shields.io/badge/dynamic/json?url=https://gw.alipayobjects.com/os/LightProxy/release.json&label=Stable%20Version&query=$.version) ![Beta version](https://img.shields.io/badge/dynamic/json?url=https://gw.alipayobjects.com/os/LightProxy/beta-release.json&label=Beta%20Version&query=$.version) ![GitHub issues](https://img.shields.io/github/issues/alibaba/lightproxy) ![GitHub closed issues](https://img.shields.io/github/issues-closed-raw/alibaba/lightproxy) [![HitCount](http://hits.dwyl.com/alibaba/lightproxy.svg)](http://hits.dwyl.com/alibaba/lightproxy) <p align="center"> <a href="https://lightproxy.org"> <img src="./vendor/files/icon.png" height="150px"/> </a> </p> <p align="center"> <b><a href="https://lightproxy.org/doc/getting-started#download">Download</a></b> | <b><a href="https://lightproxy.org/doc/getting-started">Document</a></b> | <b><a href="CONTRIBUTING.org">Contribute</a></b> | <b><a href="https://github.com/alibaba/lightproxy/issues/117">Introduction</a></b> | <b><a href="https://github.com/alibaba/lightproxy/issues/19">介绍文章</a></b> | <b><a href="https://alibaba.github.io/lightproxy/start-proxy-only.html">FAQ</a></b> </p> <p align="center"> <a href="https://www.producthunt.com/posts/lightproxy?utm_source=badge-featured&utm_medium=badge&utm_souce=badge-lightproxy" target="_blank"><img src="https://api.producthunt.com/widgets/embed-image/v1/featured.svg?post_id=195432&theme=light" alt="LightProxy - Open-source proxy tools for macOS & Windows based on whistle | Product Hunt Embed" style="width: 250px; height: 54px;" width="250px" height="54px" /></a> </p> <p align="center"> <a href="https://lightproxy.org"> <img src="https://img.alicdn.com/tfs/TB157bJF.T1gK0jSZFrXXcNCXXa-1393-921.png"></img> <img src="https://img.alicdn.com/tfs/TB1vd0uGYj1gK0jSZFOXXc7GpXa-1549-1018.png"></img> </a> </p> --- :package: Out-of-box, fully automation with **certificate install & system proxy setting** :battery: Battery include, powerful `hosts/proxy/capture` based on `whistle`, what u need is just input `/` :electric_plug: Hackable, you could write even Node.js for your proxy rule --- ## Preview GIF <p align="center"> <img src="https://i.loli.net/2020/05/05/uRZMpi8rPDyQF6I.gif"></img> </p> ## Download [macOS Version Download](https://gw.alipayobjects.com/os/LightProxy/LightProxy.dmg) [Windows Version Download](https://gw.alipayobjects.com/os/LightProxy/LightProxy-Setup.exe) ## Quick Start Take a quick start at: https://lightproxy.org/doc/getting-started ## How to contribute ### env - nodejs > 12 (**important**) - `npm install -g electron-builder` if you need bundle application ### dev ```shell git clone https://github.com/alibaba/lightproxy cd lightproxy yarn run install-deps yarn run dev ``` For new contributors you can try to fix a [🏅send-a-PR](https://github.com/alibaba/lightproxy/issues?q=is%3Aissue+is%3Aopen+label%3A%22%F0%9F%8F%85send+a+PR%22) ## Contributors ✨ <p align="center"> <a href="https://github.com/alibaba/lightproxy/graphs/contributors"> <img src="https://contributors-img.web.app/image?repo=alibaba/lightproxy"></img> </a> </p> > ICBU 端架构团队招聘 > ❤️ 如果你擅长端技术,热爱开源,追求极致的用户体验和开发者体验,欢迎发简历到 [email protected]
514
🔍 gowitness - a golang, web screenshot utility using Chrome Headless
<h1 align="center"> <br> 🔍 gowitness <br> <br> </h1> <h4 align="center">A golang, web screenshot utility using Chrome Headless.</h4> <p align="center"> <a href="https://twitter.com/leonjza"><img src="https://img.shields.io/badge/twitter-%40leonjza-blue.svg" alt="@leonjza" height="18"></a> <a href="https://goreportcard.com/report/github.com/sensepost/gowitness"><img src="https://goreportcard.com/badge/github.com/sensepost/gowitness" alt="Go Report Card" height="18"></a> <a href="https://github.com/sensepost/gowitness/actions/workflows/docker.yml"><img alt="Docker build & Push" src="https://github.com/sensepost/gowitness/actions/workflows/docker.yml/badge.svg"></a> </p> <br> ## introduction `gowitness` is a website screenshot utility written in Golang, that uses Chrome Headless to generate screenshots of web interfaces using the command line, with a handy report viewer to process results. Both Linux and macOS is supported, with Windows support mostly working. Inspiration for `gowitness` comes from [Eyewitness](https://github.com/ChrisTruncer/EyeWitness). If you are looking for something with lots of extra features, be sure to check it out along with these [other](https://github.com/afxdub/http-screenshot-html) [projects](https://github.com/breenmachine/httpscreenshot). ## documentation For installation information and other documentation, please refer to the wiki [here](https://github.com/sensepost/gowitness/wiki). ## screenshots ![dark](images/gowitness-detail.png) ## credits `gowitness` would not have been posssible without these amazing projects: - [chromedp](https://github.com/chromedp/chromedp) - [tabler](https://github.com/tabler/tabler) - [zerolog](https://github.com/rs/zerolog) - [cobra](https://github.com/spf13/cobra) - [gorm](https://github.com/go-gorm/gorm) - [go-nmap](https://github.com/lair-framework/go-nmap) - [wappalyzergo](https://github.com/projectdiscovery/wappalyzergo) - [goimagehash](https://github.com/corona10/goimagehash) And many more! ## license `gowitness` is licensed under a [GNU General Public v3 License](https://www.gnu.org/licenses/gpl-3.0.en.html). Permissions beyond the scope of this license may be available at <http://sensepost.com/contact/>.
515
Develop desktop GUI applications using PHP, HTML5, JavaScript and SQLite
# PHP Desktop Table of contents: * [Introduction](#introduction) * [Downloads](#downloads) * [Support](#support) * [Fundings for new features](#fundings-for-new-features) * [Support development](#support-development) * [Seeking sponsors](#seeking-sponsors) ## Introduction PHP Desktop is an open source project founded by Czarek Tomczak in 2012 to provide a way for developing native desktop GUI applications using web technologies such as PHP, HTML5, JavaScript and SQLite. Think of it as Electron for PHP. It is a convienient tool for converting PHP web apps and PHP CLI tools to desktop applications with little effort. The development workflow you are used to while creating web applications remains the same, there is no new framework / API to learn. The process of turning an existing website into a desktop application is basically a matter of copying it to the "phpdesktop/www/" directory. In a certain sense phpdesktop acts as a PHP to EXE compiler. It embeds a web browser, a multi-threaded web server and a PHP interpreter. All embedded into a single application, a portable folder that you can easily distribute to end users by packing it to zip archive or by making an [installer for your application](../../wiki/Knowledge-Base#application-installer). The web server embedded is a custom edition of [Mongoose](https://en.wikipedia.org/wiki/Mongoose_(web_server)), a web server used by NASA on the International Space Station. Supported browsers are Internet Explorer and Google Chrome via open source Chromium. The package with Chrome embedded has no external dependencies, everything is included in phpdesktop binaries and works out of the box on a user's computer. All popular PHP frameworks are supported, see the [PHP frameworks support](../../wiki/PHP-frameworks-support) wiki page for example configurations for CakePHP, CodeIgniter, Laravel, Symfony, Yii and Zend Framework. You can create a standalone executable for distribution with the help of the [Inno Setup installer](../../wiki/Knowledge-Base#application-installer). PHP sources can be protected with the many of the available [PHP encoders](../../wiki/Knowledge-Base#how-do-i-protect-php-sources-in-the-www-directory). PHP Desktop is released under non-restrictive license, thus it is [free for commercial use](../../wiki/Knowledge-Base#can-i-use-php-desktop-in-a-commercial-closed-sourced-project). It is one of the top goals for PHP Desktop to be stable, to work reliably. PHP Desktop does not suffer from memory leaks. PHP by design was never intended for running long hours/days, as desktop applications usually do. This is not a concern when using PHP Desktop, as it is running an internal web server and serving pages through CGI. So when PHP script execution ends, PHP-CGI process is killed and all memory is always freed. Lots of other useful information can be found on the [Knowledge Base](../../wiki/Knowledge-Base) wiki page and on the [PHP Desktop Forum](https://groups.google.com/d/forum/phpdesktop). ## Downloads * Windows - [PHP Desktop v57.0 for Windows ](https://github.com/cztomczak/phpdesktop/releases/tag/chrome-v57.0-rc) release - [PHP Desktop MSIE v1.14](https://github.com/cztomczak/phpdesktop/wiki/PHP-Desktop-MSIE-v1.14) wiki page * Linux - [PHP Desktop v72.1 for Linux](https://github.com/cztomczak/phpdesktop/releases/tag/linux-v72.0) release * Mac - No release yet, see the ongoing funding in [Issue #208](https://github.com/cztomczak/phpdesktop/issues/208) There are two ways to be notified about new releases: - Watch the project with the "Releases only" option checked - Subscribe to the [RSS/Atom feed](https://github.com/cztomczak/phpdesktop/releases.atom) ## Support * Documentation is on the [Wiki Pages](../../wiki). Start with the [Knowledge Base](../../wiki/Knowledge-Base), [Settings](../../wiki/Settings) and [Chrome settings](../../wiki/Chrome-settings) wiki pages. * Ask questions and report problems on the [PHP Desktop Forum](https://groups.google.com/d/forum/phpdesktop) * See also this externally maintained tutorial: [Create your first Desktop Application with PHP and PHP Desktop](http://phpocean.com/tutorials/design-and-illustration/create-your-first-desktop-application-with-php-and-php-desktop/4) ## Fundings for new features Here is a list of ongoing fundings for new features in PHP Desktop: Feature | Funds gathered | Issue | Status --- | --- | --- | --- Chrome v100 release for Windows | $890 of $2,000 | [Issue #227](https://github.com/cztomczak/phpdesktop/issues/227) | Ongoing funding Initial Mac release | $2,000 of $2,000 | [Issue #208](https://github.com/cztomczak/phpdesktop/issues/208) | Work started Below is a list of completed fundings with features already implemented: Feature | Funds gathered | Issue | Status --- | --- | --- | --- Initial Linux release | $1,500 of $1,500 | [Issue #221](https://github.com/cztomczak/phpdesktop/issues/221) | Done Fundings for other features submitted in the issue tracker and the ones presented on the [PHP Desktop Pro](https://github.com/cztomczak/phpdesktop/wiki/PHP-Desktop-Pro) wiki page are also possible, just let know Czarek. ## Support development If you would like to support PHP Desktop general development efforts by making a donation please click the Donate button below: [![Donate](https://raw.githubusercontent.com/wiki/cztomczak/cefpython/images/donate.gif)](https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=JQSTPDRRM8AQ8) ## Seeking sponsors PHP Desktop is seeking companies to sponsor further development of the project. There are many proposals for new features submitted in the issue tracker and on wiki pages. Most notable are: * Monthly releases with latest Chrome * An automated build system * Cross-platform support with full functionality on Mac and Linux * More Javascript and PHP API exposed for accomplishing desktop specific tasks * Better integration with desktop, taskbar and systray * HTTPS/SSL support * Custom window themes * Running app in background * SQLite encryption * Desktop notifications If your company would like to sponsor PHP Desktop development efforts then please contact [Czarek](https://www.linkedin.com/in/czarektomczak/). Long term sponsorships are welcome and Czarek is open to ideas about the project. He would love to spend more time on developing this project, but he can't afford doing so in his free time.
516
A browser extension for the Motrix Download Manager
# Motrix WebExtension This WebExtension allows you to automatically download all the files via [Motrix Download Manager](https://motrix.app/) instead of your browser's native download manager. You must download and install the Motrix download manager first to use this extension: [Releases](https://github.com/agalwood/Motrix/releases/latest) ![motrix-extension](https://user-images.githubusercontent.com/8397274/71557256-bed84a80-2a69-11ea-98d9-f2f20d2a0065.gif) ## How to use ### Demo video: - [Chrome](https://youtu.be/L0cEu-2LpOE) ### Text introduction: 1. Open the Motrix download manager installed on your computer, and go to `Preferences > Advanced > Security > RPC secret` and create a random secret key and copy it. <img src="https://user-images.githubusercontent.com/8397274/211193332-bc815b60-60a3-445c-bb0b-7547d1974de8.png" alt="how to use motrix step 1" valign="middle"> 2. Go to chrome extensions, go to Motrix WebExtension settings, paste the key and click on "SET KEY" button. You are ready to go! <img src="https://user-images.githubusercontent.com/8397274/211193337-96f7fa11-e660-48a7-b323-b800a7d64084.png" alt="how to use motrix step 2" valign="middle"> Note: **You should keep Motrix always running in the background for this extension to work. We cant launch motrix programmatically.** ## Installing ### Chrome / Opera / Edge [link-chrome]: https://chrome.google.com/webstore/detail/motrix-webextension/djlkbfdlljbachafjmfomhaciglnmkgj 'Version published on Chrome Web Store' [<img src="https://raw.githubusercontent.com/alrra/browser-logos/90fdf03c/src/chrome/chrome.svg" width="48" alt="Chrome" valign="middle">][link-chrome] [<img valign="middle" src="https://img.shields.io/chrome-web-store/v/djlkbfdlljbachafjmfomhaciglnmkgj.svg?label=%20">][link-chrome] also compatible with [<img src="https://raw.githubusercontent.com/alrra/browser-logos/90fdf03c/src/edge/edge.svg" width="24" alt="Edge" valign="middle">][link-chrome] [<img src="https://raw.githubusercontent.com/alrra/browser-logos/90fdf03c/src/opera/opera.svg" width="24" alt="Opera" valign="middle">][link-chrome] ### Firefox [link-firefox]: https://addons.mozilla.org/en-US/firefox/addon/motrixwebextension/ 'Version published on Mozilla Add-ons' [<img src="https://raw.githubusercontent.com/alrra/browser-logos/90fdf03c/src/firefox/firefox.svg" width="48" alt="Firefox" valign="middle">][link-firefox] [<img valign="middle" src="https://img.shields.io/amo/v/motrixwebextension.svg?label=%20">][link-firefox] ### Building from sources More info [here](installing-via-releases.md) ## Development ### Install ```shell yarn install ``` ### Starting the development server ```shell yarn run dev chrome yarn run dev firefox yarn run dev opera yarn run dev edge ``` ### Build ```shell yarn run build chrome yarn run build firefox yarn run build opera yarn run build edge ``` ### Environment The build tool also defines a variable named `process.env.NODE_ENV` in your scripts. ### Toolkit Docs * [webextension-toolbox](https://github.com/HaNdTriX/webextension-toolbox) ### License This project is licensed under the GPL License - see the [LICENSE](LICENSE) file for details ### Bugs If you are experiencing any bugs, don’t forget to open a [new issue](https://github.com/gautamkrishnar/motrix-webextension/issues/new). ### Maintainers - [@gautamkrishnar](https://github.com/gautamkrishnar) - [@JaroslawPokropinski](https://github.com/JaroslawPokropinski) ### Contributors Special thanks to these amazing people <a href="https://github.com/gautamkrishnar/motrix-webextension/graphs/contributors"> <img src="https://contrib.rocks/image?repo=gautamkrishnar/motrix-webextension" /> </a> ### Liked it? Hope you liked this project, don't forget to give it a star ⭐
517
chrome browser of android version from chromium open project
# AndroidChromium [中文文档](https://github.com/JackyAndroid/AndroidChromium/blob/master/README-CN.md) ![](https://github.com/JackyAndroid/AndroidChromium/blob/master/app/src/main/res/mipmap-xhdpi/app_icon.png) ### Brief Introduction * Google browser android version of the source program * This project is a world-class android architecture * Clarify the project business logic can completely fit for domestic company engineer * This project will follow up and update Google browser kernel version for a long time, welcome to the star ### Notice If you are using AndroidStudio above 2.0 version and open instant run function, suggested to debug after closing (instant run will modify on the Application of the result in chrome provider context reference error) ### Screenshots ![](https://github.com/JackyAndroid/AndroidChromium/blob/master/screenshots/screenshot1.jpg) ![](https://github.com/JackyAndroid/AndroidChromium/blob/master/screenshots/screenshot2.jpg) ![](https://github.com/JackyAndroid/AndroidChromium/blob/master/screenshots/screenshot3.jpg) ![](https://github.com/JackyAndroid/AndroidChromium/blob/master/screenshots/screenshot4.jpg) ![](https://github.com/JackyAndroid/AndroidChromium/blob/master/screenshots/screenshot5.jpg) ![](https://github.com/JackyAndroid/AndroidChromium/blob/master/screenshots/screenshot6.png) ### The upgrade Chromium kernel steps are as follows --- ### Preparation Refer to [official](https://chromium.googlesource.com/chromium/src/+/master/docs/android_build_instructions.md) and other tutorial compile chromium source code, and can generate chrome apk ### purpose Using AndroidStudio debugging Chromium Android ### The build process 1. Android Studio as a development environment, from Chromium for Android from chrome module source code, to join the Android project. 2. Native code in the chromium environment to build, as so file to join the Android project 3. Basic module (base, the content, net, etc.) in the chromium environment to build into a jar package, then add to the Android project 4. content, chrome, UI modules such as resource file to join an Android library project ### Why can't a resource file are directly added to the Android project? Because namespace problems, such as the content of the module resources namespace is org.chromium.content,the chrome module namespace is org.chromium.chrome, so need to build different Android library project, specify different package name. ### Directory corresponding relation app/libs ----------- chromium/src/out/gnbuild/lib.java app/src/main/aidl ----------- chromium/src/chrome/android/java/src/android/support/customtabs/*.aidl app/src/main/assets ----------- chromium/src/out/gnbuild/ app/src/main/java ------------ chromium/src/chrome/android/java/src app/src/main/jniLibs ----------- chromium/src/out/gnbuild/ app/src/main/res(app module init res) libraries/androidmedia_res ----------- chromium/src/third_party/android_media/java/res libraries/chrome_res ----------- chromium/src/chrome/android/java/res & chromium/src/chrome/android/java/res_chromium libraries/content_res ----------- chromium/src/content/public/android/java/res libraries/datausagechart_res --------- chromium/src/third_party/android_data_chart/java/res libraries/ui_res ---------- chromium/src/ui/android/java/res ### The kernel upgrade matters needing attention 1. Pak and dat files need to be added to the assets directory, and cannot be compressed 2. Aidl files added to the main/aidl 3. The current build chromium version is 55.0.2883.99 4. Because some Java file is through the C compiler generated, there is the chromium/src/out directory or exist in the jars.If according to corresponding relation between the above updated version missing files, please go to the out/directory search, add corresponding files according to the namespace.There are some temporary generated XML resource file also need the out/directory on copy to the corresponding resource module. ### Thanks The project is inspiration from the 365 browser ### License Copyright 2016 Jacky Wang<[email protected]> Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.
518
Go lang bindings for the Chromium Embedded Framework (CEF)
CEF2go ====== Table of contents: * [Introduction](#introduction) * [Compatibility](#compatibility) * [Binary examples](#binary-examples) * [Help](#help) * [Support Development](#support-development) * [Forks worth a look](#forks-worth-a-look) * [Communication between Go and Javascript](#communication-between-go-and-javascript) * [Getting started on Windows](#getting-started-on-windows) * [Getting started on Linux](#getting-started-on-linux) * [Getting started on Mac OS X](#getting-started-on-mac-os-x) * [Built a cool app?](#built-a-cool-app) * [Familiar with Python or PHP?](#familiar-with-python-or-php) Introduction ------------ CEF2go is an open source project founded by [Czarek Tomczak](https://www.linkedin.com/in/czarektomczak/) in 2014 to provide Go bindings for the [Chromium Embedded Framework](https://bitbucket.org/chromiumembedded/cef) (CEF). CEF2go can act as a GUI toolkit, allowing you to create an HTML 5 based GUI in your application. Or you can provide browser capabilities to your application. Currently the CEF2go example creates just a simple window with the Chromium browser embedded. You can set a few options for your application like the cache directory. More advanced bindings are in plans, and that includes javascript bindings and callbacks, so that you can have bidirectional communication between Go and Javascript in a native way. Though, it is already possible to communicate with Go from Javascript, see the "Communication between Go and Javascript" section further down this page. CEF2go is licensed under the BSD 3-clause license, see the LICENSE file. Compatibility ------------- Supported platforms: Windows, Linux, Mac OSX. CEF2go was tested and works fine with Go 1.2 / Go 1.3.3. Binary examples --------------- The binary examples provided here use CEF 3 branch 1750 (Chrome 33 beta channel as of build time). Windows example: [releases/tag/v0.10](https://github.com/CzarekTomczak/cef2go/releases/tag/v0.10) Linux example: [releases/tag/v0.11](https://github.com/CzarekTomczak/cef2go/releases/tag/v0.11) Mac OSX example: [releases/tag/v0.12](https://github.com/CzarekTomczak/cef2go/releases/tag/v0.12) Help ---- Having problems or questions? Go to the [CEF2go Forum](http://groups.google.com/group/cef2go). Please do not use Issue Tracker for asking questions. See the auto generated docs for the following packages: * [cef](https://godoc.org/github.com/CzarekTomczak/cef2go/src/cef) * [cocoa](https://godoc.org/github.com/CzarekTomczak/cef2go/src/cocoa) * [gtk](https://godoc.org/github.com/CzarekTomczak/cef2go/src/gtk) * [wingui](https://godoc.org/github.com/CzarekTomczak/cef2go/src/wingui) Support development ------------------- Both code contributions and Paypal donations are welcome. [![Donate through Paypal](https://raw.githubusercontent.com/CzarekTomczak/cef2go/master/donate.gif)](https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=9CAMRSA48UVT8) Thanks to those who have made a Paypal donation: - David Witten Forks worth a look ------------------ * [fromkeith/cef2go](https://github.com/fromkeith/cef2go) * Adds support for client handlers (eg. Display, LifeSpan, Request, Resource, Scheme, Download). * Exposes new objects (eg. Browser, Frame, Request, Response). * Tested only on Windows. * [paperlesspost/cef2go](https://github.com/paperlesspost/cef2go) * Adds suport for a few client handlers including Render handler (off-screen rendering to a raw pixel buffer). * Implements V8 callbacks for native communication from Javascript to Go. * Tested only on Linux. Communication between Go and Javascript --------------------------------------- For now to make communication between Go and javascript possible you have to run an internal http server and communicate using XMLHttpRequests in javascript. See the [http_server_windows.go](https://github.com/CzarekTomczak/cef2go/blob/master/src/http_server_windows.go) example that embeds both a http server and a Chromium browser in a standalone application. To run it type "build.bat http_server". The http server is listening at 127.0.0.1:54007, thus it is not accessible from the outside, it can be accessed only from the machine it is running on. Getting started on Windows -------------------------- 1. Install Go 32-bit. CEF 64-bit binaries are still experimental and were not tested. 2. Install mingw 32-bit and add C:\MinGW\bin to PATH. You can install mingw using [mingw-get-setup.exe](http://sourceforge.net/projects/mingw/files/Installer/). Select packages to install: "mingw-developer-toolkit", "mingw32-base", "msys-base". CEF2go was tested and works fine with GCC 4.8.2. You can check gcc version with "gcc --version". 3. Download CEF 3 branch 1750 revision 1590 binaries: [cef_binary_3.1750.1590_windows32.7z](https://github.com/CzarekTomczak/cef2go/releases/download/cef3-b1750-r1590/cef_binary_3.1750.1590_windows32.7z) Copy Release/* to cef2go/Release Copy Resources/* to cef2go/Release 4. Run build.bat (or "build.bat noconsole" to get rid of the console window when running the final executable) Getting started on Linux ------------------------ 1. These instructions work fine with Ubuntu 12.04 64-bit. On Ubuntu 13/14 libudev.so.0 is missing and it is required to create a symbolic link to libudev.so.1. For example on Ubuntu 14.04 64-bit run this command: `cd /lib/x86_64-linux-gnu/ && sudo ln -sf libudev.so.1 libudev.so.0`. 2. Install CEF dependencies: `sudo apt-get install build-essential libgtk2.0-dev libgtkglext1-dev` 3. Download CEF 3 branch 1750 revision 1604 binaries: [cef_binary_notcmalloc_3.1750.1604_linux64.zip](https://github.com/CzarekTomczak/cef2go/releases/download/cef3-b1750-r1604/cef_binary_notcmalloc_3.1750.1604_linux64.zip) Copy Release/* to cef2go/Release 4. Run "make" command. Getting started on Mac OS X --------------------------- 1. These instructions work fine with OS X 10.8 Mountain Lion. May also work with other versions, but were not tested. 2. Install Go 32-bit. Tested with Go 1.2-386 for OSX 10.8. CEF binaries for OSX 64-bit are still experimental, that's why we're using 32-bit. Though you can try building with CEF 64-bit, download binaries from [cefbuilds.com](http://cefbuilds.com). 3. Install command line tools (make is required) from: https://developer.apple.com/downloads/ (In my case command line tools for Mountain Lion from September 2013) 4. Install XCode (gcc that comes with XCode is required). Use the link above. In my case it was XCode 4.6.3 from June 2013. 5. Download CEF 3 branch 1750 revision 1625 binaries for 32-bit: [releases/tag/v0.12](https://github.com/CzarekTomczak/cef2go/releases/tag/v0.12) Copy the cef2go.app directory to cef2go/Release. 6. Run "make" command. Built a cool app? ----------------- Built a cool app using CEF2go and would like to share info with the community? Talk about it on the [CEF2go Forum](http://groups.google.com/group/cef2go). Familiar with Python or PHP? ---------------------------- The author of CEF2go is also working on CEF bindings for other languages. For Python see the [CEF Python](https://code.google.com/p/cefpython/) project. For PHP see the [PHP Desktop](https://code.google.com/p/phpdesktop/) project.
519
Python bindings for the Chromium Embedded Framework (CEF)
# CEF Python Table of contents: * [Introduction](#introduction) * [Latest releases sponsored by](#latest-releases-sponsored-by) * [Thanks to all sponsors](#thanks-to-all-sponsors) * [Install](#install) * [Tutorial](#tutorial) * [Examples](#examples) * [Support](#support) * [Releases](#releases) * [Next release](#next-release) * [Latest release](#latest-release) * [v49 release (WinXP/Vista)](#v49-release-winxpvista) * [v31 release (old systems)](#v31-release-old-systems) * [Support development](#support-development) * [Thanks to all](#thanks-to-all) * [Seeking new sponsors](#seeking-new-sponsors) * [Other READMEs](#other-readmes) * [Quick links](#quick-links) ## Introduction CEF Python is an open source project founded by [Czarek Tomczak](https://www.linkedin.com/in/czarektomczak/) in 2012 to provide Python bindings for the [Chromium Embedded Framework](https://bitbucket.org/chromiumembedded/cef) (CEF). The Chromium project focuses mainly on Google Chrome application development while CEF focuses on facilitating embedded browser use cases in third-party applications. Lots of applications use CEF control, there are more than [100 million CEF instances](http://en.wikipedia.org/wiki/Chromium_Embedded_Framework#Applications_using_CEF) installed around the world. There are numerous use cases for CEF: 1. Use it as a modern HTML5 based rendering engine that can act as a replacement for classic desktop GUI frameworks. Think of it as Electron for Python. 2. Embed a web browser widget in a classic Qt / GTK / wxPython desktop application 3. Render web content off-screen in applications that use custom drawing frameworks 4. Use it for automated testing of web applications with more advanced capabilities than Selenium web browser automation due to CEF low level programming APIs 5. Use it for web scraping, as a web crawler or other kind of internet bots CEF Python also provides examples of embedding CEF for many Python GUI frameworks such as PyQt, wxPython, PyGTK, PyGObject, Tkinter, Kivy, Panda3D, PyGame, PyOpenGL, PyWin32, PySide and PySDL2. ## Latest releases sponsored by <table border="0"><tr> <td width="50%" valign="top"> <p align="center"> <a href="https://www.fivestars.com/"> <img src="https://raw.githubusercontent.com/wiki/cztomczak/cefpython/images/fivestars360.png"> </a> </p> Thank you to Fivestars for sponsoring the [v66.1 release](../../releases/tag/v66.1) with Python 3.8 / 3.9 support. Fivestars helps local communities thrive by empowering small businesses with cutting edge marketing technology. Please visit their website: <a href="https://www.fivestars.com/">Fivestars.com</a> </td><td width="50%" valign="top"> <p align="center"> <a href="https://lampix.com/"> <img src="https://raw.githubusercontent.com/wiki/cztomczak/cefpython/images/lampix360.png"> </a> </p> Thank you to Lampix for sponsoring the [v66 release](../../releases/tag/v66.0). Lampix is the first hardware and software solution that turns any surface into a smart, augmented reality or interactive surface. Please visit their website: <a href="https://lampix.com/">Lampix.com</a> </tr></table> ### Thanks to all sponsors <table> <tr> <td> <div align="center"> <a href="https://www.fivestars.com/"> <img src="https://raw.githubusercontent.com/wiki/cztomczak/cefpython/images/fivestars200.png"> </a><br> <a href="https://www.fivestars.com/">www.fivestars.com</a> </div> </td> <td> <div align="center"> <a href="https://lampix.com/"> <img src="https://raw.githubusercontent.com/wiki/cztomczak/cefpython/images/lampix200.png"> </a><br> <a href="https://lampix.com/">www.lampix.com</a> </div> </td> <td> <div align="center"> <a href="http://www.blueplanet.com/"> <img src="https://raw.githubusercontent.com/wiki/cztomczak/cefpython/images/cyan_new_logo_200x48.png"> </a><br> <a href="http://www.blueplanet.com/">www.blueplanet.com</a> </div> </td> </tr> <tr> <td> <div align="center"> <a href="https://highside.io/"> <img src="https://raw.githubusercontent.com/wiki/cztomczak/cefpython/images/highside-onlight-200x48.png"> </a><br> <a href="https://highside.io/">www.highside.io</a> <div align="center"> </td> <td> <div align="center"> <a href="http://www.rentouch.ch/"> <img src="https://raw.githubusercontent.com/wiki/cztomczak/cefpython/images/rentouch.png"> </a><br> <a href="http://www.rentouch.ch/">www.rentouch.ch</a> </div> </td> <td> <div align="center"> <a href="https://www.jetbrains.com/pycharm/"> <img src="https://raw.githubusercontent.com/wiki/cztomczak/cefpython/images/pycharm.png"> </a><br> <a href="https://www.jetbrains.com/pycharm/">www.jetbrains.com</a> </div> </td> <tr> </table> ## Install You can install [pypi/cefpython3](https://pypi.python.org/pypi/cefpython3) package using pip tool. On Linux pip 8.1+ is required. You can also download packages for offline installation available on the [GitHub Releases](../../releases) pages. Command to install with pip: ``` pip install cefpython3==66.0 ``` ## Tutorial See the [Tutorial.md](docs/Tutorial.md) document. ## Examples See the [README-examples.md](examples/README-examples.md) and [README-snippets.md](examples/snippets/README-snippets.md) documents. ## Support - Ask questions and report problems on the [Forum](https://groups.google.com/group/cefpython) - Supported examples are listed in the [README-examples.md](examples/README-examples.md) file - Documentation is in the [docs/](docs) directory: - [Build instructions](docs/Build-instructions.md) - [Contributing code](docs/Contributing-code.md) - [Knowledge Base](docs/Knowledge-Base.md) - [Migration guide](docs/Migration-guide.md) - [Tutorial](docs/Tutorial.md) - API reference is in the [api/](api) directory: - [API categories](api/API-categories.md#api-categories) - [API index](api/API-index.md#api-index) - Additional documentation is available in [Issues labelled Knowledge Base](../../issues?q=is%3Aissue+is%3Aopen+label%3A%22Knowledge+Base%22) - To search documentation use GitHub "This repository" search at the top. To narrow results to documentation only select "Markdown" in the right pane. - You can vote on issues in the tracker to let us know which issues are important to you. To do that add a +1 thumb up reaction to the first post in the issue. See [Most popular issues](../../issues?q=is%3Aissue+is%3Aopen+sort%3Areactions-%2B1-desc) sorted by reactions. ## Releases Information on planned new and current releases, supported platforms, python versions, architectures and requirements. If you want to support old operating systems then choose the v31 release. ### Next release - To see planned new features or bugs to be fixed in the near future in one of next releases, see the [next release](../../issues?q=is%3Aissue+is%3Aopen+label%3A%22next+release%22) label in the tracker - To see planned new features or bugs to be fixed in further future, see the [next release 2](../../issues?q=is%3Aissue+is%3Aopen+label%3A%22next+release+2%22) label in the tracker ### Latest release OS | Py2 | Py3 | 32bit | 64bit | Requirements --- | --- | --- | --- | --- | --- Windows | 2.7 | 3.4 / 3.5 / 3.6 / 3.7 / 3.8 / 3.9 | Yes | Yes | Windows 7+ (Note that Python 3.9 supports Windows 8.1+) Linux | 2.7 | 3.4 / 3.5 / 3.6 / 3.7 | Yes | Yes | Debian 8+, Ubuntu 14.04+,<br> Fedora 24+, openSUSE 13.3+ Mac | 2.7 | 3.4 / 3.5 / 3.6 / 3.7 | No | Yes | MacOS 10.9+ These platforms are not supported yet: - ARM - see [Issue #267](../../issues/267) - Android - see [Issue #307](../../issues/307) ### v49 release (WinXP/Vista) OS | Py2 | Py3 | 32bit | 64bit | Requirements --- | --- | --- | --- | --- | --- Windows | 2.7 | 3.4 | Yes | Yes | Windows XP+ - Install with command: `pip --no-cache-dir install cefpython3==49.0`. - Please note that if you were previously installing cefpython3 package it is required to use the `--no-cache-dir` flag, otherwise pip will end up with error message `No matching distribution found for cefpython3==49.0`. This happens because 49.0 release occured after 57.0 and 66.0 releases. - Downloads are available on GitHub Releases tagged [v49.0](../../releases/tag/v49.0). - See [Migration guide](docs/Migration-guide.md) document for changes in this release - Documentation is available in the [docs/](../../tree/cefpython49-winxp/docs) directory in the `cefpython49-winxp` branch - API reference is available in the [api/](../../tree/cefpython49-winxp/api) directory in the `cefpython49-winxp` branch ### v31 release (old systems) OS | Py2 | Py3 | 32bit | 64bit | Requirements --- | --- | --- | --- | --- | --- Windows | 2.7 | No | Yes | Yes | Windows XP+ Linux | 2.7 | No | Yes | Yes | Debian 7+ / Ubuntu 12.04+ Mac | 2.7 | No | Yes | Yes | MacOS 10.7+ Additional information for v31.2 release: - On Windows/Mac you can install with command: `pip install cefpython3==31.2` - Downloads are available on the GitHub Releases page tagged [v31.2](../../releases/tag/v31.2). - API reference is available in revision [169a1b2](../../tree/169a1b20d3cd09879070d41aab28cfa195d2a7d5/docs/api) - Other documentation can be downloaded by cloning the cefpython.wiki repository: `git clone [email protected]:cztomczak/cefpython.wiki.git` ## Support development If you would like to support general CEF Python development efforts by making a donation then please click the Paypal Donate button below. If you would like to see a specific feature implemented then you can make a comment about that when making a donation and that will give it a higher priority. <a href='https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=V7LU7PD4N4GGG'> <img src='https://raw.githubusercontent.com/wiki/cztomczak/cefpython/images/donate.gif' /> </a><br><br> ### Thanks to all * [2021] Thank you to [Fivestars](https://www.fivestars.com/) for sponsoring the v66.1 release with Python 3.8 / 3.9 support * [2018] Thanks to [Fivestars](https://www.fivestars.com/) for sponsoring the v49 release for legacy systems (WinXP/Vista) * [2018] Many thanks to [Lampix](https://lampix.com/) for sponsoring the v66 release for all platforms * [2017] Many thanks to [HighSide Inc.](https://highside.io/) for sponsoring the v55/v56 releases for all platforms * [2016-2018] Thanks to JetBrains for providing an Open Source license for [PyCharm](https://www.jetbrains.com/pycharm/) * [2014] Thanks to Adam Duston for donating a Macbook to aid the development of Mac port * [2013-2015] Lots of thanks goes to [Cyan Inc.](http://www.blueplanet.com/) for sponsoring this project for a long time, making CEF Python 3 mature * [2013] Thanks to [Rentouch GmbH](http://www.rentouch.ch/) for sponsoring the development of the off-screen rendering support * [2013] Thanks to Thomas Wusatiuk for sponsoring the development of the web response reading features * [2012-2018] Thanks to those who have made a Paypal donation: [Rentouch GmbH](http://www.rentouch.ch/), Walter Purvis, Rokas Stupuras, Alex Rattray, Greg Kacy, Paul Korzhyk, Tomasz Tomanek. * [2012-2017] Thanks to those who have donated their time through code contributions, they are listed in the [Authors](Authors) file ## Seeking new sponsors CEF Python is seeking companies to sponsor further development of the project. There are many proposals for new features submitted in the issue tracker. Most notable are: * Monthly releases with latest Chromium * An automated build system similar to upstream CEF Spotify Automated Builds * ARM and Android support * Multi-threaded support for increased performance * Proprietary codecs support in build tools: H264, H265,AC3, EAC3, MPEG-4 * More CEF API exposed, only about 50% is exposed so far * Hundreds of new settings and Chromium preferences not yet exposed * Easier integration with popular GUI toolkits in just a few lines of code and support for more third party GUI frameworks * More examples of implementing various advanced features and more snippets as well If your company would like to sponsor CEF Python development efforts then please contact [Czarek](https://www.linkedin.com/in/czarektomczak/). Long term sponsorships are welcome and Czarek is open to ideas about the project. He would love to spend more time on developing this project, but he can't afford doing so in his free time. Currently there is no company supporting this project actively on a daily basis. ## Other READMEs - [PyInstaller packager](examples/pyinstaller/README-pyinstaller.md) ## Quick links ### Docs - [Build instructions](docs/Build-instructions.md) - [Knowledge Base](docs/Knowledge-Base.md) - [Migration guide](docs/Migration-guide.md) - [Tutorial](docs/Tutorial.md) ### API categories #### Modules * [cefpython](api/cefpython.md#cefpython) module #### Settings * [ApplicationSettings](api/ApplicationSettings.md#application-settings) dictionary * [BrowserSettings](api/BrowserSettings.md#browser-settings) dictionary * [CommandLineSwitches](api/CommandLineSwitches.md#command-line-switches) dictionary #### Classes and objects * [Browser](api/Browser.md#browser-object) object * [Callback](api/Callback.md#callback-object) object * [Cookie](api/Cookie.md#cookie-class) class * [CookieManager](api/CookieManager.md#cookiemanager-class) class * [DpiAware](api/DpiAware.md#dpiaware-class) class (Win) * [DragData](api/DragData.md#dragdata-object) object * [Frame](api/Frame.md#frame-object) object * [Image](api/Image.md#image-object) object * [JavascriptBindings](api/JavascriptBindings.md#javascriptbindings-class) class * [JavascriptCallback](api/JavascriptCallback.md#javascriptcallback-object) object * [PaintBuffer](api/PaintBuffer.md#paintbuffer-object) object * [Request](api/Request.md#request-class) class * [Response](api/Response.md#response-object) object * [WebPluginInfo](api/WebPluginInfo.md#webplugininfo-object) object * [WebRequest](api/WebRequest.md#webrequest-class) class * [WindowInfo](api/WindowInfo.md#windowinfo-class) class * [WindowUtils](api/WindowUtils.md#windowutils-class) class #### Client handlers (interfaces) * [AccessibilityHandler](api/AccessibilityHandler.md#accessibilityhandler-interface) * [DisplayHandler](api/DisplayHandler.md#displayhandler-interface) * [DownloadHandler](api/DownloadHandler.md#downloadhandler) * [FocusHandler](api/FocusHandler.md#focushandler-interface) * [JavascriptDialogHandler](api/JavascriptDialogHandler.md#javascriptdialoghandler-interface) * [KeyboardHandler](api/KeyboardHandler.md#keyboardhandler-interface) * [LifespanHandler](api/LifespanHandler.md#lifespanhandler-interface) * [LoadHandler](api/LoadHandler.md#loadhandler-interface) * [RenderHandler](api/RenderHandler.md#renderhandler-interface) * [RequestHandler](api/RequestHandler.md#requesthandler-interface) * [ResourceHandler](api/ResourceHandler.md#resourcehandler-interface) * [V8ContextHandler](api/V8ContextHandler.md#v8contexthandler-interface) #### Other interfaces * [CookieVisitor](api/CookieVisitor.md#cookievisitor-interface) interface * [StringVisitor](api/StringVisitor.md#stringvisitor-interface) interface * [WebRequestClient](api/WebRequestClient.md#webrequestclient-interface) interface ### API index * [AccessibilityHandler (interface)](api/AccessibilityHandler.md#accessibilityhandler-interface) * [_OnAccessibilityTreeChange](api/AccessibilityHandler.md#_onaccessibilitytreechange) * [_OnAccessibilityLocationChange](api/AccessibilityHandler.md#_onaccessibilitylocationchange) * [Application settings](api/ApplicationSettings.md#application-settings) * [accept_language_list](api/ApplicationSettings.md#accept_language_list) * [app_user_model_id](api/ApplicationSettings.md#app_user_model_id) * [auto_zooming](api/ApplicationSettings.md#auto_zooming) * [background_color](api/ApplicationSettings.md#background_color) * [browser_subprocess_path](api/ApplicationSettings.md#browser_subprocess_path) * [cache_path](api/ApplicationSettings.md#cache_path) * [command_line_args_disabled](api/ApplicationSettings.md#command_line_args_disabled) * [context_menu](api/ApplicationSettings.md#context_menu) * [downloads_enabled](api/ApplicationSettings.md#downloads_enabled) * [external_message_pump](api/ApplicationSettings.md#external_message_pump) * [framework_dir_path](api/ApplicationSettings.md#framework_dir_path) * [ignore_certificate_errors](api/ApplicationSettings.md#ignore_certificate_errors) * [javascript_flags](api/ApplicationSettings.md#javascript_flags) * [locale](api/ApplicationSettings.md#locale) * [locales_dir_path](api/ApplicationSettings.md#locales_dir_path) * [debug](api/ApplicationSettings.md#debug) * [log_file](api/ApplicationSettings.md#log_file) * [log_severity](api/ApplicationSettings.md#log_severity) * [multi_threaded_message_loop](api/ApplicationSettings.md#multi_threaded_message_loop) * [net_security_expiration_enabled](api/ApplicationSettings.md#net_security_expiration_enabled) * [pack_loading_disabled](api/ApplicationSettings.md#pack_loading_disabled) * [persist_session_cookies](api/ApplicationSettings.md#persist_session_cookies) * [persist_user_preferences](api/ApplicationSettings.md#persist_user_preferences) * [product_version](api/ApplicationSettings.md#product_version) * [remote_debugging_port](api/ApplicationSettings.md#remote_debugging_port) * [resources_dir_path](api/ApplicationSettings.md#resources_dir_path) * [single_process](api/ApplicationSettings.md#single_process) * [string_encoding](api/ApplicationSettings.md#string_encoding) * [uncaught_exception_stack_size](api/ApplicationSettings.md#uncaught_exception_stack_size) * [unique_request_context_per_browser](api/ApplicationSettings.md#unique_request_context_per_browser) * [user_agent](api/ApplicationSettings.md#user_agent) * [user_data_path](api/ApplicationSettings.md#user_data_path) * [windowless_rendering_enabled](api/ApplicationSettings.md#windowless_rendering_enabled) * [Browser (object)](api/Browser.md#browser-object) * [AddWordToDictionary](api/Browser.md#addwordtodictionary) * [CanGoBack](api/Browser.md#cangoback) * [CanGoForward](api/Browser.md#cangoforward) * [CloseBrowser](api/Browser.md#closebrowser) * [CloseDevTools](api/Browser.md#closedevtools) * [DragTargetDragEnter](api/Browser.md#dragtargetdragenter) * [DragTargetDragOver](api/Browser.md#dragtargetdragover) * [DragTargetDragLeave](api/Browser.md#dragtargetdragleave) * [DragTargetDrop](api/Browser.md#dragtargetdrop) * [DragSourceEndedAt](api/Browser.md#dragsourceendedat) * [DragSourceSystemDragEnded](api/Browser.md#dragsourcesystemdragended) * [ExecuteFunction](api/Browser.md#executefunction) * [ExecuteJavascript](api/Browser.md#executejavascript) * [Find](api/Browser.md#find) * [GetClientCallback](api/Browser.md#getclientcallback) * [GetClientCallbacksDict](api/Browser.md#getclientcallbacksdict) * [GetFocusedFrame](api/Browser.md#getfocusedframe) * [GetFrame](api/Browser.md#getframe) * [GetFrameByIdentifier](api/Browser.md#getframebyidentifier) * [GetFrames](api/Browser.md#getframes) * [GetFrameCount](api/Browser.md#getframecount) * [GetFrameIdentifiers](api/Browser.md#getframeidentifiers) * [GetFrameNames](api/Browser.md#getframenames) * [GetImage](api/Browser.md#getimage) * [GetJavascriptBindings](api/Browser.md#getjavascriptbindings) * [GetMainFrame](api/Browser.md#getmainframe) * [GetNSTextInputContext](api/Browser.md#getnstextinputcontext) * [GetOpenerWindowHandle](api/Browser.md#getopenerwindowhandle) * [GetOuterWindowHandle](api/Browser.md#getouterwindowhandle) * [GetSetting](api/Browser.md#getsetting) * [GetUrl](api/Browser.md#geturl) * [GetUserData](api/Browser.md#getuserdata) * [GetWindowHandle](api/Browser.md#getwindowhandle) * [GetIdentifier](api/Browser.md#getidentifier) * [GetZoomLevel](api/Browser.md#getzoomlevel) * [GoBack](api/Browser.md#goback) * [GoForward](api/Browser.md#goforward) * [HandleKeyEventAfterTextInputClient](api/Browser.md#handlekeyeventaftertextinputclient) * [HandleKeyEventBeforeTextInputClient](api/Browser.md#handlekeyeventbeforetextinputclient) * [HasDevTools](api/Browser.md#hasdevtools) * [HasDocument](api/Browser.md#hasdocument) * [Invalidate](api/Browser.md#invalidate) * [IsFullscreen](api/Browser.md#isfullscreen) * [IsLoading](api/Browser.md#isloading) * [IsMouseCursorChangeDisabled](api/Browser.md#ismousecursorchangedisabled) * [IsPopup](api/Browser.md#ispopup) * [IsWindowRenderingDisabled](api/Browser.md#iswindowrenderingdisabled) * [LoadUrl](api/Browser.md#loadurl) * [Navigate](api/Browser.md#navigate) * [NotifyMoveOrResizeStarted](api/Browser.md#notifymoveorresizestarted) * [NotifyScreenInfoChanged](api/Browser.md#notifyscreeninfochanged) * [ParentWindowWillClose](api/Browser.md#parentwindowwillclose) * [Print](api/Browser.md#print) * [Reload](api/Browser.md#reload) * [ReloadIgnoreCache](api/Browser.md#reloadignorecache) * [ReplaceMisspelling](api/Browser.md#replacemisspelling) * [SetAutoResizeEnabled](api/Browser.md#setautoresizeenabled) * [SetBounds](api/Browser.md#setbounds) * [SendKeyEvent](api/Browser.md#sendkeyevent) * [SendMouseClickEvent](api/Browser.md#sendmouseclickevent) * [SendMouseMoveEvent](api/Browser.md#sendmousemoveevent) * [SendMouseWheelEvent](api/Browser.md#sendmousewheelevent) * [SendFocusEvent](api/Browser.md#sendfocusevent) * [SendCaptureLostEvent](api/Browser.md#sendcapturelostevent) * [SetAccessibilityState](api/Browser.md#setaccessibilitystate) * [SetClientCallback](api/Browser.md#setclientcallback) * [SetClientHandler](api/Browser.md#setclienthandler) * [SetFocus](api/Browser.md#setfocus) * [SetMouseCursorChangeDisabled](api/Browser.md#setmousecursorchangedisabled) * [SetJavascriptBindings](api/Browser.md#setjavascriptbindings) * [SetUserData](api/Browser.md#setuserdata) * [SetZoomLevel](api/Browser.md#setzoomlevel) * [ShowDevTools](api/Browser.md#showdevtools) * [StartDownload](api/Browser.md#startdownload) * [StopLoad](api/Browser.md#stopload) * [StopFinding](api/Browser.md#stopfinding) * [ToggleFullscreen](api/Browser.md#togglefullscreen) * [TryCloseBrowser](api/Browser.md#tryclosebrowser) * [WasResized](api/Browser.md#wasresized) * [WasHidden](api/Browser.md#washidden) * [Browser settings](api/BrowserSettings.md#browser-settings) * [Font settings](api/BrowserSettings.md#font-settings) * [accept_language_list](api/BrowserSettings.md#accept_language_list) * [application_cache_disabled](api/BrowserSettings.md#application_cache_disabled) * [background_color](api/BrowserSettings.md#background_color) * [databases_disabled](api/BrowserSettings.md#databases_disabled) * [default_encoding](api/BrowserSettings.md#default_encoding) * [dom_paste_disabled](api/BrowserSettings.md#dom_paste_disabled) * [file_access_from_file_urls_allowed](api/BrowserSettings.md#file_access_from_file_urls_allowed) * [inherit_client_handlers_for_popups](api/BrowserSettings.md#inherit_client_handlers_for_popups) * [image_load_disabled](api/BrowserSettings.md#image_load_disabled) * [javascript_disabled](api/BrowserSettings.md#javascript_disabled) * [javascript_close_windows_disallowed](api/BrowserSettings.md#javascript_close_windows_disallowed) * [javascript_access_clipboard_disallowed](api/BrowserSettings.md#javascript_access_clipboard_disallowed) * [local_storage_disabled](api/BrowserSettings.md#local_storage_disabled) * [plugins_disabled](api/BrowserSettings.md#plugins_disabled) * [remote_fonts](api/BrowserSettings.md#remote_fonts) * [shrink_standalone_images_to_fit](api/BrowserSettings.md#shrink_standalone_images_to_fit) * [tab_to_links_disabled](api/BrowserSettings.md#tab_to_links_disabled) * [text_area_resize_disabled](api/BrowserSettings.md#text_area_resize_disabled) * [universal_access_from_file_urls_allowed](api/BrowserSettings.md#universal_access_from_file_urls_allowed) * [user_style_sheet_location](api/BrowserSettings.md#user_style_sheet_location) * [web_security_disabled](api/BrowserSettings.md#web_security_disabled) * [webgl_disabled](api/BrowserSettings.md#webgl_disabled) * [windowless_frame_rate](api/BrowserSettings.md#windowless_frame_rate) * [Callback (object)](api/Callback.md#callback-object) * [Continue](api/Callback.md#continue) * [Cancel](api/Callback.md#cancel) * [cefpython](api/cefpython.md#cefpython) * [CreateBrowser](api/cefpython.md#createbrowser) * [CreateBrowserSync](api/cefpython.md#createbrowsersync) * [ExceptHook](api/cefpython.md#excepthook) * [GetAppSetting](api/cefpython.md#getappsetting) * [GetAppPath](api/cefpython.md#getapppath) * [GetBrowserByIdentifier](api/cefpython.md#getbrowserbyidentifier) * [GetBrowserByWindowHandle](api/cefpython.md#getbrowserbywindowhandle) * [GetCommandLineSwitch](api/cefpython.md#getcommandlineswitch) * [GetDataUrl](api/cefpython.md#getdataurl) * [GetGlobalClientCallback](api/cefpython.md#getglobalclientcallback) * [GetModuleDirectory](api/cefpython.md#getmoduledirectory) * [GetVersion](api/cefpython.md#getversion) * [Initialize](api/cefpython.md#initialize) * [IsThread](api/cefpython.md#isthread) * [LoadCrlSetsFile](api/cefpython.md#loadcrlsetsfile) * [MessageLoop](api/cefpython.md#messageloop) * [MessageLoopWork](api/cefpython.md#messageloopwork) * [PostTask](api/cefpython.md#posttask) * [PostDelayedTask](api/cefpython.md#postdelayedtask) * [QuitMessageLoop](api/cefpython.md#quitmessageloop) * [SetGlobalClientCallback](api/cefpython.md#setglobalclientcallback) * [SetGlobalClientHandler](api/cefpython.md#setglobalclienthandler) * [SetOsModalLoop](api/cefpython.md#setosmodalloop) * [Shutdown](api/cefpython.md#shutdown) * [Command line switches](api/CommandLineSwitches.md#command-line-switches) * [enable-media-stream](api/CommandLineSwitches.md#enable-media-stream) * [proxy-server](api/CommandLineSwitches.md#proxy-server) * [no-proxy-server](api/CommandLineSwitches.md#no-proxy-server) * [disable-gpu](api/CommandLineSwitches.md#disable-gpu) * [Cookie (class)](api/Cookie.md#cookie-class) * [Set](api/Cookie.md#set) * [Get](api/Cookie.md#get) * [SetName](api/Cookie.md#setname) * [GetName](api/Cookie.md#getname) * [SetValue](api/Cookie.md#setvalue) * [GetValue](api/Cookie.md#getvalue) * [SetDomain](api/Cookie.md#setdomain) * [GetDomain](api/Cookie.md#getdomain) * [SetPath](api/Cookie.md#setpath) * [GetPath](api/Cookie.md#getpath) * [SetSecure](api/Cookie.md#setsecure) * [GetSecure](api/Cookie.md#getsecure) * [SetHttpOnly](api/Cookie.md#sethttponly) * [GetHttpOnly](api/Cookie.md#gethttponly) * [SetCreation](api/Cookie.md#setcreation) * [GetCreation](api/Cookie.md#getcreation) * [SetLastAccess](api/Cookie.md#setlastaccess) * [GetLastAccess](api/Cookie.md#getlastaccess) * [SetHasExpires](api/Cookie.md#sethasexpires) * [GetHasExpires](api/Cookie.md#gethasexpires) * [SetExpires](api/Cookie.md#setexpires) * [GetExpires](api/Cookie.md#getexpires) * [CookieManager (class)](api/CookieManager.md#cookiemanager-class) * [GetGlobalManager](api/CookieManager.md#getglobalmanager) * [GetBlockingManager](api/CookieManager.md#getblockingmanager) * [CreateManager](api/CookieManager.md#createmanager) * [SetSupportedSchemes](api/CookieManager.md#setsupportedschemes) * [VisitAllCookies](api/CookieManager.md#visitallcookies) * [VisitUrlCookies](api/CookieManager.md#visiturlcookies) * [SetCookie](api/CookieManager.md#setcookie) * [DeleteCookies](api/CookieManager.md#deletecookies) * [SetStoragePath](api/CookieManager.md#setstoragepath) * [FlushStore](api/CookieManager.md#flushstore) * [CookieVisitor (interface)](api/CookieVisitor.md#cookievisitor-interface) * [Visit](api/CookieVisitor.md#visit) * [DisplayHandler (interface)](api/DisplayHandler.md#displayhandler-interface) * [OnAddressChange](api/DisplayHandler.md#onaddresschange) * [OnAutoResize](api/DisplayHandler.md#onautoresize) * [OnConsoleMessage](api/DisplayHandler.md#onconsolemessage) * [OnLoadingProgressChange](api/DisplayHandler.md#onloadingprogresschange) * [OnStatusMessage](api/DisplayHandler.md#onstatusmessage) * [OnTitleChange](api/DisplayHandler.md#ontitlechange) * [OnTooltip](api/DisplayHandler.md#ontooltip) * [DownloadHandler](api/DownloadHandler.md#downloadhandler) * [DpiAware (class)](api/DpiAware.md#dpiaware-class) * [CalculateWindowSize](api/DpiAware.md#calculatewindowsize) * [EnableHighDpiSupport](api/DpiAware.md#enablehighdpisupport) * [GetSystemDpi](api/DpiAware.md#getsystemdpi) * [IsProcessDpiAware](api/DpiAware.md#isprocessdpiaware) * [SetProcessDpiAware](api/DpiAware.md#setprocessdpiaware) * [Scale](api/DpiAware.md#scale) * [DragData (object)](api/DragData.md#dragdata-object) * [IsLink](api/DragData.md#islink) * [IsFragment](api/DragData.md#isfragment) * [GetLinkUrl](api/DragData.md#getlinkurl) * [GetLinkTitle](api/DragData.md#getlinktitle) * [GetFragmentText](api/DragData.md#getfragmenttext) * [GetFragmentHtml](api/DragData.md#getfragmenthtml) * [GetImage](api/DragData.md#getimage) * [GetImageHotspot](api/DragData.md#getimagehotspot) * [HasImage](api/DragData.md#hasimage) * [FocusHandler (interface)](api/FocusHandler.md#focushandler-interface) * [OnTakeFocus](api/FocusHandler.md#ontakefocus) * [OnSetFocus](api/FocusHandler.md#onsetfocus) * [OnGotFocus](api/FocusHandler.md#ongotfocus) * [Frame (object)](api/Frame.md#frame-object) * [Copy](api/Frame.md#copy) * [Cut](api/Frame.md#cut) * [Delete](api/Frame.md#delete) * [ExecuteFunction](api/Frame.md#executefunction) * [ExecuteJavascript](api/Frame.md#executejavascript) * [GetBrowser](api/Frame.md#getbrowser) * [GetParent](api/Frame.md#getparent) * [GetIdentifier](api/Frame.md#getidentifier) * [GetBrowserIdentifier](api/Frame.md#getbrowseridentifier) * [GetName](api/Frame.md#getname) * [GetParent](api/Frame.md#getparent) * [GetSource](api/Frame.md#getsource) * [GetText](api/Frame.md#gettext) * [GetUrl](api/Frame.md#geturl) * [IsFocused](api/Frame.md#isfocused) * [IsMain](api/Frame.md#ismain) * [IsValid](api/Frame.md#isvalid) * [LoadString](api/Frame.md#loadstring) * [LoadUrl](api/Frame.md#loadurl) * [Paste](api/Frame.md#paste) * [Redo](api/Frame.md#redo) * [SelectAll](api/Frame.md#selectall) * [Undo](api/Frame.md#undo) * [ViewSource](api/Frame.md#viewsource) * [Image (object)](api/Image.md#image-object) * [GetAsBitmap](api/Image.md#getasbitmap) * [GetAsPng](api/Image.md#getaspng) * [GetHeight](api/Image.md#getheight) * [GetWidth](api/Image.md#getwidth) * [JavascriptBindings (class)](api/JavascriptBindings.md#javascriptbindings-class) * [\_\_init\_\_](api/JavascriptBindings.md#__init__) * [IsValueAllowed](api/JavascriptBindings.md#isvalueallowed) * [Rebind](api/JavascriptBindings.md#rebind) * [SetFunction](api/JavascriptBindings.md#setfunction) * [SetObject](api/JavascriptBindings.md#setobject) * [SetProperty](api/JavascriptBindings.md#setproperty) * [JavascriptCallback (object)](api/JavascriptCallback.md#javascriptcallback-object) * [Call](api/JavascriptCallback.md#call) * [GetFrame](api/JavascriptCallback.md#getframe) * [GetId](api/JavascriptCallback.md#getid) * [GetFunctionName](api/JavascriptCallback.md#getfunctionname) * [JavascriptDialogHandler (interface)](api/JavascriptDialogHandler.md#javascriptdialoghandler-interface) * [Continue](api/JavascriptDialogHandler.md#continue) * [OnJavascriptDialog](api/JavascriptDialogHandler.md#onjavascriptdialog) * [OnBeforeUnloadJavascriptDialog](api/JavascriptDialogHandler.md#onbeforeunloadjavascriptdialog) * [OnResetJavascriptDialogState](api/JavascriptDialogHandler.md#onresetjavascriptdialogstate) * [OnJavascriptDialogClosed](api/JavascriptDialogHandler.md#onjavascriptdialogclosed) * [KeyboardHandler (interface)](api/KeyboardHandler.md#keyboardhandler-interface) * [OnPreKeyEvent](api/KeyboardHandler.md#onprekeyevent) * [OnKeyEvent](api/KeyboardHandler.md#onkeyevent) * [LifespanHandler (interface)](api/LifespanHandler.md#lifespanhandler-interface) * [DoClose](api/LifespanHandler.md#doclose) * [_OnAfterCreated](api/LifespanHandler.md#_onaftercreated) * [OnBeforeClose](api/LifespanHandler.md#onbeforeclose) * [OnBeforePopup](api/LifespanHandler.md#onbeforepopup) * [LoadHandler (interface)](api/LoadHandler.md#loadhandler-interface) * [OnLoadingStateChange](api/LoadHandler.md#onloadingstatechange) * [OnLoadStart](api/LoadHandler.md#onloadstart) * [OnDomReady](api/LoadHandler.md#ondomready) * [OnLoadEnd](api/LoadHandler.md#onloadend) * [OnLoadError](api/LoadHandler.md#onloaderror) * [Network error](api/NetworkError.md#network-error) * [ERR_NONE](api/NetworkError.md#err_none) * [ERR_ABORTED](api/NetworkError.md#err_aborted) * [ERR_ACCESS_DENIED](api/NetworkError.md#err_access_denied) * [ERR_ADDRESS_INVALID](api/NetworkError.md#err_address_invalid) * [ERR_ADDRESS_UNREACHABLE](api/NetworkError.md#err_address_unreachable) * [ERR_CACHE_MISS](api/NetworkError.md#err_cache_miss) * [ERR_CERT_AUTHORITY_INVALID](api/NetworkError.md#err_cert_authority_invalid) * [ERR_CERT_COMMON_NAME_INVALID](api/NetworkError.md#err_cert_common_name_invalid) * [ERR_CERT_CONTAINS_ERRORS](api/NetworkError.md#err_cert_contains_errors) * [ERR_CERT_DATE_INVALID](api/NetworkError.md#err_cert_date_invalid) * [ERR_CERT_END](api/NetworkError.md#err_cert_end) * [ERR_CERT_INVALID](api/NetworkError.md#err_cert_invalid) * [ERR_CERT_NO_REVOCATION_MECHANISM](api/NetworkError.md#err_cert_no_revocation_mechanism) * [ERR_CERT_REVOKED](api/NetworkError.md#err_cert_revoked) * [ERR_CERT_UNABLE_TO_CHECK_REVOCATION](api/NetworkError.md#err_cert_unable_to_check_revocation) * [ERR_CONNECTION_ABORTED](api/NetworkError.md#err_connection_aborted) * [ERR_CONNECTION_CLOSED](api/NetworkError.md#err_connection_closed) * [ERR_CONNECTION_FAILED](api/NetworkError.md#err_connection_failed) * [ERR_CONNECTION_REFUSED](api/NetworkError.md#err_connection_refused) * [ERR_CONNECTION_RESET](api/NetworkError.md#err_connection_reset) * [ERR_DISALLOWED_URL_SCHEME](api/NetworkError.md#err_disallowed_url_scheme) * [ERR_EMPTY_RESPONSE](api/NetworkError.md#err_empty_response) * [ERR_FAILED](api/NetworkError.md#err_failed) * [ERR_FILE_NOT_FOUND](api/NetworkError.md#err_file_not_found) * [ERR_FILE_TOO_BIG](api/NetworkError.md#err_file_too_big) * [ERR_INSECURE_RESPONSE](api/NetworkError.md#err_insecure_response) * [ERR_INTERNET_DISCONNECTED](api/NetworkError.md#err_internet_disconnected) * [ERR_INVALID_ARGUMENT](api/NetworkError.md#err_invalid_argument) * [ERR_INVALID_CHUNKED_ENCODING](api/NetworkError.md#err_invalid_chunked_encoding) * [ERR_INVALID_HANDLE](api/NetworkError.md#err_invalid_handle) * [ERR_INVALID_RESPONSE](api/NetworkError.md#err_invalid_response) * [ERR_INVALID_URL](api/NetworkError.md#err_invalid_url) * [ERR_METHOD_NOT_SUPPORTED](api/NetworkError.md#err_method_not_supported) * [ERR_NAME_NOT_RESOLVED](api/NetworkError.md#err_name_not_resolved) * [ERR_NO_SSL_VERSIONS_ENABLED](api/NetworkError.md#err_no_ssl_versions_enabled) * [ERR_NOT_IMPLEMENTED](api/NetworkError.md#err_not_implemented) * [ERR_RESPONSE_HEADERS_TOO_BIG](api/NetworkError.md#err_response_headers_too_big) * [ERR_SSL_CLIENT_AUTH_CERT_NEEDED](api/NetworkError.md#err_ssl_client_auth_cert_needed) * [ERR_SSL_PROTOCOL_ERROR](api/NetworkError.md#err_ssl_protocol_error) * [ERR_SSL_RENEGOTIATION_REQUESTED](api/NetworkError.md#err_ssl_renegotiation_requested) * [ERR_SSL_VERSION_OR_CIPHER_MISMATCH](api/NetworkError.md#err_ssl_version_or_cipher_mismatch) * [ERR_TIMED_OUT](api/NetworkError.md#err_timed_out) * [ERR_TOO_MANY_REDIRECTS](api/NetworkError.md#err_too_many_redirects) * [ERR_TUNNEL_CONNECTION_FAILED](api/NetworkError.md#err_tunnel_connection_failed) * [ERR_UNEXPECTED](api/NetworkError.md#err_unexpected) * [ERR_UNEXPECTED_PROXY_AUTH](api/NetworkError.md#err_unexpected_proxy_auth) * [ERR_UNKNOWN_URL_SCHEME](api/NetworkError.md#err_unknown_url_scheme) * [ERR_UNSAFE_PORT](api/NetworkError.md#err_unsafe_port) * [ERR_UNSAFE_REDIRECT](api/NetworkError.md#err_unsafe_redirect) * [PaintBuffer (object)](api/PaintBuffer.md#paintbuffer-object) * [GetIntPointer](api/PaintBuffer.md#getintpointer) * [GetBytes](api/PaintBuffer.md#getbytes) * [RenderHandler (interface)](api/RenderHandler.md#renderhandler-interface) * [GetRootScreenRect](api/RenderHandler.md#getrootscreenrect) * [GetViewRect](api/RenderHandler.md#getviewrect) * [GetScreenRect](api/RenderHandler.md#getscreenrect) * [GetScreenPoint](api/RenderHandler.md#getscreenpoint) * [OnPopupShow](api/RenderHandler.md#onpopupshow) * [OnPopupSize](api/RenderHandler.md#onpopupsize) * [OnPaint](api/RenderHandler.md#onpaint) * [OnCursorChange](api/RenderHandler.md#oncursorchange) * [OnScrollOffsetChanged](api/RenderHandler.md#onscrolloffsetchanged) * [OnTextSelectionChanged](api/RenderHandler.md#ontextselectionchanged) * [StartDragging](api/RenderHandler.md#startdragging) * [UpdateDragCursor](api/RenderHandler.md#updatedragcursor) * [Request (class)](api/Request.md#request-class) * [CreateRequest](api/Request.md#createrequest) * [IsReadOnly](api/Request.md#isreadonly) * [GetUrl](api/Request.md#geturl) * [SetUrl](api/Request.md#seturl) * [GetMethod](api/Request.md#getmethod) * [SetMethod](api/Request.md#setmethod) * [GetPostData](api/Request.md#getpostdata) * [SetPostData](api/Request.md#setpostdata) * [GetHeaderMap](api/Request.md#getheadermap) * [GetHeaderMultimap](api/Request.md#getheadermultimap) * [SetHeaderMap](api/Request.md#setheadermap) * [SetHeaderMultimap](api/Request.md#setheadermultimap) * [GetFlags](api/Request.md#getflags) * [SetFlags](api/Request.md#setflags) * [GetFirstPartyForCookies](api/Request.md#getfirstpartyforcookies) * [SetFirstPartyForCookies](api/Request.md#setfirstpartyforcookies) * [GetResourceType](api/Request.md#getresourcetype) * [GetTransitionType](api/Request.md#gettransitiontype) * [RequestHandler (interface)](api/RequestHandler.md#requesthandler-interface) * [CanGetCookies](api/RequestHandler.md#cangetcookies) * [CanSetCookie](api/RequestHandler.md#cansetcookie) * [GetAuthCredentials](api/RequestHandler.md#getauthcredentials) * [GetCookieManager](api/RequestHandler.md#getcookiemanager) * [GetResourceHandler](api/RequestHandler.md#getresourcehandler) * [OnBeforeBrowse](api/RequestHandler.md#onbeforebrowse) * [_OnBeforePluginLoad](api/RequestHandler.md#_onbeforepluginload) * [OnBeforeResourceLoad](api/RequestHandler.md#onbeforeresourceload) * [_OnCertificateError](api/RequestHandler.md#_oncertificateerror) * [OnQuotaRequest](api/RequestHandler.md#onquotarequest) * [OnResourceRedirect](api/RequestHandler.md#onresourceredirect) * [OnResourceResponse](api/RequestHandler.md#onresourceresponse) * [OnPluginCrashed](api/RequestHandler.md#onplugincrashed) * [OnProtocolExecution](api/RequestHandler.md#onprotocolexecution) * [OnRendererProcessTerminated](api/RequestHandler.md#onrendererprocessterminated) * [ResourceHandler (interface)](api/ResourceHandler.md#resourcehandler-interface) * [ProcessRequest](api/ResourceHandler.md#processrequest) * [GetResponseHeaders](api/ResourceHandler.md#getresponseheaders) * [ReadResponse](api/ResourceHandler.md#readresponse) * [CanGetCookie](api/ResourceHandler.md#cangetcookie) * [CanSetCookie](api/ResourceHandler.md#cansetcookie) * [Cancel](api/ResourceHandler.md#cancel) * [Response (object)](api/Response.md#response-object) * [IsReadOnly](api/Response.md#isreadonly) * [GetStatus](api/Response.md#getstatus) * [SetStatus](api/Response.md#setstatus) * [GetStatusText](api/Response.md#getstatustext) * [SetStatusText](api/Response.md#setstatustext) * [GetMimeType](api/Response.md#getmimetype) * [SetMimeType](api/Response.md#setmimetype) * [GetHeader](api/Response.md#getheader) * [GetHeaderMap](api/Response.md#getheadermap) * [GetHeaderMultimap](api/Response.md#getheadermultimap) * [SetHeaderMap](api/Response.md#setheadermap) * [SetHeaderMultimap](api/Response.md#setheadermultimap) * [StringVisitor (interface)](api/StringVisitor.md#stringvisitor-interface) * [Visit](api/StringVisitor.md#visit) * [V8ContextHandler (interface)](api/V8ContextHandler.md#v8contexthandler-interface) * [OnContextCreated](api/V8ContextHandler.md#oncontextcreated) * [OnContextReleased](api/V8ContextHandler.md#oncontextreleased) * [Virtual Key codes](api/VirtualKey.md#virtual-key-codes) * [WebPluginInfo (object)](api/WebPluginInfo.md#webplugininfo-object) * [GetName](api/WebPluginInfo.md#getname) * [GetPath](api/WebPluginInfo.md#getpath) * [GetVersion](api/WebPluginInfo.md#getversion) * [GetDescription](api/WebPluginInfo.md#getdescription) * [WebRequest (class)](api/WebRequest.md#webrequest-class) * [Create](api/WebRequest.md#create) * [GetRequest](api/WebRequest.md#getrequest) * [GetRequestStatus](api/WebRequest.md#getrequeststatus) * [GetRequestError](api/WebRequest.md#getrequesterror) * [GetResponse](api/WebRequest.md#getresponse) * [Cancel](api/WebRequest.md#cancel) * [WebRequestClient (interface)](api/WebRequestClient.md#webrequestclient-interface) * [OnUploadProgress](api/WebRequestClient.md#onuploadprogress) * [OnDownloadProgress](api/WebRequestClient.md#ondownloadprogress) * [OnDownloadData](api/WebRequestClient.md#ondownloaddata) * [OnRequestComplete](api/WebRequestClient.md#onrequestcomplete) * [WindowInfo (class)](api/WindowInfo.md#windowinfo-class) * [SetAsChild](api/WindowInfo.md#setaschild) * [SetAsPopup](api/WindowInfo.md#setaspopup) * [SetAsOffscreen](api/WindowInfo.md#setasoffscreen) * [WindowUtils (class)](api/WindowUtils.md#windowutils-class) * [OnSetFocus ](api/WindowUtils.md#onsetfocus-win) * [OnSize ](api/WindowUtils.md#onsize-win) * [OnEraseBackground ](api/WindowUtils.md#onerasebackground-win) * [SetTitle ](api/WindowUtils.md#settitle-win) * [SetIcon ](api/WindowUtils.md#seticon-win) * [GetParentHandle](api/WindowUtils.md#getparenthandle) * [IsWindowHandle](api/WindowUtils.md#iswindowhandle) * [gtk_plug_new ](api/WindowUtils.md#gtk_plug_new-linux) * [gtk_widget_show ](api/WindowUtils.md#gtk_widget_show-linux) * [InstallX11ErrorHandlers ](api/WindowUtils.md#installx11errorhandlers-linux)
520
Chrome Headless docker images built upon alpine official image
[![GitHub Stars](https://img.shields.io/github/stars/zenika/alpine-chrome)](https://github.com/Zenika/alpine-chrome/) [![Docker Build Status](https://img.shields.io/github/workflow/status/zenika/alpine-chrome/build.svg)](https://hub.docker.com/r/zenika/alpine-chrome/) [![Docker Pulls](https://img.shields.io/docker/pulls/zenika/alpine-chrome.svg)](https://hub.docker.com/r/zenika/alpine-chrome/) [![Docker Stars](https://img.shields.io/docker/stars/zenika/alpine-chrome.svg)](https://hub.docker.com/r/zenika/alpine-chrome/) <!-- ALL-CONTRIBUTORS-BADGE:START - Do not remove or modify this section --> [![All Contributors](https://img.shields.io/badge/all_contributors-39-orange.svg?style=flat-square)](#-contributors) <!-- ALL-CONTRIBUTORS-BADGE:END --> # Available registries Following the changes with the [Rate Limiting on Docker Hub](https://www.docker.com/increase-rate-limits). [Tweet here for more information in 🇫🇷](https://twitter.com/jlandure/status/1322474352554770432) - On the [Docker Hub](https://hub.docker.com/r/zenika/alpine-chrome) without any prefix: `zenika/alpine-chrome` - On Google Cloud - available in the closest region: - Global: `gcr.io/zenika-hub/alpine-chrome` - Europe: `eu.gcr.io/zenika-hub/alpine-chrome` - Asia: `asia.gcr.io/zenika-hub/alpine-chrome` - US: `us.gcr.io/zenika-hub/alpine-chrome` # Supported tags and respective `Dockerfile` links - `latest`, `100` [(Dockerfile)](https://github.com/Zenika/alpine-chrome/blob/master/Dockerfile) - `with-node`, `100-with-node`, `100-with-node-16` [(Dockerfile)](https://github.com/Zenika/alpine-chrome/blob/master/with-node/Dockerfile) - `with-puppeteer`, `100-with-puppeteer` [(Dockerfile)](https://github.com/Zenika/alpine-chrome/blob/master/with-puppeteer/Dockerfile) - `with-playwright`, `100-with-playwright` [(Dockerfile)](https://github.com/Zenika/alpine-chrome/blob/master/with-playwright/Dockerfile) - `with-selenoid`, `100-with-selenoid` [(Dockerfile)](https://github.com/Zenika/alpine-chrome/blob/master/with-selenoid/Dockerfile) - `with-chromedriver`, `100-with-chromedriver` [(Dockerfile)](https://github.com/Zenika/alpine-chrome/blob/master/with-chromedriver/Dockerfile) - `89`, `86`, `85`, `84`, `83`, `81`, `80`, `77`, `76`, `73`, `72`, `71`, `68`, `64` - `89-with-node`, `86-with-node`, `85-with-node`, `84-with-node`, `83-with-node`, `81-with-node`, `80-with-node`, `77-with-node`, `76-with-node` - `89-with-puppeteer`, `86-with-puppeteer`, `85-with-puppeteer`,`84-with-puppeteer`, `83-with-puppeteer`, `81-with-puppeteer`, `80-with-puppeteer`, `77-with-puppeteer`, `76-with-puppeteer` # alpine-chrome Chrome running in headless mode in a tiny Alpine image **** # 🤔 Why use a Headless Chrome In the world of webdev, the ability to run quickly end-to-end tests are important. Popular technologies like Puppeteer enable developers to make fun things like testing, automating forms, crawling, generating screenshots, capturing timeline... And there is a secret: some of these features are directly available on Chrome! 🙌 ## 💡 Crafting the perfect container - 📦 Tiniest Headless Chrome (Compressed size: [423 MB](https://github.com/Zenika/alpine-chrome#image-disk-size)) - 🐳 Easy to use, ephemeral and reproducible Headless Chrome with Docker - 📝 Doc-friendly with examples for printing the DOM, generating an image with a mobile ratio or generating a PDF. - 👷‍♂️ Autobuild with the [Docker Hub](https://hub.docker.com/repository/docker/zenika/alpine-chrome) to sync the project and ship the images with confidence - 📌 Up-to-date latest Chromium and tags available to test different versions of Chromium - 🔐 Secure with the best way to use Chrome and Docker - [See "3 ways to securely use Chrome Headless"](https://github.com/Zenika/alpine-chrome#3-ways-to-securely-use-chrome-headless-with-this-image) section - 🌐 Ready for internationalisation use: support for asian characters - [See "screenshot-asia.js" file](https://github.com/Zenika/alpine-chrome/blob/master/with-puppeteer/src/screenshot-asia.js) - 💄 Ready for design use: support for WebGL, support for emojis- See ["How to use with WebGL" section](https://github.com/Zenika/alpine-chrome#how-to-use-with-webgl) and ["Emojis are not rendered properly" section](https://github.com/Zenika/alpine-chrome/issues/114) - 📄 Open Source with an Apache2 licence - 👥 Community-built with external contributors - [See "✨ Contributors" section](https://github.com/Zenika/alpine-chrome#-contributors) - 💚 Dev-friendly with examples using NodeJS, Puppeteer, docker-compose and also a test with a X11 display - [See "Run examples" section](https://github.com/Zenika/alpine-chrome#run-examples) # 3 ways to securely use Chrome Headless with this image ## ❌ With nothing Launching the container using only `docker container run -it zenika/alpine-chrome ...` will fail with some logs similar to [#33](https://github.com/Zenika/alpine-chrome/issues/33). Please use the 3 others ways to use Chrome Headless. ## ✅ With `--no-sandbox` Launch the container using: `docker container run -it --rm zenika/alpine-chrome` and use the `--no-sandbox` flag for all your commands. Be careful to know the website you're calling. Explanation for the `no-sandbox` flag in a [quick introduction here](https://www.google.com/googlebooks/chrome/med_26.html) and for [More in depth design document here](https://chromium.googlesource.com/chromium/src/+/master/docs/design/sandbox.md) ## ✅ With `SYS_ADMIN` capability Launch the container using: `docker container run -it --rm --cap-add=SYS_ADMIN zenika/alpine-chrome` This allows to run Chrome with sandboxing but needs unnecessary privileges from a Docker point of view. ## ✅ The best: With `seccomp` Thanks to ever-awesome Jessie Frazelle seccomp profile for Chrome. This is The most secure way to run this Headless Chrome docker image. [chrome.json](https://github.com/Zenika/alpine-chrome/blob/master/chrome.json) Also available here `wget https://raw.githubusercontent.com/jfrazelle/dotfiles/master/etc/docker/seccomp/chrome.json` Launch the container using: `docker container run -it --rm --security-opt seccomp=$(pwd)/chrome.json zenika/alpine-chrome` # How to use in command line ## Default entrypoint The default entrypoint runs `chromium-browser --headless` with some common flags from `CHROMIUM_FLAGS` set in the [`Dockerfile`](./Dockerfile). You can change the `CHROMIUM_FLAGS` by overriding the environment variable using: `docker container run -it --rm --env CHROMIUM_FLAGS="--other-flag ..." zenika/alpine-chrome chromium-browser ...` You can get full control by overriding the entrypoint using: `docker container run -it --rm --entrypoint "" zenika/alpine-chrome chromium-browser ...` ## Use the devtools Command (with no-sandbox): `docker container run -d -p 9222:9222 zenika/alpine-chrome --no-sandbox --remote-debugging-address=0.0.0.0 --remote-debugging-port=9222 https://www.chromestatus.com/` Open your browser to: `http://localhost:9222` and then click on the tab you want to inspect. Replace the beginning `https://chrome-devtools-frontend.appspot.com/serve_file/@.../inspector.html?ws=localhost:9222/[END]` by `chrome-devtools://devtools/bundled/inspector.html?ws=localhost:9222/[END]` ## Print the DOM Command (with no-sandbox): `docker container run -it --rm zenika/alpine-chrome --no-sandbox --dump-dom https://www.chromestatus.com/` ## Print a PDF Command (with no-sandbox): `docker container run -it --rm -v $(pwd):/usr/src/app zenika/alpine-chrome --no-sandbox --print-to-pdf --hide-scrollbars https://www.chromestatus.com/` ## Take a screenshot Command (with no-sandbox): `docker container run -it --rm -v $(pwd):/usr/src/app zenika/alpine-chrome --no-sandbox --screenshot --hide-scrollbars https://www.chromestatus.com/` ### Size of a standard letterhead. Command (with no-sandbox): `docker container run -it --rm -v $(pwd):/usr/src/app zenika/alpine-chrome --no-sandbox --screenshot --hide-scrollbars --window-size=1280,1696 https://www.chromestatus.com/` ### Nexus 5x Command (with no-sandbox): `docker container run -it --rm -v $(pwd):/usr/src/app zenika/alpine-chrome --no-sandbox --screenshot --hide-scrollbars --window-size=412,732 https://www.chromestatus.com/` ### Screenshot owned by current user (by default the file is owned by the container user) Command (with no-sandbox): `` docker container run -u `id -u $USER` -it --rm -v $(pwd):/usr/src/app zenika/alpine-chrome --no-sandbox --screenshot --hide-scrollbars --window-size=412,732 https://www.chromestatus.com/ `` # How to use with Deno Go the deno `src` folder. Build your image using this command: ``` docker image build -t zenika/alpine-chrome:with-deno-sample . ``` Then launch the container: ``` docker container run -it --rm zenika/alpine-chrome:with-deno-sample Download https://deno.land/std/examples/welcome.ts Warning Implicitly using master branch https://deno.land/std/examples/welcome.ts Compile https://deno.land/std/examples/welcome.ts Welcome to Deno 🦕 ``` With your own file, use this command: ``` docker container run -it --rm -v $(pwd):/usr/src/app zenika/alpine-chrome:with-deno-sample run helloworld.ts Compile file:///usr/src/app/helloworld.ts Download https://deno.land/std/fmt/colors.ts Warning Implicitly using master branch https://deno.land/std/fmt/colors.ts Hello world! ``` # How to use with Puppeteer With tool like ["Puppeteer"](https://pptr.dev/#?product=Puppeteer&version=v1.15.0&show=api-class-browser), we can add a lot things with our Chrome Headless. With some code in NodeJS, we can improve and make some tests. See the ["with-puppeteer"](https://github.com/Zenika/alpine-chrome/blob/master/with-puppeteer) folder for more details. We have to [follow the mapping of Chromium => Puppeteer described here](https://github.com/puppeteer/puppeteer/blob/main/versions.js). If you have a NodeJS/Puppeteer script in your `src` folder named `pdf.js`, you can launch it using the following command: ``` docker container run -it --rm -v $(pwd)/src:/usr/src/app/src --cap-add=SYS_ADMIN zenika/alpine-chrome:with-puppeteer node src/pdf.js ``` With the ["font-wqy-zenhei"](https://pkgs.alpinelinux.org/package/edge/testing/x86/font-wqy-zenhei) library, you could also manipulate asian pages like in ["screenshot-asia.js"](https://github.com/Zenika/alpine-chrome/blob/master/with-puppeteer/src/screenshot-asia.js) ``` docker container run -it --rm -v $(pwd)/src:/usr/src/app/src --cap-add=SYS_ADMIN zenika/alpine-chrome:with-puppeteer node src/screenshot-asia.js ``` These websites are tested with the following supported languages: - Chinese (with `https://m.baidu.com`) - Japanese (with `https://www.yahoo.co.jp/`) - Korean (with `https://www.naver.com/`) # How to use with Puppeteer to test a Chrome Extension [According to puppeteer official doc](https://github.com/puppeteer/puppeteer/blob/main/docs/api.md#working-with-chrome-extensions) you can not test a Chrome Extension in headleass mode. You need a display available, that's where Xvfb comes in. See the ["with-puppeteer-xvfb"](https://github.com/Zenika/alpine-chrome/blob/master/with-puppeteer-xvfb) folder for more details. We have to [follow the mapping of Chromium => Puppeteer described here](https://github.com/puppeteer/puppeteer/blob/main/versions.js). Assuming you have a NodeJS/Puppeteer script in your `src` folder named `extension.js`, and the unpacked extension in the `chrome-extension` folder, you can launch it using the following command: ``` docker container run -it --rm -v $(pwd)/src:/usr/src/app/src --cap-add=SYS_ADMIN zenika/alpine-chrome:with-puppeteer-xvfb node src/extension.js ``` The extension provided will change the page background in red for every website visited. This demo will load the extension and take a screenshot of the icanhazip.com website. # How to use with Playwright Like ["Puppeteer"](https://pptr.dev/#?product=Puppeteer&version=v6.0.0&show=api-class-browser), we can do a lot things using ["Playwright"](https://playwright.dev/docs/core-concepts/#browser) with our Chrome Headless. Go to the `with-playwright` folder and launch the following command: ``` docker container run -it --rm -v $(pwd)/src:/usr/src/app/src --cap-add=SYS_ADMIN zenika/alpine-chrome:with-playwright node src/useragent.js ``` A `example-chromium.png` file will be created in your `with-playwright/src` folder. # How to use with WebGL By default, this image works with WebGL. If you want to disable it, make sure to add `--disable-gpu` when launching Chromium. `docker container run -it --rm --cap-add=SYS_ADMIN -v $(pwd):/usr/src/app zenika/alpine-chrome --screenshot --hide-scrollbars https://webglfundamentals.org/webgl/webgl-fundamentals.html` `docker container run -it --rm --cap-add=SYS_ADMIN -v $(pwd):/usr/src/app zenika/alpine-chrome --screenshot --hide-scrollbars https://browserleaks.com/webgl` # How to use with Chromedriver [ChromeDriver](https://chromedriver.chromium.org/home) is a separate executable that Selenium WebDriver uses to control Chrome. You can use this image as a base for your Docker based selenium tests. See [Guide for running Selenium tests using Chromedriver](https://www.browserstack.com/guide/run-selenium-tests-using-selenium-chromedriver). # How to use with Selenoid [Selenoid](https://github.com/aerokube/selenoid) is a powerful implementation of Selenium hub using Docker containers to launch browsers. Even if it used to run browsers in docker containers, it can be quite useful as lightweight Selenium replacement. `with-selenoid` image is a self sufficient selenium server, chrome and chromedriver installed. You can run it with following command: ``` docker container run -it --rm --cap-add=SYS_ADMIN -p 4444:4444 zenika/alpine-chrome:with-selenoid -capture-driver-logs ``` And run your tests against `http://localhost:4444/wd/hub` One of the use-cases might be running automation tests in the environment with restricted Docker environment like on some CI systems like GitLab CI, etc. In such case you may not have permissions for `--cap-add=SYS_ADMIN` and you will need to pass the `--no-sandbox` to `chromedriver`. See more [selenoid docs](https://aerokube.com/selenoid/latest/#_using_selenoid_without_docker) # Run as root and override default entrypoint We can run the container as root with this command: ``` docker container run --rm -it --entrypoint "" --user root zenika/alpine-chrome sh ``` # Run examples Some examples are available on the `examples` [directory](examples): - 🐳 [docker-compose](https://github.com/Zenika/alpine-chrome/blob/master/examples/docker-compose) to launch a chrome calling a nginx server in the same docker-compose - ☸️ [kubernetes](https://github.com/Zenika/alpine-chrome/tree/master/examples/k8s) to launch a pod with a headless chrome - 🖥 [x11](https://github.com/Zenika/alpine-chrome/blob/master/examples/x11) to experiment this image with a X11 server. # References - Headless Chrome website: https://developers.google.com/web/updates/2017/04/headless-chrome - List of all options of the "Chromium" command line: https://peter.sh/experiments/chromium-command-line-switches/ - Where to file issues: https://github.com/Zenika/alpine-chrome/issues - Maintained by: https://www.zenika.com # Versions (in latest) ## Alpine version ``` docker container run -it --rm --entrypoint "" zenika/alpine-chrome cat /etc/alpine-release 3.15.4 ``` ## Chrome version ``` docker container run -it --rm --entrypoint "" zenika/alpine-chrome chromium-browser --version Chromium 100.0.4896.60 ``` ## Image disk size ``` docker image inspect zenika/alpine-chrome --format='{{.Size}}' 357467827 # 341 MB ``` # ✨ Contributors Thanks goes to these wonderful people ([emoji key](https://allcontributors.org/docs/en/emoji-key)): <!-- ALL-CONTRIBUTORS-LIST:START - Do not remove or modify this section --> <!-- prettier-ignore-start --> <!-- markdownlint-disable --> <table> <tr> <td align="center"><a href="https://blog.zenika.com/author/jlandure/"><img src="https://avatars2.githubusercontent.com/u/525974?v=4" width="100px;" alt=""/><br /><sub><b>Julien Landuré</b></sub></a><br /><a href="https://github.com/Zenika/alpine-chrome/commits?author=jlandure" title="Code">💻</a> <a href="https://github.com/Zenika/alpine-chrome/pulls?q=is%3Apr+reviewed-by%3Ajlandure" title="Reviewed Pull Requests">👀</a> <a href="https://github.com/Zenika/alpine-chrome/commits?author=jlandure" title="Tests">⚠️</a> <a href="#ideas-jlandure" title="Ideas, Planning, & Feedback">🤔</a> <a href="#question-jlandure" title="Answering Questions">💬</a> <a href="#maintenance-jlandure" title="Maintenance">🚧</a></td> <td align="center"><a href="https://github.com/lygstate"><img src="https://avatars3.githubusercontent.com/u/121040?v=4" width="100px;" alt=""/><br /><sub><b>Yonggang Luo</b></sub></a><br /><a href="https://github.com/Zenika/alpine-chrome/commits?author=lygstate" title="Code">💻</a> <a href="#ideas-lygstate" title="Ideas, Planning, & Feedback">🤔</a> <a href="#question-lygstate" title="Answering Questions">💬</a></td> <td align="center"><a href="https://pixelarbeit.de"><img src="https://avatars1.githubusercontent.com/u/22632550?v=4" width="100px;" alt=""/><br /><sub><b>Dennis Koch</b></sub></a><br /><a href="https://github.com/Zenika/alpine-chrome/commits?author=pxlrbt" title="Code">💻</a> <a href="#ideas-pxlrbt" title="Ideas, Planning, & Feedback">🤔</a> <a href="#question-pxlrbt" title="Answering Questions">💬</a></td> <td align="center"><a href="https://github.com/sargonpiraev"><img src="https://avatars3.githubusercontent.com/u/9588637?v=4" width="100px;" alt=""/><br /><sub><b>Sargon Piraev</b></sub></a><br /><a href="https://github.com/Zenika/alpine-chrome/commits?author=sargonpiraev" title="Code">💻</a></td> <td align="center"><a href="https://github.com/ebriand"><img src="https://avatars1.githubusercontent.com/u/1011902?v=4" width="100px;" alt=""/><br /><sub><b>Eric Briand</b></sub></a><br /><a href="https://github.com/Zenika/alpine-chrome/commits?author=ebriand" title="Code">💻</a></td> <td align="center"><a href="https://github.com/huhai463127310"><img src="https://avatars1.githubusercontent.com/u/1825820?v=4" width="100px;" alt=""/><br /><sub><b>栩风</b></sub></a><br /><a href="https://github.com/Zenika/alpine-chrome/commits?author=huhai463127310" title="Code">💻</a> <a href="#ideas-huhai463127310" title="Ideas, Planning, & Feedback">🤔</a></td> <td align="center"><a href="https://rubyisforfun.com"><img src="https://avatars3.githubusercontent.com/u/1477672?v=4" width="100px;" alt=""/><br /><sub><b>Roman Pushkin</b></sub></a><br /><a href="https://github.com/Zenika/alpine-chrome/commits?author=ro31337" title="Code">💻</a></td> </tr> <tr> <td align="center"><a href="https://twitter.com/jllado"><img src="https://avatars2.githubusercontent.com/u/628929?v=4" width="100px;" alt=""/><br /><sub><b>Juan Lladó</b></sub></a><br /><a href="https://github.com/Zenika/alpine-chrome/commits?author=jllado" title="Code">💻</a></td> <td align="center"><a href="https://github.com/c24w"><img src="https://avatars2.githubusercontent.com/u/710406?v=4" width="100px;" alt=""/><br /><sub><b>Chris Watson</b></sub></a><br /><a href="https://github.com/Zenika/alpine-chrome/issues?q=author%3Ac24w" title="Bug reports">🐛</a></td> <td align="center"><a href="https://jokester.io"><img src="https://avatars0.githubusercontent.com/u/802130?v=4" width="100px;" alt=""/><br /><sub><b>Wang Guan</b></sub></a><br /><a href="https://github.com/Zenika/alpine-chrome/issues?q=author%3Ajokester" title="Bug reports">🐛</a></td> <td align="center"><a href="https://github.com/OscarSotoSanchez"><img src="https://avatars0.githubusercontent.com/u/12794770?v=4" width="100px;" alt=""/><br /><sub><b>Óscar Soto Sánchez</b></sub></a><br /><a href="https://github.com/Zenika/alpine-chrome/issues?q=author%3AOscarSotoSanchez" title="Bug reports">🐛</a></td> <td align="center"><a href="https://ro.linkedin.com/in/alexandrucalinoiu"><img src="https://avatars3.githubusercontent.com/u/679198?v=4" width="100px;" alt=""/><br /><sub><b>Calinoiu Alexandru Nicolae</b></sub></a><br /><a href="https://github.com/Zenika/alpine-chrome/issues?q=author%3Aalexandru-calinoiu" title="Bug reports">🐛</a></td> <td align="center"><a href="https://github.com/mamacdon"><img src="https://avatars2.githubusercontent.com/u/382404?v=4" width="100px;" alt=""/><br /><sub><b>Mark Macdonald</b></sub></a><br /><a href="https://github.com/Zenika/alpine-chrome/issues?q=author%3Amamacdon" title="Bug reports">🐛</a></td> <td align="center"><a href="http://www.thisiswhytheinternetexists.com"><img src="https://avatars0.githubusercontent.com/u/5497269?v=4" width="100px;" alt=""/><br /><sub><b>Felix Mann</b></sub></a><br /><a href="https://github.com/Zenika/alpine-chrome/issues?q=author%3ADJFliX" title="Bug reports">🐛</a></td> </tr> <tr> <td align="center"><a href="https://github.com/horacimacias"><img src="https://avatars2.githubusercontent.com/u/1333208?v=4" width="100px;" alt=""/><br /><sub><b>horacimacias</b></sub></a><br /><a href="https://github.com/Zenika/alpine-chrome/issues?q=author%3Ahoracimacias" title="Bug reports">🐛</a></td> <td align="center"><a href="http://emil.kjer.info"><img src="https://avatars2.githubusercontent.com/u/970602?v=4" width="100px;" alt=""/><br /><sub><b>Emil Kjer</b></sub></a><br /><a href="https://github.com/Zenika/alpine-chrome/issues?q=author%3Aemilkjer" title="Bug reports">🐛</a></td> <td align="center"><a href="https://github.com/likwid"><img src="https://avatars1.githubusercontent.com/u/523407?v=4" width="100px;" alt=""/><br /><sub><b>Jeff Gonzalez</b></sub></a><br /><a href="https://github.com/Zenika/alpine-chrome/issues?q=author%3Alikwid" title="Bug reports">🐛</a></td> <td align="center"><a href="http://www.rom.by"><img src="https://avatars2.githubusercontent.com/u/2912732?v=4" width="100px;" alt=""/><br /><sub><b>George Gaál</b></sub></a><br /><a href="https://github.com/Zenika/alpine-chrome/issues?q=author%3Agecube" title="Bug reports">🐛</a></td> <td align="center"><a href="https://github.com/wheestermans31"><img src="https://avatars1.githubusercontent.com/u/41023907?v=4" width="100px;" alt=""/><br /><sub><b>wheestermans31</b></sub></a><br /><a href="https://github.com/Zenika/alpine-chrome/issues?q=author%3Awheestermans31" title="Bug reports">🐛</a></td> <td align="center"><a href="https://github.com/hodossy"><img src="https://avatars1.githubusercontent.com/u/19623656?v=4" width="100px;" alt=""/><br /><sub><b>Hodossy, Szabolcs</b></sub></a><br /><a href="https://github.com/Zenika/alpine-chrome/issues?q=author%3Ahodossy" title="Bug reports">🐛</a></td> <td align="center"><a href="https://github.com/ardeois"><img src="https://avatars0.githubusercontent.com/u/1867939?v=4" width="100px;" alt=""/><br /><sub><b>Corentin Ardeois</b></sub></a><br /><a href="https://github.com/Zenika/alpine-chrome/issues?q=author%3Aardeois" title="Bug reports">🐛</a></td> </tr> <tr> <td align="center"><a href="https://www.dynamicfiles.de"><img src="https://avatars0.githubusercontent.com/u/1042579?v=4" width="100px;" alt=""/><br /><sub><b>Danny Althoff</b></sub></a><br /><a href="#question-FibreFoX" title="Answering Questions">💬</a></td> <td align="center"><a href="https://github.com/chadlwilson"><img src="https://avatars1.githubusercontent.com/u/29788154?v=4" width="100px;" alt=""/><br /><sub><b>Chad Wilson</b></sub></a><br /><a href="#question-chadlwilson" title="Answering Questions">💬</a> <a href="#ideas-chadlwilson" title="Ideas, Planning, & Feedback">🤔</a></td> <td align="center"><a href="https://github.com/fenchu"><img src="https://avatars1.githubusercontent.com/u/11349883?v=4" width="100px;" alt=""/><br /><sub><b>fenchu</b></sub></a><br /><a href="https://github.com/Zenika/alpine-chrome/issues?q=author%3Afenchu" title="Bug reports">🐛</a></td> <td align="center"><a href="https://github.com/nrawat151290"><img src="https://avatars1.githubusercontent.com/u/3829598?v=4" width="100px;" alt=""/><br /><sub><b>nrawat151290</b></sub></a><br /><a href="https://github.com/Zenika/alpine-chrome/issues?q=author%3Anrawat151290" title="Bug reports">🐛</a></td> <td align="center"><a href="https://twitter.com/x0rzkov"><img src="https://avatars3.githubusercontent.com/u/56916043?v=4" width="100px;" alt=""/><br /><sub><b>x0rzkov</b></sub></a><br /><a href="https://github.com/Zenika/alpine-chrome/issues?q=author%3Ax0rzkov" title="Bug reports">🐛</a> <a href="#ideas-x0rzkov" title="Ideas, Planning, & Feedback">🤔</a></td> <td align="center"><a href="https://github.com/jketterl"><img src="https://avatars0.githubusercontent.com/u/180748?v=4" width="100px;" alt=""/><br /><sub><b>Jakob Ketterl</b></sub></a><br /><a href="https://github.com/Zenika/alpine-chrome/issues?q=author%3Ajketterl" title="Bug reports">🐛</a></td> <td align="center"><a href="http://virus.hostv.pl"><img src="https://avatars1.githubusercontent.com/u/1295000?v=4" width="100px;" alt=""/><br /><sub><b>Piotr Sikora</b></sub></a><br /><a href="https://github.com/Zenika/alpine-chrome/issues?q=author%3Apiotr-sikora-v" title="Bug reports">🐛</a> <a href="#ideas-piotr-sikora-v" title="Ideas, Planning, & Feedback">🤔</a></td> </tr> <tr> <td align="center"><a href="https://github.com/pgrimaud"><img src="https://avatars1.githubusercontent.com/u/1866496?v=4" width="100px;" alt=""/><br /><sub><b>Pierre Grimaud</b></sub></a><br /><a href="https://github.com/Zenika/alpine-chrome/commits?author=pgrimaud" title="Code">💻</a></td> <td align="center"><a href="http://www.niekvandermaas.nl"><img src="https://avatars0.githubusercontent.com/u/213140?v=4" width="100px;" alt=""/><br /><sub><b>Niek van der Maas</b></sub></a><br /><a href="#question-Niek" title="Answering Questions">💬</a> <a href="#ideas-Niek" title="Ideas, Planning, & Feedback">🤔</a></td> <td align="center"><a href="https://github.com/llange"><img src="https://avatars0.githubusercontent.com/u/222432?v=4" width="100px;" alt=""/><br /><sub><b>llange</b></sub></a><br /><a href="https://github.com/Zenika/alpine-chrome/issues?q=author%3Allange" title="Bug reports">🐛</a> <a href="https://github.com/Zenika/alpine-chrome/commits?author=llange" title="Code">💻</a></td> <td align="center"><a href="http://agengdp.github.io"><img src="https://avatars1.githubusercontent.com/u/16035097?v=4" width="100px;" alt=""/><br /><sub><b>Ageng D. Prastyawan</b></sub></a><br /><a href="https://github.com/Zenika/alpine-chrome/commits?author=agengdp" title="Documentation">📖</a></td> <td align="center"><a href="https://neelkamath.com"><img src="https://avatars3.githubusercontent.com/u/24778804?v=4" width="100px;" alt=""/><br /><sub><b>Neel Kamath</b></sub></a><br /><a href="#question-neelkamath" title="Answering Questions">💬</a></td> <td align="center"><a href="https://www.peterdavehello.org/"><img src="https://avatars3.githubusercontent.com/u/3691490?v=4" width="100px;" alt=""/><br /><sub><b>Peter Dave Hello</b></sub></a><br /><a href="https://github.com/Zenika/alpine-chrome/commits?author=PeterDaveHello" title="Code">💻</a></td> <td align="center"><a href="https://github.com/Trane9991"><img src="https://avatars1.githubusercontent.com/u/9948629?v=4" width="100px;" alt=""/><br /><sub><b>Taras</b></sub></a><br /><a href="https://github.com/Zenika/alpine-chrome/commits?author=Trane9991" title="Code">💻</a> <a href="https://github.com/Zenika/alpine-chrome/commits?author=Trane9991" title="Documentation">📖</a></td> </tr> <tr> <td align="center"><a href="https://github.com/Antoineoili"><img src="https://avatars1.githubusercontent.com/u/50737365?v=4" width="100px;" alt=""/><br /><sub><b>Antoine Oili</b></sub></a><br /><a href="https://github.com/Zenika/alpine-chrome/commits?author=Antoineoili" title="Documentation">📖</a></td> <td align="center"><a href="https://manuelcepeda.dev"><img src="https://avatars1.githubusercontent.com/u/8043309?v=4" width="100px;" alt=""/><br /><sub><b>Manuel Cepeda</b></sub></a><br /><a href="https://github.com/Zenika/alpine-chrome/commits?author=mecm1993" title="Code">💻</a></td> <td align="center"><a href="https://simon-frey.com"><img src="https://avatars3.githubusercontent.com/u/24354822?v=4" width="100px;" alt=""/><br /><sub><b>Simon Frey</b></sub></a><br /><a href="https://github.com/Zenika/alpine-chrome/commits?author=simonfrey" title="Code">💻</a></td> <td align="center"><a href="https://www.bleedbytes.in"><img src="https://avatars1.githubusercontent.com/u/20743451?v=4" width="100px;" alt=""/><br /><sub><b>Santhosh C</b></sub></a><br /><a href="https://github.com/Zenika/alpine-chrome/commits?author=santhosh-chinnasamy" title="Documentation">📖</a></td> </tr> </table> <!-- markdownlint-enable --> <!-- prettier-ignore-end --> <!-- ALL-CONTRIBUTORS-LIST:END --> This project follows the [all-contributors](https://github.com/all-contributors/all-contributors) specification. Contributions of any kind welcome! # 🎉 Show your support ⭐️ this repo or [leave a comment here](https://github.com/Zenika/alpine-chrome/issues/new?template=03_thanks.md) 💚 Support this repository using [GitHub Sponsor](https://github.com/sponsors/jlandure/)
521
🖼 新浪微博图床 Chrome/Firefox 扩展,支持同步到微相册
# Weibo-Picture-Store - [更新日志(CHANGELOG)](changelog.md) - [前往 Chrome 网上应用商店下载](https://chrome.google.com/webstore/detail/pinjkilghdfhnkibhcangnpmcpdpmehk) - [前往 Firefox 附加组件商店下载](https://addons.mozilla.org/en-US/firefox/addon/weibo-picture-store/) ## Introduction 上传图片到微博并生成外链的 Chrome 浏览器扩展 注意:虽然现在支持了 Firefox 浏览器,但是相关文档的描述部分仍然保持不变,用词以 Chrome 为主。 ## Feature > 已下列出的是功能的简介,详情可以继续往下阅读 - 支持点选、拖拽、粘贴以及页面右键菜单上传图片到微博并同步到微相册 - 支持拖拽上传文件夹中的图片文件 - 支持 JPEG、PNG、GIF 三种图片格式 - 支持 SVG、BMP、WebP、ico 有损转换为 PNG - 支持把 HTML5 视频的当前帧上传为 JPG 图像 - 支持查看上传记录,简单的浏览及删除操作 - 支持生成 URL、HTML、UBB、Markdown 四种格式 - 支持单条、多条模式的复制操作 - 支持选择协议(http、https 和相对协议) - 支持三种固定裁剪尺寸和用户自定义尺寸 - 支持使用微博账号和密码自动登录 - 支持微博图片水印功能 ## Instruction > 具体的操作指南,包含图示 <img src="screenshot/chrome-notify.jpg" width="358" alt=""> 上图展示的是扩展中常用的提示,不同的操作系统显示上略有差异。 <img src="screenshot/popup.jpg" width="972" alt=""> 1. 地址协议选择 2. 图片裁剪选择 3. 在单条和多条复制模式之间切换的按钮 4. 上传记录按钮 5. 选择上传图片的按钮 6. 复制当前类型的地址,批量模式下会复制此类型的所有地址 7. 粘贴区域及拖拽区域,弹窗任何区域都可以使用(这里可以批量粘贴图片链接) 8. 隐藏菜单,用于放置反馈及其他信息(图中是菜单展开状态) 9. 在 GitHub 上提交建议或者 BUG 10. 通过电子邮件反馈问题(如果不方便使用 GitHub) 11. [捐赠](https://www.hub.moe/blackboard/donate.html)支持一下 12. 查看更新日志 <img src="screenshot/right-upload.jpg" width="530" alt=""> 如果可以获取到页面中的图片,则会在右键菜单中显示把这张图片上传到微相册的选项,点击后会自动上传,上传结束后会出现提示。 <img src="screenshot/video-frame.jpg" width="707" alt=""> 如果可以获取到页面中 HTML5 的视频并且原生的右键菜单可用,则会在右键菜单中显示把当前的视频帧上传到微相册的选项,上传流程和上述图片一样。 <img src="screenshot/video-frame-enhancement.jpg" width="786" alt=""> 如果页面中 HTML5 视频在其他容器的下层,或者原生的右键菜单被屏蔽了。可以使用默认快捷键 `Alt+Shift+T`(可在 `chrome://extensions/shortcuts` 键盘快捷键中修改按键)来修改页面元素,让 HTML5 视频可以被右键菜单捕获并且原生右键菜单这时候处于可用状态。需要注意,在页面元素处于修改状态中,页面上的其他元素不可以被鼠标选中,并且页面周围会显示红白相间的条纹表示页面元素处于修改状态。再次按下快捷键 `Alt+Shift+T` 即可退出这种状态,恢复正常。 1. 红白相间的条纹提示线 2. 在页面未修改场景下的右键菜单 3. 原生的右键菜单 <img src="screenshot/history.jpg" width="1265" alt=""> 1. 切换相册(不可用状态) 2. 打开微相册 3. 切换相册(可用状态) 4. 从微相册中移除这张图片 5. 在图片上右击可以复制图片地址 6. 批量删除选中的文件(按住 Ctrl/Command 键可以多选) 7. 图片最近的修改时间 <img src="screenshot/directory.gif" width="689" alt=""> 上图是拖拽文件夹上传图片的示例。 <img src="screenshot/options.jpg" width="459" alt=""> 上图是选项设置,填写微博的账号和密码,可以在传图时自动登录到你的微博,这是可选的设置。默认情况下,使用浏览器中微博的 Cookies,如果你的微博没有登录,则会收到需要登录微博的提示。 ## More - [深入了解概念](docs/conception.md) - [自定义剪裁格式](docs/custom-clipsize.md) - [获得/生成 CRX 文件](docs/get-crx-file.md) - [已知问题](docs/known-issues.md) - [项目结构预览(开发者文档)](docs/project-structure.md) - [基础架构预览(开发者文档)](docs/architecture.md) ## FAQ - 图片上传到哪儿了? - 上传到用户的微博上了 - 在扩展中填写微博账号和密码,这样做是否安全? - 你填写的账号和密码存在本地,不会上传到任何服务器上 - 我的常用微博账号是**A**,我可以在扩展中填写另一个账号**B**吗? - 可以但不推荐,因为一个浏览器同时只能有一个微博的登录状态,在使用**B**时,**A**可能会被强制登出 - 若有同时登录两个账户的需求,请使用 [Chrome 的多用户模式](https://support.google.com/chrome/answer/2364824?hl=zh-Hans)来避免上述这种情况 - 可以上传的最大图片大小是多少? - 目前是 20MB - 如何设置微博图片水印? - 请参考[官方教程](https://weibo.com/ttarticle/p/show?id=2309404137032606682721)设置微博图片水印 - 如何管理已上传的图片? - 上传记录或者微相册均可以管理 - 如何删除已上传的图片? - 目前无法删除,微相册中的删除是针对相册的操作,对图片本身没有影响 - 粘贴上传没有效果? - 粘贴上传只支持复制图片文件,在资源文件管理器中的复制文件并粘贴是没有效果的 - 上传的是 PNG 图片,返回的却是 JPG 后缀的地址? - 微博不支持 PNG 后缀,后缀对于浏览器判断图片的格式是没有影响的 - 如何使用自定义裁剪? - 自定义裁剪的格式需要微博支持,否则生成的地址是不能访问的 - 裁剪操作对图片的影响? - 裁剪适用于 JPEG 格式的图片。PNG 图片裁剪后会丢失透明通道,GIF 则会变成静态图片 - 微相册同步图片的最大数量是多少? - 1000 张。如果达到这个数量后继续使用,会创建新的相册,如果相册也满了,则不再同步图片 - 微相册数量已达到上限 100 个,不能同步图片了怎么办? - 前往[微相册](http://photo.weibo.com)清理陈旧的相册即可 - 为什么通过复制粘贴的方式上传 GIF 会变成静态图片? - 在浏览器或操作系统中复制 GIF 时,只有其中一帧被复制到了剪切板,因此上传后会变成静态图片 - 如何获取扩展日志? - 在扩展栏上的扩展图标上右击,点击【导出日志】选项。 ## Privacy Policy [隐私权和条款](docs/privacy-policy.md) ## Thanks - [JetBrains IDEs](https://www.jetbrains.com/?from=Weibo-Picture-Store) - [Font Awesome](https://fontawesome.com/) - [Base64 encode/decode](https://github.com/beatgammit/base64-js) - [@Suxiaogang](https://github.com/Suxiaogang/WeiboPicBed/)(参考了某些交互设计) <p align="center"> <a href="https://www.jetbrains.com/?from=Weibo-Picture-Store" title="前往官网了解JetBrains出品的IDEs"> <img src="scratches/jetbrains.svg" width="128" alt="JetBrains logo"> </a> </p>
522
🤖 CDN assets - The #1 free and open source CDN built to make life easier for developers.
<h1 align="center"> <a href="https://cdnjs.com"><img src="https://raw.githubusercontent.com/cdnjs/brand/master/logo/standard/dark-512.png" width="175px" alt="< cdnjs >"></a> </h1> <h3 align="center">The #1 free and open source CDN built to make life easier for developers.</h3> --- <p align="center"> <a href="#contributing"> <img src="https://img.shields.io/badge/Robots-only-red.svg?style=flat-square" alt="Robots only"> </a> <a href="https://github.com/cdnjs/cdnjs/blob/master/LICENSE"> <img src="https://img.shields.io/badge/License-MIT-brightgreen.svg?style=flat-square" alt="MIT License"> </a> <a href="https://github.com/cdnjs/cdnjs/discussions"> <img src="https://img.shields.io/badge/GitHub-Discussions-brightgreen.svg?style=flat-square" alt="Discussions"> </a> </p> <p align="center"> <a href="https://github.com/cdnjs/packages/blob/master/README.md#donate-and-support-us"> <img src="https://img.shields.io/badge/GitHub-Sponsors-EA4AAA.svg?style=flat-square" alt="GitHub Sponsors"> </a> <a href="https://opencollective.com/cdnjs"> <img src="https://img.shields.io/badge/Open%20Collective-Support%20Us-3385FF.svg?style=flat-square" alt="Open Collective"> </a> <a href="https://www.patreon.com/cdnjs"> <img src="https://img.shields.io/badge/Patreon-Become%20a%20Patron-E95420.svg?style=flat-square" alt="Patreon"> </a> </p> --- ## Table of Contents * [Introduction](#introduction) * [Other Repositories](#other-repositories) * [Contributing](#contributing) * [Sponsors](#sponsors) * [License](#license) ## Introduction This is the robot-only repository for cdnjs, where all the library assets that are hosted on cdnjs are stored. For the JSON files that control the libraries we host, please see the "human" [`cdnjs/packages`](https://github.com/cdnjs/packages) repository. ### Other Repositories For the JSON files controlling the libraries we host on cdnjs, please take a look at the "human" [`cdnjs/packages`](https://github.com/cdnjs/packages) repository. For our website, please refer to the [`cdnjs/static-website`](https://github.com/cdnjs/static-website) repository. For the cdnjs API, please refer to the [`cdnjs/api-server`](https://github.com/cdnjs/api-server) repository. For the full cdnjs branding and brand-related assets/guidelines, please see the [`cdnjs/brand`](https://github.com/cdnjs/brand) repository. For our monthly CDN stats and usage reports, check out the [`cdnjs/cf-stats`](https://github.com/cdnjs/cf-stats) repository. You can find all our repositories at [github.com/cdnjs](https://github.com/cdnjs)! ## Contributing As this repository is now considered robot-only, pull requests are no longer accepted for this repository. If you are looking to contribute to cdnjs, please take a look at the [`cdnjs/packages`](https://github.com/cdnjs/packages) repository or any of our other [open-source repositories on GitHub](https://github.com/cdnjs)! ## Sponsors cdnjs wouldn't be the success that it is today without our sponsors' kind support. These companies currently support cdnjs: * [Cloudflare](https://www.cloudflare.com/?utm_source=cdnjs&utm_medium=link&utm_campaign=cdnjs_readme) * [Algolia](https://www.algolia.com/?utm_source=cdnjs&utm_medium=link&utm_campaign=cdnjs_readme) * [DigitalOcean](https://www.digitalocean.com/?utm_source=cdnjs&utm_medium=link&utm_campaign=cdnjs_readme) * [Statuspage](https://www.statuspage.io/?utm_source=cdnjs&utm_medium=cdnjs_link&utm_campaign=cdnjs_readme) * [Sentry](https://sentry.io/welcome/?utm_source=cdnjs&utm_medium=cdnjs_link&utm_campaign=cdnjs_readme) * [UptimeRobot](https://uptimerobot.com/?utm_source=cdnjs&utm_medium=cdnjs_link&utm_campaign=cdnjs_readme) If you are interested in becoming a sponsor, please feel free to contact us! ## License Each library is released under its own license. This cdnjs repository is published under [MIT license](LICENSE).
523
💯 The most essential list of resources for Front-End beginners (🇺🇸 🇬🇧 🇨🇦 & 🇫🇷)
# The most essential list of resources for Front-End beginners (🇺🇸 🇬🇧 & 🇫🇷) [![Join the chat at https://gitter.im/sky-starter-kit/Lobby][gitter-image]][gitter-url] [![Contributors](https://img.shields.io/github/contributors/thedaviddias/Resources-Front-End-Beginner.svg)](https://github.com/thedaviddias/Resources-Front-End-Beginner/graphs/contributors) [![CC0](https://img.shields.io/badge/license-CC0-green.svg)](https://creativecommons.org/publicdomain/zero/1.0/) [gitter-image]: https://badges.gitter.im/Front-End-Checklist/Lobby.svg [gitter-url]: https://gitter.im/Front-End-Checklist/Lobby?utm_source=badge&utm_medium=badge&utm_campaign=pr-badge&utm_content=badge If you want to learn how to become a Front-End developer, you are in the right place! I will regularly update that list with new resources and links I found on the web. Don't hesitate to participate by sending a PR! Maybe your first on Github :) I'm using some emoticons to give you more information on these links. 1. All links without a flag are in English 🇺🇸 🇬🇧. The flag 🇫🇷 means the resource is in French, 🌍 means the resource is multi-language. 2. 💰 are paid tutorials, 🆓 are free tutorials. Sometimes you will have some free videos / articles and other paid on the same website. 3. 🔝 indicate that the link is a reference 4. 📹 is present when video content is available --- ## Table of Contents 1. **[Start here](#start-here)** 2. **[Learn HTML](#learn-html)** 3. **[Learn CSS](#learn-css)** 4. **[Learn JavaScript](#learn-javascript)** 5. **[Learn Git](#learn-git)** 6. **[Tools](#tools)** 7. **[Chat / Slack](#chat--slack-channels)** 8. **[Aggregators / News](#aggregators--news)** 9. **[Newsletters](#newsletters)** ![Learn the basics](https://res.cloudinary.com/djnyaloac/image/upload/v1507777230/front-end-know-basics.jpg) ***From Web Developer Roadmap 2017*** --- ## Start here * Understand Internet * [How Does the Internet Actually Work?](https://www.youtube.com/watch?v=5SXK__rm6DM) 📹 🔝 * [What is Internet?](https://www.youtube.com/watch?v=Dxcc6ycZ73M) 📹 🔝 * [How does the internet work? - Part 1 (It's like a bad drawing.)](https://www.youtube.com/watch?v=XZIMEoUhOA8) 📹 * [How Does the Internet Work?](https://www.youtube.com/watch?v=7XoaoFjKqYM) 📹 * [How the Internet Works for Developers - Pt 1 - Overview & Frontend](https://www.youtube.com/watch?v=e4S8zfLdLgQ) 📹 * 🇫🇷 [Benjamin Bayart : Qu'est ce qu'Internet (Conférence à SciencesPo le 14 avril 2010, durée 5h30)](https://www.youtube.com/watch?v=pwT2egqlke4&list=PLU39vuHuXlJeER75D1GNJiK8-2i0yhRLX) 📹 🔝 * 🇫🇷 [C'est pas sorcier -INTERNET : Les pirates tissent leur toile](https://www.youtube.com/watch?v=VB7vsaan8PM) 📹 * 🇫🇷 [Comprendre Internet - histoire](https://www.youtube.com/watch?v=sLJ-QztAqNE) 📹 * 🇫🇷 [Comprendre comment marche Internet](https://www.youtube.com/playlist?list=PL2972E0D013FE7DE7) 📹 * 🇫🇷 [Comprendre Internet](http://www.comprendre-internet.com/) * Understand your journey → [Web Developer Roadmap 2019 - Github](https://github.com/kamranahmedse/developer-roadmap) **[⬆ back to top](#table-of-contents)** --- ## Learn HTML * Courses / Tutorials * 🌍 [Learn HTML - CodeCademy](https://www.codecademy.com/learn/learn-html) 💰🆓 📹 🔝 * [HTML5 and CSS - FreeCodeCamp](https://www.freecodecamp.org/map#nested-collapseHTML5andCSS) 🆓 🔝 * [MarkSheet - A free HTML & CSS tutorial](http://marksheet.io/) 🆓 🔝 * [Intro to HTML/CSS: Making webpages - KhanAcademy](https://www.khanacademy.org/computing/computer-programming/html-css) 🆓 * [Learn the Web](https://learn-the-web.algonquindesign.ca/) 🆓 * [HTML5 Introduction - EDX](https://www.edx.org/course/html5-introduction-w3cx-html5-0x-0) 🆓 * [HTML - Creating basic web pages](https://bento.io/topic/html) 🆓 * [Learn to code HTML & CSS - Shay Howe](http://learn.shayhowe.com/html-css/) 🆓 * [HTML Tutorials](http://www.htmldog.com/) 🆓 * [Intro to HTML and CSS - Udacity](https://www.udacity.com/course/intro-to-html-and-css--ud304) 🆓 * [Learn HTML in 12 minutes - Youtube](https://www.youtube.com/watch?v=bWPMSSsVdPk) 🆓 📹 * [Learn HTML in 30 Minutes - Youtube](https://www.youtube.com/watch?v=hrZqiCUx6kg) 🆓 📹 * [HTML Fundamentals - SoloLearn](https://www.sololearn.com/Course/HTML/) 💰🆓 * [HTML Basics - TreeHouse](https://teamtreehouse.com/library/html-basics-2) 💰 📹 * [HTML/CSS Path - Code School](https://www.codeschool.com/learn/html-css) 💰 📹 * [HTML Essential Training - Lynda](https://www.lynda.com/Web-Development-tutorials/HTML-Essential-Training/170427-2.html) 💰 📹 * [Your First Day with HTML - Pluralsight](https://www.pluralsight.com/courses/your-first-day-html-1665) 💰 📹 * [HTML Fundamentals - Pluralsight](https://www.pluralsight.com/courses/html-fundamentals) 💰 📹 * [Introduction to HTML and CSS - TreeHouse](https://teamtreehouse.com/library/introduction-to-html-and-css) 💰 * [Introduction to HTML5 and CSS3 - Frontend Masters](https://frontendmasters.com/courses/introduction-html5-css3/) 💰 📹 * [HTML/CSS on Code Avengers](https://www.codeavengers.com/profile#html-css) 💰🆓 * [30 Days to Learn HTML & CSS](https://webdesign.tutsplus.com/courses/30-days-to-learn-html-css?_ga=2.133963854.1549833602.1507724443-1498690494.1505785599) 💰🆓 📹 * [Introduction to HTML](https://scrimba.com/g/ghtml) 🆓 📹 * 🇫🇷 [Apprenez à créer votre site web avec HTML5 et CSS3 - OpenClassRooms](https://openclassrooms.com/courses/apprenez-a-creer-votre-site-web-avec-html5-et-css3) 💰🆓 * 🇫🇷 [Tutoriels web HTML - Alsacréations](https://www.alsacreations.com/tuto/liste/1-HTML) 🆓 * 🇫🇷 [HTML et CSS - Le Cours Complet - Udemy](https://www.udemy.com/cours-html-css/) 💰 * [HTML5 Tutorial - w3schools](https://www.w3schools.com/html/) 🆓 * [AlgoExpert's Front-end Expert Course](https://www.algoexpert.io/content#fe) 💰 * Documentation * [HTML Reference](http://htmlreference.io/) 🔝 * [Introduction to HTML - MDN web docs](https://developer.mozilla.org/en-US/docs/Learn/HTML/Introduction_to_HTML) 🔝 * [HTML Cheat Sheet - Compilation](https://websitesetup.org/html5-cheat-sheet/) * [HTML5 Tutorial PDF - Tutorialspoint](https://www.tutorialspoint.com/html5/html5_tutorial.pdf) * [Getting to Know HTML - Shay Howe](https://learn.shayhowe.com/html-css/getting-to-know-html/) * [The Elements of HTML](https://rawgit.com/w3c/elements-of-html/master/index.html) * Guidelines * [SEO, Speed and Security Best Practices - Checkbot](https://www.checkbot.io/guide/) * [HTML Best Practices - Github](https://github.com/hail2u/html-best-practices) * Quiz / Challenges * [LearnYouHTML - NodeSchool](https://github.com/denysdovhan/learnyouhtml) * [HTML Quiz beginner level - Skillvalue](https://skillvalue.com/en/quizzes/front-end/html5-beginner-level) * Articles/Books * [Learn to Code HTML and CSS: Develop and Style Websites](https://www.amazon.com/Learn-Code-HTML-CSS-Websites/dp/0321940520) * [HTML and CSS: Design and Build Websites](https://www.amazon.com/HTML-CSS-Design-Build-Websites/dp/1118008189) * 🇫🇷 [Réalisez votre site web avec HTML 5 et CSS 3](http://www.eyrolles.com/Informatique/Livre/realisez-votre-site-web-avec-html-5-et-css-3-9782212674767) **[⬆ back to top](#table-of-contents)** --- ### Learn CSS * Courses / Tutorials * 🌍 [Learn CSS - CodeCademy](https://www.codecademy.com/learn/learn-css) 💰🆓 🔝 * [Learn CSS in 12 Minutes - Youtube](https://www.youtube.com/watch?v=0afZj1G0BIE) 🆓 📹 * [CSS Basics - TreeHouse](https://teamtreehouse.com/library/css-basics) 💰 📹 * [Introduction to CSS](https://www.pluralsight.com/courses/css-intro) 💰 📹 * [CSS3 In-Depth](https://frontendmasters.com/courses/css3-in-depth/) 💰 📹 * [CSS Essential Training 3 - Lynda](https://www.lynda.com/CSS-tutorials/CSS-Essential-Training-3/609030-2.html) 💰 📹 * [Scalable Modular Architecture for CSS (SMACSS) - Frontend Masters](https://frontendmasters.com/courses/smacss/) 💰 📹 * 🇫🇷 [Tutoriel HTML/CSS - Box Sizing - Grafikart](https://www.youtube.com/watch?v=oFziQkOqKd0) 🆓 📹 * 🇫🇷 [Tutoriel CSS : Comment bien organiser son CSS - Grafikart](https://www.youtube.com/watch?v=t8Up7GiNIoU) 🆓 📹 * 🇫🇷 [Tutoriels web CSS - Alsacréations](https://www.alsacreations.com/tuto/liste/2-CSS) 🆓 * [CSS Tutorial - w3schools](https://www.w3schools.com/css/) 🆓 * [Introduction to CSS](https://scrimba.com/g/gintrotocss) 🆓 📹 * [Learn CSS - Sololearn](https://www.sololearn.com/Course/CSS/) * Selectors * [CSS Diner](https://flukeout.github.io/) 🆓 🔝 * Flexbox * 🌍 [Flexbox Froggy](http://flexboxfroggy.com/) 🆓 🔝 * [Flexbox Defense](http://www.flexboxdefense.com/) 🆓 🔝 * CSS Grid * 🌍 [Grid Garden](http://cssgridgarden.com/) 🆓 🔝 * [Learn CSS Grid with Wes Bos](https://cssgrid.io/) 🆓 🔝 * Documentation * [CSS Reference](http://cssreference.io/) 🔝 * [CSS - MDN web docs](https://developer.mozilla.org/en-US/docs/Web/CSS) 🔝 * [Open Web Reference - CSS](http://ref.openweb.io/CSS/) * [CSS Reference](https://tympanus.net/codrops/css_reference/) * [Getting to know CSS](https://learn.shayhowe.com/html-css/getting-to-know-css/) * Guidelines * 🌍 [CSS Guidelin.es](https://cssguidelin.es/) 🔝 * [Airbnb CSS / Sass Styleguide - Github](https://github.com/airbnb/css) * [Scalable and Modular Architecture for CSS - SMACSS](https://smacss.com/) 🔝 * [Google HTML/CSS Style Guide - Github](https://google.github.io/styleguide/htmlcssguide.html) * [Sensible CSS Guidelines - Github](https://github.com/chris-pearce/css-guidelines) * [Trello CSS Guide - Github](https://gist.github.com/bobbygrace/9e961e8982f42eb91b80) * Quizz / challenges * [CSS Quiz beginner level - Skillvalue](https://skillvalue.com/en/quizzes/front-end/css-beginner-level-2) * Articles/Books * [CSS, The definitive guide - Eric Meyer](https://www.amazon.com/CSS-Definitive-Guide-Eric-Meyer/dp/0596527330) * [Enduring CSS - Ben Frain](https://www.amazon.com/Enduring-CSS-Ben-Frain/dp/1787282805) * [The CSS PocketGuide - Chris Casciano](https://www.amazon.com/CSS-Pocket-Guide-Peachpit/dp/0321732278) * [CSS Secrets: Better Solutions to Everyday Web Design Problems - Lea Verou](https://www.amazon.com/CSS-Secrets-Solutions-Everyday-Problems/dp/1449372635) * [Professional CSS3 - Piotr Sikora](https://www.packtpub.com/web-development/professional-css3) * 🇫🇷 [CSS3 - Raphaël Goetter, Hugo Giraudel](http://www.eyrolles.com/Informatique/Livre/css3-9782212140231) * 🇫🇷 [CSS avancées - Raphaël Goetter](http://www.eyrolles.com/Informatique/Livre/css-avancees-9782212134056) * 🇫🇷 [CSS avancées, Vers HTML5 et CSS3 - Mathieu Nebra](%>) * 🇫🇷 [Premier pas en CSS3 et HTML5](http://www.eyrolles.com/Informatique/Livre/premiers-pas-en-css3-et-html5-9782212674309) **[⬆ back to top](#table-of-contents)** --- ### Learn JavaScript * Courses / Tutorials * [Basic JavaScript](https://www.freecodecamp.org/map#nested-collapseBasicJavaScript) 🆓 🔝 * [Introduction To JavaScript - CodeCademy](https://www.codecademy.com/learn/introduction-to-javascript) 💰🆓 🔝 * [Beau teaches JavaScript - Youtube](https://www.youtube.com/playlist?list=PLWKjhJtqVAbmoiNlqLJg1gxEjEuKHHcn_) 🆓 📹 * [JS 30 For 30 - 30 Projects for 30 Days](https://javascript30.com/) 🆓 📹 * [Intro to JavaScript - Udacity](https://www.udacity.com/course/intro-to-javascript--ud803) 🆓 * [Learn JavaScript - Codementor](https://www.codementor.io/javascript) 🆓 * [Introduction to JavaScript Programming - Frontend Masters](https://frontendmasters.com/courses/javascript-basics/) 💰 📹 * [LambdaSchool Javascript Mini Bootcamp](https://lambdaschool.com/free-course-web/)💰🆓 🔝 * [JavaScript Essential Training - Lynda](https://www.lynda.com/JavaScript-tutorials/JavaScript-Essential-Training/574716-2.html) 💰 📹 * [JavaScript Fundamentals - Tuts+](https://code.tutsplus.com/courses/javascript-fundamentals) 💰🆓 📹 * [Getting Started with JavaScript for Web Development - Scotch](https://scotch.io/courses/getting-started-with-javascript) 💰🆓 * [JavaScript Basics - TreeHouse](https://teamtreehouse.com/library/javascript-basics) 💰 * [JavaScript path - Code School](https://www.codeschool.com/learn/javascript) 💰 * [ES6 for everyone](https://es6.io/) 💰 📹 * 🇫🇷 [Tutoriels web JavaScript - Alsacréations](https://www.alsacreations.com/tuto/liste/5-Javascript) 🆓 * [JavaScript.Info](http://javascript.info/) * [JavaScript Tutorial - w3schools](https://www.w3schools.com/js/) 🆓 * [Javascript Tutorial - Watch and Code by Gordon Zhu](https://watchandcode.com/) 🆓💰 * [Learn Javascript](https://www.sololearn.com/Course/JavaScript/) * [Introduction to Javascript](https://scrimba.com/g/gintrotojavascript) 🆓 * Documentation * [JavaScript reference](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference) * [Modern JavaScript Cheatsheet](https://mbeaudru.github.io/modern-js-cheatsheet/) * [ES6 Katas - Learn ES6 by doing it](http://es6katas.org/) * Guidelines * [Clean Code concepts adapted for JavaScript - Github](https://github.com/ryanmcdermott/clean-code-javascript) * Quiz / challenges * [Workshoppers - NodeSchool](https://nodeschool.io/) 🔝 * [JavaScript Quiz beginner level - Skillvalue](https://skillvalue.com/en/quizzes/front-end/javascript-beginner-level-2) 🔝 * Articles / Books * [Practical Modern JavaScript](https://github.com/mjavascript/practical-modern-javascript) 🆓 * [You Don't Know JS (book series)](https://github.com/getify/You-Dont-Know-JS) 🆓 * [JavaScript, the definitive guide](https://www.amazon.fr/JavaScript-Definitive-Guide-David-Flanagan/dp/0596805527) * [Javascript: The Good Parts](https://www.amazon.fr/Javascript-Good-Parts-D-Crockford/dp/0596517742) * [Eloquent JavaScript: A Modern Introduction to Programming](https://www.amazon.com/Eloquent-JavaScript-2nd-Ed-Introduction/dp/1593275846) * [JavaScript Allongée](https://leanpub.com/javascriptallongesix) * [Learning JavaScript](https://www.amazon.com/Learning-JavaScript-Essentials-Application-Development/dp/1491914912) * [Understanding ECMAScript 6: The Definitive Guide for JavaScript Developers](https://www.amazon.fr/Understanding-ECMAScript-Definitive-JavaScript-Developers/dp/1593277571) * [JavaScript and JQuery: Interactive Front-End Web Development](https://www.amazon.com/JavaScript-JQuery-Interactive-Front-End-Development/dp/1118531647) * 🇫🇷 [JavaScript - Développez efficacement](https://www.amazon.fr/JavaScript-Développez-efficacement-2e-édition/dp/2409009727) * [Airbnb JavaScript Guide()](https://github.com/airbnb/javascript) **[⬆ back to top](#table-of-contents)** --- ## Learn GIT * [15 minutes to learn Git](https://try.github.io) 🔝 * [Git-it (Desktop App) - NodeSchool](https://github.com/jlord/git-it-electron) 🆓 🔝 * 🌍 [Learn Git on CodeCademy](https://www.codecademy.com/learn/learn-git) 💰🆓 🔝 * [Git-it is a (Mac, Win, Linux) Desktop App for Learning Git and GitHub](https://github.com/jlord/git-it-electron) 🆓 🔝 * [Learn Git Branching – Educational challenges](https://learngitbranching.js.org/) 🆓 * [Introduction to version control with Git - Microsoft Learn](https://docs.microsoft.com/en-gb/learn/paths/intro-to-vc-git/) 🆓 * [Git-it – Learn Git in a real terminal](http://jlord.us/git-it/) 🆓 * [Git CheatSheet](http://www.ndpsoftware.com/git-cheatsheet.html) 🆓 * [Git Essential Training - Lynda](https://www.lynda.com/Git-tutorials/Git-Essential-Training/100222-2.html) 💰 📹 * [Try Git](https://www.codeschool.com/courses/try-git) 🆓 * [Learn Git - Git Tutorials, workflows and commands](https://www.atlassian.com/git)🆓 **[⬆ back to top](#table-of-contents)** --- ## Tools * Essential * [Github](https://github.com/) 💰🆓 🔝 * Website auditors * [Checkbot](https://www.checkbot.io/) 💰🆓 🔝 * Playgrounds * [Codepen](https://codepen.io/) 💰🆓 🔝 * [CodeSandbox](https://codesandbox.io/) * [SassMeister](https://www.sassmeister.com/) * [JSFiddle](https://jsfiddle.net/) * [JSBin](https://jsbin.com/) * [Thimble](https://thimble.mozilla.org/en-US/) * Web design Tools * [Webflow](https://webflow.com/)🆓💰 * Editors * [Visual Studio Code](https://code.visualstudio.com/) 🆓 🔝 * [Sublime Text](https://www.sublimetext.com/) 🆓 * [Atom](https://atom.io/) 🆓 * [Brackets](http://brackets.io/) 🆓 * [NotePad++](https://notepad-plus-plus.org/) 🆓 * [Cloud9](https://c9.io/) 💰🆓 **[⬆ back to top](#table-of-contents)** --- ## Chat / Slack channels * [FEDs - Slack](https://feds.slack.com) * 🇫🇷 [Front-end France - Slack](https://frontendfr.slack.com) * 🇫🇷 [DevFr - Telegram](https://t.me/DevFr) --- ### Aggregators / News * [Smashing Magazine](https://www.smashingmagazine.com/) 🔝 * [CSS-Tricks](https://css-tricks.com/) 🔝 * [Front-End Stash](https://frontendstash.top/) 🔝 * [Codrops](https://tympanus.net/codrops/) 🔝 * [Front-End Front - Basically, front-end news](https://frontendfront.com/) * [Echo JS - JavaScript News](http://www.echojs.com/) * [A list Apart - Code](https://alistapart.com/topic/code) * [Scotch - Code Eat Sleep Loop](https://scotch.io/) **[⬆ back to top](#table-of-contents)** --- ## Newsletters * [Frontend Focus](https://frontendfoc.us/) * [CSS Weekly](http://css-weekly.com/) * [CSS-Tricks](https://css-tricks.com/newsletters/) * [JavaScript Weekly](http://javascriptweekly.com/) * [WebTools Weekly](https://webtoolsweekly.com/) * [Smashing Magazine](https://www.smashingmagazine.com/the-smashing-newsletter/) * [Sidebar](https://sidebar.io/) * [Responsive Design Weekly](http://responsivedesignweekly.com/) * [JSK Weekly](https://javascriptkicks.com/) * [WebRTC Weekly](https://webrtcweekly.com/) ## Contributing **Open an issue or a pull request to suggest changes or additions.** ### Contributors Check out all the super awesome [contributors](https://github.com/thedaviddias/Resources-Front-End-Beginner/graphs/contributors). ## Authors **[David Dias](https://twitter.com/thedaviddias)** ## License [![CC0](https://i.creativecommons.org/p/zero/1.0/88x31.png)](https://creativecommons.org/publicdomain/zero/1.0/) **[⬆ back to top](#table-of-contents)**
524
🚀 A command line tool aims to improve front-end engineer workflow and standard, powered by TypeScript.
English | [简体中文](./README.CN.md) <h1 align="center">Feflow</h1> <p align="center"> 🚀 A tool aims to improve front-end engineer workflow and standard, powered by TypeScript. </p> <br> [![npm][npm]][npm-url] [![Build Status][build-status]][build-status-url] [![Install Size][size]][size-url] [![Downloads][downloads]][downloads-url] [![lerna][lerna]][lerna-url] [![GitHub contributors][contributors]][contributors-url] [![Issue resolution][issue-resolution]][issue-resolution-url] [![PR's welcome][pr-welcome]][pr-welcome-url] ## Introduction Feflow is an engineering solution of Tencent's open source front-end field, which is committed to improving development efficiency and specification. ## Getting Started Let's start by installing Feflow with npm. ``` npm install @feflow/cli -g ``` There are three kinds of commands in Feflow - Native Commands - `fef config` - `fef help` - `fef info` - `fef install` - `fef uninstall` - `fef list` You can write a Feflow devkit or plugin to extends commands. More detail document can be found: - [Github Wiki](https://github.com/Tencent/feflow/wiki) - [Website](https://feflowjs.com/) ## Change Log This project adheres to [Semantic Versioning](http://semver.org/). Every release, along with the migration instructions, is documented on the GitHub [Releases](https://github.com/Tencent/feflow/releases) page. ## License [MIT](LICENSE.txt) [build-status]: https://travis-ci.org/Tencent/feflow.svg [build-status-url]: https://travis-ci.org/Tencent/feflow [contributors]: https://img.shields.io/github/contributors/Tencent/feflow.svg [contributors-url]: https://github.com/Tencent/feflow/graphs/contributors [downloads]: https://img.shields.io/npm/dw/@feflow/cli.svg [downloads-url]: https://www.npmjs.com/package/@feflow/cli [issue-resolution]: https://isitmaintained.com/badge/resolution/Tencent/feflow.svg [issue-resolution-url]: https://github.com/Tencent/feflow/issues [lerna]: https://img.shields.io/badge/maintained%20with-lerna-cc00ff.svg [lerna-url]: http://www.lernajs.io/ [npm]: https://img.shields.io/npm/v/@feflow/cli.svg [npm-url]: https://www.npmjs.com/package/@feflow/cli [pr-welcome]: https://img.shields.io/badge/PRs%20-welcome-brightgreen.svg [pr-welcome-url]: https://github.com/Tencent/feflow/blob/next/.github/CONTRIBUTING.md [size]: https://packagephobia.now.sh/badge?p=@feflow/cli [size-url]: https://packagephobia.now.sh/result?p=@feflow/cli
525
📘 Front-end developer roadmap in 2022.
# Front-End Developer Roadmap In 2022 > This repository aims to collect the most important concepts of front-end. Next, I will build a professional front-end knowledge map to help you master front-end development. * Front-End Developer Roadmap * 💡 React & Vue Ecosystem * High Quality Coding Guide * Data Structures & Algorithms Guide This list will continue to update… ### Front-End Developer Roadmap ![Front-End Developer Roadmap](./images/FrontEndDeveloperRoadmap.svg) Recommended Books * 《Professional JavaScript for Web Developers 4th Edition》 ### React & Vue Ecosystem ![React & Vue Ecosystem](./images/ReactVueEcosystem.svg) Recommended Project * [bestofjs](https://bestofjs.org/) ### High Quality Coding Guide ![CodingGuide](./images/HighQualityCodingGuide.svg) Recommended Books * 《Clean Code: A Handbook of Agile Software Craftsmanship》 * 《A Philosophy of Software Design》 * 《Refactoring: Improving the Design of Existing Code (2nd Edition)》 ### Data Structures & Algorithms Guide ![Data Structures & Algorithms](./images/DataStructuresAlgorithmsGuide.svg) Recommended Books * 《Introduction to Algorithms, 3rd Edition》 * 《Algorithms (4th Edition)》 ## Contribution If you think that these can be improved in anyway, please do suggest. * Open pull request with improvements * Discuss ideas in issues ## Support Please star ⭐️ the repository to show your support! Share it on Twitter or other places! ## License [![License: CC BY-NC-ND 3.0](https://img.shields.io/badge/License-CC%20BY--NC--ND%203.0-lightgrey.svg)](https://creativecommons.org/licenses/by-nc-nd/3.0/)
526
Eva.js is a front-end game engine specifically for creating interactive game projects.
# Eva.js (Interactive Game Engine) ![npm-version](https://img.shields.io/npm/v/@eva/eva.js) ![npm-size](https://img.shields.io/bundlephobia/minzip/@eva/eva.js) ![npm-download](https://img.shields.io/npm/dm/@eva/eva.js) English | [Chinese](./README_CN.md) ## Introduction Eva.js is a front-end game engine specifically for creating interactive game projects. **Easy to Use**: Eva.js provides out-of-box game components for developers to use right away. Yes, it's simple and elegant! **High-performance**: Eva.js is powered by efficient runtime and rendering pipeline ([Pixi.JS](http://pixijs.io/)) which makes it possible to unleash the full potential of your device. **Scalability**: Thanks to the ECS(Entity-Component-System) structure, you can expand your needs by highly customizable APIs. The only limitation is your imagination! ## Documentation You can find the Eva.js Documentation on [eva.js.org](https://eva.js.org), we appreciate your devotion by sending pull requests to [this repository](https://github.com/eva-engine/eva-engine.github.io). Checking out the [Live example](https://eva.js.org/playground). - [Quick Start](https://eva.js.org/#/tutorials/quickstart) - [Start Demo](https://github.com/eva-engine/start-demo) ## Usage ### With NPM ```bash npm i @eva/eva.js @eva/plugin-renderer @eva/plugin-renderer-img --save ``` ### In Browser ```html <script src="https://unpkg.com/@eva/[email protected]/dist/EVA.min.js"></script> ``` ### Example ```html <canvas id="canvas" ></canvas> ``` ```javascript import { Game, GameObject, resource, RESOURCE_TYPE } from '@eva/eva.js'; import { RendererSystem } from '@eva/plugin-renderer'; import { Img, ImgSystem } from '@eva/plugin-renderer-img'; resource.addResource([ { name: 'imageName', type: RESOURCE_TYPE.IMAGE, src: { image: { type: 'png', url: 'https://gw.alicdn.com/tfs/TB1DNzoOvb2gK0jSZK9XXaEgFXa-658-1152.webp', }, }, preload: true, }, ]); const game = new Game({ systems: [ new RendererSystem({ canvas: document.querySelector('#canvas'), width: 750, height: 1000, }), new ImgSystem(), ], }); const image = new GameObject('image', { size: { width: 750, height: 1319 }, origin: { x: 0, y: 0 }, position: { x: 0, y: -319, }, anchor: { x: 0, y: 0, }, }); image.addComponent( new Img({ resource: 'imageName', }) ); game.scene.addChild(image); ``` ## Questions For questions and support please use [Gitter](https://gitter.im/eva-engine/Eva.js) or [DingTalk](https://www.dingtalk.com/) (钉钉) to scan [this QR Code](https://gw.alicdn.com/imgextra/i3/O1CN01I0KDY41JkjGZ4xxks_!!6000000001067-2-tps-465-668.png). ## Issues Please make sure to read the [Issue Reporting Checklist](.github/ISSUE_TEMPLATE.md) before opening an issue. Issues not conforming to the guidelines may be closed immediately. ## Changelog [release notes](https://eva.js.org/#/others/changelog) in documentation. ## Contribute [How to Contribute](.github/HOW_TO_CONTRIBUTE.md) ## License The Eva.js is released under the MIT license. See [LICENSE file](./LICENSE).
527
This repository contains content which will be helpful in your journey as a front-end Web Developer
<!-- @format --> [![contributions welcome](https://img.shields.io/badge/contributions-welcome-brightgreen.svg?style=flat)](https://github.com/RitikPatni/Front-End-Web-Development-Resources/issues) [![GitHub issues](https://img.shields.io/github/issues/RitikPatni/Front-End-Web-Development-Resources.svg)](https://github.com/RitikPatni/Front-End-Web-Development-Resources/issues) [![GitHub forks](https://img.shields.io/github/forks/RitikPatni/Front-End-Web-Development-Resources.svg)](https://github.com/RitikPatni/Front-End-Web-Development-Resources/network) [![GitHub stars](https://img.shields.io/github/stars/RitikPatni/Front-End-Web-Development-Resources.svg)](https://github.com/RitikPatni/Front-End-Web-Development-Resources/stargazers) [![Twitter](https://img.shields.io/twitter/url/https/github.com/RitikPatni/Front-End-Web-Development-Resources.svg?style=social)](https://twitter.com/intent/tweet?text=Check%20this%20Amazing%20Resource:&url=https%3A%2F%2Fgithub.com%2FRitikPatni%2FFront-End-Web-Development-Resources) # Front-end development # Hi There <p> This is an open-source repository for all who want to learn front-end Development.</p> <br> <h2 align="center" ><strong>Front-end development</strong></h2><br> > **Front-end web development** is the practice of converting data to a graphical interface, through the use of HTML, CSS, and JavaScript, so that users can view and interact with that data. > <br> **Make sure to show your support by star mark & sharing the repository** # A List of Useful Resources for Front End Developers --- ## Table of Contents - [Front-end development](#front-end-development) - [Hi There](#hi-there) - [A List of Useful Resources for Front End Developers](#a-list-of-useful-resources-for-front-end-developers) - [Table of Contents](#table-of-contents) - [RoadMap](#roadmap) - [Useful](#useful) - [Learning](#learning) - [A11y](#a11y) - [YouTube Channels](#youtube-channels) - [Blogs](#blogs) - [Hiring](#hiring) - [Podcasts](#podcasts) - [Code Editors](#code-editors) - [Visual Studio Code Extensions](#visual-studio-code-extensions) - [Tools](#tools) - [CSS Frameworks](#css-frameworks) - [Icons](#icons) - [Colors](#colors) - [Typography](#typography) - [Design Inspiration](#design-inspiration) - [Animation Frameworks](#animation-frameworks) - [Stock Resources](#stock-resources) - [Geolocation](#geolocation) - [APIs](#apis) - [Mockups](#mockups) - [Books](#books) - [Challenges / Games](#challenges--games) - [Free Tools For Students](#free-tools-for-students) - [YouTube Videos](#youtube-videos) - [Testing](#testing) ## RoadMap - [Roadmap](https://roadmap.sh/frontend) - For a well described step-by-step roadmap for front-end developers. ![Free](https://img.shields.io/badge/-Free-brightgreen) ## Useful - [BGJar](https://bgjar.com/) - Free SVG background generator for your websites, blogs, and app. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Inspect](https://inspect.dev/) - inspect and debug your mobile web apps and websites on iOS devices directly from Mac or Windows. ## Learning - [A Complete Guide to Flexbox | CSS-Tricks](https://css-tricks.com/snippets/css/a-guide-to-flexbox/) - A comprehensive guide to the Flexbox Layout. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [A Complete Guide to Grid | CSS-Tricks](https://css-tricks.com/snippets/css/complete-guide-grid/) - A comprehensive guide to the Grid Layout. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Command Line Power User](https://commandlinepoweruser.com/) - A video series for web developers on learning a modern command-line workflow with ZSH, Z, and related tools. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [CSS Grid](https://cssgrid.io/) - Complete video course all about CSS Grid ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Best Of JS](https://bestof.js.org/) A site to check the best GitHub Repos for your favourite js framework ![Free](https://img.shields.io/badge/-Free-brightgreen) - [CodeCademy](https://www.codecademy.com/) - A series of interactive courses teaching the world how to code. Offering free and paid subscriptions across a variety of languages. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Codementor](https://www.codementor.io/experts) - A tool to get help from experienced developers in various coding languages on your learning journey. ![Paid](https://img.shields.io/badge/-Paid-blue) - [Scaler Topics](https://www.scaler.com/topics/) - A platform to learn programming languages like HTML, Java, Javascript, Python etc. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Conquering Responsive Layouts](https://courses.kevinpowell.co/conquering-responsive-layouts) - Made by Kevin Powell(https://twitter.com/KevinJPowell). This course takes you through everything you need to know to create responsive layouts in his brilliant 21-day course. ![Paid](https://img.shields.io/badge/-Paid-blue) - [Coursera](https://www.coursera.org/) - A selection of courses from highly reputable schools like Stanford and Yale. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [CSS Almanac | CSS-Tricks](https://css-tricks.com/almanac/) - A quick reference guide to many features of CSS. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [CSS Grid Playground](https://mozilladevelopers.github.io/playground/css-grid/) - A visual guide curated by the Mozilla team to help you learn CSS's grid layout features with lots of code example and demos. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Design Resources](http://designresources.party/) - Design Resources from Skullface. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [dev.to](https://dev.to/) - Where programmers share ideas and help each other grow. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [DevProjects](https://www.codementor.io/projects) - A free community consists of curated projects from senior developers to help you bridge the gap between theory and practice. ![Free](https://img.shields.io/badge/-Free-brightgreen) ! - [Dicoding Academy](https://dicoding.com/) - Where everyone can learn programming from fundamentals (**Available only in Bahasa Indonesia**). ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [edx](https://www.edx.org/) - A series of University-level courses from Harvard, MIT, Wharton, and more. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [EggHead](https://egghead.io/) - Web development video tutorials in "bite-size" segments. Has both free and "Pro" (paid) memberships. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Enboard | Front End Resources](https://enboard.co/frontend/) - Organized resources about front end development. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Flexbox](https://flexboxzombies.com/p/flexbox-zombies) - Level up your Flexbox knowledge – an online, Zombie-centric story course. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [freeCodeCamp](https://www.freecodecamp.org) - A free resource incorporating programming projects and interview preparation for developer jobs. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Frontend Masters](https://frontendmasters.com/) - Web development video tutorials from industry leaders (updated frequently). Has both free (limited-time) and paid memberships. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Full Stack Open](https://fullstackopen.com/en/) - Course on Full Stack Web Development by University of Helsinski. Learn React, Redux, Node.js, MongoDB, GraphQL and TypeScript in one go! This course will introduce you to modern JavaScript-based web development. The main focus is on building single page applications with ReactJS that use REST APIs built with Node.js. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [GeeksforGeeks](https://geeksforgeeks.org/) - A computer science portal for geeks. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Khan Academy](https://www.khanacademy.org/computing) - A universal online learning platform that also provides the important courses for developers. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [LearnAnything](https://learn-anything.xyz/) - Search interactive mind maps to learn anything. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Learn JavaScript](https://learnjavascript.online/) - Learn JavaScript in an interactive environment. Read short lessons, take notes, and complete challenges directly in your browser. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Mastering Markdown](https://masteringmarkdown.com/) - A Mini Series that will change how you write documentation. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Mozilla Developer Network](https://developer.mozilla.org/en-US/) - The latest information about Open Web technologies. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Complete web development tutorials](https://lyty.dev/) -Lyty.dev complete web development tutorials with well explained examples for free. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Pluralsight](https://www.pluralsight.com/) - Unlimited online developer training from industry experts. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Saylor](https://www.saylor.org/) - An open, online learning solution offering college credit opportunities for students. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Scrimba](https://www.scrimba.com/) - Code-screencast-based learning in a variety of languages. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Scotch](https://scotch.io/) - Many Web development courses. Has both free and "Premium" (paid) memberships. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Search Courses](https://hackr.io/) - A selection of trending courses and tutorials. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [SoloLearn](https://www.sololearn.com/)- A free portal for learning web development. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Team Treehouse](https://teamtreehouse.com/) - Self-paced learning across a variety of languages and subjects. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [The Modern JavaScript Tutorial](https://javascript.info/) - Everything about the Javascript Language. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [The Odin Project](https://www.theodinproject.com/) - An Open-Source Curriculum for Learning Web Development ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Tutorials point](https://www.tutorialspoint.com/html/) - Tutorials for many different languages with interactive code examples. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Udacity](https://in.udacity.com/) - Learn anything online – deep learning, machine learning, front end languages. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Udemy](https://www.udemy.com/) - An online learning and teaching marketplace. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Watch and Code](https://watchandcode.com) - The computer science school for students that demand intellectual rigor and depth. ![Paid](https://img.shields.io/badge/-Paid-blue) - [W3School](https://www.w3schools.com/) - Web development reference library. Covers HTML, CSS, Javascript (jQuery, AJAX, and more), as well as some server-side languages. Includes descriptions and interactive examples. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Web APIs | MDN](https://developer.mozilla.org/en/docs/Web/API) - Everything a beginner needs to know about Web APIs. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Web Design in 4 minutes](http://jgthms.com/web-design-in-4-minutes/) by Jeremy Thomas creator of [Bulma CSS](http://bulma.io/) and [marksheet.io](http://marksheet.io). ![Free](https://img.shields.io/badge/-Free-brightgreen) - [WesBos](http://wesbos.com/) - Free and premium courses in web development ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Web Dev Tricks](https://webdevtrick.com) - All your CSS, js, jQuery trending codes with source codes in one place. Your handy partner for all types of modern web development and designs. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [web.dev](https://web.dev/) - Guides and resources for modern fast websites by google developers. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Become a Front-End Web Developer](https://www.lynda.com/learning-paths/Web/become-a-front-end-web-developer) - Develop competency with HTML, CSS, JavaScript, and jQuery. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Web Skills](https://andreasbm.github.io/web-skills/) - A visual overview of useful skills to learn as a web developer. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [The App Brewery](https://www.appbrewery.co/) - All in one platform to cover your web development skills ![Paid](https://img.shields.io/badge/-Paid-blue) - [Full Stack open 2021](https://fullstackopen.com/en/) - This course serves as an introduction to modern web application development with JavaScript. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Devtools Tech](https://devtools.tech?ref=frontend-web-development-resources-github-repo) - A free interview preparation platform for Frontend Engineers with a focus on high quality real world programming questions. ![Free](https://img.shields.io/badge/-Free-brightgreen) **[⬆ back to top](#table-of-contents)** --- ## A11y - [A11y Style Guide](https://a11y-style-guide.com/style-guide/section-resources.html) - A living style guide or pattern library, generated from KSS documented styles...with an accessibility twist. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Axe](https://www.deque.com/axe/) - Accessibility testing toolkit. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Colour Contrast Analyser](https://developer.paciellogroup.com/resources/contrastanalyser/) - CCA helps you determine the legibility of text and the contrast of visual elements, such as graphical controls and visual indicators. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Deque University](https://dequeuniversity.com/) - Online courses on web and mobile accessibility skills. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [W3C Intro to Web Accessibility](https://www.w3.org/WAI/fundamentals/accessibility-intro/) - Strategies, standards, resources to make the Web accessible to people with disabilities. ![Free](https://img.shields.io/badge/-Free-brightgreen) **[⬆ back to top](#table-of-contents)** --- ## YouTube Channels - [Adrian Twarog](https://www.youtube.com/c/AdrianTwarog)- Tutorials on HTML,CSS,Bootstrap,JavaScript,React,React Native,UI/UX and cool Designing stuff ![Free](https://img.shields.io/badge/-Free-brightgreen) - [1stWebDesigner](https://www.youtube.com/user/1stwebdesigner/) - Tutorials on WordPress, PSD to HTML ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Brad Hussey](https://www.youtube.com/user/hussey17) - Tutorials on Bootstrap, SASS, jQuery, PHP, Freelancing ![Free](https://img.shields.io/badge/-Free-brightgreen) - [CSS Tricks](https://www.youtube.com/channel/UCADyUOnhyEoQqrw_RrsGleA) - YouTube channel of well-known web design and development blog CSS Tricks by Chris Coyier. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [CSS Tutorials](https://www.youtube.com/watch?v=rxjFI4RlR9A&list=PLw9zMOoodWb4OtAt8aDKqklEJDqZHYXBm) - Tutorials in Hindi by Husain sir covering all the basics of CSS. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Coder’s Guide](https://www.youtube.com/user/CodersGuide/) - Tutorials on HTML, CSS, JavaScript, Bootstrap ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Codevolution](https://www.youtube.com/c/Codevolution/featured) - Tutorials on React, Vue, Angular, MongoDB, JavaScript, MEAN stack, HTML, CSS. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Clever Programmer](https://www.youtube.com/c/CleverProgrammer/videos) - Tutorials on React, MongoDB, JavaScript, MERN stack, HTML, CSS, React Native. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Derek Banas](https://www.youtube.com/user/derekbanas) - Tutorials on C#, Visual Basic, Django, Python, NodeJS, AngularJS, MongoDB, jQuery, JavaScript, CSS, Ruby on Rails, Java, SQLite, Android, HTML, PHP, Objective C ![Free](https://img.shields.io/badge/-Free-brightgreen) - [DevTips](https://www.youtube.com/user/DevTipsForDesigners) - Tutorials on HTML5, CSS, SASS, Bootstrap, Foundation, jQuery, Ruby on Rails, GitHub. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [DesignCourse](https://www.youtube.com/user/DesignCourse) - Tutorials on UI/UX Design or HTML5, CSS, SASS, Animation Library. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Dennis Ivy](https://www.youtube.com/channel/UCTZRcDjjkVajGL6wd76UnGg) - Tutorials on Django & Flask Full-Stack Web Development Projects ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Elzero Web School](https://www.youtube.com/user/OsamaElzero/) - **Arabic only** ![Free](https://img.shields.io/badge/-Free-brightgreen) - [freeCodeCamp](https://www.youtube.com/channel/UC8butISFwT-Wl7EV0hUK0BQ/) - Tutorials on JQuery, JavaScript, React, Math, Science, Software Engineering, Open source software ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Fun Fun Function](https://www.youtube.com/channel/UCO1cgjhGzsSYb1rsB4bFe4Q) - Tutorials on JavaScript, React, Functional Programming, GraphQL, Life as a Developer ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Google Chrome Developers](https://www.youtube.com/user/ChromeDevelopers) - Latest and greatest talks on modern web development with pro-tips, insights, and techniques to help you level up your web development skill. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Kevin Powell](https://www.youtube.com/user/KepowOb) - Tutorials on HTML, CSS, Helping to Understand Css Better in Simple Way ![Free](https://img.shields.io/badge/-Free-brightgreen) - [LearnCode.academy](https://www.youtube.com/user/learncodeacademy/) - Tutorials on HTML, CSS, jQuery, JavaScript, React JS / Redux, Node JS ![Free](https://img.shields.io/badge/-Free-brightgreen) - [LevelUpTuts](https://www.youtube.com/user/LevelUpTuts/) - Tutorials on HTML, CSS, SASS, WordPress, Magento,Drupal, React, Meteor ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Mackenzie Child - Design to Code Challenge](https://www.youtube.com/watch?v=gnizXEUupsA&list=PL23ZvcdS3XPJZDL1M-kxoPF06cl9hfVB_) - Tutorials on UI, how to design & code multiple styles of sites. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [The Coding Train](https://www.youtube.com/user/shiffman/videos) - Tutorials on JavaScript, Node, Machine Learning, Neural Networks, Algorithms ![Free](https://img.shields.io/badge/-Free-brightgreen) - [The Net Ninja](https://www.youtube.com/channel/UCW5YeuERMmlnqo4oq8vwUpg/) - Tutorials on HTML, CSS, jQuery, JavaScript, Git and GitHub, Bootstrap, MangoDB, PSD to WordPress, PSD to HTML, and many more. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [TheDigiCraft](https://www.youtube.com/user/TheDigiCraft) - Tutorials on HTML, CSS, jQuery, PHP, Ajax, Bootstrap, MySQL. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [thenewboston](https://www.youtube.com/user/thenewboston) - Tutorials on ECMAScript 6, React JS / Redux, Django, Angular 2, Gulp, Git, Python, SEO, SASS, SCSS, Grunt, Illustrator, MongoDB, PHP, Java, Ruby, Objective C ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Traversy Media](https://www.youtube.com/user/TechGuyWeb/) - Tutorials on HTML, CSS, jQuery, PHP, Ajax, Bootstrap, MySQL, ECMAScript 6, React JS / Redux, Django, Angular, Ionic, Gulp, Git, Python, Node JS, PHP, Laravel, Cake PHP, Symfony, CodeIgniter, Programming Tips ![Free](https://img.shields.io/badge/-Free-brightgreen) - [CodeWithHarry](https://www.youtube.com/watch?v=6mbwJ2xhgzM&list=PLu0W_9lII9agiCUZYRsvtGTXdxkzPyItg) - Tutorials on HTML, CSS, Javascript, Node JS, MongoDB and hosting. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Programming With Mosh](https://www.youtube.com/watch?v=Ke90Tje7VS0) - Tutorial on React, Nodejs, Python, Javascript, Angular,Typescipt and C#. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Dev Ed](https://www.youtube.com/c/DevEd/featured) - Learn web development, web design, 3d modelling, tools like figma and more ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Web Dev Simplified](https://www.youtube.com/channel/UCFbNIlppjAuEX4znoulh0Cw) - Learn Website Developments with Html , Javascript , Css and other Frameworks with same projects and more ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Mozilla Developer](https://www.youtube.com/channel/UCh5UlGiu9d6LegIeUCW4N1w) - Videos for helping you with your work as a web designer, web developer, or person involved making websites or web apps ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Academind](https://www.youtube.com/channel/UCSJbGtTlrDami-tDGPUV9-w) - There's always something to learn. Whether you want to have look at Angular Tutorials or Guides, Vue.js, other Frontend Development Content or Data Science Topics or anything else - you're probably right![Free](https://img.shields.io/badge/-Free-brightgreen) - [Sonny Sangha](https://www.youtube.com/channel/UCqeTj_QAnNlmt7FwzNwHZnA) Project Tutorials on React, Redux, Next JS & React Native![Free](https://img.shields.io/badge/-Free-brightgreen) - [WB Web Development](https://www.youtube.com/c/WBWeb/) - Tutorials on HTML, CSS, Bootstrap, SASS, JavaScript, Git and GitHub, MongoDB, NodeJS, ReactJS ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Online Tutorials](https://www.youtube.com/c/OnlineTutorials4Designers)- Top class contents on front end web development. Has exclusive tutorials on HTML,CSS and javascript with amazing effects. A must visit for all front end developers![Free](https://img.shields.io/badge/-Free-brightgreen) - [Akshay Saini](https://www.youtube.com/c/akshaymarch7)- Videos on Frontend Interview Tips, Interview Experiences, and specially core concepts of Javascript. - [Devtools Tech](https://www.youtube.com/c/devtoolstech)- Videos on Advanced Frontend Concepts, Interview Questions & Experiences, and focus on intermediate to advanced JavaScript concepts. ![Free](https://img.shields.io/badge/-Free-brightgreen) **[⬆ back to top](#table-of-contents)** --- ## Blogs - [10 Need to Know JavaScript Concepts Courses](https://scotch.io/courses/10-need-to-know-javascript-concepts) - From basic to advance Javascript concept explained in simple way that every Javascript developer need to know. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [100 Ways to be more creative](https://medium.com/the-1000-day-mfa/100-ways-to-be-more-creative-44e4a491b456) - 100 Ways to be More Creative from Shaunta Grimes. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [2017 Design RoundUp](https://tympanus.net/codrops2017/) - Collection of all Codrops web development resources for 2017. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [50 Things You [Probably] Forgot To Design – UX Power Tools – Medium](https://medium.com/ux-power-tools/50-things-you-probably-forgot-to-design-7a288b0ef914) - 50 Things You Probably Forgot to Design from Jon Moore ![Free](https://img.shields.io/badge/-Free-brightgreen) - [ACM Month Of Code 2k17: Building Moodify](https://medium.com/@ajay.ns08/acm-month-of-code-2k17-building-moodify-d5d9e0c52ca7) - ACM Month Of Code 2k17: Building Moodify from Ajay NS. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [An Illustrated Guide for Setting Up Your Website Using GitHub &amp; Cloudflare](https://medium.freecodecamp.com/an-illustrated-guide-for-setting-up-your-website-using-github-cloudflare-5a7a11ca9465) - An illustrated guide to setting up your website using GitHub and Cloudflare from Karan Thakkar. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Brad Frost Blog](https://bradfrost.com/) - Author of Atomic Design, building design systems in CSS & HTML. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Best Free Fonts](https://www.websiteplanet.com/blog/best-free-fonts/) - 70+ Best Free Fonts for Designers – Free for Commercial Use in 2019 ![Free](https://img.shields.io/badge/-Free-brightgreen) - [CSS Animations vs the Web Animations API: A Case Study](https://bitsofco.de/css-animations-vs-the-web-animations-api/) ![Free](https://img.shields.io/badge/-Free-brightgreen) - [CSS Tricks](https://css-tricks.com/) - Daily articles about CSS, HTML, JavaScript, and all things related to web design and development. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Design and Creativity quotes](http://blog.invisionapp.com/design-and-creativity-quotes/) - 72 Quotes about Design and Creativity from Margaret Kelsey. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Design Resources](http://designresources.party/) - List of resources for working in and learning about design. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Design For Change](https://medium.muz.li/design-for-change-439fc7ec6bb9?source=grid_home---8-5969bf7021a3-----3-1-----------------10) - Article on regenerative and sustainable designing by Viba Mohan. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Domain registrars DNS and hosting](https://medium.freecodecamp.com/domain-registrars-dns-and-hosting-353e4163a19) - Domain Registrars, DNS, and Hosting from Kirby Kohlmorge ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Beginners guide to Gatsby](https://medium.freecodecamp.org/setting-up-and-getting-used-to-gatsby-1fc27985ae8a) - Gatsby.js: How to set up and use the React Static Site Generator from Aman Mittal ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Examples of everything in ECMAScript in 2016,2017, 2018](https://medium.freecodecamp.org/here-are-examples-of-everything-new-in-ecmascript-2016-2017-and-2018-d52fa3b5a70e) ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Flavio Copes Tutorials](https://flaviocopes.com/) - Daily tutorials about Javascript and Web development by Flavio Copes ![Free](https://img.shields.io/badge/-Free-brightgreen) - [From URL to Interactive](https://alistapart.com/article/from-url-to-interactive/) - Explanation of how our world wide web works. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Frontend Weekly](https://frontendweekly.co/) - The best articles, links and news related to Frontend Development delivered once a week to your inbox. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [How I Animated the bitsofcode Logo with CSS](https://bitsofco.de/how-i-animated-the-bitsofcode-logo/) - Process article on a custom CSS animation. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [How the minmax() Function Works](https://bitsofco.de/how-the-minmax-function-works/) - Explanation of the CSS minmax() function, which can be used for CSS grid layouts. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [How to Build an Impressive Portfolio When You're New to Tech](https://skillcrush.com/2015/03/12/impressive-tech-portfolio/) - How to Build an Impressive Portfolio When You’re New to Tech from Randle Browning ![Free](https://img.shields.io/badge/-Free-brightgreen) - [How to build a random quote generator with JavaScript and HTML, for absolute beginners](https://medium.freecodecamp.com/creating-a-bare-bones-quote-generator-with-javascript-and-html-for-absolute-beginners-5264e1725f08#.jbxuk5hiw) - How to Build a Random Quote Generator with JavaScript and HTML, for Absolute Beginners from Sophanarith Sok. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [How to build your first Vue Component](https://medium.freecodecamp.org/build-your-first-vue-js-component-2dc204bca514) - Beginner project tutorial to build a Vue Component by Sarah Dayan. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Let’s code a Neural Network from scratch — Part 1 – TypeMe – Medium](https://medium.com/typeme/lets-code-a-neural-network-from-scratch-part-1-24f0a30d7d62) - Let’s Code a Neural Network from Scratch from Charles Fried ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Music Player Inspirations](https://medium.muz.li/music-player-inspiration-2017-999403b2a85e) - Music Player Inspiration 2017 from Muzli. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [The Front End CheckList](https://codeburst.io/the-front-end-checklist-8b2292fdda44) - An Exhaustive List of all the Elements you need to have/test Before Launching your Website To Production. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [What it’s like to build and market a chatbot when you’re only 14 years old](https://medium.freecodecamp.com/the-ups-and-downs-of-building-and-marketing-a-chat-bot-when-youre-14-8a072830b43c#.eosguojxg) - What it’s Like to Build and Market a Chatbot When You’re Only 14 Years Old from Alec Jones ![Free](https://img.shields.io/badge/-Free-brightgreen) - [What's the Deal with Collapsible Margins?](https://bitsofco.de/collapsible-margins/) - Explanation of CSS' Collapsing Margins feature. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [A well curated list for UX](https://blog.prototypr.io/my-ux-resource-list-96ab9e36ac24) - Curated resource list for UX by fernandocomet. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Airbnb Open source](https://airbnb.io/) - Engineering and Data Science articles and open source projects. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [The Cost of JS](https://medium.com/@addyosmani/the-cost-of-javascript-in-2018-7d8950fbb5d4) - How to deliver JavaScript efficiently for valuable user experience by Addy Osmani. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [CSS Scroll-Snap](https://css-tricks.com/practical-css-scroll-snapping/) - Tutorial on CSS scroll snapping, which allows you to lock the viewport after a user has finished scrolling. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Preload, Prefetch and priorities in chrome](https://medium.com/reloading/preload-prefetch-and-priorities-in-chrome-776165961bbf) - Article on how web loading primitives work on Chrome's neworking stack by Addy Osmani. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Learning Git for yourself](https://gitbook.tw/) - Traditional Chinese ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [IDEs for web Developers](https://websitesetup.org/best-ide-software/) - Factors to consider when choosing an IDE for web development and examples of good options. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [The Top 8 Weather APIs for 2020](https://www.climacell.co/blog/top-8-weather-apis-for-2020/) - Top 8 Weather APIs for 2020 - The Best Free Weather APIs for Developers - [Digital Ocean community Tutorials](https://www.digitalocean.com/community/tutorials) - A free tutorial collection from experts. All contributted from digital ocean community. - [React for Beginners – A React.js Handbook for Front End Developers](https://www.freecodecamp.org/news/react-beginner-handbook/) - A React.js Handbook for Front End Developers - [Ultimate React Resources](https://dev.to/hulyakarakaya/ultimate-react-resources-obl) - The blog includes blog posts, free e-books, Github Repos with curated lists, practical implementation of React.js in the real world with working code. - [Complete Introduction to CSS Grid](https://dev.to/cenacr007_harsh/complete-introduction-to-css-grid-2ffh) - A blog to learn the fundamentals of CSS grid by building different complex layouts. - [Rado's Blog)](https://blog.rstankov.com/) - A blog consisiting of articles on React Dependencies and Implementation, GraphQl and Lot more! - [Monica Powell Blog](https://aboutmonica.com/writing/) - An awesome blog on JavaScript, React, Gatsby and Git. - [Devtools Tech](https://www.devtools.tech/resources/all?ref=frontend-web-development-resources-github-repo) - Carefully curated high quality resources for Frontend Engineers. ![Free](https://img.shields.io/badge/-Free-brightgreen) ### Hiring - [Two Great Places to Discover Tech Talent and How to Attract Them](where-to-find-tech-talent.md) - Hiring tech talent in 2020 **[⬆ back to top](#table-of-contents)** --- ## Podcasts - [Coding Blocks](https://www.codingblocks.net/) - Software development podcasts by a team of professional programmers. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Frontend Happy Hour](https://frontendhappyhour.com/) - Front end, software, and career development podcasts by industry panelists. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [JavaScript Jabber](https://devchat.tv/js-jabber) - Podcasts for JavaScript developers. Website also offers many other programming-related podcasts. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Syntax](https://syntax.fm/) - Front end development podcasts by Wes Bos and Scott Tolinski from Level Up Tuts. ![Free](https://img.shields.io/badge/-Free-brightgreen) **[⬆ back to top](#table-of-contents)** --- ## Code Editors - [Atom](https://atom.io/) - Atom is a text editor that's modern, approachable, yet hackable to the core—a tool you can customize to do anything but also use productively without ever touching a config file. **Open Source** | **All Platforms** ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Brackets](http://brackets.io/) - With focused visual tools and preprocessor support, Brackets is a modern text editor that makes it easy to design in the browser. It's crafted from the ground up for web designers and front-end developers. **Open Source** | **All Platforms** ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Geany](https://geany.org/) - Geany is a small and lightweight integrated development environment. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [IntellijIDEA](https://www.jetbrains.com/idea/) - A universal IDE from JetBrains. It has code-completion, integrationa, and Version Control System (VCS). ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Notepad++](https://notepad-plus-plus.org/) - Notepad++ is a free (as in "free speech" and also as in "free beer") source code editor and Notepad replacement that supports several languages. **Windows Only** ![Free](https://img.shields.io/badge/-Free-brightgreen) -[Pycharm](https://www.jetbrains.com/pycharm/)-Used specially for python language,It provides code analysis,a graphical debugger,an integrated unit tester,integration with version control systems and supports web development with Django as well as data science with Anaconda. **All Platforms** | **Open Source** ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Sublime Text](https://www.sublimetext.com/) - A sophisticated text editor for code, markup and prose. **All Platforms** ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Vim](https://www.vim.org/) - Vim is a highly configurable text editor for efficiently creating and changing any kind of text. It is included as "vi" with most UNIX systems and with Apple OS X. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Visual Studio Code](https://code.visualstudio.com/) - Code editing Redefined. It has syntax highlighting and autocompletion with IntelliSense, Git commands built-in, Extensible and customizable. **Open Source** | **All Platforms** ![Free](https://img.shields.io/badge/-Free-brightgreen) - [WebStorm](https://www.jetbrains.com/webstorm/) - The smartest JavaScript IDE, WebStorm is an integrated development environment for JavaScript and related technologies. **All Platforms** ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [UltraEdit](https://www.ultraedit.com/) - UltraEdit is a powerful HTML and Code editor available for Mac, Windows, and Linux. It comes with a built-in file comparison utility, autocompletion, advanced layout, multi-tab, multi-pane editors, and syntax highlighting for the most popular programming languages. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Nano](https://www.nano-editor.org) - GNU nano is a text editor for Unix-like OS's. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [StackBlitz](https://stackblitz.com/) - An online open-source powerful code editor for JavaScript Frameworks and Libraries, with some awesome features such as GitHub Imports, Live Server and direct commit from the Editor to Github! ![Free](https://img.shields.io/badge/-Free-brightgreen) **[⬆ back to top](#table-of-contents)** ### Visual Studio Code Extensions - [Auto Rename Tag](https://marketplace.visualstudio.com/items?itemName=formulahendry.auto-rename-tag) - When you rename one HTML/XML tag, automatically rename the paired HTML/XML tag. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Better Comments](https://marketplace.visualstudio.com/items?itemName=aaron-bond.better-comments) - This extension color codes various types of comments to give them different significance and stand out from the rest of your code. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Bracket Pair Colorizor](https://marketplace.visualstudio.com/items?itemName=CoenraadS.bracket-pair-colorizer) - Colors matching brackets to make your code much more readable - very helpful. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Code Spell Checker](https://marketplace.visualstudio.com/items?itemName=streetsidesoftware.code-spell-checker) - A basic spell checker that works well with camelCase code. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [ES Lint](https://marketplace.visualstudio.com/items?itemName=dbaeumer.vscode-eslint) - Javascript linter for highlighting code errors and best practices. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Formatting Toggle](https://marketplace.visualstudio.com/items?itemName=tombonnike.vscode-status-bar-format-toggle) - A VS Code extension that allows you to toggle the formatter (Prettier, Beautify, …) ON and OFF with a simple click. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Git History](https://marketplace.visualstudio.com/items?itemName=donjayamanne.githistory) - View git log, file history, compare branches or commits ![Free](https://img.shields.io/badge/-Free-brightgreen) - [GitLens](https://marketplace.visualstudio.com/items?itemName=eamodio.gitlens) - Supercharge the Git capabilities built into Visual Studio Code — Visualize code authorship at a glance via Git blame annotations and code lens, seamlessly navigate and explore Git repositories, gain valuable insights via powerful comparison commands, and so much more. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [JS Snippets](https://marketplace.visualstudio.com/items?itemName=xabikos.JavaScriptSnippets) - This extension contains code snippets for JavaScript in ES6 syntax for VS Code editor (supports both JavaScript and TypeScript). ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Live server](https://marketplace.visualstudio.com/items?itemName=ritwickdey.LiveServer) - A Quick Development Live Server with live browser reload. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Material Icon Theme](https://marketplace.visualstudio.com/items?itemName=PKief.material-icon-theme) - Google Material themed icon pack. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Path Intellisense](https://marketplace.visualstudio.com/items?itemName=christian-kohler.path-intellisense) - As you start typing a path in quotations, you will get intellisense for directories and file names. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Peacock](https://marketplace.visualstudio.com/items?itemName=johnpapa.vscode-peacock) - Subtly change the workspace color of your workspace. Ideal when you have multiple VS Code instances and you want to quickly identify which is which. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Polacode](https://marketplace.visualstudio.com/items?itemName=pnp.polacode) - You know those fancy code screenshots you see in articles and tweets? Well, most likely they came from Polacode. It's super simple to use. Copy a piece of code to your clipboard, open up the extension, paste the code, and click to save your image! ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Prettier](https://marketplace.visualstudio.com/items?itemName=esbenp.prettier-vscode) - Format your code automatically on save. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Quokka.js](https://marketplace.visualstudio.com/items?itemName=WallabyJs.quokka-vscode) - Quokka.js is a developer productivity tool for rapid JavaScript / TypeScript prototyping. Runtime values are updated and displayed in your IDE next to your code, as you type. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Settings Sync](https://marketplace.visualstudio.com/items?itemName=Shan.code-settings-sync) - Settings Sync extension save your setting off in Github. Then, you can load them to any new version of VS Code with one command. ![Free](https://img.shields.io/badge/-Free-brightgreen) **[⬆ back to top](#table-of-contents)** --- ## Tools - [API Directory | ProgrammableWeb](https://www.programmableweb.com/apis/directory) ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Animista](http://animista.net/) - CSS animation presets/generator ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Better Code Hub](https://bettercodehub.com/repositories) - Checks GitHub codebase against software engineering guidelines and gives feedback. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Browserling](https://www.browserling.com/) - Live interactive cross-browser testing on virtual machines. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [LambdaTest](https://www.lambdatest.com/) - Test websites & web apps on 2000+ browsers & OS. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [BrowserStack](https://www.browserstack.com/) - Test websites and mobile apps on different browsers and mobile devices. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Can I use...](http://www.caniuse.com/) - Support tables for HTML5, CSS3, etc. on desktop and mobile browsers ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Checkbot](https://www.checkbot.io/) - Browser extension that tests websites for SEO, speed and security issues ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Codepen](https://codepen.io/) - Social development environment where you can write code in the browser and see results as you build. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Codeply](https://www.codeply.com/) - A HTML, CSS, JavaScript editor playground for designers & developers to compare, prototype and test frontend frameworks.![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Codesandbox](https://codesandbox.io/) - Instant IDE and prototyping tool for web development. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Create a new fiddle - JSFiddle](https://jsfiddle.net/) - Test JS, CSS, HTML, or CoffeeScript in an online code editor. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Critical Path CSS Generator - by Jonas Ohlsson](https://jonassebastianohlsson.com/criticalpathcssgenerator/) - Reduces the amount of CSS the browser has to go through to render a webpage. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [CrossBrowserTesting App](https://app.crossbrowsertesting.com/livetests/run) - Web service for running functional web tests on mobile and desktop web browsers. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [CSS cheat sheet](https://adam-marsden.co.uk/css-cheat-sheet) - A very easy to use one page reference for css selectors and properties. It also includes categories for flexbox and grid. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [CSS Minifier](https://cssminifier.com/) - Minify your CSS files! ![Free](https://img.shields.io/badge/-Free-brightgreen) - [CSS Reference](https://cssreference.io/) - A free visual guide to CSS. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [CSS Triggers](https://csstriggers.com/) - Tells you what gets triggered when mutating a given CSS property. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [CSS Filters](https://www.cssfilters.co/) - Interactive CSS filter generator ![Free](https://img.shields.io/badge/-Free-brightgreen) - [ColorLisa](http://colorlisa.com/) - Color palette generator based on great artists ![Free](https://img.shields.io/badge/-Free-brightgreen) - [DirtyMarkup](https://dirtymarkup.com/) - Tidy up your HTML, CSS, and JavaScript code. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [ExtendsClass](https://extendsclass.com/) - Provides tools to add features directly usable in the browser. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Favicon Generator](http://www.favicon-generator.org/) - Upload an image and generate a favicon for your website. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Favicon Generator for iOS/Google Progressive Web App Manifest](https://realfavicongenerator.net/) - Online tool to test favicons on different platforms. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Free Developer Stuff](https://freestuff.dev/) - List of free stuff for developer by developer to use. Some services are free forever or have a free tier at least for 1 year. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Free for Developers](https://free-for.dev/) - This website has an extensive amount of free and paid resource lists curated not only for frontend developers but also for any kind of developer. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Generate favicon based on text](https://favicon.io/) - Generate a favicon from text, an image, or emojis. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Get Waves](https://getwaves.io/) - Generate many types of SVG waves for use in web design. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Glitch](https://glitch.com/) - Glitch is like working together in Google Docs–multiple people can work on the same project at the same time. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Graphic Generator](https://www.norio.be/graphic-generator/) - Generates graphics for some common front end applications. - [Google Analytics](https://analytics.google.com/) - Web service that tracks and reports website traffic. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Google APIs Explorer](https://developers.google.com/apis-explorer/#p/) - Tool to interactively explore various Google APIs. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Javascript Console in Sublime Text](https://pawelgrzybek.com/javascript-console-in-sublime-text/) - Tutorial to test JavaScript and execute it via build systems in Sublime Text 3. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [jQuery mega cheat sheet](https://cdn.makeawebsitehub.com/wp-content/uploads/2015/09/jquery-mega-cheat-sheet-Printable.pdf) - Cheat sheet of jQuery selectros, manipulation, events, and more in PDF format. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [JS Bin](http://jsbin.com/?html,output) - Live pastebin for HTML, CSS, and JS, as well as a range of processors. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Lighthouse](https://developers.google.com/web/tools/lighthouse) - Open source, automated tool for improving the quality of webpages. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Modern JavaScript cheat sheet](https://mbeaudru.github.io/modern-js-cheatsheet/) - This is an excellent collection of JavaScript Tips and concept by Manuel Beaudru works as a nice overview of many of the things you'll need to be familiar with if you're just getting started with JavaScript and other related frameworks. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Node Package Manager(npm)](https://www.npmjs.com) - Package manager for Javascript. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Yarn](https://yarnpkg.com) - Package manager for Javascript, Like npm. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Responsinator](http://www.responsinator.com/) - Replicate how responsive sites will look on popular devices. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [React cheat sheet](https://reactcheatsheet.com/) - A documentation based website also a progressive web app which means that works well even in offline. You can search by keyword or select one of the predefined filters. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Responsive Grid System](http://www.responsivegridsystem.com/) - Generate flexible grids to create a responsive website. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Regular Expression (Regex) Editor](https://rubular.com/) - Helps create and verify your regular expressions. - [Sans Francisco - a tool for designers](http://www.sansfrancis.co/) - Collection of tools for designers ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Screensizemap](https://www.screensizemap.com/) - A comparison of screen sizes in device-independent pixel. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Sizzy:Browser Testing Tool](https://sizzy.co/) - Tool for developing and testing responsive design on multiple devices at once. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Stack Overflow](https://stackoverflow.com/) - Online community for developers to ask questions and get answers. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [The W3C Markup Validation Service](http://validator.w3.org/#validate_by_input) - Checks the markup validity of Web documents in HTML, XHTML, SMIL, MATHML, etc. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [The W3C CSS Validation Service](http://jigsaw.w3.org/css-validator/#validate_by_input) - Checks the validity of CSS and XHTML documents with style sheets. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Time Helper](https://currentmillis.com/) - Helps convert millis to DateTimes and vice-versa. - [TinyPNG](https://tinypng.com/) - PNG and JPEG compression/optimizer ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Web Developer Checklist](http://webdevchecklist.com/) - Categorized checklist for things to cover during web development. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Progressive Tooling to optimize your performance on Web](https://progressivetooling.com/) - List of tools that can be used to improve page performance. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [StackBlitz](https://stackblitz.com/angular/pxxjqeeegeba) - Online IDE for Angular and React projects that can be share via link. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Postman(Tool for testing APIs)](https://docs.api.getpostman.com/?version=latest) - API client to create, share, test, and document APIs. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Free Bootstrap 5 Cheat Sheet](https://bootstrap-cheatsheet.themeselection.com/) - It is an interactive list of Bootstrap 5 classes, variables, and mixins. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [JSONT](https://www.jsont.run/) - An online simple and powerful JSON formatting tool. ![Free](https://img.shields.io/badge/-Free-brightgreen) **[⬆ back to top](#table-of-contents)** --- ## CSS Frameworks - [Bootstrap](http://getbootstrap.com/) - Design and customize responsible mobile-first sites. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Bulma CSS](http://bulma.io/) - Modular open source framework based on Flexbox. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Caramel](http://caramel.kurisubrooks.com/) - A simple, modern, responsive website framework. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Cardinal](http://cardinalcss.com/) - Modular mobile-first framework for performance and scalability. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Element CSS](http://element.eleme.io/#/en-US) - Vue 2.0 based component library. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Foundation CSS](http://foundation.zurb.com/) - Family of responsive front-end frameworks. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Halfmoon](https://www.gethalfmoon.com/) - Fully customizable and responsive front-end framework for building dashboards and tools. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Jeet](http://jeet.gs/) - Fractional grid system for Sass and Stylus. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Less](http://lessframework.com/) - CSS grid system for designing adaptive websites. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Material Design Lite](https://getmdl.io/) - Implementation of Material Design components in vanilla CSS, JS, and HTML. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Materialize CSS](http://materializecss.com/) - CSS framework aimed to allow a unified user experience across all products on any platform. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Milligram](https://milligram.io/) - A minimalist CSS framework. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Neat](https://neat.bourbon.io/) - A lightweight and flexible Sass grid. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Petal CSS](https://shakrmedia.github.io/petal/) - Light CSS UI framework based on LESS. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Pure CSS](https://purecss.io/) - A set of small, responsive CSS modules. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Semantic UI](https://semantic-ui.com/) - UI framework designed for theming and responsive design. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Skeleton CSS](http://getskeleton.com/) - Simple, responsive boilerplate to kickstart any responsive project. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Spectre CSS](https://picturepan2.github.io/spectre/) - Lightweight, Responsive and Modern CSS framework for faster and extensible development. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Tacit](https://github.com/yegor256/tacit) - Primitive but attractive framework for beginners in graphic design. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [TailwindCSS](https://tailwindcss.com/) - Highly customizable, low level CSS framework. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [UI Kit](https://getuikit.com/) - Lightweight and modular front-end framework for web interfaces. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Unsemantic](https://unsemantic.com/) - Fluid grid system based on percentages, rather than a set number of columns. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Vital CSS](https://vitalcss.com/components/) - Minimally invasive CSS framework for web applications built with Sass and Slim. ![Free](https://img.shields.io/badge/-Free-brightgreen) **[⬆ back to top](#table-of-contents)** --- ## Icons - [Brandicons](http://fontello.github.io/brandico.font/demo.html) - Icon font generator and viewer. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Flat Icon](https://www.flaticon.com/) - Database of free icons in PNG, SVG, EPS, PSD, and Base64 formats. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Font Awesome](http://fontawesome.io/) - Open source icon set and toolkit with consistent styles. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Glyphicon](http://www.webhostinghub.com/glyphs/) - Icons for use with Bootstrap, other CSS frameworks, and any web projects. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Google Material Design Icons](http://google.github.io/material-design-icons/) - An overview of material icons and how to integrate them into projects. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Icomoon](https://icomoon.io/) - Icon font generator and icon collection. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Icongram](https://icongr.am/) - Collection of icon packs from different sources. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [IconSVG](https://iconsvg.xyz/) - Quick customizable icons for your projects ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Icons8](https://icons8.com/) - Consistently styled and customizable icon packs. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Ionicons](http://ionicons.com/) - Open source icons in SVG and webfont. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Mapicons](http://map-icons.com/) - Icon font for use with Google Maps API and Google Places API using SVG markers and icon labels. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Material Design Iconic Font](http://zavoloklom.github.io/material-design-iconic-font/) - Full suite of material design icons for easy SVGs on website or desktop. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [MfgLabs-Iconset](http://mfglabs.github.io/mfglabs-iconset/) - MFG Lab's icon set for use in webfonts and CSS. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Micon](http://xtoolkit.github.io/Micon/) - Windows font and CSS toolkit. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [The Noun Project](https://thenounproject.com/) - Comprehensive icon collection. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Octicons](https://octicons.github.com/) - Collection of GitHub's icons for projects. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Open Iconic, a free and open icon set](https://useiconic.com/open/) - Open source icon set in SVG, webfont, and raster formats. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [OpenWebIcons](http://pfefferle.github.io/openwebicons/) - Webfont for scalable vector icons and logos. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [ReactIcons](https://github.com/react-icons/react-icons) -SVG react icons of popular icon packs. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [RemixIcon](https://github.com/Remix-Design/remixicon) - Open source neutral style icon system. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Shape.so](https://shape.so/) - Customizable collection of icons and animations. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Stackicons](http://stackicons.com/) - Customizable icons for social brands. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Typicons](https://www.s-ings.com/typicons/) - Free-to-use vector icons embedded in a webfont. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Weather Icons](https://erikflowers.github.io/weather-icons/) - Weather themed icon font and CSS. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Zocial | CSS3 Button Set](http://zocial.smcllns.com/) - Create social buttons using CSS and rendering social icons as a font. ![Free](https://img.shields.io/badge/-Free-brightgreen) **[⬆ back to top](#table-of-contents)** --- ## Colors - [Adobe Color](https://color.adobe.com/create/color-wheel) - Color Wheel, Extract Theme, Extract Gradient, Accessibility Tools and more ![Free](https://img.shields.io/badge/-Free-brightgreen) - [BADA55 Color Codes](http://bada55.io/) - Convert leet words into CSS hex colors. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Color Hunt](http://colorhunt.co/) - Open collections of beautiful color palettes ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Color Theory by Natalya Shelburne](https://tallys.github.io/color-theory/) - Practical Color Theory for People who Code: Tutorial on the use of color with examples ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Color wheel | Color schemes - Adobe Color CC](https://color.adobe.com/create/color-wheel/?base=2&rule=Analogous&selected=4&name=My%20Color%20Theme&mode=rgb&rgbvalues=0.050000000000000044,1,0.6943295865110486,0.13153196324950517,0.04550000000000004,0.91,1,0,0,0.91,0.6632375135840386,0.04550000000000004,0.2526315789473136,0.48,0.216140350877193&swatchOrder=0,1,2,3,4) - Interactive color wheel with different color rules (adjustments possible) ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Colordesigner Tools](https://colordesigner.io/) - The main purpose of this tool is to help with building a color palette and generate tints and shades based on it. Just pick a color, and the app does the rest. You can use the preselected colors or the color picker for more control. Check also the other tools [here](https://colordesigner.io/tools) ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Colormind - Bootstrap](http://colormind.io/bootstrap/) - Colormind is a color scheme generator that uses deep learning to automatically apply the color pallete to a live website mockup. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Coolors](https://coolors.co)- Super fast color scheme creator with a lot of functionalities ![Free](https://img.shields.io/badge/-Free-brightgreen) - [CSS Gradient](https://cssgradient.io/gradient-backgrounds/) - Curated list of sites to explore gradients and color palettes. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Data Color Picker](https://learnui.design/tools/data-color-picker.html) - Generate color palettes with visually equidistant colors. Useful for data visualizations. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Designing in Color](https://medium.freecodecamp.com/designing-in-color-abd358660a7b) - A complete guide to design in color (article on Medium) ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Flat UI Colors](https://flatuicolors.com/) - Color picker for flat designs ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Image Color Picker](https://image-color.com) - Image color picker and palette generator ![Free](https://img.shields.io/badge/-Free-brightgreen) - [LOL Colors](https://www.webdesignrankings.com/resources/lolcolors/) - Curated color palette inspirations ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Material Palette](https://www.materialpalette.com/) - Color palette generator for Material Design ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Palettable](http://www.palettable.io/ED3E75-383838-D4D4D4) - Interactive color picker: creates a color scheme based on your preferences and palettes on the Internet ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Paletton - The Color Scheme Designer](http://paletton.com/#uid=1000u0kllllaFw0g0qFqFg0w0aF) - Advanced tool for creating color schemes ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Picular - Google, but for colors](https://picular.co/) - Primary color generator using Google's image search. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Pigment - Palette Generator](https://pigment.shapefactory.co/) - Generate color palettes based on lighting and pigment. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [UI Gradients](https://uigradients.com/#Influenza) - Scroll through or pick from beautiful gradients, download JPG and copy CSS Code ![Free](https://img.shields.io/badge/-Free-brightgreen) - [W3school Color Picker](https://www.w3schools.com/colors/colors_picker.asp) - Find the perfect color from the color wheel, easy control ![Free](https://img.shields.io/badge/-Free-brightgreen) - [UI Color Picker](https://uicolorpicker.com/) - Best colors in few selected shades to choose from very helpful for quickly choosing and adding color to design. ![Free] **[⬆ back to top](#table-of-contents)** --- ## Typography - [A Crash Course in Typography: The Basics of Type](https://www.noupe.com/essentials/icons-fonts/a-crash-course-in-typography-the-basics-of-type.html) - First article of a series on Typography ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Circular Font Combinations | Free Alternatives | Typewolf](https://www.typewolf.com/site-of-the-day/fonts/circular) - A great resource for everything related to Typography ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Font Pair - Helps designers pair Google Fonts together. Beautiful Google Font combinations and pairs.](http://fontpair.co/) - Clean web-tool on How to pair Google Fonts ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Fontspiration](http://sfcd.com/work/fontspiration/) - An iOS app for creating custom typographic designs ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Fontsquirrel](https://www.fontsquirrel.com/) - A resource for FREE, hand-picked, high-quality, commercial-use fonts ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Google Fonts](https://fonts.google.com/) - A catalog of free & open source fonts, great details and font pair suggestions ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Just My Type](https://justmytype.co/) - A collection of font pairings ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Table of Contents | The Elements of Typographic Style Applied to the Web](http://webtypography.net/toc/) - A practical guide to web typography ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Typekit](https://typekit.com/) - "Quality fonts from the world’s best foundries" ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Typography Terms](https://designschool.canva.com/blog/typography-terms/) - An infographic on Typography Terms + explanations ![Free](https://img.shields.io/badge/-Free-brightgreen) **[⬆ back to top](#table-of-contents)** --- ## Design Inspiration - [Admire The Web](https://www.admiretheweb.com/) - Admire the Web is where we showcase the very best in website design inspiration - carefully curated and organised to keep you inspired. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Awwwards](https://www.awwwards.com/) - The Website Awards that recognize and promote the talent and effort of the best developers, designers and web agencies in the world. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Dribble](https://dribbble.com/) - Dribbble is where designers gain inspiration, feedback, community, and jobs and is your best resource to discover and connect with designers worldwide. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Site Inspire](https://www.siteinspire.com/) - siteInspire is a showcase of the finest web and interactive design. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Web design Inspiration](http://www.webdesign-inspiration.com/) - Find inspiration for your next web design project. We help web designers, digital agencies and entrepreneurs to be inspired. Everyday, our team of experts hand picks the best new web designs from all over the world. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Behance](https://www.behance.net/) - Behance is a social media platform to showcase and discover creative work like Graphic Design, Illustration, Game Design and many more things ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Pinterest](https://www.pinterest.com/) - Pinterest has a host of design inspirations in a variety of forms and styles. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Pixpa](https://www.pixpa.com/) - Pixpa features some nice modern designs and inspirations for web designers and photographers. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Lapa Ninja](https://www.lapa.ninja/) - Lapa Ninja is a gallery featuring the best 4127 landing page examples, free books for designers and free UI kits from around the web. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Landings](https://landings.dev/) - Find the best landing pages for your design inspiration based on your preference. ![Free](https://img.shields.io/badge/-Free-brightgreen) **[⬆ back to top](#table-of-contents)** --- ## Animation Frameworks - [Animate CSS](https://daneden.github.io/animate.css/) - Choose, try out and get the CSS-Code for different animation types (over 70) ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Anime JS](https://animejs.com/) - It’s easy to use, has a small and simple API, and offers everything you could want from a modern animation engine. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Bounce JS](http://bouncejs.com/) - Tool and JS Library, creating CSS3 powered animations(adjustments possible) & export CSS code ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Magic Animations](https://www.minimamente.com/example/magic_animations/) - Showcase of different animations with link to GitHub repo ![Free](https://img.shields.io/badge/-Free-brightgreen) - [MO JS](https://mojs.github.io/) - The library provides built-in components to start animating from scratch like HTML, shape, swirl, burst, and stagger but also brings you tools to help craft your animation in a most natural way. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Particles JS](https://vincentgarreau.com/particles.js/) - A lightweight JavaScript library for creating particles. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Typed JS](http://www.mattboldt.com/typed.js/) - A JavaScript typing animation library with a great documentation on GitHub ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Wow JS](https://wowjs.uk/) - JavaScript library: Reveal CSS animation as you scroll down a page ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) **[⬆ back to top](#table-of-contents)** --- ## Stock Resources - [Burst](https://burst.shopify.com) - Free, high-resolution images. All our pictures are free to download for personal and commercial use. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Canva](https://www.canva.com) - 8,000+ free templates and thousands of free photos ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Free stock images and Videos](http://allthefreestock.com/) - A great collection of stock photos, videos and other resources. Most of them under the CC0-License, all of them free. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Gratisography](https://www.gratisography.com) - Photographer Ryan McGuire provides this collection of high-resolution pictures for free. You can use them on your personal or commercial project free of copyright restrictions. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Humaaans](https://www.humaaans.com/) - Library of editable people illustrations. Free for both commercial and personal use. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [I’d Pin That!](http://idpinthat.com) - Created to help bloggers and non-designers create high quality images like those often seen on Pinterest. I’d Pin That is more than just a source for free images — **it is an image editor!** Use the tools provided here to add your own text and edit the images right on the site. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Illlustrations](https://illlustrations.co/) - 120+ Awesome free illustrations made by the artist vijay verma on a 100 days challenge. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [MakerBook - The best free resources for creatives](http://makerbook.net/) - A directory of sites to get free resources (Photography, Mockups, Graphics, Textures, Fonts, Colours, Video, Audio & Tools). ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Morguefile](https://morguefile.com/) - Founded in 1996 by college student Michael Connors.Photographers contribute images to Morguefile for visitors to use in their creative projects. Yes, they’re all completely free. The website does ask that you credit the photographer when possible. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Open Doodles](https://www.opendoodles.com/) - A Free Set of Open-Source Illustrations. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [The Open Photo Project](https://openphoto.net/) - The Open Photo Project is a photo sharing platform created in 1998 by Michael Jastremski. Contributors have offered their images free of charge under terms of Creative Commons licensing. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Pexels](https://www.pexels.com/) - Exclusively stock photos of high quality, great feature: Filter photos by color. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Picalls](https://picalls.com/) - Free photos and wallpapers licensed under the Creative Commons CC0 license. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Pixabay](https://pixabay.com/) - In addition to photos, Pixabay offers **video, vectors and illustrations.** ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Pikwizard](https://pikwizard.com) - Free stock photo library for commercial and editorial use. Huge library of stunning, high quality, royalty free images. No attribution required ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Public Domain Archive](http://publicdomainarchive.com/) - “a public domain image repository” created by Matt a graphic designer, web designer and photographer.Vintage and modern images. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [StockSnap.io](https://stocksnap.io/) - High quality stock photos free to download and use. Licensed under the Creative Commons CC0 license. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [The Stocks](http://thestocks.im) - Another awesome directory sharing sites for resources, loading directly on the webpage ![Free](https://img.shields.io/badge/-Free-brightgreen) - [UnDraw](https://undraw.co) - "MIT licensed illustrations for every project you can imagine and create ![Free](https://img.shields.io/badge/-Free-brightgreen) - [UnSplash](https://unsplash.com) - "Beautiful, Free Photos" & themed collections of photos ![Free](https://img.shields.io/badge/-Free-brightgreen) - [3D Bay](https://clouddevs.com/3dbay/) - "Free, 3D Illustrations" A collection of High-quality 3D Illustration resources ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Design Stripe](https://designstripe.com/catalog) - "Create beautiful illustrations, no design skills needed ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) **[⬆ back to top](#table-of-contents)** --- ## Geolocation - [Geocomplete-location autocomplete](https://ubilabs.github.io/geocomplete/) - An advanced jQuery plugin that wraps the Google Maps APIs Geocoding and Places Autocomplete services into a dropdown for an input-form. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Google maps API | Google](https://developers.google.com/maps/) - Google Map APIs including documentation & learning resources - extensive ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Google maps API | Traversy](https://youtu.be/Zxf1mnP5zcw/) - Great YouTube tutorial on using the Google Maps APIs ![Free](https://img.shields.io/badge/-Free-brightgreen) - [OpenCage Geocoder](https://opencagedata.com/) - Free to use forward (lat/long to text) and reverse (text to lat/long) geocoding API ![Free](https://img.shields.io/badge/-Free-brightgreen) - [GeoJS](https://www.geojs.io/) - Free to use API for geolocation lookup by IP address ![Free](https://img.shields.io/badge/-Free-brightgreen) **[⬆ back to top](#table-of-contents)** --- ## APIs - [Alexa API | Codecademy](https://www.codecademy.com/learn/learn-alexa) - Learn to develop a custom Amazon Alexa skill that respond to the user's voice with custom messages. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Abstract APIs](https://www.abstractapi.com) - Free utility API's for compressing images, creating user avatars, validating emails, and more ![Free](https://img.shields.io/badge/-Free-brightgreen) - [jsonplaceholder](https://jsonplaceholder.typicode.com) - Fake Online REST API for Testing and Prototyping ![Free](https://img.shields.io/badge/-Free-brightgreen) - [A list of public APIs](https://github.com/toddmotto/public-apis) ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Lorem Picsum](https://picsum.photos/) - Easy to use and customize placeholder photos ![Free](https://img.shields.io/badge/-Free-brightgreen) - [OpenWeatherMap](https://openweathermap.org/api) - Weather API with free and paid licenses ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Random famous quotes | Rapid APIs](https://rapidapi.com/andruxnet/api/Random%20Famous%20Quotes) - Gets a random quote in JSON format. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [TMDB API](https://www.themoviedb.org/documentation/api) - API Service for those who are interested in displaying data/images about different movies, TV Shows or actors in their application. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Unsplash Source](https://source.unsplash.com/) - API to retrieve random images from Unsplash.com ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Web APIs | MDN](https://developer.mozilla.org/en/docs/Web/API) ![Free](https://img.shields.io/badge/-Free-brightgreen) - [News API](https://newsapi.org/) - Locate articles and breaking news headlines from news sources and blogs across the web with our JSON API. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Spotify API](https://developer.spotify.com/) - Spotify's Web API allows you to find music and podcasts, manage your Spotify collection, control audio playing, and do a variety of other things. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) **[⬆ back to top](#table-of-contents)** --- ## Mockups - [Am I Responsive](http://ami.responsivedesign.is/) - This is a tool to check the responsiveness of a website and take a screenshot on multiple devices in a single frame. Go to the site and enter the URL to capture the screenshot. You should have separate screen capture tool to take the proper screenshot. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Figma](https://www.figma.com/) - Free app with a simple to use surface for designing, prototyping and sharing your website and app ideas ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Adobe XD](https://www.adobe.com/products/xd.html?sdid=12B9F15S&mv=Search&ef_id=CjwKCAjwn9v7BRBqEiwAbq1Ey9SoyrTK1Zsdd88wGlJfTVkU0JuW40rItPaiAypnKZ7J-lLv_IUE0xoC0GEQAvD_BwE:G:s&s_kwcid=AL!3085!3!394015010053!e!!g!!adobe%20xd!1641846448!65452677551) - One of the best tool for UI/UX Design, Wireframe, animate, prototype, collaborate, and more ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Magic Mockups](http://magicmockups.com/) - Place your product in realistic environment! Free real-life product/app mockup generator. **Laptop, Phone, Tablet, Imac.** ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Rotato 3D Mockup Generator](https://rotato.app) - Make video 3D mockups and images. No experience required. Unlimited renders. MacOS. - [The MockUp Club](https://themockup.club/) - Website that offers free downloads of design mockups (mostly Photoshop format). ![Free](https://img.shields.io/badge/-Free-brightgreen) - [MockupsJar](https://mockupsjar.com/) - Build mockups with screenshots of your application or web Design for free to share with customers and clients ![Free](https://img.shields.io/badge/-Free-brightgreen) - [MockUPhone](https://mockuphone.com) - Free and simple screenshots device mockups generator. Wrap your design in mobile devices or Laptop/Desktop in a few clicks! ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Multi Device Website Mockup Generator](http://techsini.com/multi-mockup/) - Multi device website mockup generator is free online tool to test your responsive website on apple devices including Apple iMac, MacBook, iPad and iPhone. This tool is very helpful for theme developers to mockup the web template on various apple devices with a single click. You should have a proper screen grabber tool to take the screenshot from the browser. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Wireframe.cc](https://wireframe.cc/) - Great tool for sketching out ideas and layouts, super minimalistic ![Free](https://img.shields.io/badge/-Free-brightgreen) **[⬆ back to top](#table-of-contents)** --- ## Books - [Ebook Foundation-free programing books: GitHub Repository](https://github.com/EbookFoundation/free-programming-books) - A directory of free learning resources, categorized by language ![Free](https://img.shields.io/badge/-Free-brightgreen) - [HTML Basics](https://www.austincc.edu/hr/profdev/eworkshops/docs/HTML_Basics.pdf) - A workshop covering the basics of HTML (free pdf/18 pages) ![Free](https://img.shields.io/badge/-Free-brightgreen) - [HTML5 for Masterminds, 2nd Edition](https://www.amazon.com/gp/product/1500429120/ref=as_li_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=1500429120&linkCode=as2&tag=pinnok-20&linkId=IBCPBVE3TBPCOUWF) - A complete course from Beginner to Mastermind ![Paid](https://img.shields.io/badge/-Paid-blue) - [HTML5 Pocket Reference (Pocket Reference (O'Reilly)](http://www.amazon.com/gp/product/1449363350/ref=as_li_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=1449363350&linkCode=as2&tag=pinnok-20&linkId=M6JD2MFAN24X3E7W) - A comprehensive compact reference for HTML 5 ![Paid](https://img.shields.io/badge/-Paid-blue) - [HTML Tutorialspoint](http://www.tutorialspoint.com/html/html_tutorial.pdf) - A thorough tutorial on HTML (free pdf/486 pages) ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Learn How To Code In HTML5 and CSS3](http://howtocodeinhtml.com/) - A free e-book about making websites in HTML5 and CSS for absolute beginners ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Responsive Web Design with HTML5 and CSS3](http://www.amazon.com/gp/product/1784398934/ref=as_li_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=1784398934&linkCode=as2&tag=pinnok-20&linkId=6CN4JQGXTZU6DHRY) - A comprehensive book about making RWD ![Paid](https://img.shields.io/badge/-Paid-blue) - [You don't know JS](https://github.com/getify/You-Dont-Know-JS) - Book series diving deep into the core mechanisms of the JavaScript language. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Guide to Git and Github](https://launchschool.com/books/git) - A beginner friendly guide to using git and working with Github. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Introduction to HTTP](https://launchschool.com/books/http) - Introduction to HTTP, the stateless protocol underlying all of the web. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Introduction to the Command Line](https://launchschool.com/books/command_line) - A short and beginner friendly introduction to the command line, covering common commands that will make you immediately productive. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [HTML & CSS Books](https://www.interviewbit.com/blog/html-css-books/) ![Free] **[⬆ back to top](#table-of-contents)** --- ## Challenges / Games - [Ace Front End](https://www.acefrontend.com/) - Ace Front End has complete and practical coding challenges, with a detailed walk through of a perfect interview solution. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Codepen Challenges](https://codepen.io/challenges/) - Each month has a theme and every week there is a new challenge prompt that you can use to build a project online using HTML, CSS and JavaScript. The best projects are featured on Codepen's homepage. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Codewars](https://www.codewars.com/) - Improve your skills by training with others on real code challenges. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [CSS Battle](https://cssbattle.dev/) - CSSBattle is an online CSS [Code Golfing](https://en.wikipedia.org/wiki/Code_golf) game. Here, players from all around the world try to visually replicate **Targets** in smallest possible CSS code and battle it out to get to the top of the leaderboard. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [CSS Diner](http://flukeout.github.io/) - It's a fun game to learn and practice CSS selectors. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [CSS Zen Garden](http://www.csszengarden.com/) - A demonstration of what can be accomplished through CSS-based design, and a chance to do your own. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Dev Challenges](https://devchallenges.io/) - Made by [Thu Nghiem](https://twitter.com/thunghiemdinh). devChallenges.io is a community driven platform for anyone who wants to solve practical tasks. It has some tricky and curated challenges. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Flexbox Defense](http://www.flexboxdefense.com) - It is a game that covers the flex properties align-items, justify-content, flex-direction, align-self and has 12 different levels. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Flexbox Froggy](https://flexboxfroggy.com) - This game is also about Flexbox and it covers even more flex properties: align-items, justify-content, align-content, flex-direction, align-self, flex-wrap, flex-flow and has 24 different levels. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Front End Mentor](https://www.frontendmentor.io/) - Solve real-world HTML, CSS and JavaScript challenges whilst working to professional designs. Join 192,401 developers building projects, reviewing code, and helping each other get better. ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Grid Garden](http://cssgridgarden.com/) - Interactive CSS code game. Practice your CSS skills by watering your garden! It has 28 different levels to learn CSS Grid Layout. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Hackerrank](https://www.hackerrank.com/) - Practice coding, prepare for interviews, and solve interview style coding challenges. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [JavaScript30](https://javascript30.com/) - A free challenge course, building 30 little projects with HTML, CSS and plain JavaScript. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Leetcode](https://leetcode.com/) - Coding problems to solve in a range of categories and difficulties ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Project Euler](https://projecteuler.net/) - Challenging computer science and mathematical problems. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [100DaysOfCode](https://www.100daysofcode.com/) - Regardless of your coding skills or your language of choice, this challenge invites you to code for at least 1 hour a day. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Devtools Tech](https://www.devtools.tech/questions/all?ref=frontend-web-development-resources-github-repo) - Devtools Tech is a free platform for Frontend Engineers to practice high quality real world programming interview questions, follow curated learning paths, read blogs, and track progress across various frontend domains. ![Free](https://img.shields.io/badge/-Free-brightgreen) **[⬆ back to top](#table-of-contents)** --- ## Free Tools For Students - [**JetBrains Student License**](https://www.jetbrains.com/student/): Free individual licenses of the award-winning professional developer tools from JetBrains for students and faculty members. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [**Student Developer Pack**](https://education.github.com/pack): The best developer tools, free for students via @githubeducation ![Free](https://img.shields.io/badge/-Free-brightgreen) **[⬆ back to top](#table-of-contents)** --- ## YouTube Videos - [**Flexbox in 20 minutes**](https://youtu.be/JJSoEo8JSnc) - Quick crash-course on the CSS Flexbox model. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [**SVGs can do that**](https://www.youtube.com/watch?&v=4laPOtTRteI) 😎 - Sarah Drasner's talk on nontypical pratical uses of SVGs. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [**CSS Grid Tutorial**](https://www.youtube.com/watch?v=EFafSYg-PkI&ab_channel=DevEd) - Use CSS grid to structure and position websites with ease. ![Free](https://img.shields.io/badge/-Free-brightgreen) - [**Git and GitHub for Beginners - Crash Course**](https://www.youtube.com/watch?v=RGOj5yH7evk&ab_channel=freeCodeCamp.org) - Ad-free tutorial by freeCodeCamp.![Free](https://img.shields.io/badge/-Free-brightgreen) - [**12HR Coding Bootcamp 2021!**](https://www.youtube.com/watch?v=Xm4BObh4MhI) - Complete frontend bootcamp! ![Free](https://img.shields.io/badge/-Free-brightgreen) **[⬆ back to top](#table-of-contents)** ## Testing - [Jest](https://jestjs.io/) - JavaScript testing framework ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Mocha](https://mochajs.org/) - JavaScript testing framework ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Karma](https://karma-runner.github.io/latest/index.html) - JavaScript test runner![Free](https://img.shields.io/badge/-Free-brightgreen) - [Istanbul](https://istanbul.js.org/) - JavaScript test coverage tool ![Free](https://img.shields.io/badge/-Free-brightgreen) - [TestCafe](https://devexpress.github.io/testcafe/) - Node.js end-to-end testing ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Cypress](https://www.cypress.io/) - JavaScript end-to-end testing framework ![Free](https://img.shields.io/badge/-Free-brightgreen) ![Paid](https://img.shields.io/badge/-Paid-blue) - [Puppeteer](https://pptr.dev) - Google's Chrome automation tool for E2E testing. - [Playwright](https://playwright.dev) - Microsoft's browser automation tool for E2E testing. - [Sinon.JS](https://sinonjs.org/) - Standalone test spies, stubs and mocks for JavaScript ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Chai](https://www.chaijs.com/) - Assertation library for JavaScript testing ![Free](https://img.shields.io/badge/-Free-brightgreen) - [PactumJS](https://pactumjs.github.io/) - REST API Testing Tool used to automate e2e, integration, contract & component (or service level) tests ![Free](https://img.shields.io/badge/-Free-brightgreen) - [Vitest](https://vitest.dev/) - Vitest is a blazing fast unit test framework powered by Vite ![Free](https://img.shields.io/badge/-Free-brightgreen) **[⬆ back to top](#table-of-contents)**
528
Angular testing library for mocking components, directives, pipes, services and facilitating TestBed setup
[<img src="https://img.shields.io/gitter/room/help-me-mom/ng-mocks" alt="chat on gitter" width="90" height="20" />](https://gitter.im/ng-mocks/community) [<img src="https://img.shields.io/npm/v/ng-mocks" alt="npm version" width="88" height="20" />](https://www.npmjs.com/package/ng-mocks) [<img src="https://img.shields.io/circleci/build/github/help-me-mom/ng-mocks/master" alt="build status" width="88" height="20" />](https://app.circleci.com/pipelines/github/help-me-mom/ng-mocks?branch=master) [<img src="https://img.shields.io/coveralls/github/help-me-mom/ng-mocks/master" alt="coverage status" width="104" height="20" />](https://coveralls.io/github/help-me-mom/ng-mocks?branch=master) # Mock components, services and more out of annoying dependencies for simplification of Angular testing `ng-mocks` facilitates **Angular testing** and helps to: - **mock Components**, Directives, Pipes, Modules, Services and Tokens - reduce boilerplate in tests - access declarations via simple interface The current version of the library **has been tested** and **can be used** with: | Angular | ng-mocks | Jasmine | Jest | Ivy | | ------: | :------: | :-----: | :--: | :-: | | 15 | latest | yes | yes | yes | | 14 | latest | yes | yes | yes | | 13 | latest | yes | yes | yes | | 12 | latest | yes | yes | yes | | 11 | latest | yes | yes | yes | | 10 | latest | yes | yes | yes | | 9 | latest | yes | yes | yes | | 8 | latest | yes | yes | | | 7 | latest | yes | yes | | | 6 | latest | yes | yes | | | 5 | latest | yes | yes | | ## Important links - **[Documentation with examples of Angular testing](https://ng-mocks.sudo.eu)** - [CHANGELOG](https://github.com/help-me-mom/ng-mocks/blob/master/CHANGELOG.md) - [GitHub repo](https://github.com/help-me-mom/ng-mocks) - [NPM package](https://www.npmjs.com/package/ng-mocks) * Live [example on StackBlitz](https://stackblitz.com/github/help-me-mom/ng-mocks-sandbox?file=src/test.spec.ts) * Live [example on CodeSandbox](https://codesandbox.io/s/github/help-me-mom/ng-mocks-sandbox?file=/src/test.spec.ts) - [chat on gitter](https://gitter.im/ng-mocks/community) - **[ask a question on Stackoverflow](https://stackoverflow.com/questions/ask?tags=ng-mocks%20angular%20testing%20mocking)** - [report an issue on GitHub](https://github.com/help-me-mom/ng-mocks/issues) ## Very short introduction Global configuration for mocks in `src/test.ts`. In case of jest, `src/setup-jest.ts` / `src/test-setup.ts` should be used. ```ts title="src/test.ts" // All methods in mock declarations and providers // will be automatically spied on their creation. // https://ng-mocks.sudo.eu/extra/auto-spy ngMocks.autoSpy('jasmine'); // or jest // ngMocks.defaultMock helps to customize mocks // globally. Therefore, we can avoid copy-pasting // among tests. // https://ng-mocks.sudo.eu/api/ngMocks/defaultMock ngMocks.defaultMock(AuthService, () => ({ isLoggedIn$: EMPTY, currentUser$: EMPTY, })); ``` An example of a spec for a profile edit component. ```ts title="src/profile.component.spec.ts" // Let's imagine that there is a ProfileComponent // and it has 3 text fields: email, firstName, // lastName, and a user can edit them. // In the following test suite, we would like to // cover behavior of the component. describe('profile:builder', () => { // Helps to reset customizations after each test. MockInstance.scope(); // Let's configure TestBed via MockBuilder. // The code below says to mock everything in // ProfileModule except ProfileComponent and // ReactiveFormsModule. beforeEach(() => { // The result of MockBuilder should be returned. // https://ng-mocks.sudo.eu/api/MockBuilder return MockBuilder( ProfileComponent, ProfileModule, ).keep(ReactiveFormsModule); // // or old fashion way // return TestBed.configureTestingModule({ // imports: [ // MockModule(SharedModule), // mock // ReactiveFormsModule, // real // ], // declarations: [ // ProfileComponent, // real // MockPipe(CurrencyPipe), // mock // MockDirective(HoverDirective), // mock // ], // providers: [ // MockProvider(AuthService), // mock // ], // }).compileComponents(); }); // A test to ensure that ProfileComponent // can be created. it('should be created', () => { // MockRender is an advanced version of // TestBed.createComponent. // It respects all lifecycle hooks, // onPush change detection, and creates a // wrapper component with a template like // <app-root ...allInputs></profile> // and renders it. // It also respects all lifecycle hooks. // https://ng-mocks.sudo.eu/api/MockRender const fixture = MockRender(ProfileComponent); expect( fixture.point.componentInstance, ).toEqual(assertion.any(ProfileComponent)); }); // A test to ensure that the component listens // on ctrl+s hotkey. it('saves on ctrl+s hot key', () => { // A fake profile. const profile = { email: '[email protected]', firstName: 'testFirst2', lastName: 'testLast2', }; // A spy to track save calls. // MockInstance helps to configure mock // providers, declarations and modules // before their initialization and usage. // https://ng-mocks.sudo.eu/api/MockInstance const spySave = MockInstance( StorageService, 'save', jasmine.createSpy(), // or jest.fn() ); // Renders <profile [profile]="params.profile"> // </profile>. // https://ng-mocks.sudo.eu/api/MockRender const { point } = MockRender( ProfileComponent, { profile }, // bindings ); // Let's change the value of the form control // for email addresses with a random value. // ngMocks.change finds a related control // value accessor and updates it properly. // https://ng-mocks.sudo.eu/api/ngMocks/change ngMocks.change( '[name=email]', // css selector '[email protected]', // an email address ); // Let's ensure that nothing has been called. expect(spySave).not.toHaveBeenCalled(); // Let's assume that there is a host listener // for a keyboard combination of ctrl+s, // and we want to trigger it. // ngMocks.trigger helps to emit events via // simple interface. // https://ng-mocks.sudo.eu/api/ngMocks/trigger ngMocks.trigger(point, 'keyup.control.s'); // The spy should be called with the user // and the random email address. expect(spySave).toHaveBeenCalledWith({ email: '[email protected]', firstName: profile.firstName, lastName: profile.lastName, }); }); }); ``` Profit. ## Extra If you like `ng-mocks`, please support it: - [with a star on GitHub](https://github.com/help-me-mom/ng-mocks) - [with a tweet](https://twitter.com/intent/tweet?text=Check%20ng-mocks%20package%20%23angular%20%23testing%20%23mocking&url=https%3A%2F%2Fgithub.com%2Fike18t%2Fng-mocks) Thank you! P.S. Feel free to [contact us](https://ng-mocks.sudo.eu/need-help) if you need help.
529
Curriculum for learning front-end development during #100DaysOfCode.
**Note:** this resource is old! I will be archiving this repository by the end of July 2021 as I feel that many of the recommendations here are outdated for learning front-end web development in 2021. --- <p align="center"> <img alt="#100DaysOfCode Front-End Development" src="https://i.imgur.com/dwYOP0B.jpg" /> </p> **Please support this repo by giving it a star ⭐️ at the top of the page and [follow me](https://github.com/nas5w) for more resources!** Want to learn more about frontend development? Consider: - signing up for my [free newsletter](https://buttondown.email/devtuts?100DoC) where I periodically send out digestible bits of frontend knowledge! - subscribing to my [YouTube channel](https://www.youtube.com/c/devtutsco) where I teach JavaScript, Typescript, and React. --- This is a somewhat opinionated curriculum for learning front-end development during #100DaysOfCode. As it covers a wide range of front-end development topics, it can be thought of as more of a "survey" style course rather than a deep dive into any one area. Ideally, your takeaway from completing this curriculum will be some familiarity with each topic and the ability to easily dive deeper in any area in the future when necessary. This curriculum was influenced significantly by Kamran Ahmed's [Modern Frontend Developer](https://medium.com/tech-tajawal/modern-frontend-developer-in-2018-4c2072fa2b9c) roadmap. Please check it out--it is excellent. **Note**: I know front-end development means a lot of different things to a lot of people! If you're a front-end developer and you think this guide could be improved, please let me know by raising an issue as described in the [Contributing](#contributing) section. Thank you! # Translations Thanks to some incredible contributors, this curriculum has been translated into the following languages! - [Russian русский](/ru) (translation by [@Ibochkarev](https://github.com/Ibochkarev) and [@JonikUl](https://github.com/JonikUl)) - [Chinese 中文](/chinese) (translation by [@simplefeel](https://github.com/simplefeel)) - [Portuguese Português](/portuguese) (translation by [@Zardosh](https://github.com/Zardosh)) - [Polish polski](/polish) (translation by [@mbiesiad](https://github.com/mbiesiad)) - [Malay/Indonesia](/Malay) (translation by [@asyraf-labs](https://github.com/asyraf-labs)) - [Vietnamese Tiếng Việt](/Vietnam) (translation by [@duca7](https://github.com/duca7)) - [Japanese 日本語](/japanese) (translation by [miily8310s](https://github.com/miily8310s)) - [Bangla বাংলা](/bangla) (translation by [mirajus-salehin](https://github.com/mirajus-salehin)) # :calendar: Curriculum The underlying principle of this repository is [timeboxing](https://en.wikipedia.org/wiki/Timeboxing). If you have spent any amount of time in the past trying to learn web development or a similar skill, you have likely experienced going down a rabbit hole on any one particular topic. This repository aims to assign a certain number of days to each technology and encourages you to move to the next once that number of days is up. It is anticipated that everyone is at a different level of proficiency when starting this challenge, and that's okay. Beginner and expert front-end developers alike can benefit from timeboxed practice in each of these areas. The recommended day-by-day activities are as follows: - Days 1-8: [HTML](#html) - Days 9-16: [CSS](#css) - Days 17-24: [JavaScript Basics](#javascript) - Days 25-27: [jQuery](#jquery) - Days 28-33: [Responsive Web Design](#rwd) - Days 34-36: [Accessibility](#accessibility) - Days 37-39: [Git](#git) - Days 40-44: [Node and NPM](#node) - Days 45-50: [Sass](#sass) - Days 51-54: [Bootstrap](#bootstrap) - Day 55: [BEM](#bem) - Days 57-61: [Gulp](#gulp) - Days 62-65: [Webpack](#webpack) - Day 66: [ESLint](#eslint) - Days 68-83: [React](#react) - Days 84-89: [Redux](#redux) - Days 90-94: [Jest](#jest) - Days 95-97: [TypeScript](#typescript) - Days 98-100: [NextJS](#nextjs) # :mag_right: The Details Below you can find a little information about each topic in the curriculum as well as some ideas/guidance on what to do for each. For inspiration on projects to do alongside this curriculum, see the [Project Ideas section](#project-ideas). As part of the timeboxing principle, it's okay if you don't get through all of the items in the "Learning Areas and Ideas" sections. You should instead focus on getting the most you can out of the number of days assigned to each area and then move on. <a name="html"></a> ![HTML](https://i.imgur.com/O0F5XSR.jpg) Hypertext Markup Language (HTML) is the standard markup language for creating web pages and web applications. With Cascading Style Sheets (CSS) and JavaScript, it forms a triad of cornerstone technologies for the World Wide Web. Web browsers receive HTML documents from a web server or from local storage and render the documents into multimedia web pages. HTML describes the structure of a web page semantically and originally included cues for the appearance of the document. (Source: [Wikipedia](https://en.wikipedia.org/wiki/HTML)) ### :bulb: Quick Takeaway HTML is really the foundation of web development. Even in the javascript-based frameworks, you end up writing HTML in one form or another. ### :book: Learning Areas and Ideas - Take the [Basic HTML and HTML5 section](https://learn.freecodecamp.org/) on freeCodeCamp. - HTML page structure - HTML elements - Nesting HTML elements - Semantic markup - Links / multiple pages - Images - Audio/video media - Forms and form elements - Create a multi-page website! (See [Project Ideas](#project-ideas) if you need some inspiration). <a name="css"></a> ![CSS](https://i.imgur.com/028GOR0.jpg) Cascading Style Sheets (CSS) is a style sheet language used for describing the presentation of a document written in a markup language like HTML. CSS is a cornerstone technology of the World Wide Web, alongside HTML and JavaScript. CSS is designed to enable the separation of presentation and content, including layout, colors, and fonts. This separation can improve content accessibility, provide more flexibility and control in the specification of presentation characteristics, enable multiple web pages to share formatting by specifying the relevant CSS in a separate .css file, and reduce complexity and repetition in the structural content. (Source: [Wikipedia](https://en.wikipedia.org/wiki/Cascading_Style_Sheets)) ### :bulb: Quick Takeaway CSS is another essential component of web development. While it is mainly used to style and position HTML elements, it has become increasingly capable of more dynamic tasks (e.g., animations) that would once be handled by javascript. ### :book: Learning Areas and Ideas - Take the [Basic CSS, CSS flexbox, and CSS grid sections](https://learn.freecodecamp.org/) on freeCodeCamp. - In-line CSS - `<style>` tags - External CSS with `<link>` - Styling elements - Selectors - Floats, clearing floats - Layouts (grid, flexbox) - Fonts, custom fonts - Style the HTML page(s) you made when learning HTML! <a name="javascript"></a> ![JavaScript](https://i.imgur.com/oHdD86j.jpg) JavaScript , often abbreviated as JS, is a high-level, interpreted programming language that conforms to the ECMAScript specification. It is a language that is also characterized as dynamic, weakly typed, prototype-based and multi-paradigm. Alongside HTML and CSS, JavaScript is one of the three core technologies of the World Wide Web. JavaScript enables interactive web pages and thus is an essential part of web applications. The vast majority of websites use it, and all major web browsers have a dedicated JavaScript engine to execute it. (Source: [Wikipedia](https://en.wikipedia.org/wiki/JavaScript)) ### :bulb: Quick Takeaway JavaScript has become increasingly important in the front-end world. While it was once used mainly to make pages dynamic, it is now the foundation of many front-end frameworks. These frameworks handle a lot of the tasks that were formerly handled by the back-end (e.g., routing and displaying different views). ### :book: Learning Areas and Ideas - Take the [Basic JavaScript and ES6 sections](https://learn.freecodecamp.org/) on freeCodeCamp. - Too many language fundamentals to list here! - `<script>` tag and placement - Accessing HTML elements - The event loop, call stack, and event queue - Prototypal Inheritance - Reference vs. value - Add some dynamic elements or logic to your HTML/CSS page(s) developed earlier! <a name="jquery"></a> ![jQuery](https://i.imgur.com/m9j02Fo.jpg) jQuery is a fast, small, and feature-rich JavaScript library. It makes things like HTML document traversal and manipulation, event handling, animation, and Ajax much simpler with an easy-to-use API that works across a multitude of browsers. With a combination of versatility and extensibility, jQuery has changed the way that millions of people write JavaScript. (Source: [jQuery.com](https://jquery.com/)) ### :bulb: Quick Takeaway After you have spent some time with plain (also called "vanilla") javascript, you may find some tasks a bit cumbersome, especially those related to accessing and manipulating HTML elements. For quite a while, jQuery was the go-to library for making these kinds of tasks easier and consistent across different browsers. Nowadays, jQuery isn't necessarily "mandatory" learning because of advancements in vanilla javascript, CSS, and newer javascript frameworks (we'll look at frameworks later). Still, it would be beneficial to take a little time to learn some jQuery and apply it to a small project. ### :book: Learning Areas and Ideas - Take the [jQuery section](https://learn.freecodecamp.org/) on freeCodeCamp. - Document ready - Selectors - Toggle classes - Animation - Add or move HTML elements - Add jQuery to your site! <a name="rwd"></a> ![Responsive Web Design](https://i.imgur.com/Bt1zWwq.jpg) Responsive web design (RWD) is an approach to web design that makes web pages render well on a variety of devices and window or screen sizes. Recent work also considers the viewer proximity as part of the viewing context as an extension for RWD. Content, design and performance are necessary across all devices to ensure usability and satisfaction. A site designed with RWD adapts the layout to the viewing environment by using fluid, proportion-based grids, flexible images, and CSS3 media queries, an extension of the @media rule. (Source: [Wikipedia](https://en.wikipedia.org/wiki/Responsive_web_design)) ### :bulb: Quick Takeaway Responsive web design is all about making web applications look and function properly on all types of device. A quick-and-dirty example would be that a website should look and function properly both in a desktop web browser and on a mobile phone browser. An understanding of responsive design is crucial for any front-end developer! ### :book: Learning Areas and Ideas - Take the [Responsive Web Design Principles section](https://learn.freecodecamp.org/) on freeCodeCamp. - Media queries, breakpoints - Responsive images - Make your website responsive! - Use Chrome DevTools to view your site on different devices/viewports. <a name="accessibility"></a> ![Accessibility](https://i.imgur.com/ayioMQw.jpg) Web accessibility is the inclusive practice of ensuring there are no barriers that prevent interaction with, or access to, websites on the World Wide Web by people with disabilities. When sites are correctly designed, developed and edited, generally all users have equal access to information and functionality. (Source: [Wikipedia](https://en.wikipedia.org/wiki/Web_accessibility)) ### :bulb: Quick Takeaway Accessibility, often written as a11y, is one of the most important topics in front-end web development, yet it seems to often get short shrift. Creating accessible web applications is not only ethically sound, but also makes a lot of business sense considering the additional audience that will be able to view your applications when they are accessible. ### :book: Learning Areas and Ideas - Take the [Applied Accessibility section](https://learn.freecodecamp.org/) on freeCodeCamp. - Read some content on [The A11Y Project](https://a11yproject.com/about) - Review their [checklist](https://a11yproject.com/checklist) - Update your site(s) for accessibility based on this checklist <a name="git"></a> ![Git](https://i.imgur.com/5QoNJqs.jpg) Git is a free and open source distributed version control system designed to handle everything from small to very large projects with speed and efficiency. (Source: [git-scm.com](https://git-scm.com/)) ### :bulb: Quick Takeaway Version/code control is an essential part of any web developer's toolkit. There are a number of different version control systems, but Git is by far the most prevalent at the moment. You can (and should!) use it to track your projects as you learn! ### :book: Learning Areas and Ideas - [Git Tutorial for Beginners (Video)](https://www.youtube.com/watch?v=HVsySz-h9r4) - Install git - Set up a [github](https://github.com) account - Learn the most-used git commands: - init - clone - add - commit - push - pull - merge - rebase - Add your existing projects to github! <a name="node"></a> ![Node and NPM](https://i.imgur.com/8ik2alD.jpg) Node.js is an open-source, cross-platform JavaScript run-time environment that executes JavaScript code outside of a browser. JavaScript is used primarily for client-side scripting, in which scripts written in JavaScript are embedded in a webpage's HTML and run client-side by a JavaScript engine in the user's web browser. Node.js lets developers use JavaScript to write command line tools and for server-side scripting—running scripts server-side to produce dynamic web page content before the page is sent to the user's web browser. Consequently, Node.js represents a "JavaScript everywhere" paradigm, unifying web application development around a single programming language, rather than different languages for server side and client side scripts. (Source: [Wikipedia](https://en.wikipedia.org/wiki/Node.js)) ### :bulb: Quick Takeaway While Node.js is typically known as a back-end solution, it is used quite frequently to support front-end development. It does this in a number of ways, including things like running build tools, testing, and linting (all to be covered soon!). Node Package Manager (npm) is another great feature of Node and can be used to manage dependencies of your project (i.e., code libraries your project might rely on -- jQuery is an example!). ### :book: Learning Areas and Ideas - Research node and how it is different than the browser - Install node (npm comes with it) - Create a simple javascript file and run it with node - Use NPM to manage any dependencies in your existing project(s) (e.g., jQuery!) <a name="sass"></a> ![Sass](https://i.imgur.com/ZRedLge.jpg) Sass is an extension of CSS that adds power and elegance to the basic language. It allows you to use variables, nested rules, mixins, inline imports, and more, all with a fully CSS-compatible syntax. Sass helps keep large stylesheets well-organized, and get small stylesheets up and running quickly, particularly with the help of the Compass style library. (Source: [sass-lang.com](https://sass-lang.com/documentation/file.SASS_REFERENCE.html)) ### :bulb: Quick Takeaway Sass allows you to write CSS in a more programmatic way. If you've done some CSS, you might have noticed that you end up repeating a lot of information--for example, specifying the same color code. In Sass, you can use things like variables, loops, and nesting to reduce redundancy and increase readability. After writing your code in Sass, you can quickly and easily compile it to regular CSS. ### :book: Learning Areas and Ideas - [Install Sass](https://sass-lang.com/install) globally with npm! - [Sass Crash Course Video](https://www.youtube.com/watch?v=roywYSEPSvc) - Follow the [Learn Sass](https://sass-lang.com/guide) tutorial and/or [freeCodeCamp](https://learn.freecodecamp.org/) Sass tutorial. - Update your existing site to generate your CSS using Sass! <a name="bootstrap"></a> ![Bootstrap](https://i.imgur.com/cJ21eH2.jpg) \* Some alternatives: Foundation, Bulma, Materialize Bootstrap is a free and open-source front-end framework for developing websites and web applications. It contains HTML and CSS-based design templates for typography, forms, buttons, navigation and other interface components, as well as optional JavaScript extensions. (Source: [Wikipedia](<https://en.wikipedia.org/wiki/Bootstrap_(front-end_framework)>)) ### :bulb: Quick Takeaway There are many options for laying out, styling, and making your web application dynamic, but you'll find that starting with a framework helps you tremendously in getting a head start. Bootstrap is one such framework, but it is definitely far from the only option! I recommend getting familiar with one framework like this, but it's far more important to grasp HTML, CSS, and JavaScript fundamentals than it is to get caught up in any one framework. ### :book: Learning Areas and Ideas - Learn what Bootstrap is and why you would want to use it - [Bootstrap 4 Crash Course (Video)](https://www.youtube.com/watch?v=hnCmSXCZEpU) - Complete the Bootstrap section on [freeCodeCamp](https://learn.freecodecamp.org/) - Refactor your site using bootstrap! <a name="bem"></a> ![BEM](https://i.imgur.com/MCvMRQl.jpg) The Block, Element, Modifier methodology (commonly referred to as BEM) is a popular naming convention for classes in HTML and CSS. Developed by the team at Yandex, its goal is to help developers better understand the relationship between the HTML and CSS in a given project. (Source: [css-tricks.com](https://css-tricks.com/bem-101/)) ### :bulb: Quick Takeaway It's important to know naming and organization systems like BEM exist and why they are used. Do some research here, but at a beginner level I wouldn't recommend devoting too much time to the subject. ### :book: Learning Areas and Ideas - Read the [BEM introduction](http://getbem.com/introduction/) - [Why I Use BEM (Video)](https://www.youtube.com/watch?v=SLjHSVwXYq4) - Create a simple webpage using BEM conventions. <a name="gulp"></a> ![Gulp](https://i.imgur.com/KQrByqq.jpg) Gulp is a toolkit for automating painful or time-consuming tasks in your development workflow, so you can stop messing around and build something. (Source: [gulpjs.com](https://gulpjs.com/)) ### :bulb: Quick Takeaway In modern front-end development, you'll often find yourself needing to automate tasks like bundling, moving files, and injecting references into HTML files. Gulp is one tool that can help you do these things! ### :book: Learning Areas and Ideas - Install gulp with npm - Follow the [gulp for beginners tutorial](https://css-tricks.com/gulp-for-beginners/) on CSS-Tricks - In your website, set up gulp to: - Compile Sass for you - Put the generated CSS file in `build` subdirectory - Move your web pages to the build directory - Inject a reference to your generated CSS file into your web pages <a name="webpack"></a> ![Webpack](https://i.imgur.com/0rx82Kl.jpg) At its core, webpack is a static module bundler for modern JavaScript applications. When webpack processes your application, it internally builds a dependency graph which maps every module your project needs and generates one or more bundles. (Source: [webpack.js.org](https://webpack.js.org/concepts/)) ### :bulb: Quick Takeaway Imagine that you have a large web development project with a number of different developers working on a lot of different tasks. Rather than all working in the same files, you might want to modularize them as much as possible. Webpack helps enable this by letting your team work modularly and then, come time to build the application, Webpack will stick it all together: HTML, CSS/Sass, JavasScript, images, etc. Webpack isn't the only module bundler, but it seems to be the front-runner at the moment. ### :book: Learning Areas and Ideas - Read [webpack concepts](https://webpack.js.org/concepts/) - [What is Webpack, How does it work? (Video)](https://www.youtube.com/watch?v=GU-2T7k9NfI) - [This webpack tutorial](https://hackernoon.com/a-tale-of-webpack-4-and-how-to-finally-configure-it-in-the-right-way-4e94c8e7e5c1) <a name="eslint"></a> ![ESLint](https://i.imgur.com/CJb6ZnL.jpg) ESLint is an open source JavaScript linting utility originally created by Nicholas C. Zakas in June 2013. Code linting is a type of static analysis that is frequently used to find problematic patterns or code that doesn’t adhere to certain style guidelines. There are code linters for most programming languages, and compilers sometimes incorporate linting into the compilation process. (Source: [eslint.org](https://eslint.org/docs/about/)) ### :bulb: Quick Takeaway Linting is a fantastic tool for code quality, readability, and consistency. Using a linter will help you catch syntax and formatting mistakes before they go to production. You can run linters manually or include them in your build/deployment process. ### :book: Learning Areas and Ideas - Install eslint using npm - [How to Setup VS Code + Prettier + ESLint (Video)](https://www.youtube.com/watch?v=YIvjKId9m2c) - Lint your JavaScript <a name="react"></a> ![React](https://i.imgur.com/uLYz15W.jpg) \* Some alternatives: Vue, Angular, Ember React (also known as React.js or ReactJS) is a JavaScript library for building user interfaces. It is maintained by Facebook and a community of individual developers and companies. React can be used as a base in the development of single-page or mobile applications. Complex React applications usually require the use of additional libraries for state management, routing, and interaction with an API. (source: [Wikipedia](<https://en.wikipedia.org/wiki/React_(JavaScript_library)>)) ### :bulb: Quick Takeaway Front-end JavaScript frameworks are at the forefront of modern front-end development. One important takeaway here is that React, despite being incredibly popular, is only a library for building user interfaces whereas frameworks like Vue and Angular aim to be more full-featured. For example, if you build an application with in React that needs to route to different views, you'll need to bring in something like `react-router`. ### :book: Learning Areas and Ideas - Take the [React tutorial](https://reactjs.org/tutorial/tutorial.html) - [Learn React with Mosh](https://www.youtube.com/watch?v=Ke90Tje7VS0) - Refactor your website as a React app! - Note: `create-react-app` is a convenient tool to scaffold new React projects. <a name="redux"></a> ![Redux](https://i.imgur.com/S9H2Dbp.jpg) Redux is a predictable state container for JavaScript apps. It helps you write applications that behave consistently, run in different environments (client, server, and native), and are easy to test. On top of that, it provides a great developer experience, such as live code editing combined with a time traveling debugger. (Source: [redux.js.org](https://redux.js.org/introduction/getting-started)) ### :bulb: Quick Takeaway As you build bigger and bigger front-end applications, you start realizing that it's hard to maintain application state: things like the if the user is logged in, who the user is, and generally what's going on in the application. Redux is a great library that helps you maintain a single source of state on which your application can base its logic. ### :book: Learning Areas and Ideas - This [Redux video tutorial](https://www.youtube.com/watch?v=93p3LxR9xfM) - This [Redux video series](https://egghead.io/courses/getting-started-with-redux) by Dan Abramov, creator of Redux - Take note of the [Redux three principles](https://redux.js.org/introduction/three-principles) - Single source of truth - State is read-only - Changes are made with pure functions - Add Redux state management to your app! <a name="jest"></a> ![Jest](https://i.imgur.com/Cr39axw.jpg) Jest is a delightful JavaScript Testing Framework with a focus on simplicity. It works with projects using: Babel, TypeScript, Node, React, Angular, Vue and more! (Source: [jestjs.io](https://jestjs.io)) ### :bulb: Quick Takeaway It is very important to set up automated testing for your front-end projects. Setting up automated testing will allow you to make future changes with confidence--if you make changes and your tests still pass, you will be fairly comfortable you didn't break any existing functionality. There are too many testing frameworks to list; Jest is simply one of my favorties. ### :book: Learning Areas and Ideas - Learn [Jest basics](https://jestjs.io/docs/en/getting-started) - If you used `create-react-app`, [Jest is already configured](https://facebook.github.io/create-react-app/docs/running-tests). - Add tests to your application! <a name="typescript"></a> ![TypeScript](https://i.imgur.com/BZROJNs.jpg) \* Alternative: Flow TypeScript is an open-source programming language developed and maintained by Microsoft. It is a strict syntactical superset of JavaScript, and adds optional static typing to the language. TypeScript is designed for development of large applications and transcompiles to JavaScript. As TypeScript is a superset of JavaScript, existing JavaScript programs are also valid TypeScript programs. TypeScript may be used to develop JavaScript applications for both client-side and server-side (Node.js) execution. (Source: [Wikipedia](https://en.wikipedia.org/wiki/TypeScript)) ### :bulb: Quick Takeaway JavaScript is dynamically typed. However, it is a common belief that static typing (i.e., specifying variable types, classes, interfaces ahead of time) is both clearer and reduces the likelihood of defects/bugs. Regardless of how you feel on the topic, it's important to at least get a feel for a statically-typed version of JavaScript like TypeScript. Note that TypeScript compiles down to JavaScript so it can be interpreted by browsers (i.e., browsers don't natively interpret TypeScript). ### :book: Learning Areas and Ideas - [Learn TypeScript in 5 minutes](https://medium.freecodecamp.org/learn-typescript-in-5-minutes-13eda868daeb) - [Learn TypeScript in 50 minutes (Video)](https://www.youtube.com/watch?v=WBPrJSw7yQA) - Optionally [create a React app with TypeScript](https://levelup.gitconnected.com/typescript-and-react-using-create-react-app-a-step-by-step-guide-to-setting-up-your-first-app-6deda70843a4) <a name="nextjs"></a> ![NextJS](https://i.imgur.com/YNtW38J.jpg) Next.js is a minimalistic framework for server-rendered React applications. (Source: [Next.js — React Server Side Rendering Done Right](https://hackernoon.com/next-js-react-server-side-rendering-done-right-f9700078a3b6)) ### :bulb: Quick Takeaway Now we're getting advanced! By now you've built a React (or Vue or Angular) application that does quite a bit of work in the browser. For various reasons (e.g., SEO, concerns over client performance), you might actually want your front-end application to be rendered on the server rather than the client. That's where a framework like next.js comes in. ### :book: Learning Areas and Ideas - Next.js [Getting Started](https://nextjs.org/learn/) - [Next.js Crash Course (Video)](https://www.youtube.com/watch?v=IkOVe40Sy0U) - Create a Next.js app or migrate your existing app to Next.js # But What About X? This list is supposed to give you broad exposure to the front-end ecosystem, but it's simply impossible to hit on every single topic, not to mention the myriad tools within each area! If you do think I missed something very important, please see the [Contributing](#contributing) section to see how you can help make this guide better. # Project Ideas As you progress through #100DaysOfCode, you'll want one or multiple projects to which you can apply your new knowledge. In this section, I attempt to provide a few project ideas that you can use. Alternatively, you're encouraged to come up with your own project ideas as those ideas may interest and motivate you more. - Beginner ideas: - Build a portfolio website - Intermediate/Advanced ideas: - Build a tweet analysis app (If you know back-end and API integration already) # Need Help? Generally, I have found the following resources invaluable to learning software development: - Googling the issue - [StackOverflow](http://www.stackoverflow.com) (There's a good chance your question has already been asked and will be a high-ranking result when googling). - [Mozilla MDN Web Docs](https://developer.mozilla.org/en-US/) - [freeCodeCamp](https://www.freecodecamp.org/) - Local software development Meetups! Most are very friendly to all experience levels. If you'd like my input on anything, feel free to [connect with me on Twitter](http://www.twitter.com/nas5w) and I'll do my best to try to offer some assistance. If you think there's an issue with the curriculum or have a recommendation, see the [contributing section](#contributing) below. # Contributing ## Spread the Word If you appreciate the work done here, you can contribute significantly by spreading the word about this repository, including things like: - Starring and forking this repository - Sharing this repository on social media ## Contribute to this Repository This is a work in progress and I very much appreciate any help in maintaining this knowledge base! When contributing to this repository, please first discuss the change you wish to make via issue before making a change. Otherwise, it will be very hard to understand your proposal and could potentially result in you putting in a lot of work to a change that won't get merged. Please note that everyone involved in this project is either trying to learn or trying to help--Please be nice! ## Pull Request Process 1. Create an issue outlining the proposed pull request. 2. Obtain approval from a project owner to make the proposed change. 3. Create the pull request.
530
📚 Study guide and introduction to the modern front end stack.
Grab Front End Guide == [![Front End Developer Desk](images/desk.png)](https://dribbble.com/shots/3577639-Isometric-Developer-Desk) _Credits: [Illustration](https://dribbble.com/shots/3577639-Isometric-Developer-Desk) by [@yangheng](https://dribbble.com/yangheng)_ _This guide has been cross-posted on [Free Code Camp](https://medium.freecodecamp.com/grabs-front-end-guide-for-large-teams-484d4033cc41)._ [Grab](https://www.grab.com) is Southeast Asia (SEA)'s leading transportation platform and our mission is to drive SEA forward, leveraging on the latest technology and the talented people we have in the company. As of May 2017, we handle [2.3 million rides daily](https://www.bloomberg.com/news/videos/2017-05-11/tans-says-company-has-more-than-850-000-drivers-video) and we are growing and hiring at a rapid scale. To keep up with Grab's phenomenal growth, our web team and web platforms have to grow as well. Fortunately, or unfortunately, at Grab, the web team has been [keeping up](https://blog.daftcode.pl/hype-driven-development-3469fc2e9b22) with the latest best practices and has incorporated the modern JavaScript ecosystem in our web apps. The result of this is that our new hires or back end engineers, who are not necessarily well-acquainted with the modern JavaScript ecosystem, may feel overwhelmed by the barrage of new things that they have to learn just to complete their feature or bug fix in a web app. Front end development has never been so complex and exciting as it is today. New tools, libraries, frameworks and plugins emerge every other day and there is so much to learn. It is imperative that newcomers to the web team are guided to embrace this evolution of the front end, learn to navigate the ecosystem with ease, and get productive in shipping code to our users as fast as possible. We have come up with a study guide to introduce why we do what we do, and how we handle front end at scale. This study guide is inspired by ["A Study Plan to Cure JavaScript Fatigue"](https://medium.freecodecamp.com/a-study-plan-to-cure-javascript-fatigue-8ad3a54f2eb1#.g9egaapps) and is mildly opinionated in the sense that we recommend certain libraries/frameworks to learn for each aspect of front end development, based on what is currently deemed most suitable at Grab. We explain why a certain library/framework/tool is chosen and provide links to learning resources to enable the reader to pick it up on their own. Alternative choices that may be better for other use cases are provided as well for reference and further self-exploration. If you are familiar with front end development and have been consistently keeping up with the latest developments, this guide will probably not be that useful to you. It is targeted at newcomers to front end. If your company is exploring a modern JavaScript stack as well, you may find this study plan useful to your company too! Feel free to adapt it to your needs. We will update this study plan periodically, according to our latest work and choices. *- Grab Web Team* **Pre-requisites** - Good understanding of core programming concepts. - Comfortable with basic command line actions and familiarity with source code version control systems such as Git. - Experience in web development. Have built server-side rendered web apps using frameworks like Ruby on Rails, Django, Express, etc. - Understanding of how the web works. Familiarity with web protocols and conventions like HTTP and RESTful APIs. ### Table of Contents - [Single-page Apps (SPAs)](#single-page-apps-spas) - [New-age JavaScript](#new-age-javascript) - [User Interface](#user-interface---react) - [State Management](#state-management---fluxredux) - [Coding with Style](#coding-with-style---css-modules) - [Maintainability](#maintainability) - [Testing](#testing---jest--enzyme) - [Linting JavaScript](#linting-javascript---eslint) - [Linting CSS](#linting-css---stylelint) - [Formatting Code](#formatting-code---prettier) - [Types](#types---flow) - [Build System](#build-system---webpack) - [Package Management](#package-management---yarn) - [Continuous Integration](#continuous-integration) - [Hosting and CDN](#hosting-and-cdn) - [Deployment](#deployment) - [Monitoring](#monitoring) Certain topics can be skipped if you have prior experience in them. ## Single-page Apps (SPAs) Web developers these days refer to the products they build as web apps, rather than websites. While there is no strict difference between the two terms, web apps tend to be highly interactive and dynamic, allowing the user to perform actions and receive a response for their action. Traditionally, the browser receives HTML from the server and renders it. When the user navigates to another URL, a full-page refresh is required and the server sends fresh new HTML for the new page. This is called server-side rendering. However in modern SPAs, client-side rendering is used instead. The browser loads the initial page from the server, along with the scripts (frameworks, libraries, app code) and stylesheets required for the whole app. When the user navigates to other pages, a page refresh is not triggered. The URL of the page is updated via the [HTML5 History API](https://developer.mozilla.org/en-US/docs/Web/API/History_API). New data required for the new page, usually in JSON format, is retrieved by the browser via [AJAX](https://developer.mozilla.org/en-US/docs/AJAX/Getting_Started) requests to the server. The SPA then dynamically updates the page with the data via JavaScript, which it has already downloaded in the initial page load. This model is similar to how native mobile apps work. The benefits: - The app feels more responsive and users do not see the flash between page navigations due to full-page refreshes. - Fewer HTTP requests are made to the server, as the same assets do not have to be downloaded again for each page load. - Clear separation of the concerns between the client and the server; you can easily build new clients for different platforms (e.g. mobile, chatbots, smart watches) without having to modify the server code. You can also modify the technology stack on the client and server independently, as long as the API contract is not broken. The downsides: - Heavier initial page load due to loading of framework, app code, and assets required for multiple pages.<sup><a href="#fn1" id="ref1">1</a></sup> - There's an additional step to be done on your server which is to configure it to route all requests to a single entry point and allow client-side routing to take over from there. - SPAs are reliant on JavaScript to render content, but not all search engines execute JavaScript during crawling, and they may see empty content on your page. This inadvertently hurts the Search Engine Optimization (SEO) of your app. <sup><a href="#fn2" id="ref2">2</a></sup>. However, most of the time, when you are building apps, SEO is not the most important factor, as not all the content needs to be indexable by search engines. To overcome this, you can either server-side render your app or use services such as [Prerender](https://prerender.io/) to "render your javascript in a browser, save the static HTML, and return that to the crawlers". While traditional server-side rendered apps are still a viable option, a clear client-server separation scales better for larger engineering teams, as the client and server code can be developed and released independently. This is especially so at Grab when we have multiple client apps hitting the same API server. As web developers are now building apps rather than pages, organization of client-side JavaScript has become increasingly important. In server-side rendered pages, it is common to use snippets of jQuery to add user interactivity to each page. However, when building large apps, just jQuery is insufficient. After all, jQuery is primarily a library for DOM manipulation and it's not a framework; it does not define a clear structure and organization for your app. JavaScript frameworks have been created to provide higher-level abstractions over the DOM, allowing you to keep state in memory, out of the DOM. Using frameworks also brings the benefits of reusing recommended concepts and best practices for building apps. A new engineer on the team who is unfamiliar with the code base, but has experience with a framework, will find it easier to understand the code because it is organized in a structure that they are familiar with. Popular frameworks have a lot of tutorials and guides, and tapping on the knowledge and experience from colleagues and the community will help new engineers get up to speed. #### Study Links - [Single Page App: advantages and disadvantages](http://stackoverflow.com/questions/21862054/single-page-app-advantages-and-disadvantages) - [The (R)Evolution of Web Development](http://blog.isquaredsoftware.com/presentations/2016-10-revolution-of-web-dev/) - [Here's Why Client Side Rendering Won](https://medium.freecodecamp.com/heres-why-client-side-rendering-won-46a349fadb52) ## New-age JavaScript Before you dive into the various aspects of building a JavaScript web app, it is important to get familiar with the language of the web - JavaScript, or ECMAScript. JavaScript is an incredibly versatile language which you can also use to build [web servers](https://nodejs.org/en/), [native mobile apps](https://facebook.github.io/react-native/) and [desktop apps](https://electron.atom.io/). Prior to 2015, the last major update was ECMAScript 5.1, in 2011. However, in the recent years, JavaScript has suddenly seen a huge burst of improvements within a short span of time. In 2015, ECMAScript 2015 (previously called ECMAScript 6) was released and a ton of syntactic constructs were introduced to make writing code less unwieldy. If you are curious about it, Auth0 has written a nice article on the [history of JavaScript](https://auth0.com/blog/a-brief-history-of-javascript/). Till this day, not all browsers have fully implemented the ES2015 specification. Tools such as [Babel](https://babeljs.io/) enable developers to write ES2015 in their apps and Babel transpiles them down to ES5 to be compatible for browsers. Being familiar with both ES5 and ES2015 is crucial. ES2015 is still relatively new and a lot of open source code and Node.js apps are still written in ES5. If you are doing debugging in your browser console, you might not be able to use ES2015 syntax. On the other hand, documentation and example code for many modern libraries that we will introduce later below are still written in ES2015. At Grab, we use [babel-preset-env](https://github.com/babel/babel-preset-env) to enjoy the productivity boost from the syntactic improvements the future of JavaScript provides and we have been loving it so far. `babel-preset-env` intelligently determines which Babel plugins are necessary (which new language features are not supported and have to be transpiled) as browsers increase native support for more ES language features. If you prefer using language features that are already stable, you may find that [babel-preset-stage-3](https://babeljs.io/docs/plugins/preset-stage-3/), which is a complete specification that will most likely be implemented in browsers, will be more suitable. Spend a day or two revising ES5 and exploring ES2015. The more heavily used features in ES2015 include "Arrows and Lexical This", "Classes", "Template Strings", "Destructuring", "Default/Rest/Spread operators", and "Importing and Exporting modules". **Estimated Duration: 3-4 days.** You can learn/lookup the syntax as you learn the other libraries and try building your own app. #### Study Links - [Learn ES5 on Codecademy](https://www.codecademy.com/learn/learn-javascript) - [Learn ES6 on Codecademy](https://www.codecademy.com/learn/introduction-to-javascript) - [Learn ES2015 on Babel](https://babeljs.io/learn-es2015/) - [ES6 Katas](http://es6katas.org/) - [You Don't Know JS](https://github.com/getify/You-Dont-Know-JS) (Advanced content, optional for beginners) - [Answers to Front End Job Interview Questions — JavaScript](https://github.com/yangshun/front-end-interview-handbook/blob/master/questions/javascript-questions.md) ## User Interface - React <img alt="React Logo" src="https://cdn.rawgit.com/grab/front-end-guide/master/images/react-logo.svg" width="256px" /> If any JavaScript project has taken the front end ecosystem by storm in recent years, that would be [React](https://facebook.github.io/react/). React is a library built and open-sourced by the smart people at Facebook. In React, developers write components for their web interface and compose them together. React brings about many radical ideas and encourages developers to [rethink best practices](https://www.youtube.com/watch?v=DgVS-zXgMTk). For many years, web developers were taught that it was a good practice to write HTML, JavaScript and CSS separately. React does the exact opposite, and encourages that you write your HTML and [CSS in your JavaScript](https://speakerdeck.com/vjeux/react-css-in-js) instead. This sounds like a crazy idea at first, but after trying it out, it actually isn't as weird as it sounds initially. Reason being the front end development scene is shifting towards a paradigm of component-based development. The features of React: - **Declarative** - You describe what you want to see in your view and not how to achieve it. In the jQuery days, developers would have to come up with a series of steps to manipulate the DOM to get from one app state to the next. In React, you simply change the state within the component and the view will update itself according to the state. It is also easy to determine how the component will look like just by looking at the markup in the `render()` method. - **Functional** - The view is a pure function of `props` and `state`. In most cases, a React component is defined by `props` (external parameters) and `state` (internal data). For the same `props` and `state`, the same view is produced. Pure functions are easy to test, and the same goes for functional components. Testing in React is made easy because a component's interfaces are well-defined and you can test the component by supplying different `props` and `state` to it and comparing the rendered output. - **Maintainable** - Writing your view in a component-based fashion encourages reusability. We find that defining a component's `propTypes` make React code self-documenting as the reader can know clearly what is needed to use that component. Lastly, your view and logic is self-contained within the component, and should not be affected nor affect other components. That makes it easy to shift components around during large-scale refactoring, as long as the same `props` are supplied to the component. - **High Performance** - You might have heard that React uses a virtual DOM (not to be confused with [shadow DOM](https://developer.mozilla.org/en-US/docs/Web/Web_Components/Shadow_DOM)) and it re-renders everything when there is a change in state. Why is there a need for a virtual DOM? While modern JavaScript engines are fast, reading from and writing to the DOM is slow. React keeps a lightweight virtual representation of the DOM in memory. Re-rendering everything is a misleading term. In React it actually refers to re-rendering the in-memory representation of the DOM, not the actual DOM itself. When there's a change in the underlying data of the component, a new virtual representation is created, and compared against the previous representation. The difference (minimal set of changes required) is then patched to the real browser DOM. - **Ease of Learning** - Learning React is pretty simple. The React API surface is relatively small compared to [this](https://angular.io/docs/ts/latest/api/); there are only a few APIs to learn and they do not change often. The React community is one of the largest, and along with that comes a vibrant ecosystem of tools, open-sourced UI components, and a ton of great resources online to get you started on learning React. - **Developer Experience** - There are a number of tools that improves the development experience with React. [React Developer Tools](https://github.com/facebook/react-devtools) is a browser extension that allows you to inspect your component, view and manipulate its `props` and `state`. [Hot reloading](https://github.com/gaearon/react-hot-loader) with webpack allows you to view changes to your code in your browser, without you having to refresh the browser. Front end development involves a lot of tweaking code, saving and then refreshing the browser. Hot reloading helps you by eliminating the last step. When there are library updates, Facebook provides [codemod scripts](https://github.com/reactjs/react-codemod) to help you migrate your code to the new APIs. This makes the upgrading process relatively pain-free. Kudos to the Facebook team for their dedication in making the development experience with React great. <br> ![React Devtools Demo](images/react-devtools-demo.gif) Over the years, new view libraries that are even more performant than React have emerged. React may not be the fastest library out there, but in terms of the ecosystem, overall usage experience and benefits, it is still one of the greatest. Facebook is also channeling efforts into making React even faster with a [rewrite of the underlying reconciliation algorithm](https://github.com/acdlite/react-fiber-architecture). The concepts that React introduced has taught us how to write better code, more maintainable web apps and made us better engineers. We like that. We recommend going through the [tutorial](https://facebook.github.io/react/tutorial/tutorial.html) on building a tic-tac-toe game on the React homepage to get a feel of what React is and what it does. For more in-depth learning, check out the Egghead course, [Build Your First Production Quality React App](https://egghead.io/courses/build-your-first-production-quality-react-app). It covers some advanced concepts and real-world usages that are not covered by the React documentation. [Create React App](https://github.com/facebookincubator/create-react-app) by Facebook is a tool to scaffold a React project with minimal configuration and is highly recommended to use for starting new React projects. React is a library, not a framework, and does not deal with the layers below the view - the app state. More on that later. **Estimated Duration: 3-4 days.** Try building simple projects like a to-do list, Hacker News clone with pure React. You will slowly gain an appreciation for it and perhaps face some problems along the way that isn't solved by React, which brings us to the next topic... #### Study Links - [React Official Tutorial](https://facebook.github.io/react/tutorial/tutorial.html) - [Egghead Course - Build Your First Production Quality React App](https://egghead.io/courses/build-your-first-production-quality-react-app) - [Simple React Development in 2017](https://hackernoon.com/simple-react-development-in-2017-113bd563691f) - [Presentational and Container Components](https://medium.com/@dan_abramov/smart-and-dumb-components-7ca2f9a7c7d0#.5iexphyg5) #### Alternatives - [Angular](https://angular.io/) - [Ember](https://www.emberjs.com/) - [Vue](https://vuejs.org/) - [Cycle](https://cycle.js.org/) ## State Management - Flux/Redux <img alt="Redux Logo" src="https://cdn.rawgit.com/grab/front-end-guide/master/images/redux-logo.svg" width="256px" /> As your app grows bigger, you may find that the app structure becomes a little messy. Components throughout the app may have to share and display common data but there is no elegant way to handle that in React. After all, React is just the view layer, it does not dictate how you structure the other layers of your app, such as the model and the controller, in traditional MVC paradigms. In an effort to solve this, Facebook invented Flux, an app architecture that complements React's composable view components by utilizing a unidirectional data flow. Read more about how Flux works [here](https://facebook.github.io/flux/docs/in-depth-overview.html). In summary, the Flux pattern has the following characteristics: - **Unidirectional data flow** - Makes the app more predictable as updates can be tracked easily. - **Separation of concerns** - Each part in the Flux architecture has clear responsibilities and are highly decoupled. - **Works well with declarative programming** - The store can send updates to the view without specifying how to transition views between states. As Flux is not a framework per se, developers have tried to come up with many implementations of the Flux pattern. Eventually, a clear winner emerged, which was [Redux](http://redux.js.org/). Redux combines the ideas from Flux, [Command pattern](https://www.wikiwand.com/en/Command_pattern) and [Elm architecture](https://guide.elm-lang.org/architecture/) and is the de facto state management library developers use with React these days. Its core concepts are: - App **state** is described by a single plain old JavaScript object (POJO). - Dispatch an **action** (also a POJO) to modify the state. - **Reducer** is a pure function that takes in current state and action to produce a new state. The concepts sound simple, but they are really powerful as they enable apps to: - Have their state rendered on the server, booted up on the client. - Trace, log and backtrack changes in the whole app. - Implement undo/redo functionality easily. The creator of Redux, [Dan Abramov](https://github.com/gaearon), has taken great care in writing up detailed documentation for Redux, along with creating comprehensive video tutorials for learning [basic](https://egghead.io/courses/getting-started-with-redux) and [advanced](https://egghead.io/courses/building-react-applications-with-idiomatic-redux) Redux. They are extremely helpful resources for learning Redux. **Combining View and State** While Redux does not necessarily have to be used with React, it is highly recommended as they play very well with each other. React and Redux have a lot of ideas and traits in common: - **Functional composition paradigm** - React composes views (pure functions) while Redux composes pure reducers (also pure functions). Output is predictable given the same set of input. - **Easy To Reason About** - You may have heard this term many times but what does it actually mean? We interpret it as having control and understanding over our code - Our code behaves in ways we expect it to, and when there are problems, we can find them easily. Through our experience, React and Redux makes debugging simpler. As the data flow is unidirectional, tracing the flow of data (server responses, user input events) is easier and it is straightforward to determine which layer the problem occurs in. - **Layered Structure** - Each layer in the app / Flux architecture is a pure function, and has clear responsibilities. It is relatively easy to write tests for pure functions. You have to centralize changes to your app within the reducer, and the only way to trigger a change is to dispatch an action. - **Development Experience** - A lot of effort has gone into creating tools to help in debugging and inspecting the app while development, such as [Redux DevTools](https://github.com/gaearon/redux-devtools). <br> ![Redux Devtools Demo](images/redux-devtools-demo.gif) Your app will likely have to deal with async calls like making remote API requests. [redux-thunk](https://github.com/gaearon/redux-thunk) and [redux-saga](https://github.com/redux-saga/redux-saga) were created to solve those problems. They may take some time to understand as they require understanding of functional programming and generators. Our advice is to deal with it only when you need it. [react-redux](https://github.com/reactjs/react-redux) is an official React binding for Redux and is very simple to learn. **Estimated Duration: 4 days.** The egghead courses can be a little time-consuming but they are worth spending time on. After learning Redux, you can try incorporating it into the React projects you have built. Does Redux solve some of the state management issues you were struggling with in pure React? #### Study Links - [Flux Homepage](http://facebook.github.io/flux) - [Redux Homepage](http://redux.js.org/) - [Egghead Course - Getting Started with Redux](https://egghead.io/courses/getting-started-with-redux) - [Egghead Course - Build React Apps with Idiomatic Redux](https://egghead.io/courses/building-react-applications-with-idiomatic-redux) - [React Redux Links](https://github.com/markerikson/react-redux-links) - [You Might Not Need Redux](https://medium.com/@dan_abramov/you-might-not-need-redux-be46360cf367) #### Alternatives - [MobX](https://github.com/mobxjs/mobx) ## Coding with Style - CSS Modules <img alt="CSS Modules Logo" src="https://cdn.rawgit.com/grab/front-end-guide/master/images/css-modules-logo.svg" width="256px" /> CSS (Cascading Style Sheets) are rules to describe how your HTML elements look. Writing good CSS is hard. It usually takes many years of experience and frustration of shooting yourself in the foot before one is able to write maintainable and scalable CSS. CSS, having a global namespace, is fundamentally designed for web documents, and not really for web apps that favor a components architecture. Hence, experienced front end developers have designed methodologies to guide people on how to write organized CSS for complex projects, such as using [SMACSS](https://smacss.com/), [BEM](http://getbem.com/), [SUIT CSS](http://suitcss.github.io/), etc. However, the encapsulation of styles that these methodologies bring about are artificially enforced by conventions and guidelines. They break the moment developers do not follow them. As you might have realized by now, the front end ecosystem is saturated with tools, and unsurprisingly, tools have been invented to [partially solve some of the problems](https://speakerdeck.com/vjeux/react-css-in-js) with writing CSS at scale. "At scale" means that many developers are working on the same large project and touching the same stylesheets. There is no community-agreed approach on writing [CSS in JS](https://github.com/MicheleBertoli/css-in-js) at the moment, and we are hoping that one day a winner would emerge, just like Redux did, among all the Flux implementations. For now, we are banking on [CSS Modules](https://github.com/css-modules/css-modules). CSS modules is an improvement over existing CSS that aims to fix the problem of global namespace in CSS; it enables you to write styles that are local by default and encapsulated to your component. This feature is achieved via tooling. With CSS modules, large teams can write modular and reusable CSS without fear of conflict or overriding other parts of the app. However, at the end of the day, CSS modules are still being compiled into normal globally-namespaced CSS that browsers recognize, and it is still important to learn and understand how raw CSS works. If you are a total beginner to CSS, Codecademy's [HTML & CSS course](https://www.codecademy.com/learn/learn-html-css) will be a good introduction to you. Next, read up on the [Sass preprocessor](http://sass-lang.com/), an extension of the CSS language which adds syntactic improvements and encourages style reusability. Study the CSS methodologies mentioned above, and lastly, CSS modules. **Estimated Duration: 3-4 days.** Try styling up your app using the SMACSS/BEM approach and/or CSS modules. #### Study Links - [Learn HTML & CSS course on Codecademy](https://www.codecademy.com/learn/learn-html-css) - [Intro to HTML/CSS on Khan Academy](https://www.khanacademy.org/computing/computer-programming/html-css) - [SMACSS](https://smacss.com/) - [BEM](http://getbem.com/introduction/) - [SUIT CSS](http://suitcss.github.io/) - [CSS Modules Specification](https://github.com/css-modules/css-modules) - [Sass Homepage](http://sass-lang.com/) - [Answers to Front End Job Interview Questions — HTML](https://github.com/yangshun/tech-interview-handbook/blob/master/front-end/interview-questions.md#html-questions) - [Answers to Front End Job Interview Questions — CSS](https://github.com/yangshun/tech-interview-handbook/blob/master/front-end/interview-questions.md#css-questions) #### Alternatives - [JSS](https://github.com/cssinjs/jss) - [Styled Components](https://github.com/styled-components/styled-components) ## Maintainability Code is read more frequently than it is written. This is especially true at Grab, where the team size is large and we have multiple engineers working across multiple projects. We highly value readability, maintainability and stability of the code and there are a few ways to achieve that: "Extensive testing", "Consistent coding style" and "Typechecking". Also when you are in a team, sharing same practices becomes really important. Check out these [JavaScript Project Guidelines](https://github.com/wearehive/project-guidelines) for instance. ## Testing - Jest + Enzyme <img alt="Jest Logo" src="https://cdn.rawgit.com/grab/front-end-guide/master/images/jest-logo.svg" width="164px" /> [Jest](http://facebook.github.io/jest/) is a testing library by Facebook that aims to make the process of testing pain-free. As with Facebook projects, it provides a great development experience out of the box. Tests can be run in parallel resulting in shorter duration. During watch mode, by default, only the tests for the changed files are run. One particular feature we like is "Snapshot Testing". Jest can save the generated output of your React component and Redux state and save it as serialized files, so you wouldn't have to manually come up with the expected output yourself. Jest also comes with built-in mocking, assertion and test coverage. One library to rule them all! ![Jest Demo](images/jest-demo.gif) React comes with some testing utilities, but [Enzyme](http://airbnb.io/enzyme/) by Airbnb makes it easier to generate, assert, manipulate and traverse your React components' output with a jQuery-like API. It is recommended that Enzyme be used to test React components. Jest and Enzyme makes writing front end tests fun and easy. When writing tests becomes enjoyable, developers write more tests. It also helps that React components and Redux actions/reducers are relatively easy to test because of clearly defined responsibilities and interfaces. For React components, we can test that given some `props`, the desired DOM is rendered, and that callbacks are fired upon certain simulated user interactions. For Redux reducers, we can test that given a prior state and an action, a resulting state is produced. The documentation for Jest and Enzyme are pretty concise, and it should be sufficient to learn them by reading it. **Estimated Duration: 2-3 days.** Try writing Jest + Enzyme tests for your React + Redux app! #### Study Links - [Jest Homepage](http://facebook.github.io/jest/) - [Testing React Applications with Jest](https://auth0.com/blog/testing-react-applications-with-jest/) - [Enzyme Homepage](http://airbnb.io/enzyme/) - [Enzyme: JavaScript Testing utilities for React](https://medium.com/airbnb-engineering/enzyme-javascript-testing-utilities-for-react-a417e5e5090f) #### Alternatives - [AVA](https://github.com/avajs/ava) - [Karma](https://karma-runner.github.io/) ## Linting JavaScript - ESLint <img alt="ESLint Logo" src="https://cdn.rawgit.com/grab/front-end-guide/master/images/eslint-logo.svg" width="256px" /> A linter is a tool to statically analyze code and finds problems with them, potentially preventing bugs/runtime errors and at the same time, enforcing a coding style. Time is saved during pull request reviews when reviewers do not have to leave nitpicky comments on coding style. [ESLint](http://eslint.org/) is a tool for linting JavaScript code that is highly extensible and customizable. Teams can write their own lint rules to enforce their custom styles. At Grab, we use Airbnb's [`eslint-config-airbnb`](https://www.npmjs.com/package/eslint-config-airbnb) preset, that has already been configured with the common good coding style in the [Airbnb JavaScript style guide](https://github.com/airbnb/javascript). For the most part, using ESLint is as simple as tweaking a configuration file in your project folder. There's nothing much to learn about ESLint if you're not writing new rules for it. Just be aware of the errors when they surface and Google it to find out the recommended style. **Estimated Duration: 1/2 day.** Nothing much to learn here. Add ESLint to your project and fix the linting errors! #### Study Links - [ESLint Homepage](http://eslint.org/) - [Airbnb JavaScript Style Guide](https://github.com/airbnb/javascript) #### Alternatives - [Standard](https://github.com/standard/standard) - [JSHint](http://jshint.com/) - [XO](https://github.com/xojs/xo) ## Linting CSS - stylelint <img alt="stylelint Logo" src="https://cdn.rawgit.com/grab/front-end-guide/master/images/stylelint-logo.svg" width="256px" /> As mentioned earlier, good CSS is notoriously hard to write. Usage of static analysis tools on CSS can help to maintain our CSS code quality and coding style. For linting CSS, we use stylelint. Like ESLint, stylelint is designed in a very modular fashion, allowing developers to turn rules on/off and write custom plugins for it. Besides CSS, stylelint is able to parse SCSS and has experimental support for Less, which lowers the barrier for most existing code bases to adopt it. ![stylelint Demo](images/stylelint-demo.png) Once you have learnt ESLint, learning stylelint would be effortless considering their similarities. stylelint is currently being used by big companies like [Facebook](https://code.facebook.com/posts/879890885467584/improving-css-quality-at-facebook-and-beyond/), [Github](https://github.com/primer/stylelint-config-primer) and [Wordpress](https://github.com/WordPress-Coding-Standards/stylelint-config-wordpress). One downside of stylelint is that the autofix feature is not fully mature yet, and is only able to fix for a limited number of rules. However, this issue should improve with time. **Estimated Duration: 1/2 day.** Nothing much to learn here. Add stylelint to your project and fix the linting errors! #### Study Links - [stylelint Homepage](https://stylelint.io/) - [Lint your CSS with stylelint](https://css-tricks.com/stylelint/) #### Alternatives - [Sass Lint](https://github.com/sasstools/sass-lint) - [CSS Lint](http://csslint.net/) ## Formatting Code - Prettier <img alt="Prettier Logo" src="https://cdn.rawgit.com/grab/front-end-guide/master/images/prettier-logo.png" width="256px" /> Another tool for enforcing consistent coding style for JavaScript and CSS is [Prettier](https://github.com/prettier/prettier). In most cases, it is recommended to setup Prettier on top of ESLint and stylelint and integrate it into the workflow. This allows the code to be formatted into consistent style automatically via commit hooks, so that developers do not need to spend time formatting the coding style manually. Note that Prettier only enforces coding style, but does not check for logic errors in the code. Hence it is not a replacement for linters. **Estimated Duration: 1/2 day.** Nothing much to learn here. Add Prettier to your project and add hooks to enforce the coding style! #### Study Links - [Prettier Homepage](https://prettier.io/) - [Prettier GitHub repo](https://github.com/prettier/prettier) - [Comparison between tools that allow you to use ESLint and Prettier together](https://gist.github.com/yangshun/318102f525ec68033bf37ac4a010eb0c) ## Types - Flow <img alt="Flow Logo" src="https://cdn.rawgit.com/grab/front-end-guide/master/images/flow-logo.png" width="256px" /> Static typing brings about many benefits when writing apps. They can catch common bugs and errors in your code early. Types also serve as a form of documentation for your code and improves the readability of your code. As a code base grows larger, we see the importance of types as they gives us greater confidence when we do refactoring. It is also easier to onboard new members of the team to the project when it is clear what kind of values each object holds and what each function expects. Adding types to your code comes with the trade-off of increased verbosity and a learning curve of the syntax. But this learning cost is paid upfront and amortized over time. In complex projects where the maintainability of the code matters and the people working on it change over time, adding types to the code brings about more benefits than disadvantages. Recently, I had to fix a bug in a code base that I haven’t touched in months. It was thanks to types that I could easily refresh myself on what the code was doing, and gave me confidence in the fix I made. The two biggest contenders in adding static types to JavaScript are [Flow](https://flow.org/) (by Facebook) and [TypeScript](https://www.typescriptlang.org/) (by Microsoft). As of date, there is no clear winner in the battle. For now, we have made the choice of using Flow. We find that Flow has a lower learning curve as compared to TypeScript and it requires relatively less effort to migrate an existing code base to Flow. Being built by Facebook, Flow has better integration with the React ecosystem out of the box. [James Kyle](https://twitter.com/thejameskyle), one of the authors of Flow, has [written](http://thejameskyle.com/adopting-flow-and-typescript.html) on a comparison between adopting Flow and TypeScript. Anyway, it is not extremely difficult to move from Flow to TypeScript as the syntax and semantics are quite similar, and we will re-evaluate the situation in time to come. After all, using one is better than not using any at all. Flow recently revamped their homepage and it's pretty neat now! **Estimated Duration: 1 day.** Flow is pretty simple to learn as the type annotations feel like a natural extension of the JavaScript language. Add Flow annotations to your project and embrace the power of type systems. #### Study Links - [Flow Homepage](https://flow.org/) - [TypeScript vs Flow](https://github.com/niieani/typescript-vs-flowtype) #### Alternatives - [TypeScript](https://www.typescriptlang.org/) ## Build System - webpack <img alt="webpack Logo" src="https://cdn.rawgit.com/grab/front-end-guide/master/images/webpack-logo.svg" width="256px" /> This part will be kept short as setting up webpack can be a tedious process and might be a turn-off to developers who are already overwhelmed by the barrage of new things they have to learn for front end development. In a nutshell, [webpack](https://webpack.js.org/) is a module bundler that compiles a front end project and its dependencies into a final bundle to be served to users. Usually, projects will already have the webpack configuration set up and developers rarely have to change it. Having an understanding of webpack is still a good to have in the long run. It is due to webpack that features like hot reloading and CSS modules are made possible. We have found the [webpack walkthrough](https://survivejs.com/webpack/foreword/) by SurviveJS to be the best resource on learning webpack. It is a good complement to the official documentation and we recommend following the walkthrough first and referring to the documentation later when the need for further customization arises. **Estimated Duration: 2 days (Optional).** #### Study Links - [webpack Homepage](https://webpack.js.org/) - [SurviveJS - Webpack: From apprentice to master](https://survivejs.com/webpack/foreword/) #### Alternatives - [Rollup](https://rollupjs.org/) - [Browserify](http://browserify.org/) - [Parcel](https://parceljs.org/) ## Package Management - Yarn <img alt="Yarn Logo" src="https://cdn.rawgit.com/grab/front-end-guide/master/images/yarn-logo.png" width="256px" /> If you take a peek into your `node_modules` directory, you will be appalled by the number of directories that are contained in it. Each babel plugin, lodash function, is a package on its own. When you have multiple projects, these packages are duplicated across each project and they are largely similar. Each time you run `npm install` in a new project, these packages are downloaded over and over again even though they already exist in some other project in your computer. There was also the problem of non-determinism in the installed packages via `npm install`. Some of our CI builds fail because at the point of time when the CI server installs the dependencies, it pulled in minor updates to some packages that contained breaking changes. This would not have happened if library authors respected [semver](http://semver.org/) and engineers did not assume that API contracts would be respected all the time. [Yarn](https://yarnpkg.com/) solves these problems. The issue of non-determinism of installed packages is handled via a `yarn.lock` file, which ensures that every install results in the exact same file structure in `node_modules` across all machines. Yarn utilizes a global cache directory within your machine, and packages that have been downloaded before do not have to be downloaded again. This also enables offline installation of dependencies! The most common Yarn commands can be found [here](https://yarnpkg.com/en/docs/usage). Most other yarn commands are similar to the `npm` equivalents and it is fine to use the `npm` versions instead. One of our favorite commands is `yarn upgrade-interactive` which makes updating dependencies a breeze especially when the modern JavaScript project requires so many dependencies these days. Do check it out! [email protected] was [released in May 2017](https://github.com/npm/npm/releases/tag/v5.0.0) and it seems to address many of the issues that Yarn aims to solve. Do keep an eye on it! **Estimated Duration: 2 hours.** #### Study Links - [Yarn Homepage](https://yarnpkg.com/) - [Yarn: A new package manager for JavaScript](https://code.facebook.com/posts/1840075619545360) #### Alternatives - [Good old npm](https://github.com/npm/npm/releases/tag/v5.0.0) ## Continuous Integration We used [Travis CI](https://travis-ci.com/) for our continuous integration (CI) pipeline. Travis is a highly popular CI on Github and its [build matrix](https://docs.travis-ci.com/user/customizing-the-build#Build-Matrix) feature is useful for repositories which contain multiple projects like Grab's. We configured Travis to do the following: - Run linting for the project. - Run unit tests for the project. - If the tests pass: - Test coverage generated by Jest is uploaded to [Codecov](https://codecov.io/). - Generate a production bundle with webpack into a `build` directory. - `tar` the `build` directory as `<hash>.tar` and upload it to an S3 bucket which stores all our tar builds. - Post a notification to Slack to inform about the Travis build result. #### Study Links - [Travis Homepage](https://travis-ci.com/) - [Codecov Homepage](https://codecov.io/) #### Alternatives - [Jenkins](https://jenkins.io/) - [CircleCI](https://circleci.com/) - [GitLab CI/CD](https://about.gitlab.com/product/continuous-integration/) ## Hosting and CDN Traditionally, web servers that receive a request for a webpage will render the contents on the server, and return a HTML page with dynamic content meant for the requester. This is known as server-side rendering. As mentioned earlier in the section on Single-page Apps, modern web applications do not involve server-side rendering, and it is sufficient to use a web server that serves static asset files. Nginx and Apache are possible options and not much configuration is required to get things up and runnning. The caveat is that the web server will have to be configured to route all requests to a single entry point and allow client-side routing to take over. The flow for front end routing goes like this: 1. Web server receives a HTTP request for a particular route, for example `/user/john`. 1. Regardless of which route the server receives, serve up `index.html` from the static assets directory. 1. The `index.html` should contain scripts that load up a JavaScript framework/library that handles client-side routing. 1. The client-side routing library reads the current route, and communicates to the MVC (or equivalent where relevant) framework about the current route. 1. The MVC JavaScript framework renders the desired view based on the route, possibly after fetching data from an API if required. Example, load up `UsersController`, fetch user data for the username `john` as JSON, combine the data with the view, and render it on the page. A good practice for serving static content is to use caching and putting them on a CDN. We use [Amazon Simple Storage Service (S3)](https://aws.amazon.com/s3/) for hosting our static website content and [Amazon CloudFront](https://aws.amazon.com/cloudfront/) as the CDN. We find that it is an affordable and reliable solution that meets our needs. S3 provides the option to "Use this bucket to host a website", which essentially directs the requests for all routes to the root of the bucket, which means we do not need our own web servers with special routing configurations. An example of a web app that we host on S3 is [Hub](https://hub.grab.com/). Other than hosting the website, we also use S3 to host the build `.tar` files generated from each successful CI build. #### Study Links - [Amazon S3 Homepage](https://aws.amazon.com/s3/) - [Hosting a Static Website on Amazon S3](https://docs.aws.amazon.com/AmazonS3/latest/dev/WebsiteHosting.html) #### Alternatives - [Google Cloud Platform](https://cloud.google.com/storage/docs/hosting-static-website) - [Now](https://zeit.co/now) ## Deployment The last step in shipping the product to our users is deployment. We used [Ansible Tower](https://www.ansible.com/tower) which is a powerful automation software that enables us to deploy our builds easily. As mentioned earlier, all our commits, upon successful build, are being uploaded to a central S3 bucket for builds. We follow semver for our releases and have commands to automatically generate release notes for the latest release. When it is time to release, we run a command to tag the latest commit and push to our code hosting environment. Travis will run the CI steps on that tagged commit and upload a tar file (such as `1.0.1.tar`) with the version to our S3 bucket for builds. On Tower, we simply have to specify the name of the `.tar` we want to deploy to our hosting bucket, and Tower does the following: 1. Download the desired `.tar` file from our builds S3 bucket. 1. Extracts the contents and swap in the configuration file for specified environment. 1. Upload the contents to the hosting bucket. 1. Post a notification to Slack to inform about the successful deployment. This whole process is done under 30 seconds and using Tower has made deployments and rollbacks easy. If we realize that a faulty deployment has occurred, we can simply find the previous stable tag and deploy it. #### Study Links - [Ansible Tower Homepage](https://www.ansible.com/tower) #### Alternatives - [Jenkins](https://jenkins.io/) ## Monitoring After shipping the product, you would also want to monitor it for any errors. Apart from network level monitoring from our CDN service provider and hosting provider, we use [Sentry](https://sentry.io/) to monitor errors that originates from the app logic. #### Study Links - [Sentry Homepage](https://sentry.io/) ### The Journey has Just Begun Congratulations on making it this far! Front end development today is [hard](https://hackernoon.com/how-it-feels-to-learn-javascript-in-2016-d3a717dd577f), but it is also more interesting than before. What we have covered so far will help any new engineer to Grab's web team to get up to speed with our technologies pretty quickly. There are many more things to be learnt, but building up a solid foundation in the essentials will aid in learning the rest of the technologies. This helpful [front end web developer roadmap](https://github.com/kamranahmedse/developer-roadmap#-front-end-roadmap) shows the alternative technologies available for each aspect. We made our technical decisions based on what was important to a rapidly growing Grab Engineering team - maintainability and stability of the code base. These decisions may or may not apply to smaller teams and projects. Do evaluate what works best for you and your company. As the front end ecosystem grows, we are actively exploring, experimenting and evaluating how new technologies can make us a more efficient team and improve our productivity. We hope that this post has given you insights into the front end technologies we use at Grab. If what we are doing interests you, [we are hiring](https://grab.careers)! *Many thanks to [Joel Low](https://github.com/lowjoel), [Li Kai](https://github.com/li-kai) and [Tan Wei Seng](https://github.com/xming13) who reviewed drafts of this article.* ### More Reading **General** - [State of the JavaScript Landscape: A Map for Newcomers](http://www.infoq.com/articles/state-of-javascript-2016) - [The Hitchhiker's guide to the modern front end development workflow](http://marcobotto.com/the-hitchhikers-guide-to-the-modern-front-end-development-workflow/) - [How it feels to learn JavaScript in 2016](https://hackernoon.com/how-it-feels-to-learn-javascript-in-2016-d3a717dd577f#.tmy8gzgvp) - [Roadmap to becoming a web developer in 2017](https://github.com/kamranahmedse/developer-roadmap#-frontend-roadmap) - [Modern JavaScript for Ancient Web Developers](https://trackchanges.postlight.com/modern-javascript-for-ancient-web-developers-58e7cae050f9) **Other Study Plans** - [A Study Plan To Cure JavaScript Fatigue](https://medium.freecodecamp.com/a-study-plan-to-cure-javascript-fatigue-8ad3a54f2eb1#.c0wnrrcwd) - [JS Stack from Scratch](https://github.com/verekia/js-stack-from-scratch) - [A Beginner’s JavaScript Study Plan](https://medium.freecodecamp.com/a-beginners-javascript-study-plan-27f1d698ea5e#.bgf49xno2) ### Footnotes <p id="fn1">1. This can be solved via <a href="https://webpack.js.org/guides/code-splitting/">webpack code splitting</a>. <a href="#ref1" title="Jump back to footnote 1 in the text.">↩</a></p> <p id="fn2">2. <a href="https://medium.com/@mjackson/universal-javascript-4761051b7ae9">Universal JS</a> to the rescue! <a href="#ref2" title="Jump back to footnote 1 in the text.">↩</a></p>
531
A list of resources in different fields of Computer Science
<h1 align="center">Computer Science Resources</h1> <h1 align="center"> <img alt="CS" title="Computer-Science-Resources" src="https://raw.githubusercontent.com/the-akira/Computer-Science-Resources/master/avatar.png"> </br> </h1> <p align="center"> A list of resources in different fields of <b>Computer Science</b> (in multiple languages). </p> ## Content - Getting Started - [Map of Computer Science](https://www.youtube.com/watch?v=SzJ46YA_RaA) - [Map of Mathematics](https://www.youtube.com/watch?v=OmJ-4B-mS-Y) - [Map of Physics](https://www.youtube.com/watch?v=ZihywtixUYo&t) - [MIT Courses](https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/) - [MIT 6.00 Intro to Computer Science & Programming](https://www.youtube.com/watch?v=k6U-i4gXkLM&list=PL4C4720A6F225E074) - [MIT 6.0001 Introduction to Computer Science & Programming in Python](https://www.youtube.com/playlist?list=PLUl4u3cNGP63WbdFxL8giv4yhgdMGaZNA) - [MIT 6.0002 Introduction to Computational Thinking and Data Science](https://www.youtube.com/playlist?list=PLUl4u3cNGP619EG1wp0kT-7rDE_Az5TNd) - [CS50 Harvard](https://www.youtube.com/watch?v=y62zj9ozPOM&list=PLhQjrBD2T3828ZVcVzEIhsHVgjANGZveu) - [Audio/Video Courses from Colleges and Universities](http://www.infocobuild.com/education/audio-video-courses/) - [Everything Computer Science](https://everythingcomputerscience.com/) - Computer Fundamentals - [Algorithms & Data Structures](https://github.com/the-akira/Computer-Science-Resources/blob/master/db/algorithms_data_structures.md) - [Computer Architecture](https://github.com/the-akira/computer_science_web_resources/blob/master/db/computer_architecture.md) - [Operating Systems](https://github.com/the-akira/computer_science_web_resources/blob/master/db/operating_systems.md) - [Mathematics](https://github.com/the-akira/computer_science_web_resources/blob/master/db/mathematics.md) - [Regular Expressions](https://github.com/the-akira/computer_science_web_resources/blob/master/db/regular_expressions.md) - [Physics](https://github.com/the-akira/computer_science_web_resources/blob/master/db/physics.md) - [Signals and Systems](https://github.com/the-akira/Computer_Science_Web_Resources/blob/master/db/signals_systems.md) - [Information Theory](https://github.com/the-akira/Computer-Science-Resources/blob/master/db/information_theory.md) - [Cloud Computing](https://github.com/the-akira/computer_science_web_resources/blob/master/db/cloud_computing.md) - [Quantum Computing](https://github.com/the-akira/computer_science_web_resources/blob/master/db/quantum_computing.md) - [Computer Networks](https://github.com/the-akira/computer_science_web_resources/blob/master/db/computer_networks.md) - [Computer Graphics](https://github.com/the-akira/Computer_Science_Web_Resources/blob/master/db/computer_graphics.md) - [Virtual Reality](https://github.com/the-akira/Computer_Science_Web_Resources/blob/master/db/virtual_reality.md) - Programming Languages - [Assembly](https://github.com/the-akira/computer_science_web_resources/blob/master/db/assembly.md) - [C](https://github.com/the-akira/computer_science_web_resources/blob/master/db/c.md) - [C++](https://github.com/the-akira/computer_science_web_resources/blob/master/db/cpp.md) - [Python](https://github.com/the-akira/computer_science_web_resources/blob/master/db/python.md) - [Java](https://github.com/the-akira/computer_science_web_resources/blob/master/db/java.md) - [Javascript](https://github.com/the-akira/computer_science_web_resources/blob/master/db/javascript.md) - [Ruby](https://github.com/the-akira/computer_science_web_resources/blob/master/db/ruby.md) - [Bash](https://github.com/the-akira/computer_science_web_resources/blob/master/db/bash.md) - [Go](https://github.com/the-akira/computer_science_web_resources/blob/master/db/go.md) - [PHP](https://github.com/the-akira/computer_science_web_resources/blob/master/db/php.md) - [Haskell](https://github.com/the-akira/Computer_Science_Web_Resources/blob/master/db/haskell.md) - [R](https://github.com/the-akira/Computer_Science_Web_Resources/blob/master/db/r.md) - [Julia](https://github.com/the-akira/Computer_Science_Web_Resources/blob/master/db/julia.md) - [Elixir](https://github.com/the-akira/Computer_Science_Web_Resources/blob/master/db/elixir.md) - Artificial Intelligence - [Machine Learning](https://github.com/the-akira/computer_science_web_resources/blob/master/db/machine_learning.md) - [Artificial Neural Networks](https://github.com/the-akira/Computer_Science_Web_Resources/blob/master/db/artificial_neural_network.md) - [Natural Language Processing](https://github.com/the-akira/computer_science_web_resources/blob/master/db/natural_language_processing.md) - [Computer Vision](https://github.com/the-akira/Computer_Science_Web_Resources/blob/master/db/computer_vision.md) - [Cybernetics & Robotics](https://github.com/the-akira/computer_science_web_resources/blob/master/db/cybernetics_and_robotics.md) - Information Security - [Computer Security](https://github.com/the-akira/computer_science_web_resources/blob/master/db/cyber_security.md) - [Web Hacking](https://github.com/the-akira/computer_science_web_resources/blob/master/db/web_hacking.md) - [Exploits](https://github.com/the-akira/computer_science_web_resources/blob/master/db/exploits.md) - [Reverse Engineering](https://github.com/the-akira/computer_science_web_resources/blob/master/db/reverse_engineering.md) - [Social Engineering](https://github.com/the-akira/computer_science_web_resources/blob/master/db/social_engineering.md) - [Cryptography](https://github.com/the-akira/computer_science_web_resources/blob/master/db/cryptography.md) - Databases - [SQL](https://github.com/the-akira/computer_science_web_resources/blob/master/db/sql.md) - [NOSQL](https://github.com/the-akira/computer_science_web_resources/blob/master/db/nosql.md) - [Big Data](https://github.com/the-akira/computer_science_web_resources/blob/master/db/big_data.md) - [Data Mining](https://github.com/the-akira/computer_science_web_resources/blob/master/db/data_mining.md)
532
Operating Systems: Three Easy Pieces(OSTEP) homework and project solutions
# OSTEP-HW [Operating Systems: Three Easy Pieces](https://pages.cs.wisc.edu/~remzi/OSTEP) homework solutions [CS-537 videos](https://pages.cs.wisc.edu/~remzi/Classes/537/Spring2018/Discussion/videos.html) ## Requirements - Unix-like operating system - [Clang](https://clang.llvm.org)/[GCC](https://gcc.gnu.org) - [LLDB](https://lldb.llvm.org)/[GDB](https://www.gnu.org/software/gdb) - [Valgrind](https://valgrind.org) - [Gawk](https://www.gnu.org/software/gawk) - [Python](https://www.python.org) - 🐈 ## [ostep-projects](./projects) C/Linux Projects and Kernel Hacking Projects (xv6) ## Chapters ### Virtualization 4. [The Abstraction: The Process](./4) 5. [Interlude: Process API](./5) 6. [Mechanism: Limited Direct Execution](./6) 7. [Scheduling: Introduction](./7) 8. [Scheduling: The Multi-Level Feedback Queue](./8) 9. [Scheduling: Proportional Share](./9) 10. [Multiprocessor Scheduling (Advanced)](./10) 11. Summary Dialogue on CPU Virtualization 12. A Dialogue on Memory Virtualization 13. [The Abstraction: Address Spaces](./13) 14. [Interlude: Memory API](./14) 15. [Mechanism: Address Translation](./15) 16. [Segmentation](./16) 17. [Free-Space Management](./17) 18. [Paging: Introduction](./18) 19. [Paging: Faster Translations (TLBs)](./19) 20. [Paging: Smaller Tables](./20) 21. [Beyond Physical Memory: Mechanisms](./21) 22. [Beyond Physical Memory: Policies](./22) ### Concurrency 26. [Concurrency: An Introduction](./26) 27. [Interlude: Thread API](./27) 28. [Locks](./28) 29. [Lock-based Concurrent Data Structures](./29) 30. [Condition Variables](./30) 31. [Semaphores](./31) 32. [Common Concurrency Problems](./32) 33. [Event-based Concurrency (Advanced)](./33) ### Persistence 37. [Hard Disk Drives](./37) 38. [Redundant Arrays of Inexpensive Disks (RAIDs)](./38) 39. [Interlude: Files and Directories](./39) 40. [File System Implementation](./40) 41. [Locality and The Fast File System](./41) 42. [Crash Consistency: FSCK and Journaling](./42) 43. [Log-structured File Systems](./43) 44. [Flash-based SSDs](./44) 45. [Data Integrity and Protection](./45) 46. Summary Dialogue on Persistence 47. A Dialogue on Distribution 48. [Distributed Systems](./48) 49. [Sun’s Network File System (NFS)](./49) 50. [The Andrew File System (AFS)](./50) ## License This work is licensed under the GPLv3 or any later version.
533
This repository contains all the DSA (Data-Structures, Algorithms, 450 DSA by Love Babbar Bhaiya, FAANG Questions), Technical Subjects (OS + DBMS + SQL + CN + OOPs) Theory+Questions, FAANG Interview questions, and Miscellaneous Stuff (Programming MCQs, Puzzles, Aptitude, Reasoning). The Programming languages used for demonstration are C++, Python, and Java.
<p align="center"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation#readme" target="_blank"> <img src="https://readme-typing-svg.herokuapp.com?font=Tourney&center=true&vCenter=true&color=2CFF00&size=75&pause=750&width=1280&height=80&lines=The+Complete+FAANG+Preparation"/> </a> </p> [![FAANG](https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/blob/master/images/FAANGM.gif)](https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation#readme) <p align="center"> <code><img src="https://profile-counter.glitch.me/{The-Complete-FAANG-Preparation}/count.svg" alt="Views Count" width="500px" height="80px" /></code> </p> <p align="center"> <img src="https://readme-jokes.vercel.app/api" width="450px" /> </p> <p align="center"> <a href="https://bit.ly/3FvaHo9" target="_blank"> <img align="center" src="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/blob/master/images/codestudio-1.png" width="500px" height="150px" /> </a> <br> <a href="https://bit.ly/3FvaHo9" target="_blank"> <img src="https://readme-typing-svg.herokuapp.com?font=Impact&center=true&vCenter=true&color=F78D1AFF&size=75&width=620&height=80&lines=Learning+Resources"/> </a> </p> <div align="center"> # `🏆 Table of Contents 📋` | SNo. | Topics | Sub Topics | |------|--------|------------| | 1. | [📘Aptitude + Puzzle](https://www.codingninjas.com/codestudio/guided-paths?category=interview-preparation) | [1️⃣Aptitude](https://www.codingninjas.com/codestudio/guided-paths/aptitude-preparation) <br> [2️⃣Puzzle](https://www.codingninjas.com/codestudio/guided-paths/top-150-interview-puzzles) | | 2. | [📘Languages](https://www.codingninjas.com/codestudio/guided-paths) | [1️⃣C++](https://bit.ly/3YtE9n1) <br> [2️⃣Python](https://bit.ly/3V3lgnW) <br> [3️⃣Java](https://bit.ly/3FX11Eb)| | 3. | [📘DSA + CP](https://www.codingninjas.com/codestudio/guided-paths) <hr> [📘Top Problem Lists](https://bit.ly/3v0rudC) | [1️⃣Data Structures and Algorithms](https://bit.ly/3V5h7Qx) <br> [2️⃣Competitive Programming](https://www.codingninjas.com/codestudio/guided-paths/competitive-programming) <hr> [1️⃣Striver SDE Sheet](https://bit.ly/3hu7GfF) <br> [2️⃣Love Babbar DSA Sheet](https://bit.ly/3uTFyFM)| | 4. | [📘Technical Subject](https://www.codingninjas.com/codestudio/guided-paths?category=interview-preparation) | [1️⃣Operating System](https://bit.ly/3HKNaSK) <br> [2️⃣Database Management System](https://bit.ly/3FX5k2e) <br> [3️⃣Computer Networks](https://bit.ly/3BHlNFv) <br> [4️⃣Object Oriented Programming in C++](https://bit.ly/3WrQgzn) <br>&emsp; [4️⃣🅰️Object Oriented Programming in Python](https://www.codingninjas.com/codestudio/guided-paths/oops-in-python) <br>&emsp; [4️⃣🅱️Object Oriented Programming in Java](https://www.codingninjas.com/codestudio/guided-paths/oops-in-java) <br> [5️⃣System Design](https://www.codingninjas.com/codestudio/guided-paths/system-design)| <a href="https://bit.ly/3FvaHo9" target="_blank"> <img src="https://readme-typing-svg.herokuapp.com?font=Impact&center=true&vCenter=true&color=308D46&size=75&width=600&height=80&lines=Important+Books"/> </a> <table border="3"> <thead> <tr> <th> SNo. </th> <th> Topics </th> <th> Sub-Topics </th> </tr> </thead> <tbody> <tr> <th valign="top"> 1. </th> <th align="left" valign="top"> 📘Aptitude + Puzzles </th> <th align="left"> 📒Aptitude <table> <td align="center"><a href="https://amzn.to/3w5NS6e" target="_blank"><img src="https://m.media-amazon.com/images/W/WEBP_402378-T1/images/I/510vx4eIUoL._SX198_BO1,204,203,200_QL40_FMwebp_.jpg" width="100" alt=""/><br /><sub><b>Quantitative Aptitude - <br> Dr. R S Aggarwal</b></sub></a><br /></td> </table> </th> </tr> </tbody> <tbody> <tr> <th valign="top"> 2. </th> <th align="left" valign="top"> 📘Programming Languages </th> <th align="left"> 📒C & C++ Language <table> <td align="center"><a href="https://amzn.to/3XwpgPK" target="_blank"><img src="https://m.media-amazon.com/images/I/41a4CcXfN4L._SY264_BO1,204,203,200_QL40_FMwebp_.jpg" width="100" alt=""/><br /><sub><b>Let Us C</b></sub></a><br /></td> <td align="center"><a href="https://amzn.to/3iEgyjy" target="_blank"><img src="https://m.media-amazon.com/images/I/51BFuRUjSWL._SY264_BO1,204,203,200_QL40_FMwebp_.jpg" width="100" alt=""/><br /><sub><b>C in Depth</b></sub></a><br /></td> <tr> <td align="center"><a href="https://amzn.to/3GJD8PN" target="_blank"><img src="https://m.media-amazon.com/images/I/51YkwADIq5L._SY264_BO1,204,203,200_QL40_FMwebp_.jpg" width="100" alt=""/><br /><sub><b>Let Us C++</b></sub></a><br /></td> <td align="center"><a href="https://amzn.to/3X9mUWZ" target="_blank"><img src="https://m.media-amazon.com/images/I/51Uqe5PHbML._SX381_BO1,204,203,200_.jpg" width="100" alt=""/><br /><sub><b>The Complete Reference <br> C++</b></sub></a><br /></td> </table> 📒Python Language <table> <td align="center"><a href="https://amzn.to/3kiXeso" target="_blank"><img src="https://m.media-amazon.com/images/I/51Ss-7j3v5L._SX362_BO1,204,203,200_.jpg" width="100" alt=""/><br /><sub><b>Core Python</b></sub></a><br /></td> </table> 📒Java Language <table> <td align="center"><a href="https://amzn.to/3IKptdJ" target="_blank"><img src="https://m.media-amazon.com/images/I/51z+MsmqesL._SX258_BO1,204,203,200_.jpg" width="100" alt=""/><br /><sub><b>Core Java</b></sub></a><br /></td> </table> </th> </tr> </tbody> <tbody> <tr> <th valign="top"> 3. </th> <th align="left" valign="top"> 📘DSA <hr> 📘CP <hr> 📘Coding Interviews </th> <th align="left"> 📒Data Structures <table> <td align="center"><a href="https://amzn.to/3ZzIzJw" target="_blank"><img src="https://m.media-amazon.com/images/I/417ExARdRYL._SX384_BO1,204,203,200_.jpg" width="100" alt=""/><br /><sub><b>Data Structures <br> and Algorithms <br> Made Easy</b></sub></a><br /></td> <td align="center"><a href="https://amzn.to/3WaqeQv" target="_blank"><img src="https://m.media-amazon.com/images/I/41fWWCgWk6L._SX384_BO1,204,203,200_.jpg" width="100" alt=""/><br /><sub><b>Data Structures <br> and Algorithms <br> Thinking with Python</b></sub></a><br /></td> </table> 📒Algorithms <table> <td align="center"><a href="https://amzn.to/3COZXQW" target="_blank"><img src="https://m.media-amazon.com/images/I/513P8XoCAEL._SX376_BO1,204,203,200_.jpg" width="100" alt=""/><br /><sub><b>Introduction to Algorithms</b></sub></a><br /></td> <td align="center"><a href="https://amzn.to/3QGrsSd" target="_blank"><img src="https://m.media-amazon.com/images/I/41-RWwEls6L._SX400_BO1,204,203,200_.jpg" width="100" alt=""/><br /><sub><b>Algorithms</b></sub></a><br /></td> </table> <hr> 📒Competitive Programming <table> <td align="center"><a href="https://amzn.to/3X33UcN" target="_blank"><img src="https://m.media-amazon.com/images/I/41iVz+I5jOL._SY344_BO1,204,203,200_.jpg" width="100" alt=""/><br /><sub><b>Guide to <br> Competitive Programming</b></sub></a><br /></td> </table> <hr> 📒Coding Interviews <table> <td align="center"><a href="https://amzn.to/3IWvkwy" target="_blank"><img src="https://m.media-amazon.com/images/I/41oYsXjLvZL._SY291_BO1,204,203,200_QL40_FMwebp_.jpg" width="100;" alt=""/><br /><sub><b>Cracking the Coding Interview</b></sub></a><br /></td> </table> </th> </tr> </tbody> <tbody> <tr> <th valign="top"> 4. </th> <th align="left" valign="top"> 📘Technical Subject </th> <th align="left"> 📒Object Oriented Programming (OOP) <table> <td align="center"><a href="https://amzn.to/3GG9FpY" target="_blank"><img src="https://m.media-amazon.com/images/I/51N4A59EAiL.jpg" width="100" alt=""/><br /><sub><b>Object Oriented Programming <br> with C++ <br> E Balagurusamy</b></sub></a><br /></td> </table> 📒Operating System (OS) <table> <td align="center"><a href="https://amzn.to/3GG9UBo" target="_blank"><img src="https://m.media-amazon.com/images/I/51Qy2upM+aL._SY344_BO1,204,203,200_.jpg" width="100" alt=""/><br /><sub><b>Operating System</b></sub></a><br /></td> </table> 📒Database Management System (DBMS) <table> <td align="center"><a href="https://amzn.to/3CN1FT0" target="_blank"><img src="https://m.media-amazon.com/images/I/51cq3aAdqNL._SX198_BO1,204,203,200_QL40_FMwebp_.jpg" width="100" alt=""/><br /><sub><b>Database Management System</b></sub></a><br /></td> </table> 📒Computer Network (CN) <table> <td align="center"><a href="https://amzn.to/3ixBcBX" target="_blank"><img src="https://m.media-amazon.com/images/I/51vT3X2tdtL._SX409_BO1,204,203,200_.jpg" width="100" alt=""/><br /><sub><b>Computer Network</b></sub></a><br /></td> </table> 📒System Design <table> <td align="center"><a href="https://amzn.to/3H3KKOf" target="_blank"><img src="https://m.media-amazon.com/images/I/4129HxbBnOL._SX331_BO1,204,203,200_.jpg" width="100" alt=""/><br /><sub><b>System Design - Volume 1</b></sub></a><br /></td> <td align="center"><a href="https://amzn.to/3H4iOtA" target="_blank"><img src="https://m.media-amazon.com/images/I/31wqdTUjz2L._SX348_BO1,204,203,200_.jpg" width="100" alt=""/><br /><sub><b>System Design - Volume 2</b></sub></a><br /></td> </table> </th> </tr> </tbody> </table> </div> <!-- # [`Community Exchange`](https://education.github.com/globalcampus/exchange?utf8=%E2%9C%93&q=sort%3Astar_desc) <code>[![Community Exchange](https://user-images.githubusercontent.com/60146338/207290439-271ff95f-e528-4d84-86b5-eff13c384f55.png)](https://education.github.com/globalcampus/exchange?utf8=%E2%9C%93&q=The-Complete-FAANG-Preparation) [![CLASS OF 2022 - Yearbook](https://user-images.githubusercontent.com/60146338/207295394-51549613-c597-4982-bd22-fb7894f02c13.png)](https://education.github.com/graduation/yearbook?sort=az&page=2&search=akashsingh3031#AkashSingh3031)</code> ## [`Welcome to The-Complete-FAANG-Preparation Discussions!`](https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/discussions) <code>[![Discussion Tab](https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/blob/master/images/Discussion%20Tab.PNG)](https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/discussions)</code> --> --- [![Hello programmer Welcome to my profile](https://img.shields.io/badge/Hello,Programmer!-Welcome-orange.svg?style=flat&logo=github)](https://github.com/AkashSingh3031) [![Open Source Love](https://badges.frapsoft.com/os/v1/open-source.svg?v=103)](https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation) [![GitHub followers](https://img.shields.io/github/followers/AkashSingh3031?style=social)](https://github.com/AkashSingh3031?tab=followers) [![GitHub Stars](https://img.shields.io/github/stars/AkashSingh3031/The-Complete-FAANG-Preparation?style=social)](https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/stargazers) [![GitHub Forks](https://img.shields.io/github/forks/AkashSingh3031/The-Complete-FAANG-Preparation?style=social)](https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/network/members) [![GitHub Watchers](https://img.shields.io/github/watchers/AkashSingh3031/The-Complete-FAANG-Preparation?style=social)](https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/watchers) [![License](https://img.shields.io/badge/License-MIT-red.svg?logo=github&style=social)](https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/blob/master/LICENSE) ![Size](https://img.shields.io/github/repo-size/AkashSingh3031/The-Complete-FAANG-Preparation?style=social&logo=github&label=Repo%20Size%20) ![Lines of code](https://img.shields.io/tokei/lines/github/AkashSingh3031/The-Complete-FAANG-Preparation?style=social&logo=github&label=Lines%20of%20Code) ![Issues Open](https://img.shields.io/github/issues/AkashSingh3031/The-Complete-FAANG-Preparation?style=plastic&logo=github) ![Issues Close](https://img.shields.io/github/issues-closed/AkashSingh3031/The-Complete-FAANG-Preparation?style=plastic&color=critical&logo=github) ![Open PRs](https://img.shields.io/github/issues-pr/AkashSingh3031/The-Complete-FAANG-Preparation?style=plastic&logo=github) ![Close PRs](https://img.shields.io/github/issues-pr-closed/AkashSingh3031/The-Complete-FAANG-Preparation?style=plastic&color=critical&logo=github) ![Awesome Contributors](https://img.shields.io/github/contributors/AkashSingh3031/The-Complete-FAANG-Preparation?label=Awesome%20Contributors&style=plastic&logo=github) ![Last Commit](https://img.shields.io/github/last-commit/AkashSingh3031/The-Complete-FAANG-Preparation?style=plastic&logo=github) ### `Social Networks:` <table border="3"> <td align="center"><a href="https://github.com/AkashSingh3031" target="_blank"><img align="center" src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Tech%20Tools/github-2.png" alt="Akash's GitHub" width="45"/></a></td> <td align="center"><a href="https://www.linkedin.com/in/akashsingh3031/" target="_blank"><img align="center" src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Social%20Media/linked(color).png" alt="Akash's linkedin" width="45" /></a></td> <td align="center"><a href="https://wa.me/919794423031" target="_blank"><img align="center" src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Social%20Media/whatsapp(color).png" alt="Akash's WhatsApp" width="45" /></a></td> <td align="center"><a href="https://t.me/akashsingh3031" target="_blank"><img align="center" src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Social%20Media/telegram(color).png" alt="Akash's Telegram" width="45" /></a></td> <td align="center"><a href="https://www.facebook.com/akashsingh3031/" target="_blank"><img align="center" src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Social%20Media/facebook%20(color).png" alt="Akash's Facebook" width="45" /></a></td> <td align="center"><a href="https://www.instagram.com/akash.singh3031/" target="_blank"><img align="center" src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Social%20Media/Instagram%20(color).svg" alt="Akash's Instagram" width="45" /></a></a></td> <td align="center"><a href="https://twitter.com/intent/follow?screen_name=akashsingh3031" target="_blank"><img align="center" src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Social%20Media/twitter(color).png" alt="Akash's Twitter" width="45" /></a></td> <td align="center"><a href="https://mail.google.com/mail/u/0/?fs=1&[email protected]&tf=cm" target="_blank"> <img src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Social%20Media/Gmail_icon_(2020).svg" alt="Gmail" width="45"/> </a></td> <td align="center"><a href="https://www.youtube.com/@akashsingh3031?sub_confirmation=1" target="_blank" align="center"><img align="center" src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Social%20Media/youtube(color).png" alt="YouTube" width="45" /></a></td> <td align="center"><a href="https://medium.com/@akashsingh3031" target="_blank"><img align="center" src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Tech%20Tools/medium.svg" alt="Akash's Medium" width="45"/></a></td> <tr> <td align="center"><a href="https://github.com/AkashSingh3031"><img src="https://readme-components.vercel.app/api?component=logo&fill=black&logo=github&svgfill=white"></a></td> <td align="center"><a href="https://www.linkedin.com/in/akashsingh3031/"><img src="https://readme-components.vercel.app/api?component=logo&fill=0e76a8&logo=linkedin&svgfill=white"></a></td> <td align="center"><a href="https://wa.me/919794423031"><img src="https://readme-components.vercel.app/api?component=logo&fill=25D366&logo=whatsapp&svgfill=white"></a></td> <td align="center"><a href="https://t.me/akashsingh3031"><img src="https://readme-components.vercel.app/api?component=logo&fill=1ca0f1&logo=telegram&svgfill=white"></a></td> <td align="center"><a href="https://www.facebook.com/akashsingh3031"><img src="https://readme-components.vercel.app/api?component=logo&fill=4267B2&logo=facebook&svgfill=white"></a></td> <td align="center"><a href="https://www.instagram.com/akash.singh3031"><img src="https://readme-components.vercel.app/api?component=logo&fill=E1306C&logo=instagram&svgfill=white"></a></td> <td align="center"><a href="https://twitter.com/akashsingh3031"><img src="https://readme-components.vercel.app/api?component=logo&fill=1DA1F2&logo=twitter&svgfill=white"></a></td> <td align="center"><a href="https://mail.google.com/mail/u/0/?fs=1&[email protected]&tf=cm"><img src="https://readme-components.vercel.app/api?component=logo&fill=DB4437&logo=gmail&svgfill=4285F4"></a></td> <td align="center"><a href="https://www.youtube.com/@akashsingh3031?sub_confirmation=1"><img src="https://readme-components.vercel.app/api?component=logo&fill=ff0000&logo=youtube&svgfill=white"></a></td> <td align="center"><a href="https://medium.com/@akashsingh3031"><img src="https://readme-components.vercel.app/api?component=logo&fill=black&logo=medium&svgfill=white"></a></td> </table> ### `Coding Profiles:` <table border="3"> <td align="center"><a href="https://leetcode.com/akashsingh3031/" target="_blank"><img align="center" src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Tech%20Tools/LeetCode.png" alt="LeetCode" width="45"/></a></td> <td align="center"><a href="https://auth.geeksforgeeks.org/user/akashsingh3031/practice" target="_blank"><img align="center" src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Tech%20Tools/GeeksforGeeks-1.png" alt="GeeksforGeeks" width="55"/></a></td> <td align="center"><a href="https://www.codingninjas.com/codestudio/profile/AkashSingh3031" target="_blank"><img align="center" src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Tech%20Tools/Coding%20Ninjas.png" alt="Coding Ninjas" width="45"/></a></td> <td align="center"><a href="https://workat.tech/profile/akashsingh3031" target="_blank"><img align="center" src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Tech%20Tools/workattech.png" alt="work@tech" width="45"/></a></td> <td align="center"><a href="https://www.hackerrank.com/akashsingh3031" target="_blank"><img align="center" src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Tech%20Tools/HackerRank.png" alt="HackerRank" width="45"/></a></td> <td align="center"><a href="https://www.hackerearth.com/@akashsingh3031" target="_blank"><img align="center" src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Tech%20Tools/HackerEarth.png" alt="HackerEarth" width="45"/></a></td> <td align="center"><a href="https://www.interviewbit.com/profile/akashsingh3031" target="_blank"><img align="center" src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Tech%20Tools/InterviewBit.png" alt="InterviewBit" width="45"/></a></td> <td align="center"><a href="https://www.stopstalk.com/user/profile/akashsingh3031" target="_blank"><img align="center" src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Tech%20Tools/StopStalk.png" alt="StopStalk" width="45"/></a></td> <td align="center"><a href="https://stackoverflow.com/users/18910829/akashsingh3031" target="_blank"><img align="center" src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Tech%20Tools/StackOverflow.png" alt="Stack Overflow" width="45"/></a></td> <td align="center"><a href="https://www.kaggle.com/akashsingh3031" target="_blank"><img align="center" src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Tech%20Tools/kaggle.png" alt="Akash's Kaggle" width="30"/></a></td> <tr> <td align="center"><a href="https://leetcode.com/akashsingh3031"><img src="https://readme-components.vercel.app/api?component=logo&fill=FF7F50&logo=leetcode&svgfill=white"></a></td> <td align="center"><a href="https://auth.geeksforgeeks.org/user/akashsingh3031/practice"><img src="https://readme-components.vercel.app/api?component=logo&fill=308D46&logo=geeksforgeeks&svgfill=white"></a></td> <td align="center"><a href="https://www.codingninjas.com/codestudio/profile/AkashSingh3031"><img src="https://readme-components.vercel.app/api?component=logo&fill=F78D1A&logo=coding%20ninjas&svgfill=white"></a></td> <td align="center"><a href="https://workat.tech/profile/akashsingh3031"><img src="https://readme-components.vercel.app/api?component=logo&fill=blue&logo=work@tech&svgfill=white"></a></td> <td align="center"><a href="https://www.hackerrank.com/akashsingh3031"><img src="https://readme-components.vercel.app/api?component=logo&fill=308D46&logo=hackerrank&svgfill=white"></a></td> <td align="center"><a href="https://www.hackerearth.com/@akashsingh3031"><img src="https://readme-components.vercel.app/api?component=logo&fill=650458&logo=hackerearth&svgfill=white"></a></td> <td align="center"><a href="https://www.interviewbit.com/profile/akashsingh3031"><img src="https://readme-components.vercel.app/api?component=logo&fill=F78D1A&logo=interviewBit&svgfill=blue"></a></td> <td align="center"><a href="https://www.stopstalk.com/user/profile/akashsingh3031"><img src="https://readme-components.vercel.app/api?component=logo&fill=ff0000&logo=StopStalk&svgfill=white"></a></td> <td align="center"><a href="https://stackoverflow.com/users/18910829/akashsingh3031"><img src="https://readme-components.vercel.app/api?component=logo&fill=FE7A16&logo=stackoverflow&svgfill=white"></a></td> <td align="center"><a href="https://www.kaggle.com/akashsingh3031"><img src="https://readme-components.vercel.app/api?component=logo&fill=20BEFF&logo=kaggle&svgfill=white"></a></td> </table> <table border="3"> <td><img src="https://forthebadge.com/images/badges/for-you.svg" /></td> <td><img src="https://forthebadge.com/images/badges/built-with-love.svg" /></td> <td><img src="https://forthebadge.com/images/badges/open-source.svg" /></td> </table> <table border="3"> <td><img src="http://ForTheBadge.com/images/badges/made-with-python.svg" /></td> <td><img src="https://forthebadge.com/images/badges/made-with-c.svg" /></td> <td><img src="http://ForTheBadge.com/images/badges/made-with-c-plus-plus.svg" /></td> <td><img src="http://ForTheBadge.com/images/badges/made-with-java.svg" /></td> <td><img src="http://ForTheBadge.com/images/badges/made-with-javascript.svg" /></td> </table> <table border="3"> <td><img src="https://forthebadge.com/images/badges/built-by-developers.svg" /></td> <td><img src="https://forthebadge.com/images/badges/uses-html.svg" /></td> <td><img src="https://forthebadge.com/images/badges/uses-css.svg" /></td> <td><img src="https://forthebadge.com/images/badges/uses-js.svg" /></td> <td><img src="https://forthebadge.com/images/badges/uses-git.svg" /></td> </table> --- # `🏆 The Complete FAANG Preparation 🏆` ```js This repository contains all the DSA (Data-Structures, Algorithms, 450 DSA by Love Babbar Bhaiya, FAANG Questions), Technical Subjects (OS + DBMS + SQL + CN + OOP) Theory+Questions, FAANG Interview questions and Miscellaneous Stuff (Programming MCQs, Puzzles, Aptitude, Reasoning). The Programming languages used for demonstration are C++, Python, and Java. ``` <!-- <div align="center"> <p> <a href="https://simplify.jobs/?utm_source=github&utm_medium=faang_prep"> <b>Applying to internships?</b> <br> Autofill all your applications in a single click. <br> <div> <img src="https://res.cloudinary.com/dpeo4xcnc/image/upload/v1636594918/simplify_pittcsc.png" width="450" alt="Simplify"> </div> </a> <sub><i>Stop manually re-entering your information. Simplify’s extension helps you autofill internship applications on millions of sites.</i></sub> </p> </div> --> --- <h1 align='center'> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/blob/master/Repository_Status.md"> <code> Full Repository Status </code> </a><br> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/blob/master/Learn.md"> <code> Learning Index </code> </a> </h1> <table> <thead> <tr> <th> SNo. </th> <th> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/0%5D.%20Miscellaneous%20Stuff"> <img src="https://img.shields.io/badge/Miscellaneous_Stuff-orange?style=for-the-badge"> </a> </th> <th> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP"> <img src="https://img.shields.io/badge/DSA_+_CP-orange?style=for-the-badge"> </a> </th> <th> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/2%5D.%20Technical%20Subjects"> <img src="https://img.shields.io/badge/Technical_Subjects-orange?style=for-the-badge"> </a> </th> <th> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/3%5D.%20System%20Design"> <img src="https://img.shields.io/badge/System_Design-orange?style=for-the-badge"> </a> </th> <th> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/4%5D.%20Projects"> <img src="https://img.shields.io/badge/Projects-orange?style=for-the-badge"> </a> </th> <th> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/5%5D.%20Important%20Books%20and%20Resources"> <img src="https://img.shields.io/badge/Important_Books_and_Resources-orange?style=for-the-badge"> </a> </th> <th> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/6%5D.%20Behavioural%20Interview"> <img src="https://img.shields.io/badge/Behavioural_Interview-orange?style=for-the-badge"> </a> </th> </tr> </thead> <tbody> <tr> <td valign="top"> 1. </td> <td valign="top"> <table border="5"> <thead> <tr> <th> SNo. </th> <th> Contents </th> </tr> </thead> <tbody> <tr> <th> 1. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/0%5D.%20Miscellaneous%20Stuff/Aptitude%20%26%20Reasoning"> Aptitude & Reasoning </a> </th> </tr> </tbody> <tbody> <tr> <th> 2. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/0%5D.%20Miscellaneous%20Stuff/Basic%20Programming%20MCQs"> Basic Programming MCQs </a> </th> </tr> </tbody> <tbody> <tr> <th> 3. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/0%5D.%20Miscellaneous%20Stuff/Puzzles"> Puzzles </a> </th> </tr> </tbody> </table> </td> <td valign="top"> <table border="5"> <thead> <tr> <th> SNo. </th> <th> Contents </th> <th> Sub-Contents </th> </tr> </thead> <tbody> <tr> <th valign="top"> 1. </th> <th align="left" valign="top"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/1%5D.%20DSA"> DSA </a> </th> <th> <table border="3"> <thead> <tr> <th> SNo. </th> <th> Topics </th> </tr> </thead> <tbody> <tr> <th> 1. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/1%5D.%20DSA/1%5D.%20Data%20Structures"> Data Structures </a> </th> </tr> </tbody> <tbody> <tr> <th> 2. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/1%5D.%20DSA/2%5D.%20Algorithms"> Algorithms </a> </th> </tr> </tbody> <tbody> <tr> <th> 3. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/1%5D.%20DSA/3%5D.%20450%20DSA%20by%20Love%20Babbar"> 450 DSA by Love Babbar </a> </th> </tr> </tbody> <tbody> <tr> <th> 4. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/1%5D.%20DSA/4%5D.%20Striver%20Series"> Striver Series </a> </th> </tr> </tbody> <tbody> <tr> <th> 5. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/1%5D.%20DSA/5%5D.%20DSA%20Sheet%20by%20Apna%20College"> DSA Sheet by Apna College </a> </th> </tr> </tbody> </table> </th> </tr> </tbody> <tbody> <tr> <th valign="top"> 2. </th> <th align="left" valign="top"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming"> CP </a> </th> <th> <table border="3"> <thead> <tr> <th> SNo. </th> <th> Topics </th> <th> Sub-Topics </th> </tr> </thead> <tbody> <tr> <th> 1. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/01%5D.%20Google"> <img src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Social%20Media/google.png" width="15" height="15"> Google </a> </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/01%5D.%20Google/1%5D.%20Code%20Jam"> 1️⃣Code Jam </a> <br> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/01%5D.%20Google/2%5D.%20Hash%20Code"> 2️⃣Hash Code </a> <br> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/01%5D.%20Google/3%5D.%20Kick%20Start"> 3️⃣Kick Start </a> </th> </tr> </tbody> <tbody> <tr> <th> 2. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/02%5D.%20Facebook"> <img src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Social%20Media/meta.png" width="15" height="15"> Facebook (Meta) </a> </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/02%5D.%20Facebook/1%5D.%20Hacker%20Cup"> 1️⃣Facebook Hackercup </a> <br> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/02%5D.%20Facebook/2%5D.%20FB%20Hack"> 2️⃣FB Hack </a> </th> </tr> </tbody> <tbody> <tr> <th> 3. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/03%5D.%20LeetCode"> <img src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Tech%20Tools/LeetCode.png" width="15" height="15"> LeetCode </a> </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/03%5D.%20LeetCode/1%5D.%20Problems"> 1️⃣Problems </a> <br> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/03%5D.%20LeetCode/2%5D.%20Contests"> 2️⃣Contests </a> <br>&emsp; <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/03%5D.%20LeetCode/2%5D.%20Contests/1%5D.%20Weekly%20Contests"> 📕Weekly Contests </a> <br>&emsp; <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/03%5D.%20LeetCode/2%5D.%20Contests/2%5D.%20Biweekly%20Contests"> 📕Biweekly Contests </a> <br> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/03%5D.%20LeetCode/3%5D.%20Study%20Plan"> 3️⃣Study Plan </a> <br>&emsp; <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/03%5D.%20LeetCode/3%5D.%20Study%20Plan/1%5D.%20Comprehensive%20Study%20Plans"> 📕Comprehensive Study Plans </a> <br>&emsp;&emsp; <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/03%5D.%20LeetCode/3%5D.%20Study%20Plan/1%5D.%20Comprehensive%20Study%20Plans/1%5D.%20LeetCode%2075"> 📖LeetCode 75 </a> <br>&emsp;&emsp; <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/03%5D.%20LeetCode/3%5D.%20Study%20Plan/1%5D.%20Comprehensive%20Study%20Plans/2%5D.%20Data%20Structure"> 📖Data Structure </a> <br>&emsp;&emsp; <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/03%5D.%20LeetCode/3%5D.%20Study%20Plan/1%5D.%20Comprehensive%20Study%20Plans/3%5D.%20Algorithm"> 📖Algorithm </a> <br>&emsp; <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/03%5D.%20LeetCode/3%5D.%20Study%20Plan/2%5D.%20In-Depth%20Topics"> 📕In-Depth Topics </a> <br>&emsp;&emsp; <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/03%5D.%20LeetCode/3%5D.%20Study%20Plan/2%5D.%20In-Depth%20Topics/1%5D.%20SQL"> 📖SQL </a> <br>&emsp;&emsp; <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/03%5D.%20LeetCode/3%5D.%20Study%20Plan/2%5D.%20In-Depth%20Topics/2%5D.%20Programming%20Skills"> 📖Programming Skills </a> <br>&emsp;&emsp; <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/03%5D.%20LeetCode/3%5D.%20Study%20Plan/2%5D.%20In-Depth%20Topics/3%5D.%20Binary%20Search"> 📖Binary Search </a> <br>&emsp;&emsp; <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/03%5D.%20LeetCode/3%5D.%20Study%20Plan/2%5D.%20In-Depth%20Topics/4%5D.%20Graph%20Theory"> 📖Graph Theory </a> <br>&emsp;&emsp; <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/03%5D.%20LeetCode/3%5D.%20Study%20Plan/2%5D.%20In-Depth%20Topics/5%5D.%20Dynamic%20Programming"> 📖Dynamic Programming </a> </th> </tr> </tbody> <tbody> <tr> <th> 4. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/04%5D.%20Coding%20Ninjas"> <img src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Tech%20Tools/Coding%20Ninjas.png" width="18" height="15"> Coding Ninjas </a> </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/04%5D.%20Coding%20Ninjas/1%5D.%20Practice"> 1️⃣Practice </a> <br> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/04%5D.%20Coding%20Ninjas/2%5D.%20Contests"> 2️⃣Contests </a> </th> </tr> </tbody> <tbody> <tr> <th> 5. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/05%5D.%20GeeksforGeeks"> <img src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Tech%20Tools/GeeksforGeeks-1.png" width="15" height="12"> GeeksforGeeks </a> </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/05%5D.%20GeeksforGeeks/1%5D.%20Problems"> 1️⃣Problems </a> <br> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/05%5D.%20GeeksforGeeks/2%5D.%20Events/Series"> 2️⃣Contests </a> </th> </tr> </tbody> <tbody> <tr> <th> 6. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/06%5D.%20InterviewBit"> <img src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Tech%20Tools/InterviewBit.png" width="15" height="15"> InterviewBit </a> </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/06%5D.%20InterviewBit/1%5D.%20Practice"> 1️⃣Practice </a> <br> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/06%5D.%20InterviewBit/2%5D.%20Resources"> 2️⃣Resources </a> <br> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/06%5D.%20InterviewBit/3%5D.%20Contests/1%5D.%20CodeDrift"> 3️⃣Contests </a> </th> </tr> </tbody> <tbody> <tr> <th> 7. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/07%5D.%20PrepBytes"> <img src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Tech%20Tools/prepbytes.png" width="15" height="15"> PrepBytes </a> </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/07%5D.%20PrepBytes/1%5D.%20Competitive%20Coding"> 1️⃣Competitive Coding </a> <br> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/07%5D.%20PrepBytes/2%5D.%20Interview%20Coding"> 2️⃣Interview Coding </a> <br> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/07%5D.%20PrepBytes/3%5D.%20Company%20Coding"> 3️⃣Company Coding </a> </th> </tr> </tbody> <tbody> <tr> <th> 8. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/08%5D.%20Work%40Tech"> <img src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Tech%20Tools/workattech.png" width="15" height="15"> Work@Tech </a> </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/08%5D.%20Work%40Tech/1%5D.%20Basic%20Coding%20For%20Beginners"> 1️⃣Basic Coding For Beginners </a> <br> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/08%5D.%20Work%40Tech/2%5D.%20Data%20Structures%20%26%20Algorithms"> 2️⃣Data Structures & Algorithms </a> <br> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/08%5D.%20Work%40Tech/3%5D.%20Machine%20Coding"> 3️⃣Machine Coding </a> </th> </tr> </tbody> <tbody> <tr> <th> 9. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/09%5D.%20CodeSignal"> <img src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Tech%20Tools/codesignal.png" width="15" height="15"> CodeSignal </a> </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/09%5D.%20CodeSignal/1%5D.%20Arcade"> 1️⃣Arcade </a> <br> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/09%5D.%20CodeSignal/2%5D.%20Interview%20Practice"> 2️⃣Interview Practice </a> <br> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/09%5D.%20CodeSignal/3%5D.%20Challenges"> 3️⃣Challenges </a> <br> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/09%5D.%20CodeSignal/4%5D.%20Company%20Challenges"> 4️⃣Company Challenges </a> </th> </tr> </tbody> <tbody> <tr> <th> 10. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/10%5D.%20HackerRank"> <img src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Tech%20Tools/HackerRank.png" width="15" height="15"> HackerRank </a> </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/10%5D.%20HackerRank/1%5D.%20Prepare"> 1️⃣Prepare </a> <br> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/10%5D.%20HackerRank/2%5D.%20Compete"> 2️⃣Compete </a> </th> </tr> </tbody> <tbody> <tr> <th> 11. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/11%5D.%20HackerEarth"> <img src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Tech%20Tools/HackerEarth.png" width="15" height="15"> HackerEarth </a> </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/11%5D.%20HackerEarth/1%5D.%20Practice"> 1️⃣Practice </a> <br> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/11%5D.%20HackerEarth/2%5D.%20Compete"> 2️⃣Compete </a> </th> </tr> </tbody> <tbody> <tr> <th> 12. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/12%5D.%20CodeChef"> <img src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Tech%20Tools/CodeChef.png" width="15" height="15"> CodeChef </a> </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/12%5D.%20CodeChef/1%5D.%20Learn"> 1️⃣Learn </a> <br> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/12%5D.%20CodeChef/2%5D.%20Practice"> 2️⃣Practice </a> <br> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/12%5D.%20CodeChef/3%5D.%20Compete"> 3️⃣Compete </a> </th> </tr> </tbody> <tbody> <tr> <th> 13. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/13%5D.%20CodeForces"> <img src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Tech%20Tools/CodeForces.png" width="15" height="15"> CodeForces </a> </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/13%5D.%20CodeForces/1%5D.%20Problem%20Set"> 1️⃣Problem Set </a> <br> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/13%5D.%20CodeForces/2%5D.%20Contests"> 2️⃣Contests </a> </th> </tr> </tbody> <tbody> <tr> <th> 14. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/14%5D.%20AtCoder"> <img src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Tech%20Tools/AtCoder.png" width="15" height="15"> AtCoder </a> </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/14%5D.%20AtCoder/Contest"> 1️⃣Contest </a> </th> </tr> </tbody> <tbody> <tr> <th> 15. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/15%5D.%20Sphere%20Online%20Judge%20(SPOJ)"> <img src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Tech%20Tools/spoj.png" width="15" height="15"> Sphere Online Judge (SPOJ) </a> </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/15%5D.%20Sphere%20Online%20Judge%20(SPOJ)/1%5D.%20Problems"> 1️⃣Problems </a> <br> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/15%5D.%20Sphere%20Online%20Judge%20(SPOJ)/2%5D.%20Contests"> 2️⃣Contests </a> </th> </tr> </tbody> <tbody> <tr> <th> 16. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/16%5D.%20LightOJ"> <img src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Tech%20Tools/lightoj.png" width="15" height="15"> LightOJ </a> </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/16%5D.%20LightOJ/1%5D.%20Problems"> 1️⃣Problems </a> <br> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/16%5D.%20LightOJ/2%5D.%20Compete"> 2️⃣Compete </a> </th> </tr> </tbody> <tbody> <tr> <th> 17. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/17%5D.%20Toph"> <img src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Tech%20Tools/toph.png" width="15" height="15"> Toph </a> </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/17%5D.%20Toph/1%5D.%20Problems"> 1️⃣Problems </a> <br> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/17%5D.%20Toph/2%5D.%20Contests"> 2️⃣Contests </a> </th> </tr> </tbody> <tbody> <tr> <th> 18. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/18%5D.%20Australian%20%20Maths%20Trust%20(AMT)"> <img src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Tech%20Tools/AMT.png" width="25" height="15"> Australian Maths Trust (AMT) </a> </th> <th align="left"> </th> </tr> </tbody> <tbody> <tr> <th> 19. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/19%5D.%20CSES"> <img src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Tech%20Tools/CSES.png" width="25" height="15"> CSES </a> </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/19%5D.%20CSES/1%5D.%20CSES%20Problem%20Set"> 1️⃣CSES Problem Set </a> <br> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/19%5D.%20CSES/2%5D.%20BOI%20Contest%20Collection"> 2️⃣BOI Contest Collection </a> <br> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/1%5D.%20DSA%20%2B%20CP/2%5D.%20Competitive%20Programming/19%5D.%20CSES/3%5D.%20CEOI%20Contest%20Collection"> 3️⃣CEOI Contest Collection </a> </th> </tr> </tbody> </table> </th> </tr> </tbody> </table> </td> <td valign="top"> <table border="5"> <thead> <tr> <th> SNo. </th> <th> Contents </th> </tr> </thead> <tbody> <tr> <th> 1. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/2%5D.%20Technical%20Subjects/0%5D.%20Object%20Oriented%20Programming%20(OOP)"> OOP </a> </th> </tr> </tbody> <tbody> <tr> <th> 2. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/2%5D.%20Technical%20Subjects/1%5D.%20Operating%20System%20(OS)"> OS </a> </th> </tr> </tbody> <tbody> <tr> <th> 3. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/2%5D.%20Technical%20Subjects/2%5D.%20Database%20Management%20System%20(DBMS)"> DBMS </a> </th> </tr> </tbody> <tbody> <tr> <th> 4. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/2%5D.%20Technical%20Subjects/3%5D.%20Structured%20Query%20Language%20(SQL)"> SQL </a> </th> </tr> </tbody> <tbody> <tr> <th> 5. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/2%5D.%20Technical%20Subjects/4%5D.%20Computer%20Network%20(CN)"> CN </a> </th> </tr> </tbody> </table> </td> <td valign="top"> <table border="5"> <thead> <tr> <th> SNo. </th> <th> Contents </th> </tr> </thead> <tbody> <tr> <th> 1. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/3%5D.%20System%20Design/01%5D.%20Low%20Level%20Design"> Low Level Design </a> </th> </tr> </tbody> <tbody> <tr> <th> 2. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/3%5D.%20System%20Design/02%5D.%20High%20Level%20Design"> High Level Design </a> </th> </tr> </tbody> </table> </td> <td valign="top"> <table border="5"> <thead> <tr> <th> SNo. </th> <th> Contents </th> </tr> </thead> <tbody> <tr> <th> 1. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/4%5D.%20Projects/Blockchain%20Development"> Blockchain Development </a> </th> </tr> </tbody> <tbody> <tr> <th> 2. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/4%5D.%20Projects/Data%20Science"> Data Science </a> </th> </tr> </tbody> <tbody> <tr> <th> 3. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/4%5D.%20Projects/Internet%20of%20Things%20(IOT)"> Internet of Things (IOT) </a> </th> </tr> </tbody> <tbody> <tr> <th> 4. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/4%5D.%20Projects/Web%20Development"> Web Development </a> </th> </tr> </tbody> <tbody> <tr> <th> 5. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/4%5D.%20Projects/Mobile%20Development"> Mobile Development </a> </th> </tr> </tbody> <tbody> <tr> <th> 6. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/tree/master/4%5D.%20Projects/Desktop%20Development"> Desktop Development </a> </th> </tr> </tbody> </table> </td> <td valign="top"> <table border="5"> <thead> <tr> <th> SNo. </th> <th> Contents </th> <th> Sub-Contents </th> </tr> </thead> <tbody> <tr> <th valign="top"> 1. </th> <th align="left" valign="top"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/blob/master/5%5D.%20Important%20Books%20and%20Resources/Important_Books_Link.md"> 📚Important Books </a> </th> <th> <table border="3"> <thead> <tr> <th> SNo. </th> <th> Topics </th> <th> Sub-Topics </th> </tr> </thead> <tbody> <tr> <th valign="top"> 1. </th> <th align="left" valign="top"> 📘Aptitude + Puzzles </th> <th align="left"> 📒Aptitude <table> <td align="center"> <a href="https://amzn.to/3GDDG9H" target="_blank"> <img src="https://m.media-amazon.com/images/W/WEBP_402378-T1/images/I/510vx4eIUoL._SX198_BO1,204,203,200_QL40_FMwebp_.jpg" width="100" alt=""/> <br> <sub><b>Quantitative Aptitude - <br> Dr. R S Aggarwal</b></sub> </a><br /> </td> </table> </th> </tr> </tbody> <tbody> <tr> <th valign="top"> 2. </th> <th align="left" valign="top"> 📘Programming Languages </th> <th align="left"> 📒C & C++ Language <table> <td align="center"> <a href="https://amzn.to/3CMf51r" target="_blank"> <img src="https://m.media-amazon.com/images/I/41a4CcXfN4L._SY264_BO1,204,203,200_QL40_FMwebp_.jpg" width="100" alt=""/> <br> <sub><b>Let Us C</b></sub> </a><br /> </td> <td align="center"> <a href="https://amzn.to/3CMfaCh" target="_blank"> <img src="https://m.media-amazon.com/images/I/51BFuRUjSWL._SY264_BO1,204,203,200_QL40_FMwebp_.jpg" width="100" alt=""/> <br> <sub><b>C in Depth</b></sub> </a><br /> </td> <tr> <td align="center"> <a href="https://amzn.to/3kfkh7w" target="_blank"> <img src="https://m.media-amazon.com/images/I/51YkwADIq5L._SY264_BO1,204,203,200_QL40_FMwebp_.jpg" width="100" alt=""/> <br> <sub><b>Let Us C++</b></sub> </a><br /> </td> <td align="center"> <a href="https://amzn.to/3XeVS0G" target="_blank"> <img src="https://m.media-amazon.com/images/I/51Uqe5PHbML._SX381_BO1,204,203,200_.jpg" width="100" alt=""/> <br> <sub><b>The Complete Reference <br> C++</b></sub> </a><br /> </td> </table> 📒Python Language <table> <td align="center"> <a href="https://amzn.to/3ZBGNrp" target="_blank"> <img src="https://m.media-amazon.com/images/I/51Ss-7j3v5L._SX362_BO1,204,203,200_.jpg" width="100" alt=""/> <br> <sub><b>Core Python</b></sub> </a><br /> </td> </table> 📒Java Language <table> <td align="center"> <a href="https://amzn.to/3ZCI8yk" target="_blank"> <img src="https://m.media-amazon.com/images/I/51z+MsmqesL._SX258_BO1,204,203,200_.jpg" width="100" alt=""/> <br> <sub><b>Core Java</b></sub> </a><br /> </td> </table> </th> </tr> </tbody> <tbody> <tr> <th valign="top"> 3. </th> <th align="left" valign="top"> 📘DSA <hr> 📘CP <hr> 📘Coding Interviews </th> <th align="left"> 📒Data Structures <table> <td align="center"> <a href="https://amzn.to/3khiOO8" target="_blank"> <img src="https://m.media-amazon.com/images/I/417ExARdRYL._SX384_BO1,204,203,200_.jpg" width="100" alt=""/> <br> <sub><b>Data Structures <br> and Algorithms <br> Made Easy</b></sub> </a><br /> </td> <td align="center"> <a href="https://amzn.to/3QGs0HL" target="_blank"> <img src="https://m.media-amazon.com/images/I/41fWWCgWk6L._SX384_BO1,204,203,200_.jpg" width="100" alt=""/> <br> <sub><b>Data Structures <br> and Algorithms <br> Thinking with Python</b></sub> </a><br /> </td> </table> 📒Algorithms <table> <td align="center"> <a href="https://amzn.to/3kitQTm" target="_blank"> <img src="https://m.media-amazon.com/images/I/513P8XoCAEL._SX376_BO1,204,203,200_.jpg" width="100" alt=""/> <br> <sub><b>Introduction to Algorithms</b></sub> </a><br /> </td> <td align="center"> <a href="https://amzn.to/3XwQXro" target="_blank"> <img src="https://m.media-amazon.com/images/I/41-RWwEls6L._SX400_BO1,204,203,200_.jpg" width="100" alt=""/> <br> <sub><b>Algorithms</b></sub> </a><br /> </td> </table> <hr> 📒Competitive Programming <table> <td align="center"> <a href="https://amzn.to/3ZDtJle" target="_blank"> <img src="https://m.media-amazon.com/images/I/41iVz+I5jOL._SY344_BO1,204,203,200_.jpg" width="100" alt=""/> <br> <sub><b>Guide to <br> Competitive Programming</b></sub> </a><br /> </td> </table> <hr> 📒Coding Interviews <table> <td align="center"> <a href="https://amzn.to/3kieVsf" target="_blank"> <img src="https://m.media-amazon.com/images/I/41oYsXjLvZL._SY291_BO1,204,203,200_QL40_FMwebp_.jpg" width="100;" alt=""/> <br> <sub><b>Cracking the Coding Interview</b></sub> </a><br /> </td> </table> </th> </tr> </tbody> <tbody> <tr> <th valign="top"> 4. </th> <th align="left" valign="top"> 📘Technical Subject </th> <th align="left"> 📒Object Oriented Programming (OOP) <table> <td align="center"> <a href="https://amzn.to/3GJECJI" target="_blank"> <img src="https://m.media-amazon.com/images/I/51N4A59EAiL.jpg" width="100" alt=""/> <br> <sub><b>Object Oriented Programming <br> with C++ <br> E Balagurusamy</b></sub> </a><br /> </td> </table> 📒Operating System (OS) <table> <td align="center"> <a href="https://amzn.to/3w15IXN" target="_blank"> <img src="https://m.media-amazon.com/images/I/51Qy2upM+aL._SY344_BO1,204,203,200_.jpg" width="100" alt=""/> <br> <sub><b>Operating System</b></sub> </a><br /> </td> </table> 📒Database Management System (DBMS) <table> <td align="center"> <a href="https://amzn.to/3GG6Gh5" target="_blank"> <img src="https://m.media-amazon.com/images/I/51cq3aAdqNL._SX198_BO1,204,203,200_QL40_FMwebp_.jpg" width="100" alt=""/> <br> <sub><b>Database Management System</b></sub> </a><br /> </td> </table> 📒Computer Network (CN) <table> <td align="center"> <a href="https://amzn.to/3H3L27N" target="_blank"> <img src="https://m.media-amazon.com/images/I/51vT3X2tdtL._SX409_BO1,204,203,200_.jpg" width="100" alt=""/> <br> <sub><b>Computer Network</b></sub> </a><br /> </td> </table> 📒System Design <table> <td align="center"> <a href="https://amzn.to/3COeqws" target="_blank"> <img src="https://m.media-amazon.com/images/I/4129HxbBnOL._SX331_BO1,204,203,200_.jpg" width="100" alt=""/> <br> <sub><b>System Design - Volume 1</b></sub> </a><br /> </td> <td align="center"> <a href="https://amzn.to/3CIJk9x" target="_blank"> <img src="https://m.media-amazon.com/images/I/31wqdTUjz2L._SX348_BO1,204,203,200_.jpg" width="100" alt=""/> <br> <sub><b>System Design - Volume 2</b></sub> </a><br /> </td> </table> </th> </tr> </tbody> </table> </th> </tr> </tbody> <tbody> <tr> <th valign="top"> 2. </th> <th align="left" valign="top"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/blob/master/5%5D.%20Important%20Books%20and%20Resources/Readme.md"> 📓Learning Resources </a> </th> <th> <a href="https://bit.ly/3FvaHo9" target="_blank"><img align="center" src="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/blob/master/images/codestudio-1.png" width="300px" height="80px" /></a> <br><img src="https://readme-typing-svg.herokuapp.com?font=Impact&center=true&color=F78D1AFF&size=50&width=420&height=80&lines=Learning+Resources" /> <table border="3"> <thead> <tr> <th> SNo. </th> <th> Topics </th> <th> Sub-Topics </th> </tr> </thead> <tbody> <tr> <th> 1. </th> <th align="left"> 📘Aptitude + Puzzle </th> <th align="left"> <a href="https://www.codingninjas.com/codestudio/guided-paths/aptitude-preparation"> 1️⃣Aptitude </a> <br> <a href="https://www.codingninjas.com/codestudio/guided-paths/top-150-interview-puzzles"> 2️⃣Puzzle </a> </th> </tr> </tbody> <tbody> <tr> <th> 2. </th> <th align="left"> 📘Languages </th> <th align="left"> <a href="https://bit.ly/3YtE9n1"> 1️⃣C++ </a> <br> <a href="https://bit.ly/3V3lgnW"> 2️⃣Python </a> <br> <a href="https://bit.ly/3FX11Eb">3️⃣Java </a> </th> </tr> </tbody> <tbody> <tr> <th> 3. </th> <th align="left"> 📘DSA + CP <hr> 📘Top Problem Lists </th> <th align="left"> <a href="https://bit.ly/3V5h7Qx"> 1️⃣Data Structures and Algorithms </a> <br> <a href="https://www.codingninjas.com/codestudio/guided-paths/competitive-programming"> 2️⃣Competitive Programming </a> <hr> <a href="https://bit.ly/3hu7GfF"> 1️⃣Striver SDE Sheet </a> <br> <a href="https://bit.ly/3uTFyFM"> 2️⃣Love Babbar DSA Sheet </a> </th> </tr> </tbody> <tbody> <tr> <th> 4. </th> <th align="left"> 📘Technical Subject </th> <th align="left"> <a href="https://bit.ly/3HKNaSK"> 1️⃣Operating System </a> <br> <a href="https://bit.ly/3FX5k2e"> 2️⃣Database Management System </a> <br> <a href="https://bit.ly/3BHlNFv"> 3️⃣Computer Networks </a> <br> <a href="https://bit.ly/3WrQgzn">4️⃣ Object Oriented Programming in C++ </a> <br>&emsp; <a href="https://www.codingninjas.com/codestudio/guided-paths/oops-in-python"> 4️⃣🅰️Object Oriented Programming in Python </a> <br>&emsp; <a href="https://www.codingninjas.com/codestudio/guided-paths/oops-in-java"> 4️⃣🅱️Object Oriented Programming in Java </a> <br> <a href="https://www.codingninjas.com/codestudio/guided-paths/system-design"> 5️⃣System Design </a> </th> </tr> </tbody> </table> <br> <a href="https://www.geeksforgeeks.org" target="_blank"><img align="center" src="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/blob/master/images/GFG-1.png" width="300px" height="50px" /></a> <br><img src="https://readme-typing-svg.herokuapp.com?font=Impact&center=true&color=308D46&size=50&width=420&height=80&lines=Learning+Resources" /> <table border="3"> <thead> <tr> <th> SNo. </th> <th> Topics </th> <th> Sub-Topics </th> </tr> </thead> <tbody> <tr> <th> 1. </th> <th align="left"> 📘Aptitude + Puzzles </th> <th align="left"> <a href="https://www.geeksforgeeks.org/aptitude-gq"> 1️⃣Aptitude </a> <br> <a href="https://www.geeksforgeeks.org/puzzles"> 2️⃣Puzzle </a> </th> </tr> </tbody> <tbody> <tr> <th> 2. </th> <th align="left"> 📘Languages </th> <th align="left"> <a href="https://www.geeksforgeeks.org/c-plus-plus"> 1️⃣C++ </a> <br> <a href="https://www.geeksforgeeks.org/python-programming-language"> 2️⃣Python </a> <br> <a href="https://www.geeksforgeeks.org/java"> 3️⃣Java </a> </th> </tr> </tbody> <tbody> <tr> <th> 3. </th> <th align="left"> 📘DSA + CP <hr> 📘Top Problem Lists </th> <th align="left"> <a href="https://www.geeksforgeeks.org/data-structures"> 1️⃣Data Structures </a> <br> <a href="https://www.geeksforgeeks.org/fundamentals-of-algorithms"> 2️⃣Algorithms </a> <br> <a href="https://www.geeksforgeeks.org/competitive-programming-a-complete-guide"> 3️⃣Competitive Programming </a> <hr> <a href="https://www.geeksforgeeks.org/sde-sheet-a-complete-guide-for-sde-preparation">1️⃣GFG SDE Sheet </a> <br>&emsp; <a href="https://www.geeksforgeeks.org/facebookmeta-sde-sheet-interview-questions-and-answers"> 🔵Facebook(Meta) SDE Sheet </a> <br>&emsp; <a href="https://www.geeksforgeeks.org/amazon-sde-sheet-interview-questions-and-answers"> 🟠Amazon SDE Sheet </a> <br>&emsp; <a href="https://www.geeksforgeeks.org/apple-sde-sheet-interview-questions-and-answers"> ⚫Apple SDE Sheet </a> <br>&emsp; <a href="https://www.geeksforgeeks.org/netflix-sde-sheet-interview-questions-and-answers"> 🔴Netflix SDE Sheet </a> <br>&emsp; <a href="https://www.geeksforgeeks.org/google-sde-sheet-interview-questions-and-answers"> 🟢Google SDE Sheet </a> <br> <a href="https://www.geeksforgeeks.org/dsa-sheet-by-love-babbar"> 2️⃣Love Babbar DSA Sheet </a> </th> </tr> </tbody> <tbody> <tr> <th> 4. </th> <th align="left"> 📘Technical Subject </th> <th align="left"> <a href="https://www.geeksforgeeks.org/operating-systems"> 1️⃣Operating System </a> <br> <a href="https://www.geeksforgeeks.org/dbms"> 2️⃣Database Management System </a> <br> <a href="https://www.geeksforgeeks.org/computer-network-tutorials"> 3️⃣Computer Networks </a> <br> <a href="https://www.geeksforgeeks.org/system-design-tutorial"> 4️⃣System Design </a> <br>&emsp; <a href="https://www.geeksforgeeks.org/software-design-patterns"> 4️⃣🅰️Software Design Patterns </a> </th> </tr> </tbody> <tbody> <tr> <th> 5. </th> <th align="left"> 📘Projects </th> <th align="left"> <a href="https://www.geeksforgeeks.org/computer-science-projects"> 1️⃣Computer Science Projects </a> </th> </tr> </tbody> </table> </th> </tr> </tbody> </table> </td> <td valign="top"> <table border="5"> <thead> <tr> <th> SNo. </th> <th> Contents </th> </tr> </thead> <tbody> <tr> <th> 1. </th> <th align="left"> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/blob/master/6%5D.%20Behavioural%20Interview/behavioural-interview-ques.md"> Behavioural Interview Questions </a> </th> </tr> </tbody> </table> </td> </tr> </tbody> </table> </br> ## 🏆 `Project Admin` | <a href="https://github.com/AkashSingh3031"><img src="https://avatars.githubusercontent.com/u/60146338?s=400&u=0efcf847bb1584e6653c26096e9855ed09d2a5ad&v=4" width=200px height=200px /></a> | | :----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------: | | **[Akash Singh](https://prepverse.github.io/)** <br><br> <a href="https://wa.me/919794423031"><img src="https://img.shields.io/badge/-WhatsApp-075E54?style=flat&amp;labelColor=white&amp;logo=whatsapp&amp;logoColor=075E54"></a> <a href="https://t.me/akashsingh3031"><img src="https://img.shields.io/badge/-Telegram-1ca0f1?style=flat&amp;labelColor=white&amp;logo=telegram&amp;logoColor=1ca0f1"></a> <br> <a href="https://www.linkedin.com/in/akashsingh3031/"><img src="https://img.shields.io/badge/-Linkedin-0e76a8?style=flat&amp;labelColor=white&amp;logo=linkedin&amp;logoColor=0e76a8"></a> <a href="https://www.facebook.com/akashsingh3031"><img src="https://img.shields.io/badge/-Facebook-4267B2?style=flat&amp;labelColor=white&amp;logo=facebook&amp;logoColor=4267B2"></a> <br> <a href="https://www.instagram.com/akash.singh3031"><img src="https://img.shields.io/badge/-Instagram-E1306C?style=flat&amp;labelColor=FCAF45&amp;logo=instagram&amp;logoColor=FD1D1D"></a> <a href="https://twitter.com/akashsingh3031"><img src="https://img.shields.io/badge/-Twitter-1DA1F2?style=flat&amp;labelColor=white&amp;logo=twitter&amp;logoColor=1DA1F2"></a> | ## `Awesome Contributors` ✨🎉 `81` Thanks goes to these **Wonderful People** 👨🏻‍💻: <!-- ALL-CONTRIBUTORS-LIST:START - Do not remove or modify this section --> <!-- prettier-ignore-start --> <!-- markdownlint-disable --> <table> <!-- 1st Row --> <tr> <td align="center"><a href="https://github.com/AkashSingh3031"><img src="https://avatars.githubusercontent.com/u/60146338?s=400&u=0efcf847bb1584e6653c26096e9855ed09d2a5ad&v=4" width="100px;" alt=""/><br /><sub><b>AkashSingh3031</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation" title="Project Management">📆</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=AkashSingh3031" title="Commits">✍️</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a> <br> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation" title="Design">🎨</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation" title="Code">👨🏻‍💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation" title="Document">📓</a></td> <td align="center"><a href="https://github.com/Anuradha0501"><img src="https://avatars.githubusercontent.com/u/71958796?v=4" width="100px;" alt=""/><br /><sub><b>Anuradha0501</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=Anuradha0501" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/RishikaGhosh"><img src="https://avatars.githubusercontent.com/u/58912231?v=4" width="100px;" alt=""/><br /><sub><b>RishikaGhosh</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=RishikaGhosh" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/thecoder8890"><img src="https://avatars.githubusercontent.com/u/33773206?v=4" width="100px;" alt=""/><br /><sub><b>thecoder8890</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=thecoder8890" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/Ash515"><img src="https://avatars.githubusercontent.com/u/53136674?v=4" width="100px;" alt=""/><br /><sub><b>Ash515</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=Ash515" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/fame2105"><img src="https://avatars.githubusercontent.com/u/6636804?v=4" width="100px;" alt=""/><br /><sub><b>fame2105</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=fame2105" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <!-- 2nd Row --> <tr> <td align="center"><a href="https://github.com/vkhurana25"><img src="https://avatars.githubusercontent.com/u/64976194?v=4" width="100px;" alt=""/><br /><sub><b>vkhurana25</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=vkhurana25" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/RAUNAK-PANDEY"><img src="https://avatars.githubusercontent.com/u/65064180?v=4" width="100px;" alt=""/><br /><sub><b>RAUNAK-PANDEY</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=RAUNAK-PANDEY" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/codeaholic-shub"><img src="https://avatars.githubusercontent.com/u/65807708?v=4" width="100px;" alt=""/><br /><sub><b>codeaholic-shub</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=codeaholic-shub" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/aroravansh"><img src="https://avatars.githubusercontent.com/u/44532230?v=4" width="100px;" alt=""/><br /><sub><b>aroravansh</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=aroravansh" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/tanmayChakrawarty"><img src="https://avatars.githubusercontent.com/u/75254780?v=4" width="100px;" alt=""/><br /><sub><b>tanmayChakrawarty</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=tanmayChakrawarty" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/onlykingKD"><img src="https://avatars.githubusercontent.com/u/55577276?v=4" width="100px;" alt=""/><br /><sub><b>onlykingKD</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=onlykingKD" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <!-- 3rd Row --> <tr> <td align="center"><a href="https://github.com/parajshah"><img src="https://avatars.githubusercontent.com/u/65371747?v=4" width="100px;" alt=""/><br /><sub><b>parajshah</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=parajshah" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/Pranjal-bisht"><img src="https://avatars.githubusercontent.com/u/58468853?v=4" width="100px;" alt=""/><br /><sub><b>Pranjal-bisht</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=Pranjal-bisht" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/SanandhKumar02"><img src="https://avatars.githubusercontent.com/u/72318041?v=4" width="100px;" alt=""/><br /><sub><b>SanandhKumar02</b></sub></a><br /></td> <td align="center"><a href="https://github.com/sainikhil1605"><img src="https://avatars.githubusercontent.com/u/35322884?v=4" width="100px;" alt=""/><br /><sub><b>sainikhil1605</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=sainikhil1605" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/work-mohit"><img src="https://avatars.githubusercontent.com/u/46566524?v=4" width="100px;" alt=""/><br /><sub><b>work-mohit</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=work-mohit" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/Ayush7614"><img src="https://avatars.githubusercontent.com/u/67006255?v=4" width="100px;" alt=""/><br /><sub><b>Ayush7614</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=Ayush7614" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <!-- 4th Row --> <tr> <td align="center"><a href="https://github.com/sayeedajmal"><img src="https://avatars.githubusercontent.com/u/76242275?v=4" width="100px;" alt=""/><br /><sub><b>sayeedajmal</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=sayeedajmal" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/Wenodh"><img src="https://avatars.githubusercontent.com/u/63317955?v=4" width="100px;" alt=""/><br /><sub><b>Wenodh</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=Wenodh" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/devraj4522"><img src="https://avatars.githubusercontent.com/u/55313450?v=4" width="100px;" alt=""/><br /><sub><b>devraj4522</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=devraj4522" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/RounakNeogy"><img src="https://avatars.githubusercontent.com/u/56738141?v=4" width="100px;" alt=""/><br /><sub><b>RounakNeogy</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=RounakNeogy" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/ashwin3082002"><img src="https://avatars.githubusercontent.com/u/73417773?v=4" width="100px;" alt=""/><br /><sub><b>ashwin3082002</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=ashwin3082002" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/VishnuSastryHK"><img src="https://avatars.githubusercontent.com/u/42547521?v=4" width="100px;" alt=""/><br /><sub><b>VishnuSastryHK</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=VishnuSastryHK" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <!-- 5th Row --> <tr> <td align="center"><a href="https://github.com/muhiqsimui"><img src="https://avatars.githubusercontent.com/u/33776809?v=4" width="100px;" alt=""/><br /><sub><b>muhiqsimui</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=muhiqsimui" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/adityagi02"><img src="https://avatars.githubusercontent.com/u/77538183?v=4" width="100px;" alt=""/><br /><sub><b>adityagi02</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=adityagi02" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/Satyamchaubey07"><img src="https://avatars.githubusercontent.com/u/55735057?v=4" width="100px;" alt=""/><br /><sub><b>Satyamchaubey07</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=Satyamchaubey07" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/vedudx"><img src="https://avatars.githubusercontent.com/u/53002423?v=4" width="100px;" alt=""/><br /><sub><b>vedudx</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=vedudx" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/sheetalneeraj"><img src="https://avatars.githubusercontent.com/u/42382485?v=4" width="100px;" alt=""/><br /><sub><b>sheetalneeraj</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=sheetalneeraj" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/amandewatnitrr"><img src="https://avatars.githubusercontent.com/u/52046981?v=4" width="100px;" alt=""/><br /><sub><b>amandewatnitrr</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=amandewatnitrr" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <!-- 6th Row --> <tr> <td align="center"><a href="https://github.com/samnoon1971"><img src="https://avatars.githubusercontent.com/u/36998653?v=4" width="100px;" alt=""/><br /><sub><b>samnoon1971</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=samnoon1971" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/draciel58"><img src="https://avatars.githubusercontent.com/u/58848892?v=4" width="100px;" alt=""/><br /><sub><b>draciel58</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=draciel58" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/GJuceviciute"><img src="https://avatars.githubusercontent.com/u/57292801?v=4" width="100px;" alt=""/><br /><sub><b>GJuceviciute</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=GJuceviciute" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/Sukhendra523"><img src="https://avatars.githubusercontent.com/u/44740202?v=4" width="100px;" alt=""/><br /><sub><b>Sukhendra523</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=Sukhendra523" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/Ranjul-Arumadi"><img src="https://avatars.githubusercontent.com/u/54582161?v=4" width="100px;" alt=""/><br /><sub><b>Ranjul-Arumadi</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=Ranjul-Arumadi" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/GouravRusiya30"><img src="https://avatars.githubusercontent.com/u/13219295?v=4" width="100px;" alt=""/><br /><sub><b>GouravRusiya30</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=GouravRusiya30" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <!-- 7th Row --> <tr> <td align="center"><a href="https://github.com/Akashkhandelwal191"><img src="https://avatars.githubusercontent.com/u/67469131?v=4" width="100px;" alt=""/><br /><sub><b>Akashkhandelwal191</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=Akashkhandelwal191" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/RahulSurana123"><img src="https://avatars.githubusercontent.com/u/35515322?v=4" width="100px;" alt=""/><br /><sub><b>RahulSurana123</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=RahulSurana123" title="Commits">💻</a></td> <td align="center"><a href="https://github.com/imsoumen"><img src="https://avatars.githubusercontent.com/u/43337272?v=4" width="100px;" alt=""/><br /><sub><b>imsoumen</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=imsoumen" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/thisisbillall"><img src="https://avatars.githubusercontent.com/u/74954492?v=4" width="100px;" alt=""/><br /><sub><b>thisisbillall</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=thisisbillall" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/nixmaldonado"><img src="https://avatars.githubusercontent.com/u/8680692?v=4" width="100px;" alt=""/><br /><sub><b>nixmaldonado</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=nixmaldonado" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/thefool76"><img src="https://avatars.githubusercontent.com/u/69065938?v=4" width="100px;" alt=""/><br /><sub><b>thefool76</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=thefool76" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <!-- 8th Row --> <tr> <td align="center"><a href="https://github.com/suniti0804"><img src="https://avatars.githubusercontent.com/u/72435330?v=4" width="100px;" alt=""/><br /><sub><b>suniti0804</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=suniti0804" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/harish3124"><img src="https://avatars.githubusercontent.com/u/66413502?v=4" width="100px;" alt=""/><br /><sub><b>harish3124</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=harish3124" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/poojitha2002"><img src="https://avatars.githubusercontent.com/u/58463372?v=4" width="100px;" alt=""/><br /><sub><b>poojitha2002</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=poojitha2002" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/vk-2501"><img src="https://avatars.githubusercontent.com/u/73028420?v=4" width="100px;" alt=""/><br /><sub><b>vk-2501</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=vk-2501" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/mgazdovic"><img src="https://avatars.githubusercontent.com/u/62848619?v=4" width="100px;" alt=""/><br /><sub><b>mgazdovic</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=mgazdovic" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/Anshir08"><img src="https://avatars.githubusercontent.com/u/69457505?v=4" width="100px;" alt=""/><br /><sub><b>Anshir08</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=Anshir08" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <!-- 9th Row --> <tr> <td align="center"><a href="https://github.com/harshil202"><img src="https://avatars.githubusercontent.com/u/83488223?v=4" width="100px;" alt=""/><br /><sub><b>harshil202</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=harshil202" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/Rei-x"><img src="https://avatars.githubusercontent.com/u/38581479?v=4" width="100px;" alt=""/><br /><sub><b>Rei-x</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=Rei-x" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/maanasvi999"><img src="https://avatars.githubusercontent.com/u/51221086?v=4" width="100px;" alt=""/><br /><sub><b>maanasvi999</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=maanasvi999" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/mansijain980"><img src="https://avatars.githubusercontent.com/u/63226239?v=4" width="100px;" alt=""/><br /><sub><b>mansijain980</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=mansijain980" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/tanyagupta0201"><img src="https://avatars.githubusercontent.com/u/66638392?v=4" width="100px;" alt=""/><br /><sub><b>tanyagupta0201</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=tanyagupta0201" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/saikrithik"><img src="https://avatars.githubusercontent.com/u/55931692?v=4" width="100px;" alt=""/><br /><sub><b>saikrithik</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=saikrithik" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <!-- 10th Row --> <tr> <td align="center"><a href="https://github.com/ankit200490"><img src="https://avatars.githubusercontent.com/u/4373228?v=4" width="100px;" alt=""/><br /><sub><b>ankit200490</b></sub></a><br /></td> <td align="center"><a href="https://github.com/Sumit4482"><img src="https://avatars.githubusercontent.com/u/61246873?v=4" width="100px;" alt=""/><br /><sub><b>Sumit4482</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=Sumit4482" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/GSAUC3"><img src="https://avatars.githubusercontent.com/u/55054089?v=4" width="100px;" alt=""/><br /><sub><b>GSAUC3</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=GSAUC3" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/iamsinghashutosh"><img src="https://avatars.githubusercontent.com/u/44143541?v=4" width="100px;" alt=""/><br /><sub><b>iamsinghashutosh</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=iamsinghashutosh" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/Uchiha-Itachi0"><img src="https://avatars.githubusercontent.com/u/86482181?v=4" width="100px;" alt=""/><br /><sub><b>Uchiha-Itachi0</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=Uchiha-Itachi0" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/yan-michael"><img src="https://avatars.githubusercontent.com/u/15942983?v=4" width="100px;" alt=""/><br /><sub><b>yan-michael</b></sub></a><br /></td> <!-- 11th Row --> <tr> <td align="center"><a href="https://github.com/abhistark007"><img src="https://avatars.githubusercontent.com/u/58290134?v=4" width="100px;" alt=""/><br /><sub><b>abhistark007</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=abhistark007" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/xor09"><img src="https://avatars.githubusercontent.com/u/70262740?v=4" width="100px;" alt=""/><br /><sub><b>xor09</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=xor09" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/avnoor-488"><img src="https://avatars.githubusercontent.com/u/54592053?v=4" width="100px;" alt=""/><br /><sub><b>avnoor-488</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=avnoor-488" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/VishnuVVR-369"><img src="https://avatars.githubusercontent.com/u/86388801?v=4" width="100px;" alt=""/><br /><sub><b>VishnuVVR-369</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=VishnuVVR-369" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/oguilhermefigueiredo"><img src="https://avatars.githubusercontent.com/u/97318219?v=4" width="100px;" alt=""/><br /><sub><b>oguilhermefigueiredo</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=oguilhermefigueiredo" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/gcnit"><img src="https://avatars.githubusercontent.com/u/4833751?v=4" width="100px;" alt=""/><br /><sub><b>gcnit</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=gcnit" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <!-- 12th Row --> <tr> <td align="center"><a href="https://github.com/Yasien99"><img src="https://avatars.githubusercontent.com/u/55417069?v=4" width="100px;" alt=""/><br /><sub><b>Yasien99</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=Yasien99" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/ginny100"><img src="https://avatars.githubusercontent.com/u/58489398?v=4" width="100px;" alt=""/><br /><sub><b>ginny100</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=ginny100" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/galin-chung-nguyen"><img src="https://avatars.githubusercontent.com/u/19767623?v=4" width="100px;" alt=""/><br /><sub><b>galin-chung-nguyen</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=galin-chung-nguyen" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/Phoenix-92"><img src="https://avatars.githubusercontent.com/u/102870015?v=4" width="100px;" alt=""/><br /><sub><b>Phoenix-92</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=Phoenix-92" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/edo-ce"><img src="https://avatars.githubusercontent.com/u/72577095?v=4" width="100px;" alt=""/><br /><sub><b>edo-ce</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=edo-ce" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/nixrajput"><img src="https://avatars.githubusercontent.com/u/10887215?v=4" width="100px;" alt=""/><br /><sub><b>nixrajput</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=nixrajput" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <!-- 13th Row --> <tr> <td align="center"><a href="https://github.com/anmolp476"><img src="https://avatars.githubusercontent.com/u/99687931?v=4" width="100px;" alt=""/><br /><sub><b>anmolp476</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=anmolp476" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/Vaishnaviamirayada"><img src="https://avatars.githubusercontent.com/u/108050528?v=4" width="100px;" alt=""/><br /><sub><b>Vaishnaviamirayada</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=Vaishnaviamirayada" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/Mist57"><img src="https://avatars.githubusercontent.com/u/89301994?v=4" width="100px;" alt=""/><br /><sub><b>Mist57</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=Mist57" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/saurabh200014"><img src="https://avatars.githubusercontent.com/u/68815222?v=4" width="100px;" alt=""/><br /><sub><b>saurabh200014</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=saurabh200014" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/chandru1003"><img src="https://avatars.githubusercontent.com/u/55582956?v=4" width="100px;" alt=""/><br /><sub><b>chandru1003</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=chandru1003" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/csi-Abil"><img src="https://avatars.githubusercontent.com/u/101435994?v=4" width="100px;" alt=""/><br /><sub><b>csi-Abil</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=csi-Abil" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <!-- 14th Row --> <tr> <td align="center"><a href="https://github.com/shubhanshurav"><img src="https://avatars.githubusercontent.com/u/87806305?v=4" width="100px;" alt=""/><br /><sub><b>shubhanshurav</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=shubhanshurav" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/Pratyush0612"><img src="https://avatars.githubusercontent.com/u/86615560?v=4" width="100px;" alt=""/><br /><sub><b>Pratyush0612</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=Pratyush0612" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> <td align="center"><a href="https://github.com/nisabmohd"><img src="https://avatars.githubusercontent.com/u/76525761?v=4" width="100px;" alt=""/><br /><sub><b>nisabmohd</b></sub></a><br /><a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/commits?author=nisabmohd" title="Commits">💻</a> <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/graphs/contributors" title="Contribution Graph">📊</a></td> </table> ## `Contributing` <img align="center" src="https://github.com/AkashSingh3031/AkashSingh3031/blob/main/images/Handshake.gif" height="30px"> We'd love your contributions! Kindly follow the steps below to get started: 0. Star <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation" title="this">this</a> repository. 1. Fork <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation" title="this">this</a> repository. 2. Clone the forked repository. ```css git clone https://github.com/<your-github-username>/The-Complete-FAANG-Preparation ``` 3. Navigate to the project directory. ```py cd The-Complete-FAANG-Preparation ``` 4. Create a new branch. ```css git checkout -b <your_branch_name> ``` 5. Make changes. 6. Stage your changes and commit ```css git add -A git commit -m "<your_commit_message>" ``` 7. Push your local commits to the remote repo. ```css git push -u origin <your_branch_name> ``` 8. Create a <a href="https://docs.github.com/en/github/collaborating-with-pull-requests/proposing-changes-to-your-work-with-pull-requests/creating-a-pull-request" title="Pull Request">Pull-Request</a> to `develop` ! 9. Congratulations! 🎉 Sit and relax, you've made your contribution to <a href="https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation" title="The-Complete-FAANG-Preparation">The Complete FAANG Preparation</a>. ✌️ ❤️ 💥 --- ## `Stargazers Over Time 📊📈` <table> <td> <a href="https://starchart.cc/AkashSingh3031/The-Complete-FAANG-Preparation"><img src="https://starchart.cc/AkashSingh3031/The-Complete-FAANG-Preparation.svg" width="100%" height="100%"></a> </td> <tr> <td> <a href="https://star-history.com/#AkashSingh3031/The-Complete-FAANG-Preparation&Timeline"><img src="https://api.star-history.com/svg?repos=AkashSingh3031/The-Complete-FAANG-Preparation&type=Timeline" width="100%" height="100%"></a> </td> </table> <!-- [![Stargazers over time](https://starchart.cc/AkashSingh3031/The-Complete-FAANG-Preparation.svg)](https://starchart.cc/AkashSingh3031/The-Complete-FAANG-Preparation) --> ## [`MIT LICENSE 📜`](https://github.com/AkashSingh3031/The-Complete-FAANG-Preparation/blob/master/LICENSE) | Permissions | Limitations | Conditions | |-------------------|--------------|---------------------------------| | ✔ Commercial use | ❌ Liability | 🛈 License and copyright notice | | ✔ Modification | ❌ Warranty | | | ✔ Distribution | | | | ✔ Private use | | | > **Note** ```css MIT License Copyright (c) 2021 Akash Singh Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. ```
534
Operating System for Enterprise Blockchain
![Cello](docs/images/favicon.png) [![Build Status](https://dev.azure.com/Hyperledger/Cello/_apis/build/status/hyperledger.cello?branchName=master)](https://dev.azure.com/Hyperledger/Cello/_build/latest?definitionId=27&branchName=master) Hyperledger Cello is a blockchain provision and operation system, which helps manage blockchain networks in an efficient way. 1. [Introduction](#introduction) 2. [Main Features](#main-features) 3. [Quick Start](#quick-start) 4. [Documentation](#documentation-getting-started-and-develop-guideline) 5. [Why named cello?](#why-named-cello) 6. [Notice](#incubation-notice) ## Introduction Using Cello, everyone can easily: * Build up a Blockchain as a Service (BaaS) platform quickly from scratch. * Provision customizable Blockchains instantly, e.g., a Hyperledger fabric network v1.0. * Maintain a pool of running blockchain networks on top of baremetals, Virtual Clouds (e.g., virtual machines, vsphere Clouds), Container clusters (e.g., Docker, Swarm, Kubernetes). * Check the system status, adjust the chain numbers, scale resources... through dashboards. A typical usage scenario is illustrated as: ![Typical Scenario](docs/images/scenario.png) ## Quick Start Environmental preparation: 1. docker [how install](https://get.docker.com) 2. docker compose(`we switched to` [Docker Compose V2](https://docs.docker.com/compose/#compose-v2-and-the-new-docker-compose-command)) [how install](https://docs.docker.com/compose/install/) 3. make `all script for cello service management is written in Makefile` 4. kubernetes (`optional`) [how install](https://kubernetes.io/docs/setup/) 5. node [how install](https://nodejs.org/en/download/) If environment is prepared, then we can start cello service. * Build essential images for cello service (Optional, because currently the dockerhub image auto build haven't ready, in the future you can ignore this step.) * Build API Engine ```bash $ make api-engine ``` * Build Docker Agent ```bash $ make docker-rest-agent ``` * Build Docker Dashboard ```bash $ make dashboard ``` <!--- * config variables for service deployment through menuconfig/alldefconfig, then will generate .config file under the project folder. if you want to use default configuration for service deployment, only need run alldefconfig. ```bash # make alldefconfig ``` if you want to set the config through terminal ui, run menuconfig ![menuconfig](docs/images/menuconfig.png). ```bash # make menuconfig ``` --> * Start cello service.<!---, default deployment method is using docker-compose, if you have kubernetes environment,--> <!---you can change deployment method to kubernetes through `DEPLOY_METHOD=k8s make start`.--> ```bash $ make start ``` After service started up, if use docker-compose method, you can see output: ```bash CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES 81e6459965ec hyperledger/cello-agent-docker "gunicorn server:app…" 4 seconds ago Up 2 seconds 0.0.0.0:2375->2375/tcp, :::2375->2375/tcp, 0.0.0.0:5001->5001/tcp, :::5001->5001/tcp cello.docker.agent 04367ab6bd5e postgres:11.1 "docker-entrypoint.s…" 4 seconds ago Up 2 seconds 0.0.0.0:5432->5432/tcp, :::5432->5432/tcp cello-postgres 29b56a279893 hyperledger/cello-api-engine "/bin/sh -c 'bash /e…" 4 seconds ago Up 2 seconds 0.0.0.0:8080->8080/tcp, :::8080->8080/tcp cello-api-engine a272a06d8280 hyperledger/cello-dashboard "bash -c 'nginx -g '…" 4 seconds ago Up 2 seconds 80/tcp, 0.0.0.0:8081->8081/tcp, :::8081->8081/tcp cello-dashboard ``` <!--- If use kubernetes method to deploy, the output is: ```bash NAME READY UP-TO-DATE AVAILABLE AGE deployment.extensions/api-engine 1/1 1 1 7s deployment.extensions/api-engine-tasks 1/1 1 1 7s deployment.extensions/postgres 1/1 1 1 8s deployment.extensions/redis 1/1 1 1 8s NAME READY STATUS RESTARTS AGE pod/api-engine-5844d7d9d4-zqw9k 1/1 Running 0 7s pod/api-engine-tasks-74484d6f45-jj6p9 1/1 Running 0 7s pod/postgres-774d5cd5f-p5j5l 1/1 Running 0 8s pod/redis-6bf574b8c5-p2dnl 1/1 Running 0 7s NAME HOSTS ADDRESS PORTS AGE ingress.extensions/ingress-api-engine * 80 7s ``` --> * Stop cello service.<!---, same as start, need set the `DEPLOY_METHOD` variable.--> ```bash $ make stop ``` * Check [troubleshoot](https://github.com/hyperledger/cello/blob/main/docs/setup/server.md#3-troubleshoot) section if you get any question. ## Main Features * Manage the lifecycle of blockchains, e.g., create/start/stop/delete/keep health automatically. * Support customized (e.g., size, consensus) blockchains request, currently we mainly support [Hyperledger fabric](https://github.com/hyperledger/fabric). * Support native Docker host, swarm or Kubernetes as the worker nodes. More supports on the way. * Support heterogeneous architecture, e.g., X86, POWER and Z, from bare-metal servers to virtual machines. * Extend with monitor, log, health and analytics features by employing additional components. ## Documentation, Getting Started and Develop Guideline For new users, it is highly recommended to read the [tutorial](docs/tutorial.md) or [index](docs/index.md) first. And feel free to visit the [online documentation](http://cello.readthedocs.io/en/latest/) for more information. You can also run `make doc` to start a local documentation website (Listen at [localhost:8000](http://127.0.0.1:8000). ## Why named Cello? Can you find anyone better at playing chains? :) ## Incubation Notice This project is a Hyperledger project in _Incubation_. It was proposed to the community and documented [here](https://docs.google.com/document/d/1E2i5GRqWsIag7KTxjQ_jQdDiWcuikv3KqXeuw7NaceM/edit), and was approved by [Hyperledger TSC at 2017-01-07](https://lists.hyperledger.org/pipermail/hyperledger-tsc/2017-January/000535.html). Information on what _Incubation_ entails can be found in the [Hyperledger Project Lifecycle document](https://goo.gl/4edNRc). ## Inclusive Language Statement These guiding principles are very important to the maintainers and therefore we respectfully ask all contributors to abide by them as well: - Consider that users who will read the docs are from different backgrounds and cultures and that they have different preferences. - Avoid potential offensive terms and, for instance, prefer "allow list and deny list" to "white list and black list". - We believe that we all have a role to play to improve our world, and even if writing inclusive documentation might not look like a huge improvement, it's a first step in the right direction. - We suggest to refer to [Microsoft bias free writing guidelines](https://docs.microsoft.com/en-us/style-guide/bias-free-communication) and [Google inclusive doc writing guide](https://developers.google.com/style/inclusive-documentation) as starting points. <a rel="license" href="http://creativecommons.org/licenses/by/4.0/"><img alt="Creative Commons License" style="border-width:0" src="https://i.creativecommons.org/l/by/4.0/88x31.png" /></a><br />This work is licensed under a <a rel="license" href="http://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</a>.
535
Writing an OS in Rust
# Blog OS This repository contains the source code for the _Writing an OS in Rust_ series at [os.phil-opp.com](https://os.phil-opp.com). If you have questions, open an issue or chat with us [on Gitter](https://gitter.im/phil-opp/blog_os). ## Where is the code? The code for each post lives in a separate git branch. This makes it possible to see the intermediate state after each post. **The code for the latest post is available [here][latest-post].** [latest-post]: https://github.com/phil-opp/blog_os/tree/post-12 You can find the branch for each post by following the `(source code)` link in the [post list](#posts) below. The branches are named `post-XX` where `XX` is the post number, for example `post-03` for the _VGA Text Mode_ post or `post-07` for the _Hardware Interrupts_ post. For build instructions, see the Readme of the respective branch. You can check out a branch in a subdirectory using [git worktree]: [git worktree]: https://git-scm.com/docs/git-worktree ``` git worktree add code post-10 ``` The above command creates a subdirectory named `code` that contains the code for the 10th post ("Heap Allocation"). ## Posts The goal of this project is to provide step-by-step tutorials in individual blog posts. We currently have the following set of posts: **Bare Bones:** - [A Freestanding Rust Binary](https://os.phil-opp.com/freestanding-rust-binary/) ([source code](https://github.com/phil-opp/blog_os/tree/post-01)) - [A Minimal Rust Kernel](https://os.phil-opp.com/minimal-rust-kernel/) ([source code](https://github.com/phil-opp/blog_os/tree/post-02)) - [VGA Text Mode](https://os.phil-opp.com/vga-text-mode/) ([source code](https://github.com/phil-opp/blog_os/tree/post-03)) - [Testing](https://os.phil-opp.com/testing/) ([source code](https://github.com/phil-opp/blog_os/tree/post-04)) **Interrupts:** - [CPU Exceptions](https://os.phil-opp.com/cpu-exceptions/) ([source code](https://github.com/phil-opp/blog_os/tree/post-05)) - [Double Faults](https://os.phil-opp.com/double-fault-exceptions/) ([source code](https://github.com/phil-opp/blog_os/tree/post-06)) - [Hardware Interrupts](https://os.phil-opp.com/hardware-interrupts/) ([source code](https://github.com/phil-opp/blog_os/tree/post-07)) **Memory Management:** - [Introduction to Paging](https://os.phil-opp.com/paging-introduction/) ([source code](https://github.com/phil-opp/blog_os/tree/post-08)) - [Paging Implementation](https://os.phil-opp.com/paging-implementation/) ([source code](https://github.com/phil-opp/blog_os/tree/post-09)) - [Heap Allocation](https://os.phil-opp.com/heap-allocation/) ([source code](https://github.com/phil-opp/blog_os/tree/post-10)) - [Allocator Designs](https://os.phil-opp.com/allocator-designs/) ([source code](https://github.com/phil-opp/blog_os/tree/post-11)) **Multitasking**: - [Async/Await](https://os.phil-opp.com/async-await/) ([source code](https://github.com/phil-opp/blog_os/tree/post-12)) ## First Edition Posts The current version of the blog is already the second edition. The first edition is outdated and no longer maintained, but might still be useful. The posts of the first edition are: <details><summary><i>Click to expand</i></summary> **Bare Bones:** - [A Minimal x86 Kernel](https://os.phil-opp.com/multiboot-kernel.html) ([source code](https://github.com/phil-opp/blog_os/tree/first_edition_post_1)) - [Entering Long Mode](https://os.phil-opp.com/entering-longmode.html) ([source code](https://github.com/phil-opp/blog_os/tree/first_edition_post_2)) - [Set Up Rust](https://os.phil-opp.com/set-up-rust.html) ([source code](https://github.com/phil-opp/blog_os/tree/first_edition_post_3)) - [Printing to Screen](https://os.phil-opp.com/printing-to-screen.html) ([source code](https://github.com/phil-opp/blog_os/tree/first_edition_post_4)) **Memory Management:** - [Allocating Frames](https://os.phil-opp.com/allocating-frames.html) ([source code](https://github.com/phil-opp/blog_os/tree/first_edition_post_5)) - [Page Tables](https://os.phil-opp.com/modifying-page-tables.html) ([source code](https://github.com/phil-opp/blog_os/tree/first_edition_post_6)) - [Remap the Kernel](https://os.phil-opp.com/remap-the-kernel.html) ([source code](https://github.com/phil-opp/blog_os/tree/first_edition_post_7)) - [Kernel Heap](https://os.phil-opp.com/kernel-heap.html) ([source code](https://github.com/phil-opp/blog_os/tree/first_edition_post_8)) **Exceptions:** - [Handling Exceptions](https://os.phil-opp.com/handling-exceptions.html) ([source code](https://github.com/phil-opp/blog_os/tree/first_edition_post_9)) - [Double Faults](https://os.phil-opp.com/double-faults.html) ([source code](https://github.com/phil-opp/blog_os/tree/first_edition_post_10)) **Additional Resources:** - [Cross Compile Binutils](https://os.phil-opp.com/cross-compile-binutils.html) - [Cross Compile libcore](https://os.phil-opp.com/cross-compile-libcore.html) - [Set Up GDB](https://os.phil-opp.com/set-up-gdb) - [Handling Exceptions using Naked Functions](https://os.phil-opp.com/handling-exceptions-with-naked-fns.html) - [Catching Exceptions](https://os.phil-opp.com/catching-exceptions.html) ([source code](https://github.com/phil-opp/blog_os/tree/catching_exceptions)) - [Better Exception Messages](https://os.phil-opp.com/better-exception-messages.html) ([source code](https://github.com/phil-opp/blog_os/tree/better_exception_messages)) - [Returning from Exceptions](https://os.phil-opp.com/returning-from-exceptions.html) ([source code](https://github.com/phil-opp/blog_os/tree/returning_from_exceptions)) </details> ## License This project, with exception of the `blog/content` folder, is licensed under either of - Apache License, Version 2.0 ([LICENSE-APACHE](LICENSE-APACHE) or https://www.apache.org/licenses/LICENSE-2.0) - MIT license ([LICENSE-MIT](LICENSE-MIT) or https://opensource.org/licenses/MIT) at your option. For licensing of the `blog/content` folder, see the [`blog/content/README.md`](blog/content/README.md). ### Contribution Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.
536
Incompatible Timesharing System
# Incompatible Timesharing System ![CI Build Status](https://github.com/PDP-10/its/workflows/Build/badge.svg) ### About ITS ITS, the Incompatible Timesharing System, is an operating system for the PDP-10 computer family. It was created by hackers at MIT in the 1960s. The MIT site was shut down in 1990, but enthusiasts continue to operate ITS systems to this day. Some notable ITS features: - Hosted the first versions of Emacs, Zork, Macsyma, Maclisp, Scheme, and multi-player Maze War - Virtual memory - User-space device drivers - Networking: TCP/IP, ARPAnet, Chaosnet - Transparent network file system - Terminal-independent text output - Graphical workstations There is a mailing list for discussion about ITS. Go to http://its.victor.se/mailman/listinfo/its-hackers_its.victor.se for more information. ### About this project This repository contains source code, tools, and scripts to build an ITS system from scratch. The goals are: - To provide an automated build from start to end. No user intervention is necessary. - To check which programs have source code, and [which programs are missing source code](https://github.com/PDP-10/its/issues/61). - To ensure that we know how to build all programs. - To update programs with the latest bug fixes and enhancements. - To be able to set configurable options across the whole system, such as host name, IP address, hardware devices. The build currently runs on the SIMH and KLH10 emulators. Of course, we'd be delighted to test this on a real KS10. ### Building To build ITS with this repository, you need some tools installed; see the table below. Ensure all submodules are checked out, and then type `make EMULATOR=simh`, `make EMULATOR=pdp10-ka`, `make EMULATOR=pdp10-kl`, `make EMULATOR=pdp10-ks`, or `make EMULATOR=klh10`. This will leave built files in the `out` directory, some of which are disk images with ITS installed. | Emulator | Dependencies | | --- | --- | | klh10 | git, c compiler, make, expect, curses, autoconf | simh | git, c compiler, make, expect, curses, autoconf, sdl2 | pdp10-ka | git, c compiler, make, expect, curses, autoconf, sdl2, sdl2-image, sdl2-net, gtk3 | pdp10-kl | git, c compiler, make, expect, curses, autoconf, sdl2, sdl2-image, gtk3 | pdp10-ks | git, c compiler, make, expect, curses, autoconf, sdl2 ### Usage To start ITS, type `./start`. If you see `KLH10#`, type `go` and Enter. If you see the `DSKDMP` prompt, type `its`, press Enter, and then <kbd>ESC</kbd><kbd>G</kbd>. If you use the `pdp10-kl` emulator there is no prompt and you need to type <kbd>ESC</kbd><kbd>L</kbd> `ITS`, press Enter, and then <kbd>ESC</kbd><kbd>G</kbd>. Eventually, you will see `SYSTEM JOB USING THIS CONSOLE`. You are now ready to log in, so type <kbd>CTRL</kbd><kbd>Z</kbd>. See [doc/DDT.md](doc/DDT.md) for a list of useful commands. Alternatively to logging in directly in the system console window, which will always be displaying daemon messages, you may prefer to use a seperate terminal session for logging in. To do this just run `telnet localhost 10003` from another shell window and press <kbd>CTRL</kbd><kbd>Z</kbd> to log in there. To shut down ITS, type `:lock` and then `5down`. Log yourself out to avoid the 5 minute grace period: type `:logout`. When ITS writes `SHUTDOWN COMPLETE`, it's safe to stop the emulator. Press <kbd>CTRL</kbd><kbd>\\</kbd> to escape to the simulator command prompt and `quit` to close it. If you had a separate telnet user session running you can similary press <kbd>CTRL</kbd><kbd>\[</kbd> and then exit telnet. ITS can optionally use some additional peripheral devices. To attach a simulated GT40 graphics terminal, type `./start gt40`. If you run the KA10 emulator, you can use the Knight TV raster display by typing `./start tv11 tvcon`. On a TV, type <kbd>F1</kbd> instead of <kbd>CTRL</kbd><kbd>Z</kbd>. Here is an overview of the repository: - bin - PDP-10 binary files necessary to bootstrap the system. - build - build scripts. - conf - configuration for building ITS. - doc - documentation, most of which appear in the INFO system. - src - source code for ITS and all programs. - tools - build tools. - out - build output. - user - optional user files installed in ITS. ### Terminal Emulators Several emulators for terminals and peripheral processors are built along with ITS. They can be started conveniently with the `start` script, or separately. Not all terminal emulators are set up to work with all PDP-10 emulators by default. | Name | Description | Type | klh10 | pdp10-ka | pdp10-kl | pdp10-ks | simh | ------- | ----------------- | ------ | ----- | -------- | -------- | -------- | ---- | type340 | Type 340 | vector | no | yes | no | no | no | gt40 | GT40 PDP-11 | vector | no | yes | no | yes | yes | imlac | Imlac PDS-1 | vector | no | yes | no | no | no | simh_imlac | Imlac PDS-1 | vector | no | yes | no | no | no | tv11 | Knight TV PDP-11 | cpu | no | yes | no | no | no | tvcon | Knight TV console | raster | no | yes | no | no | no | datapoint | Datapoint 3300 | text | no | yes | no | no | no | vt52 | VT52 | text | no | yes | yes | yes | yes | tek | Tektronix 4010 | vector | no | yes | yes | no | no ### Documentation See the [`doc` subdirectory](doc) for documentation. There are some short introductions for beginners: - [How to create a new user](doc/new-user.md) - [DDT cheat sheet for Unix users](doc/DDT.md) - [Basic editing with EMACS](doc/EMACS.md) - [TECO survival guide](doc/TECO.md) - [DDT debugging newbie guide](doc/debugging.md) - [Hello MIDAS](doc/hello-midas.md) - [Hello Maclisp](doc/hello-lisp.md) - [Introduction to Muddle](doc/muddle.md) - [DUMP and itstar](doc/DUMP-itstar.md) - [Games](doc/games.md) - [Printing](doc/printing.md) - [Assembling ITS](doc/NITS.md) - [Com link mode](doc/comlink.md) - [Logo](doc/logo.md) - [PDP-6](doc/pdp6.md) - [Networking](doc/networking.md) A list of [known ITS machines](doc/machines.md). How [ITS is built](doc/build.md). ### Applications Some major applications: - Adventure, game - C10, C compiler - CLU, progamming language. - DDT, debugger - Emacs, editor - Logo, interpreter - Mac Hack VI and Tech II, chess programs - Maclisp, interpreter and compiler - Muddle, interpreter - Macsyma, symbolic math - Maze War, game - Midas, assembler - Muscom and musrun, for playing music - PDP-11 simulator - Scheme, interpreter - Spacewar!, game - Stanford University Drawing System - TECO, editor - TOPS-10 and WAITS emulator There is a [detailed list of all installed programs](doc/programs.md).
537
Lightweight operating system using Node.js as userspace
<!--- NodeOS Copyright (c) 2013-2017 Jacob Groundwater, Jesús Leganés-Combarro 'piranna' and other contributors MIT License --> [![Build Status](https://semaphoreapp.com/api/v1/projects/71d72807-779a-40d3-a8d4-523cd0a52eb3/356164/shields_badge.svg)](https://semaphoreapp.com/nodeos/nodeos) [![Stories in Ready](https://badge.waffle.io/NodeOS/NodeOS.png?label=ready&title=Ready)](https://waffle.io/NodeOS/NodeOS) [![Join the chat at https://gitter.im/NodeOS/NodeOS](https://badges.gitter.im/NodeOS/NodeOS.svg)](https://gitter.im/NodeOS/NodeOS?utm_source=badge&utm_medium=badge&utm_campaign=pr-badge&utm_content=badge) [![MIT Licence](https://badges.frapsoft.com/os/mit/mit.svg)](https://opensource.org/licenses/mit-license.php) # NodeOS [![Greenkeeper badge](https://badges.greenkeeper.io/NodeOS/NodeOS.svg)](https://greenkeeper.io/) Lightweight operating system using [Node.js](http://nodejs.org) as userspace. NodeOS is an operating system built entirely in Javascript and managed by [npm](https://www.npmjs.com). Any package in `npm` is a NodeOS package, that means a selection of more than 400.000 packages. The goal of NodeOS is to provide just enough to let `npm` provide the rest. Since anyone can contribute to it, anyone can create NodeOS packages. This project won the Spanish [9th National Free Software Championship](https://www.concursosoftwarelibre.org/1415) on the Systems category and was Honorable Mention of its [10th edition](https://www.concursosoftwarelibre.org/1516). It was also presented as the degree thesis of [Jesús Leganes Combarro](https://github.com/piranna) with a qualification of 10/10 with distinction. ## Useful links * [New Wiki (under work)](https://nodeos.gitbooks.io/nodeos) * [pre-build releases images](https://github.com/NodeOS/NodeOS/releases) * [1.0 Roadmap](https://github.com/NodeOS/NodeOS/issues/37) * [2.0 Roadmap](https://github.com/NodeOS/NodeOS/issues/146) * [media files](https://github.com/NodeOS/media) (logos, wallpapers...) * [discussion](https://github.com/NodeOS/NodeOS/issues) [![Join the Discussion](http://i.imgur.com/hUjSLXt.png)](https://github.com/NodeOS/NodeOS/issues) ## Introduction NodeOS is a Node.js based operating system, built-off of the Linux kernel. The NodeOS Project is aiming to, and can already run on some of the following platforms: - **real hardware** like desktops, laptops, or SoC's (Raspberry Pi) - **cloud providers** like Joyent, Amazon or Rackspace - **virtual machines** like QEmu, VirtualBox, VMWare and KVM - **PaaS providers** like Heroku or Joyent's Manta - **container providers** like Docker & Vagga Core development is being done in layers. There could be some differences to adjust better to each target platform, but the general structure is: - *barebones* custom Linux kernel with an initramfs that boots to a Node.js REPL - *initramfs* Initram environment to mount the users partition & boot the system - *usersfs* multi-user environment with the same behaviour of traditional OSes ### Booting process All the layers are bootable, leading *barebones* to a raw naked Node.js [REPL](http://nodejs.org/api/repl.html) prompt as PID 1, while *initramfs* exec actual NodeOS code to isolate user code from the core system and, if available, mount a partition with the users' home directories and root filesystems. If a *usersfs* partition is being set at boot time, it will be mounted and the system will consider each one of its folders as the home folder for a valid user on the system, and will execute a `init` file in the root of each of them. If found, the `root` user will be the first to be considered and will have access to all of the home directories, but by design it will not be possible to elevate permissions once the system has finished booting. ### Hacking If you are hacking on NodeOS for a somewhat production environment, you are likely interested on building a custom *usersfs* image or modify it once booted, since each user is isolated from the others and everyone can be able to define its own root filesystem, but you can customize all other layers if you want. For example, you can modify *initramfs* to login users and mount their home folders from a cloud service or craft a system without global services (no `root` user), or also dedicate a full NodeOS instance to a single Node.js application. ## Pre-built Images Ready to use [pre-build images](https://github.com/NodeOS/NodeOS/releases) are automatically generated after each commit in master branch that sucessfully [pass the tests](https://semaphoreapp.com/nodeos/nodeos). To exec them, you'll need to have [QEmu](http://wiki.qemu.org/Main_Page) installed on your system. The *iso* can be written to a CD-R or flashed to a USB pendrive, but will only provide the read-only rootfs and the changes will be done in memory, losing them after reboot, so you'll manually need to set a read-write *usersfs* partition if you want to persist them. On the other hand, if you want to flash it to a USB pendrive, We recommended doing it by using `bin/installUSB` command so it will automatically create a read-write *usersfs* partition to fill the remaining space and use it as persistent storage. ## Build NodeOS in five steps 1. Download the project source code: ```bash git clone [email protected]:NodeOS/NodeOS.git cd NodeOS ``` 2. Install the required build tools. On a Ubuntu based system you can do it by executing: ```bash sudo bin/install-dependencies ``` 3. Install NodeOS build dependencies: ```bash npm install ``` 4. Build NodeOS: ```bash npm run build ``` By default it will generate some files that can be used with QEmu, compiled for your current machine architecture. You can configure the build process by passing some environment variables. For example, to force to build for 32 bits, use `BITS=32 npm install` instead. 5. Exec your freshly compiled NodeOS image: ```bash npm start ``` It will automatically detect what CPU architecture will need to be used on QEmu and exec the correct emulation. ...profit! :-D If you encounter an error when building NodeOS, take a look at [the wiki](https://github.com/NodeOS/NodeOS/wiki/Fixing-NodeOS-Build-Errors) or open an [issue](https://github.com/NodeOS/NodeOS/issues). ## Single Process OS NodeOS can be used as a Single Process OS, where only run a single executable. To do so, set the `SINGLE_USER` environment variable to the name of a `npm` module when executing `npm run build`. This will run fully from initram, persistence can be achieved by setting this environment variable to an empty string and later using a custom `usersfs` partition, but this is still experimental. ## NodeOS on LXC containers (Docker and vagga) NodeOS fully officially supports Docker, published images are available at the [DockerHub NodeOS organization](https://hub.docker.com/u/nodeos). If you are interested in helping or testing, you can build them from source code. Vagga support is fairly experimental, and help here will be greatly appreciated. ### Quick Start 1. [Install Docker](http://docs.docker.io/en/latest/installation/) 2. One Liner ```bash sudo docker run -t -i nodeos/nodeos ``` ### Build from Source ```bash git clone https://github.com/NodeOS/NodeOS.git cd NodeOS PLATFORM=docker npm install ``` ## License MIT This software consists of voluntary contributions made by many individuals. For exact contribution history, see the revision history available at https://github.com/NodeOS/NodeOS
538
The extensible bootloader for embedded system with application engine, write once, run everywhere.
![xboot-logo](developments/logo/xboot-logo.svg) *** # XBOOT简介([English Version](README.md#xboot-introduction)) ``` _ _ _ _ | |___ _____ _____ _| |_ \ \/ /| _ | _ | _ |_ _| (C) 2007-2022 ) ( | |_| | |_| | |_| | | |____JIANJUN.JIANG__ /_/\_\|_____|_____|_____| |_____________________| ``` 操作一个GPIO,需要仔细对照芯片手册,好繁琐;每换一个主控芯片,所有工作从头来过;想开发个现代点支持各种动效的UI,发现几乎是不可能的事情;各种协议栈有如天书一样,阅读都困难,何谈编写;虚拟机技术很流行,功能很强大,想自己移植个,可是困难重重;还是放开自己吧,让XBOOT来替你解决这些问题。XBOOT不仅仅是一款功能强大、可移植性强、代码复用率高的嵌入式系统bootloader,而且还是一款SOC片上系统应用软件执行引擎,无需复杂的操作系统,APP上电直接执行。一次编写,到处运行,不仅仅是个口号,而且还是XBOOT存在的唯一原因。一些基本特性,简单列举如下: * 支持文件系统 * 支持lua虚拟机 * 支持各种协议栈 * 支持矢量图形库,矢量字体 * 支持各种现代GUI控件,以及动效 * 多平台支持 * 各种总线驱动,UART,I2C,SPI等等 * 各种设备驱动,GPIO,PWM,IRQ,CLK,LED,BUZZER,VIBRATOR,WATCHDOG,RNG,FRAMEBUFFER,RTC等 * 支持用lua编写应用软件,包含高等级API,可直接操作各种硬件抽象接口 * 应用软件平台无关,一次编写,到处运行 ![linux-sandbox-game-2048](docs/_images/linux-sandbox-game-2048.gif) # 文档及开发工具 * [Xboot文档](https://xboot.github.io/xboot) * [交叉工具链](http://pan.baidu.com/s/1dDtssIt) * [Eclipse集成开发环境](http://pan.baidu.com/s/1i3ImG0d) # 编译源码 Makefile中有两个变量在编译时需要传递,一个是交叉工具链,另一个是具体的硬件平台 | 变量 | 说明 | | ------------- | --------------------------- | | CROSS_COMPILE | 指定交叉工具链 | | PLATFORM | 指定硬件平台,由两部分组成,`arch`及`mach` | * ## Realview平台,qemu-system-arm模拟器 ```shell make clean make CROSS_COMPILE=/path/to/arm-none-linux-gnueabihf- PLATFORM=arm32-realview ``` * ## X86_64位linux系统下的sandbox sandbox依赖与SDL2库,在编译前需要安装libsdl2-dev,以ubuntu系统为例: ```shell sudo apt-get install libsdl2-dev ``` ```shell make clean make CROSS_COMPILE="" PLATFORM=x64-sandbox ``` # 讨论组,大佬聚集,请踊跃加入 XBOOT官方QQ群:[658250248](https://jq.qq.com/?_wv=1027&k=5BOkXYO) (2000人) *** # Xboot Introduction It very tedious that we need careful read soc datasheet when operate GPIO on soc.We always repeat working when changed the soc.its almost almost impossible to We want develop a UI that support all kinds of magic motion.Stacks of protocols are like heavenly books ,it Reading is very hard , How do we program? Virtual machine technology is very popular and it function is powerful,but it very difficult to transplant it.so we build the Xboot.it can help us deal with these problems. XBOOT is not only a powerful, portable, and highly reusable, embedded system bootloader,but also on a piece of SOC system application software execution engine, without complex operating system, electricity directly executed on the APP。"Once written, running everywhere." It not just a slogan,but also the only reason for the existence of XBOOT. What's on the XBOOT? - Support file systems - Support lua virtual machine - Support many protocol stacks - Support graphics library, and vector font - Supports a modern GUI, and animations - Multi-platform support - Bus drivers, UART, I2C, SPI and so on - Device drivers, GPIO, PWM, IRQ, CLK, LED, BUZZER, VIBRATOR, WATCHDOG, RNG, FRAMEBUFFER, RTC, etc. - Support application using lua, which include high-level API, can operate a variety of hardware abstract interface directly - Application software platform has nothing to do, write once, run everywhere # Documents and Development Tools * [Xboot Documents](https://xboot.github.io/xboot) * [Cross Toolchains](http://pan.baidu.com/s/1dDtssIt) * [Eclipse Integrated Development Environment](http://pan.baidu.com/s/1i3ImG0d) # Compile The Source Code Makefile have two variables need to pass, one is cross toolchain, the other is a specific hardware platform | variable | Description | | ------------- | ---------------------------------------- | | CROSS_COMPILE | The specical cross toolchain | | PLATFORM | The hardware platform, have two parts, `arch` and `mach` | * ## Realview Platform,qemu-system-arm Emulator ```shell make clean make CROSS_COMPILE=/path/to/arm-none-linux-gnueabihf- PLATFORM=arm32-realview ``` * ## Linux Sandbox On X86_64 The sandbox depends on the SDL2 library, you need to install libsdl2-dev before compile, as an example at the ubuntu system: ```shell sudo apt-get install libsdl2-dev ``` ```shell make clean make CROSS_COMPILE="" PLATFORM=x64-sandbox ``` # Discussion Group, Many Big Brother, Please Join Us XBOOT Official Tencent QQ Group: [658250248](https://jq.qq.com/?_wv=1027&k=5BOkXYO) (2000 people)
539
A secure embedded operating system for microcontrollers
# ![TockOS](http://www.tockos.org/assets/img/tock.svg "TockOS Logo") [![tock-ci](https://github.com/tock/tock/workflows/tock-ci/badge.svg)][tock-ci] [![slack](https://img.shields.io/badge/slack-tockos-informational)][slack] Tock is an embedded operating system designed for running multiple concurrent, mutually distrustful applications on Cortex-M and RISC-V based embedded platforms. Tock's design centers around protection, both from potentially malicious applications and from device drivers. Tock uses two mechanisms to protect different components of the operating system. First, the kernel and device drivers are written in Rust, a systems programming language that provides compile-time memory safety and type safety. Tock uses Rust to protect the kernel (e.g. the scheduler and hardware abstraction layer) from platform specific device drivers as well as isolate device drivers from each other. Second, Tock uses memory protection units to isolate applications from each other and the kernel. [tock-ci]: https://github.com/tock/tock/actions?query=branch%3Amaster+workflow%3Atock-ci Tock 2.x! --------- Tock is now on its second major release! Tock 2.x includes significant changes from Tock 1.x, including: - Revamped system call interface. - Support for 11 new hardware platforms. - Updated kernel types. - Many new and improved HILs. For a summary of the latest new features and improvements, check out the [changelog](CHANGELOG.md). Learn More ---------- How would you like to get started? ### Learn How Tock Works Tock is documented in the [doc](doc) folder. Read through the guides there to learn about the overview and design of Tock, its implementation, and much more. ### Use Tock Follow our [getting started guide](doc/Getting_Started.md) to set up your system to compile Tock. Head to the [hardware page](https://www.tockos.org/hardware/) to learn about the hardware platforms Tock supports. Also check out the [Tock Book](https://book.tockos.org) for a step-by-step introduction to getting Tock up and running. A book on how to use Tock with the [micro:bit v2](boards/microbit_v2) and [Raspberry Pi Pico](boards/raspberry_pi_pico) boards is [Getting Started with Secure Embedded Systems](https://link.springer.com/book/10.1007/978-1-4842-7789-8). Find example applications that run on top of the Tock kernel written in both [Rust](https://github.com/tock/libtock-rs) and [C](https://github.com/tock/libtock-c). ### Develop Tock Read our [getting started guide](doc/Getting_Started.md) to get the correct version of the Rust compiler, then look through the `/kernel`, `/capsules`, `/chips`, and `/boards` directories. There are also generated [source code docs](https://docs.tockos.org). We encourage contributions back to Tock and are happy to accept pull requests for anything from small documentation fixes to whole new platforms. For details, check out our [Contributing Guide](.github/CONTRIBUTING.md). To get started, please do not hesitate to submit a PR. We'll happily guide you through any needed changes. ### Keep Up To Date Check out the [blog](https://www.tockos.org/blog/) where the **Talking Tock** post series highlights what's new in Tock. Also, follow [@talkingtock](https://twitter.com/talkingtock) on Twitter. You can also browse our [email group](https://groups.google.com/forum/#!forum/tock-dev) and our [Slack][slack] to see discussions on Tock development. [slack]: https://join.slack.com/t/tockos/shared_invite/enQtNDE5ODQyNDU4NTE1LWVjNTgzMTMwYzA1NDI1MjExZjljMjFmOTMxMGIwOGJlMjk0ZTI4YzY0NTYzNWM0ZmJmZGFjYmY5MTJiMDBlOTk Code of Conduct --------------- The Tock project adheres to the Rust [Code of Conduct][coc]. All contributors, community members, and visitors are expected to familiarize themselves with the Code of Conduct and to follow these standards in all Tock-affiliated environments, which includes but is not limited to repositories, chats, and meetup events. For moderation issues, please contact members of the @tock/core-wg. [coc]: https://www.rust-lang.org/conduct.html Cite this Project ----------------- <h4>Tock was presented at SOSP'17</h4> Amit Levy, Bradford Campbell, Branden Ghena, Daniel B. Giffin, Pat Pannuto, Prabal Dutta, and Philip Levis. 2017. Multiprogramming a 64kB Computer Safely and Efficiently. In Proceedings of the 26th Symposium on Operating Systems Principles (SOSP ’17). Association for Computing Machinery, New York, NY, USA, 234–251. DOI: https://doi.org/10.1145/3132747.3132786 <p> <details> <summary>Bibtex</summary> <pre> @inproceedings{levy17multiprogramming, title = {Multiprogramming a 64kB Computer Safely and Efficiently}, booktitle = {Proceedings of the 26th Symposium on Operating Systems Principles}, series = {SOSP'17}, year = {2017}, month = {10}, isbn = {978-1-4503-5085-3}, location = {Shanghai, China}, pages = {234--251}, numpages = {18}, url = {http://doi.acm.org/10.1145/3132747.3132786}, doi = {10.1145/3132747.3132786}, acmid = {3132786}, publisher = {ACM}, address = {New York, NY, USA}, conference-url = {https://www.sigops.org/sosp/sosp17/}, author = {Levy, Amit and Campbell, Bradford and Ghena, Branden and Giffin, Daniel B. and Pannuto, Pat and Dutta, Prabal and Levis, Philip}, } </pre> </details> </p> <p>This is the primary paper that describes the design considerations of Tock.</p> <details> <summary>Other Tock-related papers</summary> <p>There are two shorter papers that look at potential limitations of the Rust language for embedded software development. The earlier PLOS paper lays out challenges and the later APSys paper lays out potential solutions. Some persons describing work on programming languages and type theory may benefit from these references, but generally, most work should cite the SOSP paper above.</p> <h4><a href="http://doi.acm.org/10.1145/3124680.3124717">APSys: The Case for Writing a Kernel in Rust</a></h4> <pre> @inproceedings{levy17rustkernel, title = {The Case for Writing a Kernel in Rust}, booktitle = {Proceedings of the 8th Asia-Pacific Workshop on Systems}, series = {APSys '17}, year = {2017}, month = {9}, isbn = {978-1-4503-5197-3}, location = {Mumbai, India}, pages = {1:1--1:7}, articleno = {1}, numpages = {7}, url = {http://doi.acm.org/10.1145/3124680.3124717}, doi = {10.1145/3124680.3124717}, acmid = {3124717}, publisher = {ACM}, address = {New York, NY, USA}, conference-url = {https://www.cse.iitb.ac.in/~apsys2017/}, author = {Levy, Amit and Campbell, Bradford and Ghena, Branden and Pannuto, Pat and Dutta, Prabal and Levis, Philip}, }</pre> <h4><a href="http://dx.doi.org/10.1145/2818302.2818306">PLOS: Ownership is Theft: Experiences Building an Embedded OS in Rust</a></h4> <pre> @inproceedings{levy15ownership, title = {Ownership is Theft: Experiences Building an Embedded {OS} in {R}ust}, booktitle = {Proceedings of the 8th Workshop on Programming Languages and Operating Systems}, series = {PLOS 2015}, year = {2015}, month = {10}, isbn = {978-1-4503-3942-1}, doi = {10.1145/2818302.2818306}, url = {http://dx.doi.org/10.1145/2818302.2818306}, location = {Monterey, CA}, publisher = {ACM}, address = {New York, NY, USA}, conference-url = {http://plosworkshop.org/2015/}, author = {Levy, Amit and Andersen, Michael P and Campbell, Bradford and Culler, David and Dutta, Prabal and Ghena, Branden and Levis, Philip and Pannuto, Pat}, }</pre> <p>There is also a paper on the Tock security model. The threat model documentation in the docs/ folder is the source of truth for the current Tock threat model, but this paper represents a snapshot of the reasoning behind the Tock threat model and details how it compares to those in similar embedded OSes.</p> <h4><a href="https://dx.doi.org/10.1145/3517208.3523752">EuroSec: Tiered Trust for useful embedded systems security</a></h4> <pre> @inproceedings{10.1145/3517208.3523752, author = {Ayers, Hudson and Dutta, Prabal and Levis, Philip and Levy, Amit and Pannuto, Pat and Van Why, Johnathan and Watson, Jean-Luc}, title = {Tiered Trust for Useful Embedded Systems Security}, year = {2022}, isbn = {9781450392556}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, url = {https://doi.org/10.1145/3517208.3523752}, doi = {10.1145/3517208.3523752}, booktitle = {Proceedings of the 15th European Workshop on Systems Security}, pages = {15–21}, numpages = {7}, keywords = {security, embedded systems, operating systems, IoT}, location = {Rennes, France}, series = {EuroSec '22} }</pre> </details> License ------- Licensed under either of - Apache License, Version 2.0 ([LICENSE-APACHE](LICENSE-APACHE) or http://www.apache.org/licenses/LICENSE-2.0) - MIT license ([LICENSE-MIT](LICENSE-MIT) or http://opensource.org/licenses/MIT) at your option. Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.
540
How to be low-level programmer
NOTICE1: Please do not copy the contents of this page to your blog. You can share this page but please share with the original link. That is how we compliment the authors of good document and open source project. NOTICE2: Please notice that low-level programming is out of trend and currently there are not many companies hiring low-level developer. It is getting harder for me to find a job. If you haven't started a professional career yet, I would like to recommend you consider other fields either carefully. NOTICE3: If you want a quick start, go to "How to start?". * [Low-Level Programming University](#Low-Level-Programming-University) * [What is it?](#What-is-it) * [What Is the Low Level](#What-Is-the-Low-Level) * [Theory](#Theory) * [Languages](#Languages) * [Assembly](#Assembly) * [C language](#C-language) * [Rust language](#Rust-language) * [Applications](#Applications) * [Hardware && Firmware](#Hardware-Firmware) * [Linux kernel and device driver](#Linux-kernel-and-device-driver) * [References](#References) * [Other applications](#Other-applications) * [Future of low-level programming](#Future-of-low-level-programming) * [How to start?](#How-to-start) * [Translation](#Translation) * [Who am I?](#who-am-i) # Low-Level Programming University ## <a name="What-is-it"></a>What is it? I'm inspired by [google-interview-university](https://github.com/jwasham/coding-interview-university). I'd like to share my experience and show a roadmap to becoming a low-level programmer because I have found that these skills are not as common as they once were. In addition, many students and beginners ask me how they could become low-level programmers and Linux kernel engineers. This page cannot include every link/book/course. For example, this page introduces Arduino but there is not detailed information about Arduino and embedded systems. You should go further yourself. You have the keyword "Arduino" with which you can start. So your next step is probably googling Arduino, buying a kit, and doing something for yourself, not collecting links or free books. Please remember this page is just a roadmap for beginners. Low-level programming is a part of computer science. Absolutely it would be much better to get education for computer science first. * [Path to a free self-taught education in Computer Science!](https://github.com/ossu/computer-science) ## <a name="What-Is-the-Low-Level"></a>What Is the Low-Level? I classify low-level programming as programming that is very close to the machine, using a lower level programming language like C or assembly. This is in contrast to higher-level programming, typical of user-space applications, using high level languages (e.g. Python, Java). * [Wikipedia: Low-level programming language](https://en.wikipedia.org/wiki/Low-level_programming_language) Yes, systems programming is a very close concept to low-level programming. This page includes the hardware design and firmware development that is not included in systems programming. * [Wikipedia: System programming](https://en.wikipedia.org/wiki/System_programming) Finally, this page includes topics ranging from hardware components to the Linux kernel. That is a huge range of layers. A one page document can never cover the details of all the layers, so the aim of this document is to serve as a starting point for low-level programming. ## <a name="Theory"></a>Theory There are two background theories to low-level programming: * Computer Architecture * Operating Systems I think the best way to learn theory is by taking a course. Reading books is not bad but takes too much time and effort. You can find many good classes on online universities, for instance, Coursera.org and edx.org. Theory is theory. I don't think you need to get an A+ in the class, just understand the big picture. You'll get better and better with experience. Let me introduce several books that I've read. They are commonly used as textbooks in universities. If there is no class with these books in your university, it's worth spending some time reading them. * Computer Architecture * Computer Architecture, Fifth Edition: A Quantitative Approach * Computer Systems: A Programmer's Perspective * Computer Organization and Design, Fourth Edition: The Hardware/Software Interface * Operating Systems * The Magic Garden Explained: The Internals of UNIX System V Release 4 an Open Systems Design * The Design of the UNIX Operating System * Operating Systems: Internals and Design Principles by William Stallings * Recommended Courses * [CS401: Operating Systems from saylor.org](https://learn.saylor.org/course/view.php?id=94) * General Programming Skill * [Structure and Interpretation of Computer Programs](https://en.wikipedia.org/wiki/Structure_and_Interpretation_of_Computer_Programs) * It's about how to be a good Software programmer. You need not only theory but only technique because programming is a kind of craftwork. * If you learn Lisp/Scheme, you should be able to learn any other language quickly. * [I've solved about 80% exercises. It should be worth to try every single exercise.](https://github.com/gurugio/sicp_exercise) * Hardware Design * Build Your Own 8086 Microprocessor Kit * If you don't build your HW board, you don't understand what physical memory mapped device is. * Modern APs includes so many IPs. So you don't have a chance to understand how CPU core and peripheral devices are connected. * When you build your own 8086 kit, you have a chance to locate each peripheral devices on the physical memory. And you can set how the main HW components (BUS, IRQ, Clock, Power and etc) works with your own eyes. * I built the 8086 kit in my University. It was one of the most valuable courses I've ever taken. Try to build your own HW kit. It would be better if the HW is older ans simpler because you should do more for yourself. * Google "8086 kit". You would be able to find some web-sites you can buy a HW scheme, parts and manuals. There is an infinite list of good books. I don't want to say that you should read many books. Just read one book carefully. Whenever you learn a theory, implement simulation code of it. **Implementing one thing is better than knowing one hundred theories.** ## <a name="Languages"></a>Languages ### <a name="Assembly"></a>Assembly Choose one between x86 or ARM. No need to know both. It doesn't matter to know assembly language. The essential thing is understanding the internals of a CPU and computer. So you don't need to practice the assembly of the latest CPU. Select 8086 or Corex-M. * [8086 assembly programming with emu8086](https://github.com/gurugio/book_assembly_8086) * basic concepts of CPU and computer architecture * basic concepts of C programming language * [64bit assembly programming(translation in progress)](https://github.com/gurugio/book_assembly_64bit) * basic concepts of modern CPU and computer architecture * basic concepts of disassembling and debugging of C code * _need help for translation_ * [Learning assembly for linux-x64](https://github.com/0xAX/asm) * pure 64-bit assembly programming with NASM and inline assembly with GCC * [ARM Architecture Reference Manual, 2nd Edition](http://www.mypearsonstore.ca/bookstore/arm-architecture-reference-manual-9780201737196) * Complete reference on ARM programming * Computer Organization and Design * [MIPS Edition](https://www.amazon.ca/Computer-Organization-Design-MIPS-Interface/dp/0124077269/) * [ARM Edition](https://www.amazon.ca/Computer-Organization-Design-ARM-Interface/dp/0128017333/) * [RISC-V Edition](https://www.amazon.com/Computer-Organization-Design-RISC-V-Architecture/dp/0128122757) * Academic books that explain how every component of a computer work from the ground up. * Explains in detail the different concepts that make up computer architecture. * They are not targeted at readers who wish to become proficient in a specific assembly language. * The MIPS and ARM edition cover the same topics but by dissecting a different architecture. * Both editions contain examples in the x86 world ### <a name="C-language"></a>C language There is no shortcut. Just read the entire book and solve all the exercises. * [C Programming: A Modern Approach, 2nd Edition](https://www.amazon.com/C-Programming-Modern-Approach-2nd/dp/0393979504) * [The C Programming Language 2nd Edition](https://www.amazon.com/Programming-Language-Brian-W-Kernighan/dp/0131103628/ref=pd_sbs_14_t_0?_encoding=UTF8&psc=1&refRID=60R1D2CHBA8DHYT6JNMN) * Modern C: Jens Gustedt. Modern C. Manning, 2019, 9781617295812. ffhal-02383654f * For new standard of C * [Is Parallel Programming Hard, And, If So, What Can You Do About It?](https://www.kernel.org/pub/linux/kernel/people/paulmck/perfbook/perfbook.html) * raw implementation of synchronization with C * Essential for large scale C programming (especially for kernel programming) * [C Project Based Tutorials?](https://www.reddit.com/r/C_Programming/comments/872rlt/c_project_based_tutorials/) * If you finish reading one or two C programming books, then you MUST make something. * Choose whatever you like. * First make on your own and then compare with someone else's source code. It is very important to compare your source and others. You can improve your skill only when you read the other's source and learn better methods. Books are dead and source is live. * [C and other languages based projects](https://github.com/danistefanovic/build-your-own-x) * find more interesting projects * [Michael Abrash’s Graphics Programming Black Book, Special Edition](http://www.jagregory.com/abrash-black-book/) * Reference on optimization using C and a bit of x86 assembly * Starts from the 8088 up to today * Special focus on low-level graphics optimization * [Framework and plugin design in C](https://github.com/gurugio/book_cprogramming) * How to develop framework and plugin in C for large scale software * Very basic programming tips for Linux kernel source reading If you want to be expert of C programming, visit https://leetcode.com/. Good luck! ### <a name="Rust-language"></a>Rust language I am sure that the next language for the systems programming would be Rust. I will make a list what I did to learn Rust. [Linus Torvalds said "Unless something odd happens, it [Rust] will make it into 6.1."](https://www.zdnet.com/article/linus-torvalds-rust-will-go-into-linux-6-1/) * [The Rust Programming Language](https://doc.rust-lang.org/book/) * Great introduction, but lack of examples and exercises. * [Rust by Example](https://doc.rust-lang.org/rust-by-example/) * While reading "The Rust Programming Language", you can find examples and exercises here. * But there are not many exercises you can do something for yourself. Only some examples includes "do-this" exercises and they are very simple. * [Programming Rust, 2nd](https://www.oreilly.com/library/view/programming-rust-2nd/9781492052586/) * Deeper introduction, but still lack of examples and exercises. * [Exercism](https://exercism.org/tracks/rust) * Good exercises to practice indivisual features of RUST. * I am not sure Mentors are working actively but it would be enough to compare your solution with others. * After submitting your solution, you can see other's solutions with "Community solutions" tab (since Exercism V3). * Many easy level exercises are for functional feature such as map/filter/any and etc. * [Easy rust](https://dhghomon.github.io/easy_rust/) * A book written in easy English. * Youtube materials provided: https://www.youtube.com/playlist?list=PLfllocyHVgsRwLkTAhG0E-2QxCf-ozBkk * [Let's get rusty](https://www.youtube.com/c/LetsGetRusty) * There are many Youtubers uploading Rust course but I enjoied this course most. * He has been uploading the latest news for Rust. It's worth substribing. * [Rust for Linux](https://github.com/Rust-for-Linux) * See the example sources and check how Rust will get into the Linux kernel ## <a name="Applications"></a>Applications ### <a name="Hardware-Firmware"></a>Hardware && Firmware If you want to be an embedded systems engineer, it would be best to start from a simple hardware kit, rather than starting with the latest ARM chipset. * [Arduino Start Kit](https://www.arduino.cc/) * There are many series of Arduinos but "Arduino Start Kit" has the most simple processor(Atmega328P) and guide book * Atmega328P has an 8-bit core which is a good place to start digital circuit design and firmware development. * You don't need to know how to draw schematics and layouts and assemble the chips. * But you do need to know how to read schematics and understand how the chips are connected. * Firmware developers should be able to read the schematics and figure out how to send data to the target device. * Follow the guide book! * [8086 manual](https://edge.edx.org/c4x/BITSPilani/EEE231/asset/8086_family_Users_Manual_1_.pdf) * If you're a beginner to x86 architecture, 8086 is also very good guide for processor architecture and 80x86 assembly * [80386 manual](http://css.csail.mit.edu/6.858/2015/readings/i386.pdf) * Best guide for protected mode and paging mechanism of 80x86 processor * Web version: https://pdos.csail.mit.edu/6.828/2011/readings/i386/toc.htm At this point, you should be good to start the latest ARM or x86 processor. * https://www.raspberrypi.org/ * https://beagleboard.org/ * https://www.arduino.cc/en/ArduinoCertified/IntelEdison For example, the Raspberry Pi board has a Cortex-A53 Processor that supports a 64-bit instruction set. This allows you to experience a modern processor architecture with rPi. Yes, you can buy it... but... what are you going to do with it? If you have no target project, you would be likely to throw the board into a drawer and forget it like other gadgets you may have bought before. So, I recommend one project for you. * [Making your own kernel](http://wiki.osdev.org/Getting_Started) * Good references: https://www.reddit.com/r/osdev/ * [Learning operating system development using Linux kernel and Raspberry Pi](https://github.com/s-matyukevich/raspberry-pi-os) * (description of the project) This repository contains a step-by-step guide that teaches how to create a simple operating system (OS) kernel from scratch...(skip)...Each lesson is designed in such a way that it first explains how some kernel feature is implemented in the RPi OS, and then it tries to demonstrate how the same functionality works in the Linux kernel. I've made [a toy kernel](https://github.com/gurugio/caos) that supports 64-bit long mode, paging and very simple context switching. Making a toy kernel is good way to understand modern computer architecture and hardware control. In fact, you have already the latest processor and the latest hardware devices. Your laptop! Your desktop! You already have all that you need in order to start! You don't need to buy anything. The qemu emulator can emulate the latest ARM processors and Intel processors. So everything you need is already on hand. There are many toy kernels and documents you can refer to. Just install qemu emulator and make a tiny kernel that just boots, turns on paging, and prints some messages. Other toy kernels: * https://littleosbook.github.io/ * https://tuhdo.github.io/os01/ ### <a name="Linux-kernel-and-device-driver"></a>Linux kernel and device driver You don't need to make a complete operating system. Join the Linux community and participate in development. Some resources for Linux kernel and device driver development from beginner to advanced. * Books: Read the following in order * [The Design of the Unix Operating System](https://www.amazon.com/Design-UNIX-Operating-System/dp/0132017997) * The basic concepts of Unix are applied into all operating systems. * This book is a very good place to learn the core concepts of operating systems. * [Linux Device Drivers](https://www.amazon.com/Linux-Device-Drivers-Jonathan-Corbet/dp/0596005903/ref=sr_1_4?ie=UTF8&qid=1483650712&sr=8-4&keywords=understanding+linux+kernel) * Make all examples for yourself * [Linux Kernel Development](https://www.amazon.com/Linux-Kernel-Development-Robert-Love/dp/0672329468/ref=sr_1_2?ie=UTF8&qid=1483650712&sr=8-2&keywords=understanding+linux+kernel) * Understand the design of the Linux Kernel * [Understanding the Linux Kernel](https://www.amazon.com/Understanding-Linux-Kernel-Third-Daniel/dp/0596005652/ref=sr_1_1?ie=UTF8&qid=1483650712&sr=8-1&keywords=understanding+linux+kernel) * Read this book and the kernel source v2.6 at the same time * Never start with the latest version, v2.6 is enough! * Use qemu and gdb to run the kernel source line by line * http://stackoverflow.com/questions/11408041/how-to-debug-the-linux-kernel-with-gdb-and-qemu * https://github.com/gurugio/linuxdeveloptip/blob/master/qemu-gdb-kdump.md * Use busybox to make the simplest filesystem that takes only one second to boot * https://github.com/gurugio/linuxdeveloptip/blob/master/minikernelwithbusybox.md * Other resources: Free resources I recommend * [Linux device driver labs](https://linux-kernel-labs.github.io/) * Practical guide and excellent exercises making Linux device drivers with essential kernel APIs * I think this document introduces almost all essential kernel APIs. * [The Eudyptula Challenge](http://eudyptula-challenge.org/) * _Sadly, this challenge does not accept new challengers because there is no challenge anymore._ The maintainer said he/she is planning a new format. I hope it comes back ASAP. * But you can find the questions of the challenge with Google. Some people already uploaded what they did. Find the questions and try to solve them on your own, and compare your solution with others. * This is like an awesome private teacher who guides you on what to do. * If you don't know what to do, just start this. * [Learning operating system development using Linux kernel and Raspberry Pi](https://github.com/s-matyukevich/raspberry-pi-os) * This project is not completed yet. * I always think making a kernel similar to the Linux kernel is the best way to understand the Linux kernel. * [Block layer and device driver](https://github.com/gurugio/book_linuxkernel_blockdrv) * start from a simple block device driver example (Ramdisk) with multi-queue mode * go forward to block layer * I completed translation into English. Please send me your feedback. * [md driver of Linux kernel(Korean)](https://github.com/gurugio/book_linuxkernel_md) * how mdadm tool works and how it calls md driver * how md driver works * [A Heavily Commemted Linux Kernel Source Code](http://www.oldlinux.org/) * Heavy comments for the ancient Linux v0.12. * It would be good to start with old and simple OS. * Unix version: [Lions' Commentary on UNIX 6th Edition, with Source Code](https://en.wikipedia.org/wiki/Lions%27_Commentary_on_UNIX_6th_Edition,_with_Source_Code) #### <a name="References"></a>References Check when you need something * [Free-electrons homepage](http://free-electrons.com/docs/) * many slide files introducing good topics, specially ARM-linux * [Julia Evans's posting: You can be a kernel hacker!](http://jvns.ca/blog/2014/09/18/you-can-be-a-kernel-hacker/) * guide to start kernel programming ### <a name="Other-applications"></a>Other application Yes, you might not be interested in Linux or firmware. If so, you can find other applications: * Windows systems programming & device drivers * Security * Reverse engineering I don't have any knowledge about those applications. Please send me any information for beginners. **Kernels and drivers are not all of low-level programming.** One more important application of low-level programming is the software-defined storage or distributed filesystem. Detailed descriptions of them is beyond the scope of this document but there is an excellent course where you can try a simple distributed filesystem. * Course: https://pdos.csail.mit.edu/archive/6.824-2012/ * reference Source: https://github.com/srned/yfs ## <a name="Future-of-low-level-programming"></a>Future of low-level programming I do not know the future, but I keep my eye on Rust. * https://hacks.mozilla.org/2016/11/rust-and-the-future-of-systems-programming/ If I could have one week free and alone, I would learn Rust. That is because Rust is the latest language with which I can develop Linux device drivers. * https://github.com/tsgates/rust.ko IoT is new trend, so it's worth to check what OSs are for IoT. ARM, Samsung and some companies has their own realtime OS but sadly many of them are closed source. But Linux Foundation also has a solution: Zephyr * https://www.zephyrproject.org/ Typical cloud servers have many layers; for instance, host OS, kvm driver, qemu process, guest OS and service application. A container has been developed to provide light virtualization. In the near future, a new concept of OS, a so-called library OS or Unikernel, would replace the typical stack of SW for virtualization. * http://unikernel.org/ Big data and cloud computing require bigger and bigger storage. Some disks directly attached to server machines cannot satisfy the required capacity, stability and performance. Therefore there has been research to make huge storage systems with many storage machines connected by a high speed network. It used to be focused on making one huge storage volume. But currently they are providing many volumes dedicated for many virtual machines. * https://en.wikipedia.org/wiki/Software-defined_storage * https://en.wikipedia.org/wiki/Clustered_file_system * https://en.wikipedia.org/wiki/Ceph_(software) ## <a name="How-to-start"></a>How to start? I received an email to ask how to start. There are many information about books, courses and projects in this page. It is my mistake to forget to write how to start. Unfortunately there is no King's Road to [King's Landing](https://gameofthrones.fandom.com/wiki/King%27s_Landing). I will just write what I did in order. If you have already done something, please skip it. AGAIN, this is just an example that you could do in order, just in case if you do not know how to start or what to do. * Reading OS theory books: at least "The Design of the UNIX Operating System by Maurice J. Bach" * Learn assembly and C * [8086 assembly programming with emu8086](https://github.com/gurugio/book_assembly_8086) * It is enough if you understand the concept of assembly programming. You do not need to do something practical. * [The C Programming Language 2nd Edition](https://www.amazon.com/Programming-Language-Brian-W-Kernighan/dp/0131103628/ref=pd_sbs_14_t_0?_encoding=UTF8&psc=1&refRID=60R1D2CHBA8DHYT6JNMN) * DO YOUR BEST TO solve every single exercises! * [C Programming: A Modern Approach, 2nd Edition](https://www.amazon.com/C-Programming-Modern-Approach-2nd/dp/0393979504) * Do something practical with C * [C Project Based Tutorials?](https://www.reddit.com/r/C_Programming/comments/872rlt/c_project_based_tutorials/): Find one or two interesting projects and make your own project. * [leetcode.com](https://leetcode.com/): If you cannot find an interesting project, it would be also good to focus on data-structure and algorithm. * Do a hardware project * Raspberrypi or Arduino does not matter. You need a experience to control a hardware directly with only C. ONLY C! * I recommend to buy a Atmega128 kit and make a firmware to turn on/off LEDs, detect switch input and display message on the text LCD. Motor control program is also a very good project: for instance, the line tracer. * DO NOT use any library. You should make everything on your own, except program downloader. * Basic of the Linux kernel * Low-level programming is very close to the operating system. You should know inside of the OS. * Start with drivers * Read [Linux Device Drivers](https://www.amazon.com/Linux-Device-Drivers-Jonathan-Corbet/dp/0596005903/ref=sr_1_4?ie=UTF8&qid=1483650712&sr=8-4&keywords=understanding+linux+kernel) * [Linux device driver labs](https://linux-kernel-labs.github.io/) * [The Eudyptula Challenge](http://eudyptula-challenge.org/) * Read [Linux Kernel Development](https://www.amazon.com/Linux-Kernel-Development-Robert-Love/dp/0672329468/ref=sr_1_2?ie=UTF8&qid=1483650712&sr=8-2&keywords=understanding+linux+kernel) to understand the internal of Linux kernel. * Go to the professional field * If you want to be professional Linux Kernel Developer * must read [Understanding the Linux Kernel](https://www.amazon.com/Understanding-Linux-Kernel-Third-Daniel/dp/0596005652/ref=sr_1_1?ie=UTF8&qid=1483650712&sr=8-1&keywords=understanding+linux+kernel) * Then try to make a toy kernel * [Learn operating system development using Linux kernel and Raspberry Pi](https://github.com/s-matyukevich/raspberry-pi-os) * [Making your own kernel](http://wiki.osdev.org/Getting_Started) * Write the github link to your kernel on your resume (Don't forget to write the detail description in commit message) * Check the latest issues at https://lwn.net/ and join it. * Check "Recent kernel patches" at "https://lwn.net/Kernel/" or direct link https://lwn.net/Kernel/Patches * Find an interesting patch to you. Try to understand the source code. Of course it would be really difficult but try. You will be closer and closer whenever you try. * Build kernel and test it on your system. For example, performance test, stability test with LTP(https://linux-test-project.github.io/) or static code analysis tools inside of kernel. * Report any problem if you find any: compile warnings/errors, performance drop, kernel panic/oops or any problem * If it works well, report that with the spec of your system. The patch owner would write a "Reviewed-by" tag with your name. * Find your name in kernel git log * Or find another topics * There are many fields where the low-level engineer can work: security, Compiler, Firmware, robot/car and so on # <a name="Translation"></a>Translation Please send me the pull request if you'd like to translate this page. I'll list it here. * [Chinese(Traditional)](https://github.com/gurugio/lowlevelprogramming-university/blob/master/README_tw.md) * [Chinese(Simplified)](https://github.com/gurugio/lowlevelprogramming-university/blob/master/README_cn.md) * [Portuguese (Brazilian)](https://github.com/gurugio/lowlevelprogramming-university/blob/master/README_pt.md) * [Italian](https://github.com/gurugio/lowlevelprogramming-university/blob/master/README_it.md) * [Czech](https://github.com/gurugio/lowlevelprogramming-university/blob/master/README_cz.md) * [Russian](https://github.com/gurugio/lowlevelprogramming-university/blob/master/README_ru.md) * [Turkish](https://github.com/gurugio/lowlevelprogramming-university/blob/master/README_tr.md) * [Persian](https://github.com/gurugio/lowlevelprogramming-university/blob/master/README_fa.md) # <a name="who-am-i"></a>Who am I? I'm inspired by [google-interview-university](https://github.com/jwasham/google-interview-university). I'd like to share my experience and show a roadmap to becoming a low-level programmer because I have found that these skills are not as common as they once were. In addition, many students and beginners ask me how they could become low-level programmers and Linux kernel engineers. FYI, I have over 10 years of experience as a low-level programmer: * 80x86 Assembly programming * Hardware device with Atmel chip and firmware * C language system programming for Unix * Device driver in Linux * Linux kernel: page allocation * Linux kernel: block device driver and md module
541
A list of operating systems and stuff
# Awesome Operating System Stuff This list contains awesome OS related stuff. It contains open source operating sytems and hobby operating systems as one can study their code and learn from them. ## Open Source Operating Systems * [9front](http://9front.org) - A fork of Plan 9, designed for distributed, networked computing. * [ackOS](https://github.com/ackOS-project/ackOS) - A simple 64-bit operating system. * [AROS](https://aros.sourceforge.io/) - Research Operating System is a lightweight, efficient, and flexible desktop operating system, designed to help you make the most of your computer. It's an independent, portable and free project, aiming at being compatible with AmigaOS at the API level * [BoneOS](https://github.com/Bone-Project/BoneOS)- OS for everyone built by everyone * [Bottlerocket OS](https://github.com/bottlerocket-os/bottlerocket)- Linux-based OS meant for hosting containers. * *[broken]* [Cadex OS](https://github.com/opencreeck/Cadex-OS-Official) - a simple operating system kernel originally made by Prof. Douglas Thain at the University of Notre Dame and students * [ChibiOS](http://www.chibios.org/) - a complete development environment for embedded applications including RTOS, an HAL, peripheral drivers, support files and tools * [Clive](https://lsub.org/ls/clive.html) - A unikernel OS inspired by Plan9 and Nix developed at *Universidad Rey Juan Carlos of Madrid* * [CollapseOS](https://collapseos.org/) - Bootstrap post-collapse technology * [dahliaOS](https://dahliaos.io)- dahliaOS is a modern, secure, lightweight and responsive operating system, combining the best of GNU/Linux and Fuchsia OS. * [eggos](https://github.com/icexin/eggos) - A Go unikernel running on x86 bare metal * *[broken]* [Embox](http://www.embox.rocks/) - Configurable operating system kernel designed for resource constrained and embedded systems. * [ExectOS](https://git.codingworkshop.eu.org/xt-sys/exectos), [GitHub](https://github.com/xt-sys/exectos) - ExectOS is a modern, EFI-enabled, general purpose operating system written from scratch and implementing the XT architecture. It runs on x86 and x86_64 architectures and provides NT drivers compatibility layer. * [Fiwix](https://www.fiwix.org/), [GitHub](https://github.com/mikaku/Fiwix) - A UNIX-like kernel for the i386 architecture. * [FreeRTOS](https://aws.amazon.com/freertos/), [GitHub](https://github.com/aws/amazon-freertos) - IoT operating system for microcontrollers, by Amazon. * [Genode](https://genode.org/) - A FOSS operating system framework consisting of a microkernel abstraction layer and a collection of userspace components * [gopher-os](https://github.com/gopher-os/gopher-os) - A proof of concept OS kernel written in Go * [GreenteaOS](https://greenteaos.github.io/), [Github](https://github.com/GreenteaOS/Greentea) - A free OS designed to be compatible with Windows executables * [HarveyOS](https://harvey-os.org/) - A distributed operating system * [HelenOS](https://github.com/HelenOS/helenos) - multikernel multiserver OS * [helium](https://github.com/mszoek/helium) - A BSD-based OS project that aims to provide an experience like and some compatibility with macOS * [Hubris](https://hubris.oxide.computer/) - Hubris is an operating system for microcontrollers developed by Oxide Computer Company in Rust * [Interim](https://github.com/mntmn/interim) - Minimalist OS with concepts from Lisp machines and Plan9 * [Jehanne](http://jehanne.io/), [GitHub](https://github.com/JehanneOS/jehanne/) - OS inspired by Plan9, 9front and Harvey OS * [KnightOS](https://github.com/KnightOS/KnightOS) - for z80 calculators * [L4re](https://github.com/kernkonzept/l4re-core) - Operating system and hypervisor for security/safety-critical and virtualization-enabled applications. * [managarm](https://github.com/managarm/managarm) - Pragmatic microkernel-based OS with fully asynchronous I/O * [MentOS](https://github.com/mentos-team/MentOS) - An educational 32-bit linux-like Operating System. * [Mimiker](https://mimiker.ii.uni.wroc.pl/), [GitHub](https://github.com/cahirwpz/mimiker) - Simple unix-like operating system for education and research purposes. MIPS microkernel. * [Minoca OS](https://github.com/minoca/os) - General purpose OS, written in C * [MollenOS](https://github.com/Meulengracht/MollenOS) - MollenOS/Vali is a modern operating system that is built with focus on abstraction and a modular design, allowing anyone to port it to any architecture. It currently targets the x86-32 and x86-64 platform * [Nanos](https://github.com/nanovms/nanos) - Unikernel that is linux-compatible, written in C * [NodeOS](https://github.com/NodeOS/NodeOS) - OS using NodeJS and Linux * [opuntiaOS](https://github.com/opuntiaOS-Project/opuntiaOS) - an operating system targeting x86, ARMv7, Aarch64. * [orange_slice](https://github.com/gamozolabs/orange_slice) - A research kernel and hypervisor attempting to get fully deterministic emulation with minimum performance cost. In Rust * [Pidi OS](https://github.com/GandelXIV/pidi-os) - Independent and minimalistic OS * [Redox](https://github.com/redox-os/redox) - written in Rust * [Sanos](http://www.jbox.dk/sanos/), [GitHub](https://github.com/ringgaard/sanos) - Sanos is a minimalistic 32-bit x86 operating system kernel for network server appliances running on standard PC hardware. * [skiftOS](https://skiftos.org/), [GitHub](https://github.com/skiftOS/skift) - A simple, handmade, operating system with a graphical user interface. * [Sculpt OS](https://genode.org/download/sculpt) - Genode based OS * [soso](https://github.com/ozkl/soso) - Simple unix-like operating system written in Nasm assembly and mostly in C * [SynestiaOS](https://github.com/SynestiaOS/SynestiaOS) - 32/64 bit operating system written in C for arm platform * [Thor](https://github.com/wichtounet/thor-os) - 64bit operating system mostly written in C++ * [Theseus](https://github.com/theseus-os/Theseus) - A modern experimental OS written from scratch in Rust to explore novel OS structure and state management techniques. * [tilck](https://github.com/vvaltchev/tilck) - A Tiny Linux-Compatible Kernel. * [tock](https://www.tockos.org/), [GitHub](https://github.com/tock/tock) - A secure embedded operating system for microcontrollers * [Unikraft](https://github.com/unikraft/unikraft) - A modular unikernel for specialization, high efficiency, performance, and security; Linux/POSIX-compatible; mostly in C * [Mimosa](https://icfp20.sigplan.org/details/scheme-2020-papers/3/Running-Scheme-On-Bare-Metal-Experience-Report-), [GitHub](https://github.com/udem-dlteam/mimosa) - Research Operating System that runs Scheme on bare-metal * [hhuOS](https://github.com/hhuOS/hhuOS) - hhuOS is a small operating system written in C++ and Assembler for the x86-architecture. The main purpose of this project is to show how different aspects of operating systems theory can be implemented and linked together. The system is not aimed to be a full-featured operating system for daily use. ### Hobby * [AlmeidaOS](https://github.com/PauloMigAlmeida/AlmeidaOS) - x86-64 OS with its own bootloader, scheduler and limited libc all written from scratch * [AquilaOS](https://aquilaos.com) - Operating System that is designed to be POSIX compliant and mostly ISA transparent * [Animal](https://github.com/frednora/animal) - 32 bit multithreaded operating system (formerly Gramado) * [Brutal](https://brutal-org.netlify.app/), [GitHub](https://github.com/brutal-org/brutal) - An operating system inspired by brutalist design that combines the ideals of UNIX from the 1970s with modern technology and engineering * [Cyjon](https://github.com/CorruptedByCPU/Cyjon/) - pure x64 assembly language operating system (related to [Fern-Night](https://github.com/CorruptedByCPU/Fern-Night/) project). * [DragonOS](https://github.com/fslongjin/DragonOS) - An x86-64 OS build from scratch. * [Dreamos64](https://github.com/dreamos82/Dreamos64) - An x86-64 hobby os built from scratch * [duckOS](https://github.com/byteduck/duckOS) - A hobby UNIX-like OS with a graphical window manager for x86 computers. * [emerald](https://github.com/Abb1x/emerald) - An operating system kernel written for fun in C * [Fern-Night](https://github.com/CorruptedByCPU/Fern-Night/) - C language operating system (related to [Cyjon](https://github.com/CorruptedByCPU/Cyjon/) project). * [HalideOS](https://dsc-kiit.github.io/project-halide/) - experimental operating system written entirely from scratch. * [hydrogen](https://github.com/mszoek/hydrogen) - toy OS. 64-bit, preemptive multitasking kernel supporting EFI, PCIe, SATA, framebuffer graphics mode, HFS+. * [JSD-OS](https://github.com/pgrAm/JSD-OS) - A small operating system for 32 bit x86. * [KripayaOS](https://github.com/Kridar/KripayaOS) - x86 Kernel with it's own bootloader. * [KolibriOS](http://www.kolibrios.org) - MenuetOS fork * [LemonOS](https://lemonos.org/), [GitHub](https://github.com/fido2020/Lemon-OS) - UNIX-like 64-bit operating system written in C++. * [lyre](https://github.com/lyre-os/lyre) - x86 kernel and distribution powered by mlibc, GNU userland tools, and other common *nix software. * [Mako](https://github.com/AjayMT/mako) - Hobby OS for x86 from scratch, written in C * [MenuetOS](http://www.menuetos.net/) - Hobby OS supporting 32 and 64 bit, written in Assembly language * [MeetixOS](https://github.com/MarcoCicognani/MeetixOS) - A hobby OS written in modern C++20 which aims to be Unix-like. * [mOS](https://github.com/MQuy/mos) - A hobby operating system developed from scratch * [moros](https://github.com/vinc/moros) - MOROS is a hobby operating system written in Rust for the x86 architecture. * [MyXomycota](https://sourceforge.net/projects/myxomycota/) - Monolithic kernel in C * [nopeos](https://github.com/d99kris/nopeos) - Simple OS kernel with BASIC interpreter for x86 * [Northport](https://github.com/DeanoBurrito/northport) - Monolithic kernel and support libraries for riscv64 and x86_64. * [oneOS](https://github.com/nimelehin/oneOS) - x86-32 and ARMv7 kernel with pre-emptive multi-threading, window manager and editor * [pranaOS](https://github.com/pranaOS/pranaOS) - A unix operating system written from scratch in c / c++ * [PathOS](http://path-os.duckdns.org/) - Hobby OS based on [MikeOS](https://github.com/mig-hub/mikeOS), written in Assembly Language * [PonyOS](https://ponyos.org/), [GitHub](https://github.com/klange/ponyos) - ToaruOS-based, My Little Pony themed OS * [PouplyOS](https://github.com/mtribiere/PoulpyOS) - Simple OS for fun and learning, named after the ESISAR mascot Poulpy * [r3](https://github.com/Narasimha1997/r3) - A hobby x86_64 Operating System kernel written in Rust -- with minimal functionalities * [SayoriOS](https://github.com/pimnik98/SayoriOS) - Hobby OS for x86 computers, currently under active development, written in C * [Serenity](https://github.com/SerenityOS/serenity) - Graphical Unix-like operating system for x86 computers * [SimpleOS](https://github.com/xing1357/SimpleOS) - Simple Operating System coded in C and Assembly * [Snowdrop OS](http://sebastianmihai.com/snowdrop/) - a homebrew operating system from scratch, in assembly language * [Sortix](https://sortix.org/) - Hobby OS in C and C++ by *Jonas 'Sortie' Termansen* * [TempleOS](https://github.com/minexew/TempleOS) - Religious OS :-) * [TETRIS-OS](https://github.com/jdah/tetris-os) - An operating system, but it only plays Tetris. * [ToaruOS](https://github.com/klange/toaruos) - Hobby operating system from scratch * [Týndur](http://www.tyndur.org/) - Hobby operating system build by the Lowlevel community. Written in C and Pascal * [Ultron OS](https://github.com/aswinmohanme/ultronOS) - x86 Operating System written in C++, High School Project * [Visopsys](https://visopsys.org/) - Open Source Hobby OS developed since 1997 * [willOS](https://github.com/willdurand/willOS) - A minimal 64 bits kernel (Operating System that cannot "operate" a lot of things) * [Windows 95 in Electron](https://github.com/felixrieseberg/windows95) - Hobby Windows 95 implementation in Electron * [Xv6](https://pdos.csail.mit.edu/6.828/2019/xv6.html) - A teaching operating system developed in the summer of 2006 for MIT's operating systems course * [BareMetal](http://www.returninfinity.com/), [GitHub](https://github.com/ReturnInfinity/BareMetal) - 64 bit operating system written in Assembly for x86-64 * [ZealOS](https://github.com/Zeal-Operating-System/ZealOS) - The Zeal Operating System is a modernized, professional fork of the 64-bit Temple Operating System, TempleOS. ### Popular Operating Systems * [Darwin XNU](https://github.com/apple/darwin-xnu) - The XNU kernel source code for use in MacOS and iOS * [FreeBSD](https://freebsd.org/), [Github](https://github.com/freebsd/freebsd) - Unix-like operating system based on the BSD * [FreeDOS](http://freedos.org/) - DOS compatible OS * [Haiku](https://github.com/haiku/haiku) - BeOS inspired OS * [Linux](https://github.com/torvalds/linux) - Linux kernel * [Minix](https://www.minix3.org/), [Github](https://github.com/Stichting-MINIX-Research-Foundation/minix) - Unix-like operating system based on a microkernel architecture * [MS-DOS](https://github.com/microsoft/MS-DOS) - The original sources of MS-DOS 1.25 and 2.0 * [NetBSD](https://www.netbsd.org/), [Github](https://github.com/netbsd/src) - Unix-like operating system based on the BSD * [OpenBSD](https://www.openbsd.org/), [Github](https://github.com/openbsd/src) - Unix-like operating system based on the BSD * [Plan 9 from Bell Labs](http://9p.io/plan9/) - An OS from the creators of Unix, extending the Unix philosophy of "everything is a file" with a network-centric file system, namespaces and distributed computing. * [ReactOS](https://reactos.org/), [Github](https://github.com/reactos/reactos) - A free Windows-compatible Operating System * [SystemV](https://archive.org/details/ATTUNIXSystemVRelease4Version2) - AT&T UNIX System V Source Code ## Books and Guides ### Online books * [How to Make a Computer Operating System](https://github.com/SamyPesse/How-to-Make-a-Computer-Operating-System) - in C++ * [Intermezzos](https://intermezzos.github.io/book/) - A follow along book to build IntermezzosOS in Rust * [Linux Kernel in a Nutshell](http://www.kroah.com/lkn/) - Covers the entire range of kernel tasks, available as chapters or one PDF * [The little book about OS development](http://littleosbook.github.io/) by *Erik Helin* and *Adam Renberg* * [Think OS](http://greenteapress.com/thinkos/) - A Brief Introduction to Operating Systems by *Allen B. Downey* * [Operating System Development Series](http://www.brokenthorn.com/Resources/OSDevIndex.html) - OS from the ground up in C * [Operating Systems: Three Easy Pieces](http://pages.cs.wisc.edu/~remzi/OSTEP/) - Easy to read book covering virtualization, concurrency and persistence * [xv6: a simple, Unix-like teaching operating system](https://pdos.csail.mit.edu/6.828/2019/xv6/book-riscv-rev0.pdf) - Book for Xv6 * [Operating Systems: From 0 to 1](https://tuhdo.github.io/os01/) - Bootstrap yourself to write an OS from scratch by *Do Hoang Tu* * [Osdev Notes](https://github.com/dreamos82/Osdev-Notes) - How to write an operating system from scratch by *Ivan G.* and *Dean T.* ### Tutorials * [Baking Pi – Operating Systems Development](https://www.cl.cam.ac.uk/projects/raspberrypi/tutorials/os/index.html) by University of Cambridge * [Build a minimal multi-tasking OS kernel for ARM from scratch](https://github.com/jserv/mini-arm-os) by Jim Huang * [Bran's Kernel Development](http://www.osdever.net/bkerndev/Docs/title.htm) by Brandon Friesen * [How to write a Linux kernel patch and submit it](https://github.com/gregkh/kernel-tutorial) by Greg Kroah-Hartman * [Presentation on how the Linux kernel is developed](https://github.com/gregkh/kernel-development) by Greg Kroah-Hartman * [os-tutorial - How to create an OS from scratch](https://github.com/cfenollosa/os-tutorial) by Carlos Fenollosa * [Roll your own toy UNIX-clone OS](http://jamesmolloy.co.uk/tutorial_html/) by James Molloy * [Writing an OS in Rust](https://os.phil-opp.com/) by Philipp Oppermann * [Making a RISC-V Operating System using Rust](http://osblog.stephenmarz.com/) by Stephen Marz * [Operating systems development for Dummies](https://medium.com/@lduck11007/operating-systems-development-for-dummies-3d4d786e8ac) by Leo Whitehead * [Kernels 101 – Let’s write a Kernel](https://arjunsreedharan.org/post/82710718100/kernels-101-lets-write-a-kernel) by Arjun Sreedharan * [Kernels 201 - Let’s write a Kernel with keyboard and screen support](https://arjunsreedharan.org/post/99370248137/kernels-201-lets-write-a-kernel-with-keyboard) by Arjun Sreedharan * [Writing a Tiny x86 Bootloader](https://www.joe-bergeron.com/posts/Writing%20a%20Tiny%20x86%20Bootloader/) by Joe Bergeron * [Writing a Bootloader](http://3zanders.co.uk/2017/10/13/writing-a-bootloader/) by Alex Parker * [Learning operating system development using Linux kernel and Raspberry Pi](https://github.com/s-matyukevich/raspberry-pi-os) ### Website * [Genodians](https://genodians.org/) - Stories around the Genode Operating System * [os-dev](http://wiki.osdev.org/Main_Page) - Wiki with everything you need to know * [Lowlevel](http://www.lowlevel.eu/wiki/Hauptseite) - A wiki about creating an OS from scratch. In German * [POSIX](https://pubs.opengroup.org/onlinepubs/9699919799/) - Standards for maintaining compatibility between operating systems ### Papers * [The benefits and costs of writing a POSIX kernel in a high-level language](https://www.usenix.org/conference/osdi18/presentation/cutler) by Cody Cutler, M. Frans Kaashoek, and Robert T. Morris, MIT CSAIL * [Running Scheme On Bare Metal](https://icfp20.sigplan.org/details/scheme-2020-papers/3/Running-Scheme-On-Bare-Metal-Experience-Report-) by Samuel Yvon, Marc Feeley, Scheme 2020 * [Unikraft: Fast, Specialized Unikernels the Easy Way](https://dl.acm.org/doi/pdf/10.1145/3447786.3456248) by Kuenzer et al., EuroSys 2021 ### Video Tutorials * [Write your own Operating System](https://www.youtube.com/playlist?list=PLHh55M_Kq4OApWScZyPl5HhgsTJS9MZ6M) * [Nanobyte](https://www.youtube.com/channel/UCSPIuWADJIMIf9Erf--XAsA) * [Kernel dev from scratch by Dragon Zap Education](https://www.youtube.com/watch?v=HNIg3TXfdX8&list=PLrGN1Qi7t67V-9uXzj4VSQCffntfvn42v) ### Linux Kernel specific Resources * [The Linux Kernel Module Programming Guide](https://sysprog21.github.io/lkmpg/) * [The Linux Kernel documentation](https://www.kernel.org/doc/html/latest/) * [Working with the kernel development community](https://www.kernel.org/doc/html/latest/process/) * [Linux Kernel Teaching](https://linux-kernel-labs.github.io/refs/heads/master) * [linux-insides](https://0xax.gitbooks.io/linux-insides/content/) * [Linux Kernel Workbook](https://lkw.readthedocs.io/en/latest/index.html) * [bootlins interactive Linux kernel map](https://makelinux.github.io/kernel/map/) * [OldLinux](http://www.oldlinux.org/) - A Heavily Commented Linux kernel source and more * [sam4ks Linux Kernel Resources](https://github.com/sam4k/linux-kernel-resources) * [xairys Linux Kernel Exploitation](https://github.com/xairy/linux-kernel-exploitation) * [Linux kernel system call table for all archs](https://marcin.juszkiewicz.com.pl/download/tables/syscalls.html) by Marcin Juszkiewicz * [You can be a kernel hacker!](https://jvns.ca/blog/2014/09/18/you-can-be-a-kernel-hacker/) * [4 paths to being a kernel hacker](https://jvns.ca/blog/2014/01/04/4-paths-to-being-a-kernel-hacker/) * [Guessing Linux kernel registers](https://jvns.ca/blog/2016/01/18/guessing-linux-kernel-registers/)
542
Build your Chromium OS for Raspberry Pi 3B/3B+/4B and Pi400
[<img src="https://img.shields.io/endpoint?url=https://openfyde-referral-badge-njwdjt8vwpnb.runkit.sh/">](https://github.com/openFyde/overlay-rpi4-openfyde) [<img src="https://img.shields.io/endpoint?style=flat&color=fedcba&url=https://telegram-badge-t2fuv4m3rno2.runkit.sh/?url=https://t.me/hi_fydeos">](https://t.me/hi_fydeos) <br> # TL;DR: (in FAQ format) <details> <summary>What's this, is this FydeOS?</summary> <br> We get it, it's confusing. There are `Chromium OS for Raspberry Pi`, `openFyde` that happens to boot on Raspberry Pi and `FydeOS for You - Raspberry Pi 400`, these are different releases. This project is about **Chromium OS for Raspberry Pi**, not FydeOS for You - Raspberry Pi 400, also not openFyde. This project aims to only ship vanilla Chromium OS developed by Google and the Chromium Authors, ported to the world's favourite single-board computer - the Raspberry Pi platform. The next question gives detailed differences between these confusing terms. </details> <details> <summary>What's the difference between Chromium OS, Chrome OS, openFyde and FydeOS?</summary> <br> - Chromium OS is an open-source project, used primarily by developers, with code that is available for anyone to checkout, modify, and build. - Google Chrome OS is the Google product that OEMs ship on Chromebooks for general consumer use. - openFyde is a downstream fork of the Chromium OS, with modifications and enhancements developed by Fyde Innovations. It's an open-source initiative sharing a similar series of relaxed licenses as per the Chromium OS upstream. - FydeOS is similar to Google Chrome OS, it's a commercial-grade operating system product developed and maintained by Fyde Innovations, based on openFyde and Chromium OS. Some specific differences: - These OS projects fundamentally share the same code base, but Google Chrome OS has some additional firmware features, including verified boot and easy recovery, which require corresponding hardware changes and thus also don't work out of the box in Chromium OS builds. - Google Chrome OS / "FydeOS for You" runs on specially optimised hardware to get enhanced performance and security. - Chromium OS and openFyde images do not auto-update by default (so that changes you may have made to the code are not blown away), whereas Google Chrome OS / FydeOS seamlessly auto-updates so that users have the latest and greatest features and fixes. - Google Chrome OS / FydeOS includes some proprietary/commercial/licensed packages which are not included in the Chromium OS project. - In consequence of the above, Google Chrome OS / FydeOS supports the Android subsystem, while Chromium OS and openFyde do not. - Google Chrome OS has a green/yellow/red logo, Chromium OS has a blue/bluer/bluest logo, openFyde has a logo that looks like ⭕️ and the logo FydeOS is only textural. </details> <details> <summary>Can I build Chromium OS? Can I build FydeOS?</summary> <br> - Yes you can build Chromium OS, in fact, this project is all about building your own Chromium OS for Raspberry Pi as well as offering pre-built images using the provided build artefacts. - No you can't build FydeOS - the same reason that you can't build Google Chrome OS. - You can build openFyde too, more information about openFyde is available on its [project website](https://openfyde.io/). </details> <details> <summary>I don't want to be bothered with the technicalities, where are the download links?</summary> <br> - To download pre-built Chromium OS for Raspberry Pi, head over to [releases](https://github.com/FydeOS/chromium_os-raspberry_pi/releases) tab, you will find all historical releases as well as important release notes. Please do read the release note! - To download FydeOS for You - Raspberry Pi 400, please use the [Download](https://fydeos.com/download) page of the FydeOS official site. </details> <details> <summary>Where to get help?</summary> <br> You are welcome to open an issue in this project if: - You've read the entire developer guide and even watched the [build demonstration video](https://youtu.be/og4wzzIfGA0), and then you are attempting to build Chromium OS but have encountered problems - You believe your copy of the Chromium OS for Raspberry Pi isn't functioning correctly as it should be Your issues will likely get closed if: - You are asking about FydeOS for You - Raspberry Pi 400: for this please use [FydeOS Community](http://community.fydeos.com/) or join [Official FydeOS Telegram Group](http://t.me/hi_fydeos) - You are asking for generic features/bugs about Chromium OS / Chrome OS itself: for this please use [chromium-os-dev Google Group](https://groups.google.com/a/chromium.org/g/chromium-os-dev) or report bugs to [CRBUGS](https://bugs.chromium.org/) - You are asking about issues about a 3rd-party app, a non-standard peripheral device or a special setup that does not benefit the general community </details> <br><br> # Table of contents (for cool kids) <!-- TOC --> - [Introduction](#introduction) - [System requirement](#system-requirement) - [Prepare the system](#prepare-the-system) - [Get Chromium OS source code](#get-chromium-os-source-code) - [Setup Raspberry Pi overlay](#setup-raspberry-pi-overlay) - [Setup local chromium source](#setup-local-chromium-source) - [Build Chromium OS for Raspberry Pi](#build-chromium-os-for-raspberry-pi) - [Boot Raspberry Pi from the image](#boot-raspberry-pi-from-the-image) - [Video demonstration of the build process](#video-demonstration-of-the-build-process) - [More information](#more-information) - [About us](#about-us) <!-- /TOC --> <br> # Introduction This document describes how to build and run Google [Chromium OS](https://www.chromium.org/chromium-os) on Raspberry Pi 3B, 3B+, 4B and the Pi 400 personal computer kit(Pi400 hereafter), from its source code and the board overlay hosted in this repository. These overlays and the document has been tested against Raspberry Pi 3B, 3B+, 4B and Pi400 by the FydeOS team. It **will not work** on an earlier version of the Raspberry Pi line-up. ### Goal of this project * To provide a usable Chromium OS pre-built image that everybody can download and use that offers a similar experience to Chrome OS * To provide an open-source code base that everybody can use to build and improve Chromium OS on Raspberry Pi. * This project does not aim to provide support for Chromium OS itself. If you find bugs and glitches, please report to [crbugs](https://bugs.chromium.org/p/chromium/issues/list); if you have further queries regarding Chromium OS, please revert to one of the official Chromium related [Google groups](https://www.chromium.org/developers/technical-discussion-groups). ### About this repository The code and document in this repository are the results of works by the people of the FydeOS team. We previously worked on this overlay internally and released a few disk images for Raspberry Pi to the public. Now we open this to the public. ### Branches and tags in this repository - **branches** - `main` - the default branch of this project. It has been tested against our current release version. You are welcome to test it with future releases and send feedback and/or PRs. - `r<revision>` - branches for specific Chromium OS revision, it could be served for archiving purposes or used as a development branch for future (non-stable) code. - **tags** - When we do release a prebuilt image, the commit would be tagged with a release number corresponding to the repo manifest. For example, if the repo manifest release is `rrelease-R102-14695.B`, then our release tag would be `r102`. - Often we will be doing more than one release for each repo manifest release number, so we will append a meaningful string to the tag name to identify such. For example: `r102-hardware_acceleration` ### Typography Conventions Shell Commands are shown with different labels to indicate whether they apply to - your build computer (the computer on which you're doing development) - the chroot (Chromium OS SDK) on your build computer - your Chromium OS computer (the device on which you run the images you build) | Label | Commands | | --------- | ------------------------------------------ | | (outside) | on your build computer, outside the chroot | | (inside) | inside the chroot on your build computer | <br> # System requirement * An x86_64 system to perform the build. 64-bit hardware and OS are a must. The Chromium OS is a very large project, building from the source from scratch usually takes hours to over 10 hours, depending on the system configuration. * CPU: we recommend using a 4-core or higher processor. The Chromium OS build process runs in parallel so more cores can help shorten build time dramatically. * Memory: we recommend at least 16GB, plus enough swap space because for this project you will need to build Chromium from source code. Linking Chromium required between 8GB and 28GB of RAM as of March 2017, so you will run into massive swapping or OOM if you have less memory. However, if you are not building your copy of Chromium, the RAM requirements will be substantially lower at a cost of losing some of the key features provided by this project. * Disk: at least 100GB of free space, 200GB or more is recommended. SSD could noticeably shorten the build time as there are many gigabytes of files that need to be written to and read from the disk. * Network: total source code downloading will be over 10GB. Fast and stable Internet access is going to be very helpful. * An x86_64 Linux OS, it is called the host OS later in this doc. The Chromium OS build process utilises chroot to isolate the built environment from the host OS. So theoretically any modern Linux system should work. However, only limited Linux distros are tested by the Chromium OS team and the FydeOS team. Linux versions that are known to work: * Ubuntu 18.04 LTS * Ubuntu 20.04 LTS * Gentoo Linux * A non-root user account with sudo access. The build process should be run by this user, not the root user. The user needs to have _sudo_ access. For simplicity and convenience password-less sudo could be set for this user. <br> # Prepare the system ### Install necessary tools Git and curl as the essential tools that need to be installed in the host OS, you will also need Python3 for most of the scripting work in the build process. ```bash (outside) sudo apt-get install git-core gitk git-gui curl lvm2 thin-provisioning-tools \ python-pkg-resources python-virtualenv python-oauth2client xz-utils \ python3.6 # If Python 3.5 is the default, switch it to Python 3.6. python3 --version # If above version says 3.5, you'll need to run: sudo update-alternatives --install /usr/bin/python3 python3 /usr/bin/python3.5 1 sudo update-alternatives --install /usr/bin/python3 python3 /usr/bin/python3.6 2 sudo update-alternatives --config python3 ``` This command also installs git's graphical front end (`git gui`) and revision history browser (`gitk`). ### Install Google depot_tools The depot_tools is a software package of scripts, provided by Google, to manage source code checkouts and code reviews. We need it to fetch the Chromium OS source code. ```bash (outside) $ sudo mkdir -p /usr/local/repo $ sudo chmod 777 /usr/local/repo $ cd /usr/local/repo $ git clone https://chromium.googlesource.com/chromium/tools/depot_tools.git ``` Then add depot_tools directory to PATH and set up proper umask for the user who is going to perform the build. Add below lines to the file `~/.bash_profile` of that user. Or if you are using a different shell, handle that accordingly. ```bash (outside) export PATH=/usr/local/repo/depot_tools:$PATH umask 022 ``` Then re-login to make the above changes take effect. ### Configure git Better configure git now or it may complain in some operations later. ```bash (outside) $ git config --global user.email "[email protected]" $ git config --global user.name "Your Name" ``` <br> # Get Chromium OS source code ### Create directory structure The directory structure described here is a recommendation based on the best practice in the FydeOS team. You may host the files differently as you wish. ```bash (outside) # This is the directory to hold Chromium OS source code, aka cros-sdk $ mkdir -p /path/to/cros-pi ``` If you are building a different release, make sure you use the actual directory name on your system, the name here mentioned is just an example. ### Fetch Chromium OS source code First, you need to find out the reference name of the release you would like to build, by visiting this page [https://chromium.googlesource.com/chromiumos/manifest.git](https://chromium.googlesource.com/chromiumos/manifest.git): You will see a list of Git commit IDs and its name in the form of `refs/heads/release-Rxx-xxxx.B`. That `release-Rxx-XXXX.B` link is what you need for fetching the code of that specific Chromium OS release. For example, [release-R102-14695.B](https://chromium.googlesource.com/chromiumos/manifest.git/+/refs/heads/release-R102-14695.B) for release r102. Now run these commands to fetch the source code. Find and use a different release name if you would like to build a different release. ```bash (outside) #Assuming you understand what /path/to means. If not, replace it with '~' $ cd /path/to/cros-pi $ repo init -u https://chromium.googlesource.com/chromiumos/manifest.git --repo-url https://chromium.googlesource.com/external/repo.git -b release-R102-14695.B # Raise this number if you have a fast internet connection $ repo sync -j8 ``` Fetching Chromium OS source code may take 20 to more than 40 minutes depending on your connection speed, around 10GB of data will need to be downloaded primarily from googlesource.com, it'd be helpful if you have a decent internet speed to reach Google's server. ### Request for Google API key If you would like to login into the Chromium OS GUI by using your Google account, you will need to request for Google API key and include them in the disk image you build. Since the only authentication mechanism included in Chromium OS is Google ID, you probably will need this or you will only be able to log in as a guest user. Apply for Google API on the Google website per [this document](http://www.chromium.org/developers/how-tos/api-keys). After acquiring the client ID, client secret and API key, put them in ```~/.googleapikeys``` file as in the below format. ``` 'google_api_key': 'your api key', 'google_default_client_id': 'your client id', 'google_default_client_secret': 'your client secret', ``` Then the Chromium OS build script will read the necessary information from this file automatically, and the image you build will allow Google ID login. <br> # Setup Raspberry Pi overlay Now fetch this overlay and also create symlinks in the designated place. ```bash (outside) $ cd /path/to/overlays $ git clone https://github.com/fydeos/chromium_os-raspberry_pi.git . $ cd /path/to/cros-pi/src/overlays $ ln -s /path/to/overlays/* . ``` By now, your `cros-pi/src/overlays` directory should have included symbolic links for: - `project-cros-pi` - `baseboard-rpi3` - `overlay-rpi3` - `overlay-rpi4` - `chipset-bcm2837` <br> # Setup local chromium source It's recommended to build Chromium browser on your local setup so that your Chromium OS for Raspberry Pi could benefit from the additional functionalities like kiosk mode, you will also have the option to incorporate your modifications. If you wish to do so, you need to prepare the necessary files before entering the cros_sdk. As far as this project is concerned, the chromium source that we use to build our releases can be found in the [chromium-raspberry_pi](https://github.com/FydeOS/chromium-raspberry_pi) project. You may also choose to use Google's vanilla chromium repository which can be found [here](https://chromium.googlesource.com/chromium/src.git/). Note that we use a much simpler way to manage releases, with our [chromium-raspberry_pi](https://github.com/FydeOS/chromium-raspberry_pi) project you need to select the correct branch corresponding to the [repo manifest](#fetch-chromium-os-source-code) you used in the previous step to sync your Chromium OS code. For example, if you are building r102, you will then need to look out for "`chromium-m102`" branch under [chromium-raspberry_pi](https://github.com/FydeOS/chromium-raspberry_pi). The letter "m" stands for "milestone" and it correlates to the release number for Chromium OS(r102 in this case). Choosing an unmatched chromium milestone branch and Chromium OS repo will probably result in endless build errors. With Google's repository, you need to choose a correct release tag rather than a branch. For example, if you are building r102, you can browse all existing chromium release tags on [this page](https://chromium.googlesource.com/chromium/src.git/) and deduce that the latest tag on your desired milestone version. At the point where this was written, this would be [102.0.5005.90](https://chromium.googlesource.com/chromium/src.git/+/refs/tags/102.0.5005.90). Having understood the above, now create a directory parallel to your Chromium OS repo to house the chromium source: ```bash (outside) $ mkdir chromium-pi $ cd chromium-pi $ mkdir src $ cd src ``` Now clone the desired chromium project: ```bash (outside) # use our chromium repo $ git clone [email protected]:FydeOS/chromium-raspberry_pi.git . # use google's vanilla chromium $ git clone https://chromium.googlesource.com/chromium/src.git . ``` Note that chromium is an absolute **HUGE** project, cloning the entire repo will require ~22GB of disk space and will require about 2 hours to complete even if you have a decent internet speed. Then choose the correct branch/tag ```bash (outside) #with our chromium repo $ git checkout chromium-m102 #with Google's repo and you wish to build for r102 $ git checkout 102.0.5005.90 ``` Now you need to create a config file known to gclient for syncing the chromium dependencies: ```bash (outside) $ cd .. # now you should be in /path/to/chromium-pi $ touch .gclient ``` The .gclient file should have the following content, note that you should replace the correct branch name with the `url` field (in this example we use `chromium-m102`) you may also replace the `url` value to Google's per your setup. ``` solutions = [{'custom_deps': {}, 'custom_vars': {}, 'deps_file': '.DEPS.git', 'managed': False, 'name': 'src', 'url': '[email protected]:FydeOS/chromium-raspberry_pi.git@refs/remotes/origin/chromium-m102'}] target_os = ['chromeos'] ``` Now you can start syncing: ```bash (outside) $ gclient sync ``` Note, due to an existing issue with WebRTC, during syncing you may encounter a git related error complaining fetch failure(if you do not see such error, you can safely ignore this and move on). A temporary fix is to manually edit the `src/third_party/webrtc/.git/config` file under the WebRTC folder: ``` [core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = https://webrtc.googlesource.com/src.git fetch = +refs/heads/*:refs/remotes/origin/* fetch = +refs/branch-heads/*:refs/remotes/branch-heads/* [branch "master"] remote = origin merge = refs/heads/master ``` Once gclient sync is completed, the chromium source folder is now fully set up. <br> # Build Chromium OS for Raspberry Pi ### Create the chroot As mentioned above, a chroot environment will be used to run the actual build process and some other related tasks. To create the chroot environment, run the below commands. ``` (outside) $ cd /path/to/cros-pi $ cros_sdk ``` If you wish to build your chromium and you have to follow the steps to set it up, you need to specify it when entering the cros_sdk by: ```bash (outside) $ cd /path/to/cros-pi $ cros_sdk --chrome-root /path/to/your/chromium-pi #absolute path needed ``` It may take 10 to over 30 minutes depending on your internet connection speed and disk i/o speed. Once finished, it will enter into the chroot. The shell prompt string looks like below so it is very easy to tell whether you are currently in the chroot or not. ``` (inside) (release-R102-14695.B/(xxxxxx...)) <user>@<host> ~/trunk/src/scripts $ ``` The chroot environment is located under the `/path/to/cros-pi/chroot` directory. Let's exit from the chroot first as we need to do some customisation before moving on. Type `exit` or `ctrl + d` to exit from the chroot shell. Usually, the chroot only needs to be created once and can be used to build a board many times or build different boards. It very rarely needs to be removed/re-created. ### Delete the chroot If you would like to remove the chroot and re-create it from scratch, don't delete the `chroot` directory directly. As there could be directories from the host OS bind mounted in the chroot, an `rm chroot` command could remove files from your host OS undesirably. The correct way to remove the chroot is by using the below commands. ```bash (outside) $ cd /path/to/cros-pi $ cros_sdk --delete ``` ### Setup bind mount directories for chroot Programs running inside the chroot will not be able to access files outside of the chroot. One way to circumvent this is to bind-mount those files into a directory inside the chroot. When entering the Chromium OS chroot environment, a file named `.local_mounts` will be checked and directories listed in it will be bind-mounted inside the chroot. All we need to do is to create this file in the right place and put the necessary contents in, by using the below command. ```bash (outside) $ echo "/path/to/overlays" > /path/to/cros-pi/src/scripts/.local_mounts ``` Now, after entering the chroot, a `/path/to/overlays` directory will exist in the chroot and its content is the same as the `/path/to/overlays` directory in the host OS, as it is bind-mounted from the host OS. If we don't do this, the `/path/to/cros-pi/src/overlays/overlay-rpi4` symbolic link will not be accessible, as the top directory (`/path/to/overlays`) it points to doesn't exist in the chroot. ### Enter the chroot Now we can enter the chroot. ```bash (outside) $ cd /path/to/cros-pi $ cros_sdk ``` It is the same command used to create the chroot. It creates the chroot if one does not exist and enters the chroot if there is already one. And we can check whether the above `.local_mounts` setup was done correctly. ```bash (inside) $ ls /path/to/overlays/ # You should be able to see the same content as in the host OS. $ ls ../overlays/overlay-rpi4/ # You should be able to see the content of this repo. ``` Move on if it works well. If not, check and make sure you set up `.local_mounts` correctly. ### Set password for the chronos user The chronos user is used to log into the command line interface of Chromium OS, via ssh, local console or the shell in crosh interface. It is recommended that a password is set for this user so you can log in as this user and also can do `sudo` in the Chromium OS command line, for advanced tasks. To set a password for the chronos user, run the below command. ```bash (inside) $ ./set_shared_user_password.sh ``` Type in a password when prompted. If you would like to change the password, simply run the command again. The password is encrypted and saved in the file `/etc/shared_user_passwd.txt` in the chroot. You only need to set it once and it will be used for all the images you build unless you re-create the chroot. ### Setup Raspberry Pi board In the Chromium OS terminology, a board refers to a class of computer platforms with distinct hardware configurations. The board will be used as a target in the process of building software packages and disk images for that specific computer platform. There are many boards in the Chromium OS code base. They are either development platforms or real selling hardware products running Chrome OS, such as Chromebooks you can buy from many vendors. The Chromium OS project utilises the Portage package management system from Gentoo Linux. Each board lives in its own "overlay", which holds distinct build configuration, system configurations, collection of software packages, system services, disk image customisation etc. for that board. In our case here, we created a board named "rpi4" which refers to the Raspberry Pi 4B. We call the overlay "overlay-rpi4" and all its files are hosted in this repository. To build Chromium OS for a board, the first thing is to initialise the board from its overlay. **Beginning from release 86 and onwards, we have done some efforts to add Raspberry Pi 3B/3B+ support to the Raspberry Pi 4B overlay. In the following steps, we will be using the rpi4 board as an example, the resulting image will also likely work on both Raspberry Pi 3B/3B+.** ```bash (inside) $ setup_board --board=rpi4 ``` Again, it may take 10 to over 30 minutes depending on the speed of your internet connection and disk i/o. Once it's done, a directory structure for the "rpi4" board will be created under `/build/rpi4` of the chroot. ### Re-initialise the board It is usually not necessary to re-initialise the board as what you have already built will be lost, and you will have to spend hours rebuilding all packages from scratch. But if you need to do so, just re-run the same setup_board command with the `---force` option. ```bash (inside) $ setup_board --board=rpi4 --force ``` The `--force` option will remove the existing board directory `/build/rpi4` and re-create it from scratch. ### Build packages Now it is time to build all software packages for the rpi4 board. ```bash (inside) $ ./build_packages --board=rpi4 --nowithautotest # Append "--nowithautotest" to speed up the build process by skipping some tests ``` It may take hours depending on your processor power, your memory size, your disk speed and the quality of your internet connection. Here are some examples for you to adjust your expectation: - On a decent machine with 4 cores 8 threads, 16GB memory, files on regular HDD, and 100Mb broadband, it takes about 5 to 6 hours for the command to finish. - On a Workstation-grade server with AMD Threadripper 3990x CPU with 64-core 128-thread, 128GB memory and 300Mb broadband, it takes 44mins for the command to finish. ### Things to note - **What is happening now** The `build_packages` script acts as an entry point to initialise a series of processes aiming to compile all the necessary software packages from source code and build them together forming Chromium OS as a whole. During the process there are a few required dependencies will be fetched and cloned from GitHub, so please do ensure a decent internet connection to github.com. - **When interrupted** The build process is incremental. If it gets interrupted for any reason, you can always re-run the same `build_packages` command and it will resume the build instead of rebuilding from scratch. - **Read the output** The `build_packages` command throws out a lot of information on the console. Fortunately, that information is very well organised. - <span style="color:red">Red text</span>: these are error messages and very likely will cause the build process to break. - <span style="color:green">Green text</span>: these are useful messages printed by the build script itself. They are useful when debugging problem. - White text: these are regular information that mostly is printed by the commands called in the build script. They provide more details about the build process and thus are also useful for debugging. - **Read the logs** The `build_packages` script spends most of its airtime on running the `emerge` commands, to build, install and pack those hundreds of software packages required by the overlay. The `emerge` command is from the Portage system of Gentoo Linux. The `emerge` command saves the output of its building, installation and packing process into log files. These files are extremely useful if there is a failure when building packages. Those log files are located under the `/build/rpi4/tmp/portage/logs` directory of the chroot. They are plain text files so can be viewed right from your command-line interface. ### Build the disk image After the build_packages command is finished successfully, you can start building the disk image. ```bash (inside) $ ./build_image --board=rpi4 --noenable_rootfs_verification # Append --noenable_rootfs_verification flag to enable root file system read/write on the built image ``` It may take 10 to 30 minutes, mainly depending on the speed of your disk. It will be much faster on SSD than on HDD. ### Find your image After the command finished successfully, you will have disk images generated, saved under `/mnt/host/source/src/build/images/rpi4/` directory in the chroot, or `/path/to/cros-pi/src/build/images/rpi4` in the host OS. These two are the same directory, just bind mounted in the chroot. Each invocation of the build_image command will create a directory named similar to `R102-XXXX.XXX.<date time>-a1` under above directory. There is a symlink named `latest` under the above directory, that always points to the image directory of the last successful build. The disk image is usually named `chromiumos_image.bin`, under the abovementioned directory. So full path to the latest image is ``` /mnt/host/source/src/build/images/rpi4/latest/chromiumos_image.bin ``` in the chroot, and ``` /path/to/cros-pi/src/build/images/rpi4/latest/chromiumos_image.bin ``` in the host OS. <br> # Boot Raspberry Pi from the image The Raspberry Pi boots from the SD card so we need to write the previously generated disk image onto the SD card. An SD card of at least 8GB capacity is required. ### Write the disk image to an SD card There are two usual ways to write the Chromium OS disk image to an SD card. You can copy the image out to another Windows/macOS/Linux system and write it using your favourite GUI/CLI application. It is the same as writing other Linux images for Raspberry Pi, so will not be explained here. Another Chromium OS-specific way is by using the `cros` command in the chroot. ### Write the image by using the `cros` command First, plug the SD card into the box used to build the image and has the chroot. Then run the below command. ``` (inside) $ cros flash usb:// rpi4/latest ``` This asks to write the latest disk image to USB removable media. A list of USB removable media will be presented, with the index number prefixed. You can select which USB drive to write to by typing in the index number when prompted. ### Boot from the SD card After the disk image is successfully written to the SD card, plug it into the Raspberry Pi and boot it as usual. After a few seconds, you will see a Chromium logo, later on, it will boot into GUI mode and the first time setup screen (OOBE) will pop up for you to configure the system and log in. <br> # Video demonstration of the build process <https://youtu.be/og4wzzIfGA0> <br> # More information [Chromium OS Developer Guide](http://www.chromium.org/chromium-os/developer-guide). This is the official source of how to build Chromium OS. [openFyde](https://openfyde.io), the open-sourced version of FydeOS. [The FydeOS website](https://fydeos.io), our home. [FydeOS official Telegram group](https://t.me/hi_fydeos), to say hi and get help. <br> # About us Fyde began with a vision where all applications and services we use today will be living in the Cloud. We believed that with the ever-advancing browser platform technology and web frontend performances, it’s not surprising that most things we do today with the internet can be done through a single browser window. We are stepping into an era where installable apps will soon become history. FydeOS is our answer to this new era of computing. FydeOS is a simple, secure, fast and productive operating system. Based on the open-source Chromium Project that also powers the well-known Google Chromebooks. FydeOS inherits most of the benefits that Chromebooks have but is also bundled with our enhancements and new features. We have turned FydeOS into a more open platform, users will no longer be forced to rely on Google services and have the freedom to choose whichever services they prefer. We have also made FydeOS run on a wider range of hardware platforms ranging from x86 PCs and ARM-based single board computers, providing endless possibilities and potentials of how FydeOS can be used and applied.
543
📊 An infographics generator with 30+ plugins and 300+ options to display stats about your GitHub account and render them as SVG, Markdown, PDF or JSON!
# 📊 Metrics [<img src="https://api.producthunt.com/widgets/embed-image/v1/featured.svg?post_id=280144&theme=dark" alt="" align="right" width="190" height="41">](https://www.producthunt.com/posts/github-metrics?utm_source=badge-featured&utm_medium=badge&utm_source=badge-github-metrics) [![Continuous integration](https://github.com/lowlighter/metrics/actions/workflows/ci.yml/badge.svg)](https://github.com/lowlighter/metrics/actions/workflows/ci.yml) Generate metrics that can be embedded everywhere, including your GitHub profile readme! Supports users, organizations, and even repositories! <table> <tr> <th align="center">For user accounts</th> <th align="center">For organization accounts</th> </tr> <tr> <td align="center"> <img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.classic.svg" alt=""></img> </td> <td align="center"> <img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.organization.svg" alt=""></img> </td> </tr> <tr> <th colspan="2" align="center"> <h3><a href="/README.md#-plugins">🧩 Customizable with 44 plugins and 314 options!</a></h3> </th> </tr> <tr> <th><a href="source/plugins/isocalendar/README.md">📅 Isometric commit calendar</a></th> <th><a href="source/plugins/languages/README.md">🈷️ Languages activity</a></th> </tr> <tr> <td align="center"> <details open><summary>Full year calendar</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.isocalendar.fullyear.svg" alt=""></img></details> <details><summary>Half year calendar</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.isocalendar.svg" alt=""></img></details> <img width="900" height="1" alt=""> </td> <td align="center"> <details open><summary>Indepth analysis (clone and analyze repositories)</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.languages.indepth.svg" alt=""></img></details> <details open><summary>Recently used (analyze recent activity events)</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.languages.recent.svg" alt=""></img></details> <details><summary>Default algorithm</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.languages.svg" alt=""></img></details> <details><summary>Default algorithm (with details)</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.languages.details.svg" alt=""></img></details> <img width="900" height="1" alt=""> </td> </tr> <tr> <th><a href="source/plugins/stargazers/README.md">✨ Stargazers</a></th> <th><a href="source/plugins/lines/README.md">👨‍💻 Lines of code changed</a></th> </tr> <tr> <td align="center"> <details open><summary>Classic charts</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.stargazers.svg" alt=""></img></details> <details><summary>Chartist charts</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.stargazers.chartist.svg" alt=""></img></details> <details open><summary>Worldmap</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.stargazers.worldmap.svg" alt=""></img></details> <img width="900" height="1" alt=""> </td> <td align="center"> <details open><summary>Repositories and diff history</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.lines.history.svg" alt=""></img></details> <details><summary>Compact display in base plugin</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.lines.svg" alt=""></img></details> <img width="900" height="1" alt=""> </td> </tr> <tr> <th><a href="source/plugins/topics/README.md">📌 Starred topics</a></th> <th><a href="source/plugins/stars/README.md">🌟 Recently starred repositories</a></th> </tr> <tr> <td align="center"> <details open><summary>With icons</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.topics.icons.svg" alt=""></img></details> <details open><summary>With labels</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.topics.svg" alt=""></img></details> <img width="900" height="1" alt=""> </td> <td align="center"> <img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.stars.svg" alt=""></img> <img width="900" height="1" alt=""> </td> </tr> <tr> <th><a href="source/plugins/licenses/README.md">📜 Repository licenses</a></th> <th><a href="source/plugins/habits/README.md">💡 Coding habits and activity</a></th> </tr> <tr> <td align="center"> <details open><summary>Permissions, limitations and conditions</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.licenses.svg" alt=""></img></details> <details open><summary>Licenses overview</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.licenses.ratio.svg" alt=""></img></details> <img width="900" height="1" alt=""> </td> <td align="center"> <details open><summary>Recent activity charts</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.habits.charts.svg" alt=""></img></details> <details open><summary>Mildly interesting facts</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.habits.facts.svg" alt=""></img></details> <img width="900" height="1" alt=""> </td> </tr> <tr> <th><a href="source/plugins/contributors/README.md">🏅 Repository contributors</a></th> <th><a href="source/plugins/followup/README.md">🎟️ Follow-up of issues and pull requests</a></th> </tr> <tr> <td align="center"> <details open><summary>By contribution types</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.contributors.categories.svg" alt=""></img></details> <details><summary>By number of contributions</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.contributors.contributions.svg" alt=""></img></details> <img width="900" height="1" alt=""> </td> <td align="center"> <details open><summary>Indepth analysis</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.followup.indepth.svg" alt=""></img></details> <details><summary>Created on a user's repositories</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.followup.svg" alt=""></img></details> <details><summary>Created by a user</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.followup.user.svg" alt=""></img></details> <img width="900" height="1" alt=""> </td> </tr> <tr> <th><a href="source/plugins/reactions/README.md">🎭 Comment reactions</a></th> <th><a href="source/plugins/people/README.md">🧑‍🤝‍🧑 People</a></th> </tr> <tr> <td align="center"> <img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.reactions.svg" alt=""></img> <img width="900" height="1" alt=""> </td> <td align="center"> <details open><summary>Related to a user</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.people.followers.svg" alt=""></img></details> <details><summary>Related to a repository</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.people.repository.svg" alt=""></img></details> <img width="900" height="1" alt=""> </td> </tr> <tr> <th><a href="source/plugins/sponsorships/README.md">💝 GitHub Sponsorships</a></th> <th><a href="source/plugins/sponsors/README.md">💕 GitHub Sponsors</a></th> </tr> <tr> <td align="center"> <img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.sponsorships.svg" alt=""></img> <img width="900" height="1" alt=""> </td> <td align="center"> <details open><summary>GitHub sponsors card</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.sponsors.svg" alt=""></img></details> <details><summary>GitHub sponsors full introduction</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.sponsors.full.svg" alt=""></img></details> <img width="900" height="1" alt=""> </td> </tr> <tr> <th><a href="source/plugins/repositories/README.md">📓 Featured repositories</a></th> <th><a href="source/plugins/discussions/README.md">💬 Discussions</a></th> </tr> <tr> <td align="center"> <details open><summary>Featured</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.repositories.svg" alt=""></img></details> <details><summary>Pinned</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.repositories.pinned.svg" alt=""></img></details> <img width="900" height="1" alt=""> </td> <td align="center"> <img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.discussions.svg" alt=""></img> <img width="900" height="1" alt=""> </td> </tr> <tr> <th><a href="source/plugins/starlists/README.md">💫 Star lists</a></th> <th><a href="source/plugins/calendar/README.md">📆 Commit calendar</a></th> </tr> <tr> <td align="center"> <details open><summary>Repositories from star lists</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.starlists.svg" alt=""></img></details> <details open><summary>Languages from star lists</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.starlists.languages.svg" alt=""></img></details> <img width="900" height="1" alt=""> </td> <td align="center"> <details><summary>Current year</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.calendar.svg" alt=""></img></details> <details open><summary>Full history</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.calendar.full.svg" alt=""></img></details> <img width="900" height="1" alt=""> </td> </tr> <tr> <th><a href="source/plugins/achievements/README.md">🏆 Achievements</a></th> <th><a href="source/plugins/notable/README.md">🎩 Notable contributions</a></th> </tr> <tr> <td align="center"> <details open><summary>Compact display</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.achievements.compact.svg" alt=""></img></details> <details><summary>Detailed display</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.achievements.svg" alt=""></img></details> <img width="900" height="1" alt=""> </td> <td align="center"> <details open><summary>Indepth analysis</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.notable.indepth.svg" alt=""></img></details> <details><summary>Contributions in organizations only</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.notable.svg" alt=""></img></details> <img width="900" height="1" alt=""> </td> </tr> <tr> <th><a href="source/plugins/activity/README.md">📰 Recent activity</a></th> <th><a href="source/plugins/traffic/README.md">🧮 Repositories traffic</a></th> </tr> <tr> <td align="center"> <img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.activity.svg" alt=""></img> <img width="900" height="1" alt=""> </td> <td align="center"> <img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.traffic.svg" alt=""></img> <img width="900" height="1" alt=""> </td> </tr> <tr> <th><a href="source/plugins/code/README.md">♐ Random code snippet</a></th> <th><a href="source/plugins/gists/README.md">🎫 Gists</a></th> </tr> <tr> <td align="center"> <img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.code.svg" alt=""></img> <img width="900" height="1" alt=""> </td> <td align="center"> <img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.gists.svg" alt=""></img> <img width="900" height="1" alt=""> </td> </tr> <tr> <th><a href="source/plugins/projects/README.md">🗂️ GitHub projects</a></th> <th><a href="source/plugins/introduction/README.md">🙋 Introduction</a></th> </tr> <tr> <td align="center"> <img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.projects.svg" alt=""></img> <img width="900" height="1" alt=""> </td> <td align="center"> <details open><summary>For a user or an organization</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.introduction.svg" alt=""></img></details> <details><summary>For a repository</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.introduction.repository.svg" alt=""></img></details> <img width="900" height="1" alt=""> </td> </tr> <tr> <th><a href="source/plugins/skyline/README.md">🌇 GitHub Skyline</a></th> <th><a href="source/plugins/pagespeed/README.md">⏱️ Google PageSpeed</a></th> </tr> <tr> <td align="center"> <details open><summary>GitHub Skyline</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.skyline.svg" alt=""></img></details> <details><summary>GitHub City</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.skyline.city.svg" alt=""></img></details> <img width="900" height="1" alt=""> </td> <td align="center"> <details open><summary>PageSpeed scores</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.pagespeed.svg" alt=""></img></details> <details><summary>PageSpeed scores with detailed report</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.pagespeed.detailed.svg" alt=""></img></details> <details><summary>PageSpeed scores with a website screenshot</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.pagespeed.screenshot.svg" alt=""></img></details> <img width="900" height="1" alt=""> </td> </tr> <tr> <th><a href="source/plugins/tweets/README.md">🐤 Latest tweets</a></th> <th><a href="source/plugins/stackoverflow/README.md">🗨️ Stack Overflow</a></th> </tr> <tr> <td align="center"> <details open><summary>Latest tweets with attachments</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.tweets.attachments.svg" alt=""></img></details> <details><summary>Latest tweets</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.tweets.svg" alt=""></img></details> <img width="900" height="1" alt=""> </td> <td align="center"> <img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.stackoverflow.svg" alt=""></img> <img width="900" height="1" alt=""> </td> </tr> <tr> <th><a href="source/plugins/anilist/README.md">🌸 Anilist watch list and reading list</a></th> <th><a href="source/plugins/music/README.md">🎼 Music activity and suggestions</a></th> </tr> <tr> <td align="center"> <details open><summary>For anime watchers</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.anilist.svg" alt=""></img></details> <details><summary>For manga readers</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.anilist.manga.svg" alt=""></img></details> <details open><summary>For waifus simp</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.anilist.characters.svg" alt=""></img></details> <img width="900" height="1" alt=""> </td> <td align="center"> <details open><summary>Random tracks from a playlist</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.music.playlist.svg" alt=""></img></details> <details open><summary>Recently listened</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.music.recent.svg" alt=""></img></details> <img width="900" height="1" alt=""> </td> </tr> <tr> <th><a href="source/plugins/posts/README.md">✒️ Recent posts</a></th> <th><a href="source/plugins/rss/README.md">🗼 Rss feed</a></th> </tr> <tr> <td align="center"> <details open><summary>Latest posts width description and cover image</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.posts.full.svg" alt=""></img></details> <details><summary>Latest posts</summary><img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.posts.svg" alt=""></img></details> <img width="900" height="1" alt=""> </td> <td align="center"> <img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.rss.svg" alt=""></img> <img width="900" height="1" alt=""> </td> </tr> <tr> <th><a href="source/plugins/wakatime/README.md">⏰ WakaTime</a></th> <th><a href="source/plugins/leetcode/README.md">🗳️ Leetcode</a></th> </tr> <tr> <td align="center"> <img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.wakatime.svg" alt=""></img> <img width="900" height="1" alt=""> </td> <td align="center"> <img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.leetcode.svg" alt=""></img> <img width="900" height="1" alt=""> </td> </tr> <tr> <th colspan="2" align="center"> <a href="/source/plugins/community/README.md">🎲 See also community plugins</a> </th> </tr> <tr> <th><a href="source/plugins/community/chess/README.md">♟️ Chess</a><br><sup>by <a href="https://github.com/lowlighter">@lowlighter</a></sup> <details><summary>Render example</summary> <img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.chess.svg" alt=""></img> <img width="900" height="1" alt=""> </details> </th> <th><a href="source/plugins/community/fortune/README.md">🥠 Fortune</a><br><sup>by <a href="https://github.com/lowlighter">@lowlighter</a></sup> <details><summary>Render example</summary> <img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.fortune.svg" alt=""></img> <img width="900" height="1" alt=""> </details> </th> </tr> <tr> <th><a href="source/plugins/community/nightscout/README.md">💉 Nightscout</a><br><sup>by <a href="https://github.com/legoandmars">@legoandmars</a></sup> <details><summary>Render example</summary> <img alt="" width="400" src="https://github.com/legoandmars/legoandmars/blob/master/metrics.plugin.nightscout.svg" alt=""></img> <img width="900" height="1" alt=""> </details> </th> <th><a href="source/plugins/community/poopmap/README.md">💩 PoopMap plugin</a><br><sup>by <a href="https://github.com/matievisthekat">@matievisthekat</a></sup> <details><summary>Render example</summary> <img alt="" width="400" src="https://github.com/matievisthekat/matievisthekat/blob/master/metrics.plugin.poopmap.svg" alt=""></img> <img width="900" height="1" alt=""> </details> </th> </tr> <tr> <th><a href="source/plugins/community/screenshot/README.md">📸 Website screenshot</a><br><sup>by <a href="https://github.com/lowlighter">@lowlighter</a></sup> <details><summary>Render example</summary> <img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.screenshot.svg" alt=""></img> <img width="900" height="1" alt=""> </details> </th> <th><a href="source/plugins/community/splatoon/README.md">🦑 Splatoon</a><br><sup>by <a href="https://github.com/lowlighter">@lowlighter</a></sup> <details><summary>Render example</summary> <img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.splatoon.svg" alt=""></img> <img width="900" height="1" alt=""> </details> </th> </tr> <tr> <th><a href="source/plugins/community/stock/README.md">💹 Stock prices</a><br><sup>by <a href="https://github.com/lowlighter">@lowlighter</a></sup> <details><summary>Render example</summary> <img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.plugin.stock.svg" alt=""></img> <img width="900" height="1" alt=""> </details> </th> <th> </th> </tr> <tr> <th colspan="2" align="center"> <h3><a href="/README.md#%EF%B8%8F-templates">🖼️ And even more with 4+ templates!</a></h3> </th> </tr> <tr> <th><a href="/source/templates/classic/README.md">📗 Classic template</a></th> <th><a href="/source/templates/repository/README.md">📘 Repository template</a></th> </tr> <tr> <td align="center"> <img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.classic.svg" alt=""></img> <img width="900" height="1" alt=""> </td> <td align="center"> <img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.repository.svg" alt=""></img> <img width="900" height="1" alt=""> </td> </tr> <tr> <th><a href="/source/templates/terminal/README.md">📙 Terminal template</a></th> <th><a href="/source/templates/markdown/README.md">📒 Markdown template</a></th> </tr> <tr> <td align="center"> <img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.terminal.svg" alt=""></img> <img width="900" height="1" alt=""> </td> <td align="center"> <img alt="" width="400" src="https://github.com/lowlighter/metrics/blob/examples/metrics.markdown.png" alt=""></img> <img width="900" height="1" alt=""> </td> </tr> <tr> <th colspan="2"><a href="/source/templates/community/README.md">📕 See also community templates</a></th> </tr> <tr> <th colspan="2"><h2>🦑 Try it now!</h2></th> </tr> <tr> <th><a href="https://metrics.lecoq.io/embed">📊 Metrics embed</a></th> <th><a href="https://metrics.lecoq.io/insights">✨ Metrics insights</a></th> </tr> <tr> <td align="center"> Embed metrics images on your profile or blog!<br> Use <a href="https://github.com/marketplace/actions/metrics-embed">GitHub actions</a> for even more features!<br> <img src="/.github/readme/imgs/features_embed.gif" width="360"> </td> <td align="center"> Share your metrics with friends and on social medias!<br> No configuration needed!<br> <img src="/.github/readme/imgs/features_insights.gif" width="360"> </td> </tr> <tr> <td align="center" colspan="2"> Test latest features and patches on <code><a href="https://beta-metrics.lecoq.io">🧪 Metrics beta</a></code>! </td> </tr> <tr> <td align="center" colspan="2"> <b>Power user?</b><br> <a href="https://github.com/lowlighter/metrics/fork">Fork this repository</a> and edit HTML, CSS, JS and <a href="https://github.com/mde/ejs">EJS</a> for even more customization! </td> </tr> </table> # 📚 Documentation > <sup>*⚠️ This is the documentation of **v3.33-beta** (`@master`/`@main` branches) which includes [unreleased features](https://github.com/lowlighter/metrics/compare/latest...master) planned for next release. See documentation for current released version [**v3.32** (`@latest` branch) here](https://github.com/lowlighter/metrics/blob/latest/README.md).* </sup> ## 🦮 Setup There are several ways to setup metrics, each having its advantages and disadvantages: * [⚙️ Using GitHub Action on a profile repository *(~10 min)*](/.github/readme/partials/documentation/setup/action.md) * ✔️ All features * ✔️ High availability (no downtimes) * ➖ Configuration can be a bit time-consuming * [💕 Using the shared instance *(~1 min)*](/.github/readme/partials/documentation/setup/shared.md) * ✔️ Easily configurable and previewable * ➖ Limited features *(compute-intensive features are disabled)* * [🏗️ Deploying a web instance *(~20 min)*](/.github/readme/partials/documentation/setup/web.md) * ✔️ Create another shared instance * ➖ Requires some sysadmin knowledge * [🐳 Using command line with docker *(~2 min)*](/.github/readme/partials/documentation/setup/docker.md) * ✔️ Suited for one-time rendering * [🔧 Local setup for development *(~20 min)*](/.github/readme/partials/documentation/setup/local.md) Additional resources for setup: * [🏦 Configure metrics for organizations](/.github/readme/partials/documentation/organizations.md) * [🏠 Run metrics on self-hosted runners](/.github/readme/partials/documentation/selfhosted.md) * [🧰 Template/Plugin compatibility matrix](/.github/readme/partials/documentation/compatibility.md) ## 🖼️ Templates Templates lets you change general appearance of rendered metrics. * [📗 Classic template <sub>`classic`</sub>](/source/templates/classic/README.md) * [📘 Repository template <sub>`repository`</sub>](/source/templates/repository/README.md) * [📙 Terminal template <sub>`terminal`</sub>](/source/templates/terminal/README.md) * [📒 Markdown template <sub>`markdown`</sub>](/source/templates/markdown/README.md) * [📕 Community templates <sub>`community`</sub>](/source/templates/community/README.md) ## 🧩 Plugins Plugins provide additional content and lets you customize rendered metrics. **📦 Maintained by core team** * **Core plugins** * [🗃️ Base content <sub>`base`</sub>](/source/plugins/base/README.md) * [🧱 Core <sub>`core`</sub>](/source/plugins/core/README.md) * **GitHub plugins** * [🏆 Achievements <sub>`achievements`</sub>](/source/plugins/achievements/README.md) * [📰 Recent activity <sub>`activity`</sub>](/source/plugins/activity/README.md) * [📆 Commit calendar <sub>`calendar`</sub>](/source/plugins/calendar/README.md) * [♐ Random code snippet <sub>`code`</sub>](/source/plugins/code/README.md) * [🏅 Repository contributors <sub>`contributors`</sub>](/source/plugins/contributors/README.md) * [💬 Discussions <sub>`discussions`</sub>](/source/plugins/discussions/README.md) * [🎟️ Follow-up of issues and pull requests <sub>`followup`</sub>](/source/plugins/followup/README.md) * [🎫 Gists <sub>`gists`</sub>](/source/plugins/gists/README.md) * [💡 Coding habits and activity <sub>`habits`</sub>](/source/plugins/habits/README.md) * [🙋 Introduction <sub>`introduction`</sub>](/source/plugins/introduction/README.md) * [📅 Isometric commit calendar <sub>`isocalendar`</sub>](/source/plugins/isocalendar/README.md) * [🈷️ Languages activity <sub>`languages`</sub>](/source/plugins/languages/README.md) * [📜 Repository licenses <sub>`licenses`</sub>](/source/plugins/licenses/README.md) * [👨‍💻 Lines of code changed <sub>`lines`</sub>](/source/plugins/lines/README.md) * [🎩 Notable contributions <sub>`notable`</sub>](/source/plugins/notable/README.md) * [🧑‍🤝‍🧑 People <sub>`people`</sub>](/source/plugins/people/README.md) * [🗂️ GitHub projects <sub>`projects`</sub>](/source/plugins/projects/README.md) * [🎭 Comment reactions <sub>`reactions`</sub>](/source/plugins/reactions/README.md) * [📓 Featured repositories <sub>`repositories`</sub>](/source/plugins/repositories/README.md) * [🌇 GitHub Skyline <sub>`skyline`</sub>](/source/plugins/skyline/README.md) * [💕 GitHub Sponsors <sub>`sponsors`</sub>](/source/plugins/sponsors/README.md) * [💝 GitHub Sponsorships <sub>`sponsorships`</sub>](/source/plugins/sponsorships/README.md) * [✨ Stargazers <sub>`stargazers`</sub>](/source/plugins/stargazers/README.md) * [💫 Star lists <sub>`starlists`</sub>](/source/plugins/starlists/README.md) * [🌟 Recently starred repositories <sub>`stars`</sub>](/source/plugins/stars/README.md) * [💭 GitHub Community Support <sub>`support`</sub>](/source/plugins/support/README.md) <sub>`⚠️ deprecated`</sub> * [📌 Starred topics <sub>`topics`</sub>](/source/plugins/topics/README.md) * [🧮 Repositories traffic <sub>`traffic`</sub>](/source/plugins/traffic/README.md) * **Social plugins** * [🌸 Anilist watch list and reading list <sub>`anilist`</sub>](/source/plugins/anilist/README.md) * [🗳️ Leetcode <sub>`leetcode`</sub>](/source/plugins/leetcode/README.md) * [🎼 Music activity and suggestions <sub>`music`</sub>](/source/plugins/music/README.md) * [⏱️ Google PageSpeed <sub>`pagespeed`</sub>](/source/plugins/pagespeed/README.md) * [✒️ Recent posts <sub>`posts`</sub>](/source/plugins/posts/README.md) * [🗼 Rss feed <sub>`rss`</sub>](/source/plugins/rss/README.md) * [🗨️ Stack Overflow <sub>`stackoverflow`</sub>](/source/plugins/stackoverflow/README.md) * [🐤 Latest tweets <sub>`tweets`</sub>](/source/plugins/tweets/README.md) * [⏰ WakaTime <sub>`wakatime`</sub>](/source/plugins/wakatime/README.md) **🎲 Maintained by community** * **[Community plugins](/source/plugins/community/README.md)** * [♟️ Chess <sub>`chess`</sub>](/source/plugins/community/chess/README.md) by [@lowlighter](https://github.com/lowlighter) * [🥠 Fortune <sub>`fortune`</sub>](/source/plugins/community/fortune/README.md) by [@lowlighter](https://github.com/lowlighter) * [💉 Nightscout <sub>`nightscout`</sub>](/source/plugins/community/nightscout/README.md) by [@legoandmars](https://github.com/legoandmars) * [💩 PoopMap plugin <sub>`poopmap`</sub>](/source/plugins/community/poopmap/README.md) by [@matievisthekat](https://github.com/matievisthekat) * [📸 Website screenshot <sub>`screenshot`</sub>](/source/plugins/community/screenshot/README.md) by [@lowlighter](https://github.com/lowlighter) * [🦑 Splatoon <sub>`splatoon`</sub>](/source/plugins/community/splatoon/README.md) by [@lowlighter](https://github.com/lowlighter) * [💹 Stock prices <sub>`stock`</sub>](/source/plugins/community/stock/README.md) by [@lowlighter](https://github.com/lowlighter) ## 💪 Contributing If you are interested in contributing, the following resources may interest you: * [💪 Contribution guide](/CONTRIBUTING.md) * [🧬 Architecture](/ARCHITECTURE.md) * [📜 License](/LICENSE) * **:octocat: GitHub resources** * [📖 GitHub GraphQL API](https://docs.github.com/en/graphql) * [📖 GitHub GraphQL Explorer](https://docs.github.com/en/free-pro-team@latest/graphql/overview/explorer) * [📖 GitHub Rest API](https://docs.github.com/en/rest) * [📖 GitHub Octicons](https://github.com/primer/octicons) Use [`💬 discussions`](https://github.com/lowlighter/metrics/discussions) for feedback, new features suggestions, bugs reports or to request help for installation. ## 📜 License ``` MIT License Copyright (c) 2020-present lowlighter ``` ![Sponsors](https://github.com/lowlighter/metrics/blob/examples/metrics.sponsors.svg)
544
This repository helps you to have a more beautiful and attractive github profile, and you can access a complete set of tools and guides for beautifying your github profile. 🪄 ⭐
null
545
Practical Ethical Hacking Labs 🗡🛡
# <p align="center">Ethical Hacking Labs </p> ![h](https://gist.githubusercontent.com/Samsar4/62886aac358c3d484a0ec17e8eb11266/raw/89f706846f97cd3e59880dbc03e4f1d5f8023783/header-ehl.jpg) This is a collection of tutorials and labs made for ethical hacking students, cybersecurity students, network and sys-admins. These tutorials accompany the resources of CEH content and different resources across the internet. ⌨️ The tutorials is very practical/hands-on. Don't worry if you are a completely noob, you don't need to be an expert to start learn ethical hacking. **Google is always your best friend.** This repo will guide you very carefully from basics to more advanced techniques. **✅ Prerequisites**: * Any computer with at least 8GB RAM (16GB recommended) * At least 80GB of free disk space available * Hardware-based virtualization support * * * > **⚠️ Disclaimer**: *This is purely for educational purposes only. DO NOT try these techniques with any public network. Because if you are find guilty for causing any harm to any individual, government, corporate body, non-profit etc you will be sued with serious charges of cyber crime. I recommend you to practice the lessons in this course on your owned system and your own data in a private or local network.* * * * ## ⚙️ Core Knowledge First things first, you really need to understand how things work before start to disassembly and look for vulnerable components. The more you understand how things works, a better hacker you'll be. The 'Core Knowledge' (module 0) is just a jumpstart to these topics. **Core Knowledge provides a jumpstart to networking, linux systems, virtualization, lab building, scripting and also information security topics. If you are familiar on these topics you can skip it straight to Ethical Hacking module.** * [Networking 101](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/0-Core-Knowledge/0-Networking-101.md) * [Lab Building / Virtualization](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/0-Core-Knowledge/1-Lab-Building.md) * [Introduction to Linux](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/0-Core-Knowledge/2-Intro-to-Linux.md) * [Scripting] * [Information Security 101](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/0-Core-Knowledge/4-Infosec-101.md) ## ⚔️ Ethical Hacking 1. **Footprinting and Reconnaissance** * [Introduction](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/1-Footprinting-and-Reconnaissance/0-What-is-Footprinting.md) * [Windows command line](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/1-Footprinting-and-Reconnaissance/1-Windows-CommandLine.md) * [Maltego basics](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/1-Footprinting-and-Reconnaissance/2-Maltego-Basics.md) * [Recon-ng](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/1-Footprinting-and-Reconnaissance/3-Recon-ng.md) * [OSRFramework](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/1-Footprinting-and-Reconnaissance/4-OSRFramework.md) * [Metasploit](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/1-Footprinting-and-Reconnaissance/5-Metasploit-Basics.md) * [theHarvester](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/1-Footprinting-and-Reconnaissance/6-theHarvester.md) * [Another tools for Recon](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/1-Footprinting-and-Reconnaissance/7-Other-Tools.md) 2. **Scanning Networks** * [Introduction](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/2-Scanning-Networks/0-Scanning-a-Target-Network.md) * [hping3](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/2-Scanning-Networks/1-hping3.md) * [Detect OS's by TTL using Wireshark](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/2-Scanning-Networks/2-TTL.md) * [Mega Ping](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/2-Scanning-Networks/3-MegaPing.md) * [Nmap Basics](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/2-Scanning-Networks/4-Nmap.md) * [Avoid Detection with Nmap](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/2-Scanning-Networks/5-NmapDecoyIP.md) * [More Windows GUI Tools](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/2-Scanning-Networks/6-WindowsTools.md) 3. **Enumeration** * [Introduction](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/3-Enumeration/0-Introduction.md) * [Enumeration with Nmap](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/3-Enumeration/1-Enumerating-with-Nmap.md) * [SNMP Enumeration](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/3-Enumeration/2-SNMP-Enumeration.md) * [Enum4Linux](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/3-Enumeration/3-Enum4linux-Win-and-Samba-Enumeration.md) * [More Windows GUI Tools](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/3-Enumeration/4-Windows-EnumerationTools.md) 4. **Vulnerability Analysis** * [Overview and Tools](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/4-Vulnerability-Analysis/Overview-and-Tools.md) 5. **System Hacking** * [Introduction](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/5-System-Hacking/0-Introduction.md) * [LLMNR / NBT-NS Spoofing](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/5-System-Hacking/1-LLMNR-NBT-NS.md) * [Dumping and Cracking SAM hashes](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/5-System-Hacking/2-SAM-Hashes.md) * [Rainbow Tables](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/5-System-Hacking/3-Rainbow-tables.md) * [Establishing a VNC Session](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/5-System-Hacking/4-VNC-Session.md) * [Escalating Privileges](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/5-System-Hacking/5-Escalating-Privileges.md) * [Hacking Windows with MS Word file](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/5-System-Hacking/6-Hacking-Windows-with-Doc-file.md) * [Hacking Windows with Msf/Meterpreter - Post Exploitation](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/5-System-Hacking/7-Hacking-Windows-with-Metasploit-PostExploitation.md) * [Hiding Data - NTFS streams](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/5-System-Hacking/8-NTFS-Streams.md) * [Hiding Data - Steganography](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/5-System-Hacking/9-Steganography.md) * [Using Covert_TCP](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/5-System-Hacking/10-Covert_TCP.md) * [Auditpol basics](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/5-System-Hacking/11-Auditpol.md) * [More Windows GUI Tools](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/5-System-Hacking/12-WindowsTools.md) 6. **Malware** * [Introduction](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/6-Malware/0-Introduction.md) * [njRAT](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/6-Malware/1-Using-njRAT.md) * [HTTP RAT Trojan](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/6-Malware/2-HTTP-Trojan.md) * [Obfuscating a Trojan using SwayzCryptor](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/6-Malware/3-Obfuscating-Trojan-SwayzCryptor.md) * [Malware Analysis Lab](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/6-Malware/4-Malware-Analysis-Lab.md) * [Windows Tools](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/6-Malware/5-Windows-Tools.md) 7. **Sniffing** * [Introduction](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/7-Sniffing/0-Introduction.md) * [MITM using BetterCAP](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/7-Sniffing/1-MITM-with-Bettercap.md) * [MAC Address Spoofing](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/7-Sniffing/2-Spoofing-MAC-address.md) * [Windows Tools](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/7-Sniffing/x-Windows-Tools.md) 8. **Social Engineering** * [Introduction](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/8-Social-Engineering/0-Introduction.md) * [Using SET](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/8-Social-Engineering/1-Using-SET.md) * [Tools](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/8-Social-Engineering/X-Tools.md) 9. **Denial-of-Service** * [Introduction](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/9-Denial-of-Service/0-Introduction.md) * [SYN Flooding](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/9-Denial-of-Service/1-SYN-Flooding.md) * [DDoS using HOIC](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/9-Denial-of-Service/2-DDoS-using-HOIC.md) * [Detecting DoS Traffic](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/9-Denial-of-Service/3-Detecting-DoS-Traffic.md) 10. **Session Hijacking** * [Introduction](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/10-Session-Hijacking/0-Introduction.md) * [Using ZAP - Zed Attack Proxy](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/10-Session-Hijacking/1-Using-ZAP.md) * [Intercepting HTTP Traffic](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/10-Session-Hijacking/2-Intercepting-HTTP-Traffic.md) 11. **Bonus - 🔬 The Forensic Approach** * [TCPDump](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/11-Bonus/TCPDump-Tutorial.md) * [Dissecting Packets](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/11-Bonus/Dissecting-packets.md) * [ExifTool](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/11-Bonus/ExifTool-Tutorial.md) * [hdparm & dd command](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/11-Bonus/Using-hdparm-and-dd-command.md) * [Recovering a Deleted Partition](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/11-Bonus/Recovering-Deleted-Partition.md) * [Recovering Deleted Files](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/11-Bonus/Recovering-Deleted-Files.md) * * * **💭 To Do**: - ![](https://img.shields.io/badge/status-in%20progress-orange) - Add Foundational level modules (~~networking~~, ~~virtualization~~, crypto, linux kernel and scripting). - Bonus modules to add: - ~~Introduction to Infosec terms and methodologies (from [CEH Study Guide](https://github.com/Samsar4/CEH-v10-Study-Guide))~~ - More Reconnaissance techniques. - Active Directory: Lab build and attack vectors. - Web application: Enumeration and exploitation using some OWASP Top 10 vulnerabilities and Bug Bounty techniques. - Wireless hacking (WPA)
546
A Curated list of IoT Security Resources
![](https://github.com/V33RU/IoTSecurity101/blob/master/logo.png) ![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg) - A Collection for IoT Security Resources - You are welcome to fork and [contribute](https://github.com/V33RU/IoTSecurity101/blob/master/contributors.md#contributors) - Other Interesting Areas - [ICS-Security](https://github.com/V33RU/IoTSecurity101/blob/master/ICS/Industrial%20Control%20Systems.md) - [Automotive-Security](https://github.com/V33RU/IoTSecurity101/blob/master/Automotive-Security.md) ******************************************************************************************************************************** #### Approach Methodology - ***1. Network*** - ***2. Web (Front & Backend and Web services)*** - ***3. Mobile App (Android & iOS)*** - ***4. Wireless Connectivity (Zigbee , WiFi , Bluetooth , etc)*** - ***5. Firmware Pentesting (OS of IoT Devices)*** - ***6. Hardware Hacking & Fault Injections & SCA Attacks*** - ***7. Storage Medium*** - ***8. I/O Ports*** ## Contents - IoT Security information - [IoT Security Chat groups](#Chat-groups-for-IoT-Security) - [Books](#Books-For-IoT-Pentesting) - [Blogs](#Blogs-for-iotpentest) - [Cheatsheets](#Awesome-CheatSheets) - [Search Engines](#search-engines-for-exposed-iot-devices-worldwide) - [CTF](#CTF-For-IoT-And-Embeddded) - [Youtube](#YouTube-Channels-for-IoT-Pentesting) - [Exploitation Tools](#Exploitation-Tools) - [IoT Pentesting OSes](#IoT-Pentesting-OSes) - [IoT Vulnerabilites Checking Guides](#IoT-Vulnerabilites-Checking-Guides) - [IoT Labs](#Vulnerable-IoT-and-Hardware-Applications) - [Awesome IoT Pentesting Guides](#Awesome-IoT-Pentesting-Guides) - [Fuzzing Things](#Fuzzing-Things) - [IoT Lab Setup guide for corporate/individual](https://github.com/IoT-PTv/IoT-Lab-Setup) - Network - Web IoT Message Protocols - [MQTT](#MQTT) - [CoAP](#CoAP) - Mobile app - [Mobile security (Android & iOS)](#mobile-security-android--ios) - Wireless Protocols - [RADIO HACKING STARTING GUIDE](#RADIO-HACKER-QUICK-START-GUIDE) - [Cellular Hacking GSM BTS](#cellular-hacking-gsm-bts) - [Zigbee](#Zigbee-ALL-Stuff) - [Bluetooth](#BLE-Intro-and-SW-HW-Tools-to-pentest) - Firmware - [Reverse Engineering Tools](#Reverse-Engineering-Tools) - [Online Assemblers](#Online-Assemblers) - [ARM](#ARM) - [Pentesting Firmwares and emulating and analyzing](#Pentesting-Firmwares-and-emulating-and-analyzing) - [Firmware samples to pentest](#Firmware-samples-to-pentest) - [Secureboot](#Secureboot) - Hardware - [IoT Hardware Intro](#IoT-hardware-Overview-and-Hacking) - [IoT Hardware hacking Intro] - [Required hardware to pentest IoT](#Hardware-Gadgets-to-pentest) - [Hardware interfaces](#Attacking-Hardware-Interfaces) - [SPI](#SPI) - [UART](#UART) - [JTAG](#JTAG) - [SideChannel Attacks & Glitching attacks](#sidechannel-attacks) - [Glitching Attacks](#glitching-attacks) - Storage Medium - [EMMC Hacking](#emmc-hacking) ******************************************************************************************************************************** ### To seen Hacked devices - https://blog.exploitee.rs/2018/10/ - https://www.exploitee.rs/ - https://forum.exploitee.rs/ - [Your Lenovo Watch X Is Watching You & Sharing What It Learns](https://www.checkmarx.com/blog/lenovo-watch-watching-you/) - [Your Smart Scale is Leaking More than Your Weight: Privacy Issues in IoT](https://www.checkmarx.com/blog/smart-scale-privacy-issues-iot/) - [Smart Bulb Offers Light, Color, Music, and… Data Exfiltration?](https://www.checkmarx.com/blog/smart-bulb-exfiltration/) - [Besder-IPCamera analysis](http://blog.0x42424242.in/2019/04/besder-investigative-journey-part-1_24.html) - [Smart Lock](https://blog.rapid7.com/2019/08/01/r7-2019-18-multiple-hickory-smart-lock-vulnerabilities/) - [Subaru Head Unit Jailbreak](https://github.com/sgayou/subaru-starlink-research/blob/master/doc/README.md) - [Jeep Hack](http://illmatics.com/Remote%20Car%20Hacking.pdf) - [Dropcam hacking](https://www.defcon.org/images/defcon-22/dc-22-presentations/Moore-Wardle/DEFCON-22-Colby-Moore-Patrick-Wardle-Synack-DropCam-Updated.pdf) - [Printer Hacking live sessions - gamozolabs](https://www.youtube.com/playlist?list=PLSkhUfcCXvqHS4Bqz804OAZqND6bk7OG6) - [LED Light Hacking](https://youtu.be/Nnb2ct3hc68) ******************************************************************************************************************************** - [IoT-Vuln-with CVE and PoC of tenda and dlink](https://github.com/z1r00/IOT_Vul) ******************************************************************************************************************************** ### Chat groups for IoT Security - IoTSecurity101 Telegram - <https://t.me/iotsecurity1011> - IoTSecurity101 Reddit - <https://www.reddit.com/r/IoTSecurity101/> - IoTSecurity101 Discord - <https://discord.gg/EH9dxT9> - hardware hacking Telegram - <https://t.me/hardwareHackingBrasil> - RFID Discord group - <https://discord.gg/Z43TrcVyPr> - ICS Discord group - <https://discord.com/invite/CmDDsFK> ******************************************************************************************************************************** ### Books For IoT Pentesting - [The Firmware Handbook (Embedded Technology) 1st Edition by Jack Ganssle ](https://www.amazon.com/Firmware-Handbook-Embedded-Technology/dp/075067606X) - 2004 - [Hardware Hacking: Have Fun while Voiding your Warranty 1st Edition ](https://www.elsevier.com/books/hardware-hacking/grand/978-1-932266-83-2) - 2004 - [Linksys WRT54G Ultimate Hacking 1st Edition by Paul Asadoorian](https://www.amazon.com/Linksys-WRT54G-Ultimate-Hacking-Asadoorian/dp/1597491667) - 2007 - [Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure by Eric D. Knapp , Raj Samani](https://www.amazon.com/Applied-Cyber-Security-Smart-Grid/dp/1597499986/) -2013 - [Hacking the Xbox-An Introduction to Reverse Engineering HACKING THE XBOX by Andrew “bunnie” Huang](https://www.nostarch.com/xboxfree) - Openbook - 2013 - [Android Hacker's Handbook by Joshua J. Drake](https://www.amazon.in/Android-Hackers-Handbook-MISL-WILEY-Joshua/dp/812654922X) - 2014 - [The Art of Pcb Reverse Engineering: Unravelling the Beauty of the Original Design ](https://www.amazon.in/Art-Pcb-Reverse-Engineering-Unravelling/dp/1499323441) - 2015 - [Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts 1st Edition, by Nitesh Dhanjani](https://www.amazon.in/Abusing-Internet-Things-Blackouts-Freakouts-ebook/dp/B013VQ7N36) - 2015 - [Learning Linux Binary Analysis By Ryan "elfmaster" O'Neill](https://www.packtpub.com/networking-and-servers/learning-linux-binary-analysis) - 2016 - [Car hacker's handbook by Craig Smith](http://opengarages.org/handbook) - 2016 - [IoT Penetration Testing Cookbook By Aaron Guzman , Aditya Gupta](https://www.packtpub.com/networking-and-servers/iot-penetration-testing-cookbook) - 2017 - [Inside Radio: An Attack and Defense Guide by Authors: Yang, Qing, Huang, Lin](https://books.google.co.in/books?id=71NSDwAAQBAJ&printsec=copyright&redir_esc=y#v=onepage&q&f=false) -2018 - [Pentest Hardware](https://github.com/unprovable/PentestHardware/) - Openbook -2018 - [Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition 5th Edition by by Daniel Regalado , Shon Harris , Allen Harper , Chris Eagle , Jonathan Ness , Branko Spasojevic , Ryan Linn , Stephen Sims](https://www.amazon.in/Gray-Hat-Hacking-Ethical-Handbook-ebook/dp/B07D3J9J4H) - 2018 - [Practical Hardware Pentesting](https://www.packtpub.com/product/practical-hardware-pentesting/9781789619133?_ga=2.224205017.333884789.1668314814-101815837.1668314814) - 2021 - [The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks Front Cover Jasper van Woudenberg, Colin O'Flynn](https://books.google.co.in/books?id=DEqatAEACAAJ&source=gbs_navlinks_s) - 2021 - [Practical IoT Hacking-The Definitive Guide to Attacking the Internet of Things by Fotios Chantzis, Ioannis Stais, Paulino Calderon, Evangelos Deirmentzoglou, Beau Woods](https://nostarch.com/practical-iot-hacking) - 2021 - [Internet of Things Security Encyclopedia](https://iot-security.wiki/) - Openbook - [PatrIoT: practical and agile threat research for IoT by Emre Süren](https://link.springer.com/article/10.1007/s10207-022-00633-3) - 2022 - [Practical Hardware Pentesting - Second Edition](https://www.packtpub.com/product/practical-hardware-pentesting-second-edition/9781803249322) - 2023 ******************************************************************************************************************************** ### Blogs for iotpentest - https://payatu.com/blog/ - https://raelize.com/blog/ - http://jcjc-dev.com/ - https://w00tsec.blogspot.in/ - http://www.devttys0.com/ - https://wrongbaud.github.io/ - https://embeddedbits.org/ - https://www.rtl-sdr.com/ - https://keenlab.tencent.com/en/ - https://courk.cc/ - https://iotsecuritywiki.com/ - https://cybergibbons.com/ - http://firmware.re/ - http://blog.k3170makan.com/ - https://blog.tclaverie.eu/ - http://blog.besimaltinok.com/category/iot-pentest/ - https://ctrlu.net/ - http://iotpentest.com/ - https://blog.attify.com - https://duo.com/decipher/ - http://www.sp3ctr3.me - http://blog.0x42424242.in/ - https://dantheiotman.com/ - https://blog.danman.eu/ - https://quentinkaiser.be/ - https://blog.quarkslab.com - https://blog.ice9.us/ - https://labs.f-secure.com/ - https://mg.lol/blog/ - https://cjhackerz.net/ - https://github.com/sponsors/bunnie/ - https://iotmyway.wordpress.com/ - https://www.synacktiv.com/publications.html - http://blog.cr4.sh/ - https://ktln2.org/ - https://naehrdine.blogspot.com/ - https://limitedresults.com/ - https://fail0verflow.com/blog/ ******************************************************************************************************************************** ### Awesome CheatSheets - [Hardware Hacking](https://github.com/arunmagesh/hw_hacking_cheatsheet) - [Nmap](https://github.com/gnebbia/nmap_tutorial) ******************************************************************************************************************************** ### Search Engines for Exposed IoT devices worldwide - [Shodan](https://www.shodan.io/) - [FOFA](https://fofa.so/?locale=en) - [Censys](https://censys.io/) - [Zoomeye](https://www.zoomeye.org/about) - [ONYPHE](https://www.onyphe.io/) ******************************************************************************************************************************** ### CTF For IoT And Embeddded - https://github.com/hackgnar/ble_ctf - https://www.microcorruption.com/ - https://github.com/Riscure/Rhme-2016 - https://github.com/Riscure/Rhme-2017 - https://blog.exploitlab.net/2018/01/dvar-damn-vulnerable-arm-router.html - https://github.com/scriptingxss/IoTGoat ******************************************************************************************************************************** ### YouTube Channels for IoT Pentesting - [Joe Grand](https://www.youtube.com/@JoeGrand) - [Liveoverflow](https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w) - [Binary Adventure](https://www.youtube.com/channel/UCSLlgiYtOXZnYPba_W4bHqQ) - [EEVBlog](https://www.youtube.com/user/EEVblog) - [Craig Smith](https://www.youtube.com/channel/UCxC8G4Oeed4N0-GVeDdFoSA) - [iotpentest [Mr-IoT]](https://www.youtube.com/channel/UCe2mJv2FPRFhYJ7dvNdYR4Q) - [Besim ALTINOK - IoT - Hardware - Wireless](https://www.youtube.com/channel/UCnIV7A3kDL4JXJEljpW6TRQ/playlists) - [Ghidra Ninja](https://www.youtube.com/channel/UC3S8vxwRfqLBdIhgRlDRVzw) - [Cyber Gibbons](https://www.youtube.com/channel/UC_IYERSoSwdR7AA5P41mYTA) - [Scanline](https://www.youtube.com/channel/UCaEgw3321ct_PE4PJvdhXEQ) - [Aaron Christophel](https://www.youtube.com/c/12002230/videos) - [Valerio Di Giampietro](https://www.youtube.com/c/MakeMeHack) ******************************************************************************************************************************** ### Vehicle Security Resources - https://github.com/jaredthecoder/awesome-vehicle-security ******************************************************************************************************************************** ### IoT Vulnerabilites Checking Guides - [Reflecting upon OWASP TOP-10 IoT Vulnerabilities](https://embedi.org/blog/reflecting-upon-owasp-top-10-iot-vulnerabilities/) - [OWASP IoT Top 10 2018 Mapping Project](https://scriptingxss.gitbook.io/owasp-iot-top-10-mapping-project/) - [Hardware toolkits for IoT security analysis](https://defcon-nn.ru/0x0B/Hardware%20toolkits%20for%20IoT%20security%20analysis.pdf) ******************************************************************************************************************************** ### IoT Gateway Software - [Webthings by Mozilla - RaspberryPi](https://iot.mozilla.org/docs/gateway-getting-started-guide.html) ******************************************************************************************************************************** ### IoT Pentesting OSes - [Sigint OS- LTE IMSI Catcher](https://www.sigintos.com/downloads/) - [Instatn-gnuradio OS - For Radio Signals Testing](https://github.com/bastibl/instant-gnuradio) - [AttifyOS - IoT Pentest OS - by Aditya Gupta](https://github.com/adi0x90/attifyos) - [Ubutnu Best Host Linux for IoT's - Use LTS](https://www.ubuntu.com/) - [Internet of Things - Penetration Testing OS v1](https://github.com/IoT-PTv) - [Dragon OS - DEBIAN LINUX WITH PREINSTALLED OPEN SOURCE SDR SOFTWARE](https://www.rtl-sdr.com/dragonos-debian-linux-with-preinstalled-open-source-sdr-software/) - [EmbedOS - Embedded security testing virtual machine](https://github.com/scriptingxss/EmbedOS) - [Skywave Linux- Software Defined Radio for Global Online Listening](https://skywavelinux.com/) - [A Small, Scalable Open Source RTOS for IoT Embedded Devices](https://www.zephyrproject.org/) - [ICS - Controlthings.io](https://www.controlthings.io/platform) ******************************************************************************************************************************** ### Exploitation Tools - [Expliot - IoT Exploitation framework - by Aseemjakhar](https://gitlab.com/expliot_framework/expliot) - [Routersploit (Exploitation Framework for Embedded Devices)](https://github.com/threat9/routersploit) - [IoTSecFuzz (comprehensive testing for IoT device)](https://gitlab.com/invuls/iot-projects/iotsecfuzz) - [HomePwn - Swiss Army Knife for Pentesting of IoT Devices](https://github.com/ElevenPaths/HomePWN) - [killerbee - Zigbee exploitation](https://github.com/riverloopsec/killerbee) - [PRET - Printer Exploitation Toolkit](https://github.com/RUB-NDS/PRET) - [HAL – The Hardware Analyzer](https://github.com/emsec/hal) - [FwAnalyzer (Firmware Analyzer)](https://github.com/cruise-automation/fwanalyzer) - [ISF(Industrial Security Exploitation Framework](https://github.com/w3h/isf) - [PENIOT: Penetration Testing Tool for IoT](https://github.com/yakuza8/peniot) - [MQTT-PWN](https://github.com/akamai-threat-research/mqtt-pwn) ******************************************************************************************************************************** ### Reverse Engineering Tools - [IDA Pro](https://www.youtube.com/watch?v=fgMl0Uqiey8) - [GDB](https://www.youtube.com/watch?v=fgMl0Uqiey8) - [Radare2](https://radare.gitbooks.io/radare2book/content/) | [cutter](https://cutter.re/) - [Ghidra](https://ghidra-sre.org/) ******************************************************************************************************************************** ## Introduction - [Introduction to IoT](https://en.wikipedia.org/wiki/Internet_of_things) - [IoT Architecture](https://www.c-sharpcorner.com/UploadFile/f88748/internet-of-things-part-2/) - [IoT attack surface](https://www.owasp.org/index.php/IoT_Attack_Surface_Areas) - [IoT Protocols Overview](https://www.postscapes.com/internet-of-things-protocols/) ******************************************************************************************************************************** ### IoT Web and message services #### MQTT - [Introduction](https://www.hivemq.com/blog/mqtt-essentials-part-1-introducing-mqtt) - [Hacking the IoT with MQTT](https://morphuslabs.com/hacking-the-iot-with-mqtt-8edaf0d07b9b) - [thoughts about using IoT MQTT for V2V and Connected Car from CES 2014](https://mobilebit.wordpress.com/tag/mqtt/) - [Nmap](https://nmap.org/nsedoc/lib/mqtt.html) - [The Seven Best MQTT Client Tools](https://www.hivemq.com/blog/seven-best-mqtt-client-tools) - [A Guide to MQTT by Hacking a Doorbell to send Push Notifications](https://youtu.be/J_BAXVSVPVI) - [Are smart homes vulnerable to hacking](https://blog.avast.com/mqtt-vulnerabilities-hacking-smart-homes) - [Deep Learning UDF for KSQL / ksqlDB for Streaming Anomaly Detection of MQTT IoT Sensor Data](https://github.com/kaiwaehner/ksql-udf-deep-learning-mqtt-iot) - [Authenticating & Authorizing Devices using MQTT with Auth0](https://auth0.com/docs/integrations/authenticate-devices-using-mqtt) - [Development information for the MQTT with hardware](https://www.hackster.io/search?i=projects&q=Mqtt) - [Understanding the MQTT Protocol Packet Structure](http://www.steves-internet-guide.com/mqtt-protocol-messages-overview/) - [R7-2019-18: Multiple Hickory Smart Lock Vulnerabilities](https://blog.rapid7.com/2019/08/01/r7-2019-18-multiple-hickory-smart-lock-vulnerabilities/) - [IoT Live Demo: 100.000 Connected Cars With Kubernetes, Kafka, MQTT, TensorFlow](https://dzone.com/articles/iot-live-demo-100000-connected-cars-with-kubernete) #### Softwares - [Mosquitto-An open source MQTT broker](https://mosquitto.org/) - [HiveMQ](https://www.hivemq.com/) - [MQTT Explorer](http://mqtt-explorer.com/) - [MQTT proxy - IoXY](https://blog.nviso.eu/2020/07/06/introducing-ioxy-an-open-source-mqtt-intercepting-proxy/) - [MQTT Broker Security - 101](https://payatu.com/blog/dattatray/iot-security-%E2%80%93-part-12-mqtt-broker-security---101) - [Welcome to MQTT-PWN!](https://mqtt-pwn.readthedocs.io/en/latest/) #### CoAP - [Introduction](http://coap.technology/) - [CoAP client Tools](http://coap.technology/tools.html) - [CoAP Pentest Tools](https://bitbucket.org/aseemjakhar/expliot_framework) - [Nmap - NSE for coap](https://nmap.org/nsedoc/lib/coap.html) ******************************************************************************************************************************** ### RADIO HACKER QUICK START GUIDE - [Complete course in Software Defined Radio (SDR) by Michael Ossmann](https://greatscottgadgets.com/sdr/) - [SDR Notes - Radio IoT Protocols Overview](https://github.com/notpike/SDR-Notes) - [Understanding Radio](https://www.taitradioacademy.com/lessons/introduction-to-radio-communications-principals/) - [Introduction to Software Defined Radio](https://www.allaboutcircuits.com/technical-articles/introduction-to-software-defined-radio/) - [Introduction Gnuradio companion](https://wiki.gnuradio.org/index.php/Guided_Tutorial_GRC#Tutorial:_GNU_Radio_Companion) - [Creating a flow graph in gunradiocompanion](https://blog.didierstevens.com/2017/09/19/quickpost-creating-a-simple-flow-graph-with-gnu-radio-companion/) - [Analysing radio signals 433Mhz ](https://www.rtl-sdr.com/analyzing-433-mhz-transmitters-rtl-sdr/) - [Recording specific radio signal](https://www.rtl-sdr.com/freqwatch-rtl-sdr-frequency-scanner-recorder/) - [Replay Attacks with raspberrypi -rpitx](https://www.rtl-sdr.com/tutorial-replay-attacks-with-an-rtl-sdr-raspberry-pi-and-rpitx/) ### Cellular Hacking GSM BTS #### BTS - [Awesome-Cellular-Hacking](https://github.com/W00t3k/Awesome-Cellular-Hacking/blob/master/README.md) - [what is base tranceiver station](https://en.wikipedia.org/wiki/Base_transceiver_station) - [How to Build Your Own Rogue GSM BTS](https://l33t.gg/how-to-build-a-rogue-gsm-bts/) #### GSM SS7 Pentesting - [Introduction to GSM Security](http://www.pentestingexperts.com/introduction-to-gsm-security/) - [GSM Security 2 ](https://www.ehacking.net/2011/02/gsm-security-2.html) - [vulnerabilities in GSM security with USRP B200](https://ieeexplore.ieee.org/document/7581461/) - [Security Testing 4G (LTE) Networks](https://labs.mwrinfosecurity.com/assets/BlogFiles/mwri-44con-lte-presentation-2012-09-11.pdf) - [Case Study of SS7/SIGTRAN Assessment](https://nullcon.net/website/archives/pdf/goa-2017/case-study-of-SS7-sigtran.pdf) - [Telecom Signaling Exploitation Framework - SS7, GTP, Diameter & SIP](https://github.com/SigPloiter/SigPloit) - [ss7MAPer – A SS7 pen testing toolkit](https://n0where.net/ss7-pentesting-toolkit-ss7maper) - [Introduction to SIGTRAN and SIGTRAN Licensing](https://www.youtube.com/watch?v=XUY6pyoRKsg) - [SS7 Network Architecture](https://youtu.be/pg47dDUL1T0) - [Introduction to SS7 Signaling](https://www.patton.com/whitepapers/Intro_to_SS7_Tutorial.pdf) - [Breaking LTE on Layer Two](https://alter-attack.net/) ******************************************************************************************************************************** ### Zigbee ALL Stuff - [Introduction and protocol Overview](http://www.informit.com/articles/article.aspx?p=1409785) - [Hacking Zigbee Devices with Attify Zigbee Framework](https://blog.attify.com/hack-iot-devices-zigbee-sniffing-exploitation/) - [Hands-on with RZUSBstick](https://uk.rs-online.com/web/p/radio-frequency-development-kits/6962415/) - [ZigBee & Z-Wave Security Brief](http://www.riverloopsecurity.com/blog/2018/05/zigbee-zwave-part1/) - [Hacking ZigBee Networks](https://resources.infosecinstitute.com/topic/hacking-zigbee-networks/) - [Zigator: Analyzing the Security of Zigbee-Enabled Smart Homes](https://mews.sv.cmu.edu/papers/wisec-20.pdf) - [Security Analysis of Zigbee Networks with Zigator and GNU Radio](https://mews.sv.cmu.edu/research/zigator/testbed-grcon2020-slides.pdf) - [Low-Cost ZigBee Selective Jamming](https://www.bastibl.net/reactive-zigbee-jamming/) #### SW TOOLS - [zigbear](https://github.com/philippnormann/zigbear) - [ZigDiggity](https://github.com/BishopFox/zigdiggity) - [Zigator](https://github.com/akestoridis/zigator) - [Z3sec](https://github.com/IoTsec/Z3sec) #### Hardware Tools for Zigbee - [APIMOTE IEEE 802.15.4/ZIGBEE SNIFFING HARDWARE](https://www.riverloopsecurity.com/projects/apimote/) - [RaspBee-The Raspberry Pi Zigbee gateway](https://phoscon.de/en/raspbee/) - [USRP SDR 2](https://www.ettus.com/products/) - [ATUSB IEEE 802.15.4 USB Adapter](http://shop.sysmocom.de/products/atusb) - [nRF52840-Dongle](https://www.nordicsemi.com/Software-and-tools/Development-Kits/nRF52840-Dongle) ******************************************************************************************************************************** ### BLE Intro and SW-HW Tools to pentest - [Step By Step guide to BLE Understanding and Exploiting](https://github.com/V33RU/BLE-NullBlr) - [Traffic Engineering in a Bluetooth Piconet](http://www.diva-portal.org/smash/get/diva2:833159/FULLTEXT01.pdf) - [BLE Characteristics](https://devzone.nordicsemi.com/nordic/short-range-guides/b/bluetooth-low-energy/posts/ble-characteristics-a-beginners-tutorial) #### Bluetooth and BLE Pentest Tools - [btproxy](https://github.com/conorpp/btproxy) - [hcitool & bluez](https://www.pcsuggest.com/linux-bluetooth-setup-hcitool-bluez) - [Testing With GATT Tool](https://www.jaredwolff.com/blog/get-started-with-bluetooth-low-energy/) - [Cracking encryption](https://github.com/mikeryan/crackle) - [bettercap](https://github.com/bettercap/bettercap) - [BtleJuice Bluetooth Smart Man-in-the-Middle framework](https://github.com/DigitalSecurity/btlejuice) - [gattacker](https://github.com/securing/gattacker) - [BTLEjack Bluetooth Low Energy Swiss army knife](https://github.com/virtualabs/btlejack) #### Hardware for bluetooth hacking - [NRFCONNECT - 52840](https://www.nordicsemi.com/Software-and-tools/Development-Kits/nRF52840-Dongle) - [EDIMAX](https://www.nordicsemi.com/Software-and-tools/Development-Kits/nRF52840-Dongle) - [CSR 4.0](https://www.amazon.in/GENERIC-Ultra-Mini-Bluetooth-Dongle-Adapter/dp/B0117H7GZ6/ref=asc_df_B0117H7GZ6/?tag=googleshopdes-21&linkCode=df0&hvadid=396984700257&hvpos=1o1&hvnetw=g&hvrand=2179727910417729406&hvpone=&hvptwo=&hvqmt=&hvdev=c&hvdvcmdl=&hvlocint=&hvlocphy=9061998&hvtargid=pla-343685677347&psc=1&ext_vrnc=hi) - [ESP32 - Development and learning Bluetooth](https://www.espressif.com/en/products/hardware/esp32/overview) - [Ubertooth](https://github.com/greatscottgadgets/ubertooth/wiki/Ubertooth-One) - [Sena 100](http://www.senanetworks.com/ud100-g03.html) - [ESP-WROVER-KIT-VB](https://www.digikey.in/en/products/detail/espressif-systems/ESP-WROVER-KIT-VB/8544301) #### BLE Pentesting Tutorials - [Bluetooth vs BLE Basics](https://github.com/V33RU/BLE-NullBlr) - [Finding bugs in Bluetooth](https://bluetooth.lol/) - [Intel Edison as Bluetooth LE — Exploit box](https://medium.com/@arunmag/intel-edison-as-bluetooth-le-exploit-box-a63e4cad6580) - [How I Reverse Engineered and Exploited a Smart Massager](https://medium.com/@arunmag/how-i-reverse-engineered-and-exploited-a-smart-massager-ee7c9f21bf33) - [My journey towards Reverse Engineering a Smart Band — Bluetooth-LE RE](https://medium.com/@arunmag/my-journey-towards-reverse-engineering-a-smart-band-bluetooth-le-re-d1dea00e4de2) - [Bluetooth Smartlocks](https://www.getkisi.com/blog/smart-locks-hacked-bluetooth-ble) - [I hacked MiBand 3](https://medium.com/@yogeshojha/i-hacked-xiaomi-miband-3-and-here-is-how-i-did-it-43d68c272391) - [GATTacking Bluetooth Smart Devices](https://securing.pl/en/gattacking-bluetooth-smart-devices-introducing-a-new-ble-proxy-tool/index.html) - [blueooth beacon vulnerability](https://www.beaconzone.co.uk/blog/category/security/) - [Sweyntooth Vulnerabilties](https://asset-group.github.io/disclosures/sweyntooth/) - [AIRDROP_LEAK - sniffs BLE traffic and displays status messages from Apple devices](https://github.com/hexway/apple_bleee) - [BRAKTOOTH: Causing Havoc on Bluetooth Link Manager](https://asset-group.github.io/disclosures/braktooth/) ******************************************************************************************************************************** ### Mobile security (Android & iOS) - [Android App Reverse Engineering 101](https://maddiestone.github.io/AndroidAppRE/) - [Android Application pentesting book](https://www.packtpub.com/hardware-and-creative/learning-pentesting-android-devices) - [Android Pentest Video Course-TutorialsPoint](https://www.youtube.com/watch?v=zHknRia3I6s&list=PLWPirh4EWFpESLreb04c4eZoCvJQJrC6H) - [IOS Pentesting](https://web.securityinnovation.com/hubfs/iOS%20Hacking%20Guide.pdf?) - [OWASP Mobile Security Testing Guide](https://owasp.org/www-project-mobile-security-testing-guide/) - [Android Tamer - Android Tamer is a Virtual / Live Platform for Android Security professionals](https://androidtamer.com/) ******************************************************************************************************************************* ### Online Assemblers - [AZM Online Arm Assembler by Azeria](https://azeria-labs.com/azm/) - [Online Disassembler](https://onlinedisassembler.com/odaweb/) - [Compiler Explorer is an interactive online compiler which shows the assembly output of compiled C++, Rust, Go](https://godbolt.org/) ******************************************************************************************************************************** ### ARM - [Azeria Labs](https://azeria-labs.com/) - [ARM EXPLOITATION FOR IoT](https://www.exploit-db.com/docs/english/43906-arm-exploitation-for-iot.pdf) - [Damn Vulnerable ARM Router (DVAR)](https://blog.exploitlab.net/2018/01/dvar-damn-vulnerable-arm-router.html) - [EXPLOIT.EDUCATION](https://exploit.education/) ******************************************************************************************************************************** ### Pentesting Firmwares and emulating and analyzing - [EMBA-An analyzer for embedded Linux firmware](https://p4cx.medium.com/emba-b370ce503602) - [Firmware analysis and reversing](https://www.owasp.org/index.php/IoT_Firmware_Analysis) - [IoT Security Verification Standard (ISVS)](https://github.com/OWASP/IoT-Security-Verification-Standard-ISVS) - [OWASP Firmware Security Testing Methodology](https://scriptingxss.gitbook.io/firmware-security-testing-methodology/) - [Firmware emulation with QEMU](https://www.youtube.com/watch?v=G0NNBloGIvs) - [Reversing ESP8266 Firmware](https://boredpentester.com/reversing-esp8266-firmware-part-1/) - [Emulating Embedded Linux Devices with QEMU](https://www.novetta.com/2018/02/emulating-embedded-linux-devices-with-qemu/?__cf_chl_captcha_tk__=2167fb6cf097848dbf0dea8e4ecccc66f2a55e55-1585030085-0-AVfO7wG_mHgvnIgeIl-aiKLNW1IMb5IMLyqLOSOLydnZFzhyAyySWgfKvjvllAtYtmpbJjnaTlwyaWiO2kHXH4APqLuott0R7UReYCTZ3u--g4AJBK4eONEL2bTJcAHg3fzmXhrC-3iAqccNQC4jx1RWEz60y_MKFq63NVeoE1pC0EBYWkk7VqDWusBFbgpj6zRNv0ifKLc3oLYJck-oG13jeSbPISVLMCn6bCHVLaTp2gW7qG6GRELIWgdyfP9viyMDSAww3u-R1NmUgRQzctXIYMWH1MdL5p8lqbSpCa160cW3JaZ16IxT7iP1HkCBurx7rCOVP3DAcI8zrc19V9mi-jU9nXIW0Xf9eIpqlUP-R_txfNw4vF10PwIGKmg0Cpl2IDuY1ty3J8koQkdvxfE) - [Emulating Embedded Linux Systems with QEMU](https://www.novetta.com/2018/02/emulating-embedded-linux-systems-with-qemu/?__cf_chl_captcha_tk__=9dd83a08cffb28fae75286f63f399c34eec56852-1585030087-0-AblGAUd4LCDVbghNgQyfL5hgPXNC8pUcLIAbPUpx2tBOb_L4gVVc1sZ7Ivg0g--06WpkdpeV-kylZu3T_Yqgr7GdFpc2cKzxATdc_bsEV7uu1ljIctFloHTW_B1vvjFAe3QXdex4kkn2D4HuQiw9WLszvO2Ff8SvvfEpHoBumOavj-c2iXcEb2dDFMoK3_HB_3-y7q_BEAX3xqDCjqz7TpcoIWt-wTSQwRfx-VuBfO87hrTsX43yzq6BNjCE9s15ZQmPp_NouYIHNMnx3augAfkwZBSUA0r43GbA--3jLmJsTe_qvcn7gMz_HAR-GpnA_Usn_cr94VqtyNpl0vEsC1OMf48oBMMoFQJA6Jjn1hGPv5hV4M4aBtJrTnFoRP2YGwxAyNTM3Df9qw1iyBB8r58) - [Fuzzing Embedded Linux Devices](https://www.novetta.com/2018/07/fuzzing-embedded-linux-devices/?__cf_chl_captcha_tk__=f07f3f76e61b43f9ae6340e94cf4adeaec87977e-1585030089-0-AYkRNbh1wpUia0P5wBgrRfhf92Uy6Pl2mEEBOXi2FUvxROOJ9obK4ZIS78Y4iCRrMdi3umwQrJEyF0u3EPwHPu3_22f5PwOvVDFC0QwFPyw7LkY5bLuansI_8uoEunuLIEQ1VPIZHFpht1vT0_rW4YrYGc8osJZpubAhXfyZe1G7U_ibpZj9tdrUE6SwgA_Ph0io4LRfbjuvpeM03NHuc1sTTqRVdkWiw47kmr9uSAK10ZmQEvE7zpbpkEJM2slchjdYq6hziM3L5l8vB-eEm_JVxsSHbGfdDM3kSfTw3oXlYkvxvLy_llSyyefuub4yOBrqNgzV1Gj_PDTmuRTMxobGo7vZaRdr2LgOXML58kpG6NTDLb3A4YzwVw9u32ErRh4Ab89vn90RsHlWnU928Oc) - [Emulating ARM Router Firmware](https://azeria-labs.com/emulating-arm-firmware/) - [Reversing Firmware With Radare](https://www.bored-nerds.com/reversing/radare/automotive/2019/07/07/reversing-firmware-with-radare.html) - [Samsung Firmware Magic - Unpacking and Decrypting](https://github.com/chrivers/samsung-firmware-magic) - [Qiling & Binary Emulation for automatic unpacking](https://kernemporium.github.io/articles/en/auto_unpacking/m.html) - [Reverse engineering with #Ghidra: Breaking an embedded firmware encryption scheme](https://www.youtube.com/watch?v=4urMITJKQQs&ab_channel=stacksmashing) - [Simulating and hunting firmware vulnerabilities with Qiling](https://blog.vincss.net/2020/12/pt007-simulating-and-hunting-firmware-vulnerabilities-with-Qiling.html?m=1&s=09) ******************************************************************************************************************************** ### Firmware samples to pentest - [Download From here by firmware.center](https://firmware.center/) ******************************************************************************************************************************** ### Secureboot #### Dev - [Writing a Bootloader](http://3zanders.co.uk/2017/10/13/writing-a-bootloader/) #### Hacking - [Pwn the ESP32 Secure Boot](https://limitedresults.com/2019/09/pwn-the-esp32-secure-boot/) - [Pwn the ESP32 Forever: Flash Encryption and Sec. Boot Keys Extraction](https://limitedresults.com/2019/11/pwn-the-esp32-forever-flash-encryption-and-sec-boot-keys-extraction/) - [Amlogic S905 SoC: bypassing the (not so) Secure Boot to dump the BootROM](https://fredericb.info/2016/10/amlogic-s905-soc-bypassing-not-so.html) / [another-link](https://www.cnx-software.com/2016/10/06/hacking-arm-trustzone-secure-boot-on-amlogic-s905-soc/) - [Defeating Secure Boot with Symlink Attacks](https://www.anvilsecure.com/blog/defeating-secure-boot-with-symlink-attacks.html) - [PS4 Aux Hax 5 & PSVR Secure Boot Hacking with Keys by Fail0verflow!](https://www.psxhax.com/threads/ps4-aux-hax-5-psvr-secure-boot-hacking-with-keys-by-fail0verflow.12820/) - [ECLYPSIUM DISCOVERS MULTIPLE VULNERABILITIES AFFECTING 129 DELL MODELS VIA DELL REMOTE OS RECOVERY AND FIRMWARE UPDATE CAPABILITIES](https://eclypsium.com/2021/06/24/biosdisconnect/) ******************************************************************************************************************************** ### Storage Medium #### EMMC HACKING - [HARDWARE HACKING 101: IDENTIFYING AND DUMPING EMMC FLASH](https://www.riverloopsecurity.com/blog/2020/03/hw-101-emmc/) - [EMMC DATA RECOVERY FROM DAMAGED SMARTPHONE](https://dangerouspayload.com/2018/10/24/emmc-data-recovery-from-damaged-smartphone/) - [Another bunch of Atricles for EMMC](https://hackaday.com/tag/emmc/) - [Unleash your smart-home devices: Vacuum Cleaning Robot Hacking](https://media.ccc.de/v/34c3-9147-unleash_your_smart-home_devices_vacuum_cleaning_robot_hacking#t=1810) - [Hands-On IoT Hacking: Rapid7 at DEF CON 30 IoT Village, Part 1](https://www.rapid7.com/blog/post/2022/10/18/hands-on-iot-hacking-rapid7-at-def-con-30-iot-village-part-1/) ******************************************************************************************************************************** ### IoT hardware Overview and Hacking - [IoT Hardware Guide](https://www.postscapes.com/internet-of-things-hardware/) - [Intro To Hardware Hacking - Dumping Your First Firmware](https://blog.nvisium.com/intro-to-hardware-hacking-dumping-your-first-firmware) #### Hardware Gadgets to pentest - [Bus Pirate](https://www.sparkfun.com/products/12942) - [EEPROM reader/SOIC Cable](https://www.sparkfun.com/products/13153) - [Jtagulator/Jtagenum](https://www.adafruit.com/product/1550) - [Logic Analyzer](https://www.saleae.com/) - [The Shikra](https://int3.cc/products/the-shikra) - [FaceDancer21 (USB Emulator/USB Fuzzer)](https://int3.cc/products/facedancer21) - [RfCat](https://int3.cc/products/rfcat) - [Hak5Gear- Hak5FieldKits](https://hakshop.com/) - [Ultra-Mini Bluetooth CSR 4.0 USB Dongle Adapter](https://www.ebay.in/itm/Ultra-Mini-Bluetooth-CSR-4-0-USB-Dongle-Adapter-Black-Golden-with-2-yr-wrnty-/332302813975) - [Attify Badge - UART, JTAG, SPI, I2C (w/ headers)](https://www.attify-store.com/products/attify-badge-assess-security-of-iot-devices) #### Attacking Hardware Interfaces - [An Introduction to Hardware Hacking](https://securityboulevard.com/2020/09/an-introduction-to-hardware-hacking/) - [Serial Terminal Basics](https://learn.sparkfun.com/tutorials/terminal-basics/all) - [Reverse Engineering Serial Ports](http://www.devttys0.com/2012/11/reverse-engineering-serial-ports/) - [REVERSE ENGINEERING ARCHITECTURE AND PINOUT OF CUSTOM ASICS](https://sec-consult.com/en/blog/2019/02/reverse-engineering-architecture-pinout-plc/) - [ChipWhisperer - Hardware attacks](http://wiki.newae.com/Main_Page) - [Hardware hacking tutorial: Dumping and reversing firmware](https://ivanorsolic.github.io/post/hardwarehacking1/) #### SPI - [Reading FlashROMS - Youtube](https://www.youtube.com/results?search_query=reading+chip+flash+rom) - [Dumping the firmware From Router using BUSPIRATE - SPI Dump](https://www.iotpentest.com/2019/06/dumping-firmware-from-device-using.html) - [How to Flash Chip of a Router With a Programmer | TP-Link Router Repair & MAC address change](https://www.youtube.com/watch?v=fbt4OJXJdOc&ab_channel=ElectricalProjects%5BCreativeLab%5D) - [Extracting Flash Memory over SPI](https://akimbocore.com/article/extracting-flash-memory-over-spi/) - [Extracting Firmware from Embedded Devices (SPI NOR Flash)](https://www.youtube.com/watch?v=nruUuDalNR0&ab_channel=FlashbackTeam) - [SPI-Blogs](https://www.google.com/search?q=%22spi+dump%22&source=hp&ei=5jv9YaW6JNvl2roPgbGqMA&iflsig=AHkkrS4AAAAAYf1J9qNY6Snarz3dsHr9KXF1YSY6AKVL&ved=0ahUKEwilxY3apOb1AhXbslYBHYGYCgYQ4dUDCAg&uact=5&oq=%22spi+dump%22&gs_lcp=Cgdnd3Mtd2l6EAMyBggAEBYQHjIGCAAQFhAeMgYIABAWEB4yBggAEBYQHjIGCAAQFhAeMgYIABAWEB4yBggAEBYQHjIGCAAQFhAeMgYIABAWEB4yCAgAEBYQChAeUABYAGC-A2gAcAB4AIABYIgBYJIBATGYAQCgAQKgAQE&sclient=gws-wiz) #### UART - [Identifying UART interface](https://www.mikroe.com/blog/uart-serial-communication) - [onewire-over-uart](https://github.com/dword1511/onewire-over-uart) - [Accessing sensor via UART](http://home.wlu.edu/~levys/courses/csci250s2017/SensorsSignalsSerialSockets.pdf) - [Using UART to connect to a chinese IP cam](https://www.davidsopas.com/using-uart-to-connect-to-a-chinese-ip-cam/) - [A journey into IoT – Hardware hacking: UART](https://techblog.mediaservice.net/2019/03/a-journey-into-iot-hardware-hacking-uart/) - [UARTBruteForcer](https://github.com/FireFart/UARTBruteForcer) - [UART Connections and Dynamic analysis on Linksys e1000](https://www.youtube.com/watch?v=ix6rSV2Dj44&ab_channel=Defenceindepth) - [Accessing and Dumping Firmware Through UART](https://www.cyberark.com/resources/threat-research-blog/accessing-and-dumping-firmware-through-uart) #### JTAG - [HARDWARE HACKING 101: INTRODUCTION TO JTAG](https://www.riverloopsecurity.com/blog/2021/05/hw-101-jtag/) - [How To Find The JTAG Interface - Hardware Hacking Tutorial](https://www.youtube.com/watch?v=_FSM_10JXsM&ab_channel=MakeMeHack) - [Buspirate JTAG Connections - Openocd](https://research.kudelskisecurity.com/2014/05/01/jtag-debugging-made-easy-with-bus-pirate-and-openocd/#:~:text=The%20Bus%20Pirate%20is%20an,protocols%20like%20I%C2%B2C%20and%20SPI.) - [Extracting Firmware from External Memory via JTAG](https://www.youtube.com/watch?v=IadnBUJAvks&ab_channel=JoeGrand) - [Analyzing JTAG](https://nse.digital/pages/guides/hardware/jtag.html) - [The hitchhacker’s guide to iPhone Lightning & JTAG hacking](https://media.defcon.org/DEF%20CON%2030/DEF%20CON%2030%20presentations/stacksmashing%20-%20The%20hitchhackers%20guide%20to%20iPhone%20Lightning%20%20%20JTAG%20hacking.pdf) #### SideChannel Attacks - [Side channel attacks](https://yifan.lu/) - [Attacks on Implementations of Secure Systems](https://github.com/Yossioren/AttacksonImplementationsCourseBook) - [fuzzing, binary analysis, IoT security, and general exploitation](https://github.com/0xricksanchez/paper_collection) - [Espressif ESP32: Bypassing Encrypted Secure Boot(CVE-2020-13629)](https://raelize.com/blog/espressif-esp32-bypassing-encrypted-secure-boot-cve-2020-13629/) - [Breaking AES with ChipWhisperer - Piece of scake (Side Channel Analysis 100)](https://www.youtube.com/watch?v=FktI4qSjzaE&ab_channel=LiveOverflow) - [Researchers use Rowhammer bit flips to steal 2048-bit crypto key](https://arstechnica.com/information-technology/2019/06/researchers-use-rowhammer-bitflips-to-steal-2048-bit-crypto-key/) #### Glitching attacks - [NAND Glitching Attack](http://www.brettlischalk.com/posts/nand-glitching-wink-hub-for-root) - [Tutorial CW305-4 Voltage Glitching with Crowbars](https://wiki.newae.com/index.php?title=Tutorial_CW305-4_Voltage_Glitching_with_Crowbars&mobileaction=toggle_view_mobile) - [Voltage Glitching Attack using SySS iCEstick Glitcher](https://www.youtube.com/watch?v=FVUhVewFmxw&feature=youtu.be&ab_channel=SySSPentestTV) - [Samy Kamkar - FPGA Glitching & Side Channel Attacks](https://www.youtube.com/watch?v=oGndiX5tvEk) - [Hardware Power Glitch Attack (Fault Injection) - rhme2 Fiesta (FI 100)](https://www.youtube.com/watch?v=6Pf3pY3GxBM&ab_channel=LiveOverflow) - [Keys in flash - Glitching AES keys from an Arduino / ATmega with a camera flash](https://srfilipek.medium.com/keys-in-a-flash-3e984d0de54b) - [Implementing Practical Electrical Glitching Attacks](blackhat.com/docs/eu-15/materials/eu-15-Giller-Implementing-Electrical-Glitching-Attacks.pdf) ******************************************************************************************************************************** ### Awesome IoT Pentesting Guides - [Shodan Pentesting Guide](https://community.turgensec.com/shodan-pentesting-guide/) - [Car Hacking Practical Guide 101](https://medium.com/@yogeshojha/car-hacking-101-practical-guide-to-exploiting-can-bus-using-instrument-cluster-simulator-part-i-cd88d3eb4a53) - [OWASP Firmware Security Testing Methodology ](https://scriptingxss.gitbook.io/firmware-security-testing-methodology/) - [Awesome-bluetooth-security](https://github.com/engn33r/awesome-bluetooth-security) ******************************************************************************************************************************** ### Fuzzing Things - [OWASP Fuzzing Info](https://owasp.org/www-community/Fuzzing) - [Fuzzing_ICS_protocols](https://1modm.github.io/Fuzzing_ICS_protocols.html) - [Fuzzowski - the Network Protocol Fuzzer that we will want to use](https://hakin9.org/fuzzowski-the-network-protocol-fuzzer-that-we-will-want-to-use/) - [Fuzz Testing of Application Reliability](https://pages.cs.wisc.edu/~bart/fuzz/) - [FIRM-AFL : High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation](https://www.usenix.org/conference/usenixsecurity19/presentation/zheng) - [Snipuzz : Black-box Fuzzing of IoT Firmware via Message Snippet Inference](https://arxiv.org/pdf/2105.05445.pdf) - [fuzzing-iot-binaries] - [part1](https://blog.attify.com/fuzzing-iot-devices-part-1/) / [part2](https://blog.attify.com/fuzzing-iot-binaries-with-afl-part-ii/) ******************************************************************************************************************************** ### ICS - [ICS-Security](https://github.com/V33RU/IoTSecurity101/blob/master/ICS/Industrial%20Control%20Systems.md) ******************************************************************************************************************************** ### Automotive - [Automotive-Security](https://github.com/V33RU/IoTSecurity101/blob/master/Automotive-Security.md) ******************************************************************************************************************************** ## Vulnerable IoT and Hardware Applications - IoT Goat : https://github.com/OWASP/IoTGoat - IoT : https://github.com/Vulcainreo/DVID - Safe : https://insinuator.net/2016/01/damn-vulnerable-safe/ - Router : https://github.com/praetorian-code/DVRF - SCADA : https://www.slideshare.net/phdays/damn-vulnerable-chemical-process - PI : https://whitedome.com.au/re4son/sticky-fingers-dv-pi/ - SS7 Network: https://www.blackhat.com/asia-17/arsenal.html#damn-vulnerable-ss7-network - VoIP : https://www.vulnhub.com/entry/hacklab-vulnvoip,40/ - Hardware Hacking 101 : https://github.com/rdomanski/hardware_hacking - RHME-2015 : https://github.com/Riscure/RHme-2015 - RHME-2016 : https://github.com/Riscure/Rhme-2016 - RHME-2017 : https://github.com/Riscure/Rhme-2017 ******************************************************************************************************************************** ## follow the people - [Jilles](https://twitter.com/jilles_com) - [Joe Fitz](https://twitter.com/securelyfitz) - [Aseem Jakhar](https://twitter.com/aseemjakhar) - [Cybergibbons](https://twitter.com/cybergibbons) - [Jasper](https://twitter.com/jzvw) - [Dave Jones](https://twitter.com/eevblog) - [bunnie](https://twitter.com/bunniestudios) - [Ilya Shaposhnikov](https://twitter.com/drakylar) - [Mark C.](https://twitter.com/LargeCardinal) - [A-a-ron Guzman](https://twitter.com/scriptingxss) - [Yashin Mehaboobe](https://twitter.com/YashinMehaboobe) - [Arun Magesh](https://www.linkedin.com/in/marunmagesh) - [Mr-IoT](https://twitter.com/v33riot) - [QKaiser](https://twitter.com/qkaiser)
547
Make any web page a desktop application
# Nativefier ![Example of Nativefier app in the macOS dock](.github/dock-screenshot.png) You want to make a native-looking wrapper for WhatsApp Web (or any web page). ```bash nativefier 'web.whatsapp.com' ``` ![Walkthrough animation](.github/nativefier-walkthrough.gif) You're done. ## Introduction Nativefier is a command-line tool to easily create a “desktop app” for any web site with minimal fuss. Apps are wrapped by [Electron](https://www.electronjs.org/) (which uses Chromium under the hood) in an OS executable (`.app`, `.exe`, etc) usable on Windows, macOS and Linux. I built this because I grew tired of having to Alt-Tab to my browser and then search through numerous open tabs when using Messenger or Whatsapp Web ([HN thread](https://news.ycombinator.com/item?id=10930718)). Nativefier features: - Automatically retrieval of app icon / name - Injection of custom JS & CSS - Many more, see the [API docs](API.md) or `nativefier --help` ## Installation Install Nativefier globally with `npm install -g nativefier` . Requirements: - macOS 10.10+ / Windows / Linux - [Node.js](https://nodejs.org/) ≥ 12.9 and npm ≥ 6.9 Optional dependencies: - [ImageMagick](http://www.imagemagick.org/) or [GraphicsMagick](http://www.graphicsmagick.org/) to convert icons. Be sure `convert` + `identify` or `gm` are in your `$PATH`. - [Wine](https://www.winehq.org/) to build Windows apps from non-Windows platforms. Be sure `wine` is in your `$PATH`. <details> <summary>Or install with Docker (click to expand)</summary> - Pull the image from [Docker Hub](https://hub.docker.com/r/nativefier/nativefier): `docker pull nativefier/nativefier` - ... or build it yourself: `docker build -t local/nativefier .` (in this case, replace `nativefier/` in the below examples with `local/`) By default, `nativefier --help` will be executed. To build e.g. a Gmail app into `~/nativefier-apps`, ```bash docker run --rm -v ~/nativefier-apps:/target/ nativefier/nativefier https://mail.google.com/ /target/ ``` You can pass Nativefier flags, and mount volumes to pass local files. E.g. to use an icon, ```bash docker run --rm -v ~/my-icons-folder/:/src -v $TARGET-PATH:/target nativefier/nativefier --icon /src/icon.png --name whatsApp -p linux -a x64 https://web.whatsapp.com/ /target/ ``` </details> <details> <summary>Or install with Snap & AUR (click to expand)</summary> These repos are *not* managed by Nativefier maintainers; use at your own risk. If using them, for your security, please inspect the build script. - [Snap](https://snapcraft.io/nativefier) - [AUR](https://aur.archlinux.org/packages/nodejs-nativefier) </details> ## Usage To create an app for medium.com, simply `nativefier 'medium.com'` Nativefier will try to determine the app name, and well as other options that you can override. For example, to override the name, `nativefier --name 'My Medium App' 'medium.com'` **Read the [API docs](API.md) or run `nativefier --help`** to learn about command-line flags and configure your app. ## Troubleshooting **See [CATALOG.md](CATALOG.md) for site-specific ideas & workarounds contributed by the community**. If this doesn’t help, go look at our [issue tracker](https://github.com/nativefier/nativefier/issues). ## Development Help welcome on [bugs](https://github.com/nativefier/nativefier/issues?q=is%3Aopen+is%3Aissue+label%3Abug) and [feature requests](https://github.com/nativefier/nativefier/issues?q=is%3Aopen+is%3Aissue+label%3Afeature-request)! Docs: [Developer / build / hacking](HACKING.md), [API / flags](API.md), [Changelog](CHANGELOG.md). License: [MIT](LICENSE.md).
548
An endless drawing canvas desktop app made with Tauri (Rust) and React 🎨 ✍️
![logo](./screenshots/banner.jpg) ![app](./screenshots/app.png) # Table of Contents - [Table of Contents](#table-of-contents) - [Introduction](#introduction) - [Features](#features) - [Installation](#installation) - [Development](#development) - [Creating a build](#creating-a-build) - [License](#license) # Introduction Pointless is an endless drawing canvas that provides useful features when you're in need for a simple whiteboard/note app. It is build using Tauri (Rust) and React with a pure SVG canvas and local files are saved with brotli compression to ensure small file sizes. ❗️ Currently, this app can only be build locally. Anytime soon there will be public releases available with prebuild binaries for MacOS, Windows and Linux. 📚 ✍️ Feel like contributing? Submit an issue with your ideas (or bugs) and we'll discuss it. # Features - [ ] Save as PNG - [ ] Save as JPG - [ ] Toolbar - [x] Undo - [x] Redo - [x] Pan - [x] Clear - [x] Zoom in - [x] Zoom out - [x] Scale to fit - [x] Create arrow shapes - [x] Create rectangle shapes - [x] Create ellipse shapes - [ ] Text - [x] Create folders - [x] Save/load state from file - [x] Light/dark theme # Prerequisites - [NodeJS](https://nodejs.org) - [Yarn](https://classic.yarnpkg.com/lang/en/docs/install) - [Cargo](https://doc.rust-lang.org/cargo/getting-started/installation.html) # Installation ``` $ git clone https://github.com/kkoomen/pointless.git && cd pointless $ yarn install ``` # Development Starting the development server can be done with `yarn run tauri dev` # Creating a build Creating a build can simply be done with `yarn run tauri build` # License Pointless is licensed under the GPL-3.0 license.
549
Linux networking examples and tutorials
Network Examples ================ Welcome to my Linux Networking tutorials. The first part, learning two widely used routing protocols, OSPF and BGP, is almost completed. ## Target audience You've been a Linux server and network administrator for some years, have been building an office and/or colocation network with IPv4, IPv6, firewalls with IPTables, some stateful filtering (and NAT for IPv4). You've set up VPN tunnels between different locations to be able to reach the internal IPv4 network using RFC1918 addresses on the other side. You know how to use the `iproute2` programs (`ip a`, `ip r`, etc) to set up your networking, and haven't typed the `ifconfig` or `route` commands in your terminal since 1999. You know how to debug problems using `tcpdump`, `traceroute` etc... But... your network doesn't show much redundancy. You're pointing a static route to your VPN tunnel to be able to reach the other side, and when you connect a third location, you're realizing that this way of working is getting more and more painful. You're googling the interwebz for tutorials about an introduction to routing protocols, and discover that most of them start out with a huge amount of theoretical information, and then teach you how to configure Cisco equipment. You found out that there's helper software to make routing more dynamic, like BIRD, but you have no idea where to start. You don't have money to buy physical routers and switches and cables to connect them, and got a headache after once playing around with a cisco simulator for an hour, missing your cozy linux command line. ## Does the web need more tutorials on these topics? There aren't a lot of tutorials that take a practical approach, ignoring most of the theory that's not yet needed to be known before just starting to explore the working of e.g. a routing protocol. In my opinion there is really no use in first of all learning that "a type 5 AS-external Link State Advertisement is not allowed in a Not So Stubby Area, unless it's a type 7 Link State Advertisement, that has been converted to a type 5 at an Area Border router, which makes it possible to traverse a..." whatever... :o) And, while BIRD (the routing software used in these tutorials) has good reference documentation, it's missing tutorial-style documentation for new users. Even if you already know routing protocols, these tutorials should be a quick way to learn using BIRD and some of its quirks on Linux. I hope that while following the tutorials, you're going to experience the "Wow!" moments, that "make the penny drop" and suddenly make you understand a lot more about complex networking topologies on the internet. Just reading the pages will not make that happen, setting up the examples and doing the assignments will. Depending on your current knowledge and experience, following the tutorials can take quite some time. This is normal. Don't skip pages or part of them, because when writing, I assume that everything told before is known already. Even though the tutorials are meant as an introduction, there's still already a huge amount of information hidden in them. Have fun! ## Getting up to speed setting up test environments All test setups used in the tutorials are built using Linux, LXC and OpenvSwitch for setting up network topologies, and using BIRD as routing daemon. * [Setting up a lab environment](/lxcbird/README.md) explains how to set up a local test environment to build example networks using LXC and openvswitch. The result of the tutorial is having a base container that can be cloned into routers and end hosts. * [A basic network example](/birdhouse-intro/README.md) provides an introduction to the computer network of a fictional company, the Birdhouse Factory. The tutorial part is to practice some more with setting up a network with containers and openvswitch. ## Learning OSPF and BGP * [The Birdhouse Factory continued](/birdhouse-vlans-vpn/README.md) shows how the network at the Birdhouse Factory is evolving, and shows the need for a dynamic routing protocol when multiple routers are introduced. * [An introduction to OSPF](/ospf-intro/README.md) explains the basics of using OSPF as an IGP. * [An introduction to BGP](/bgp-intro/README.md) shows using BGP to make a connection to an external network that is managed by someone else. Also shows how the routes learned are propagated into the local network, having OSPF and iBGP work together. * [A bigger BGP network](/bgp-contd/README.md) shows redundant routes, asymmetric traffic flow and explains the difference between "peering" and "transit". * To be finished: [Wait what... The Internet](/routing-on-the-internet/README.md) shows that with the little amount of knowledge we built up about routing, we can suddenly understand how the whole Internet works! (So, fun with traceroute, bgp.he.net, etc...) ## Further ideas * Building a pair of stateful filtering IPv4 and IPv6 gateways that can fail over traffic to each other, using `keepalived` and `conntrackd`, while participating in OSPF. * Building a load balancer using LVS. * Example showcases would be really nice. For example, visiting some IXP that uses BIRD as route server, and doing a writeup of what their network architecture looks like and the been-there-done-thats that they want to share. * ... ## Feedback, getting help * I'm very interested in feedback on the amount of time it takes to work through the tutorials. Since I wrote them, I cannot predict those, and it may provide useful information about reordering the pages if they're too long. * If you like IRC, try the `#bird` channel on Libera Chat. There's a bunch of friendly BIRD users in there that might help you with the BIRD configuration if you have questions. Hans van Kranenburg, `[email protected]`
550
A fast and easy-to-use status bar
<p align="center"> <img src="doc/_static/banner.png#gh-light-mode-only" alt="Polybar"> <img src="doc/_static/banner-dark-mode.png#gh-dark-mode-only" alt="Polybar"> </p> <p align="center"> A fast and easy-to-use tool for creating status bars. </p> <p align="center"> <a href="https://github.com/polybar/polybar/releases"><img src="https://img.shields.io/github/release/polybar/polybar.svg"></a> <a href="https://github.com/polybar/polybar/releases"><img alt="GitHub All Releases" src="https://img.shields.io/github/downloads/polybar/polybar/total" /></a> <a href="https://github.com/polybar/polybar/actions?query=workflow%3ACI"><img src="https://github.com/polybar/polybar/workflows/CI/badge.svg"></a> <a href="https://github.com/polybar/polybar/actions?query=workflow%3A%22Release+Workflow%22"><img src="https://github.com/polybar/polybar/workflows/Release%20Workflow/badge.svg?branch=master"></a> <a href="https://polybar.readthedocs.io"><img src="https://readthedocs.org/projects/polybar/badge/?version=latest"></a> <a href="https://gitter.im/polybar/polybar"><img src="https://badges.gitter.im/polybar/polybar.svg"></a> <a href="https://codecov.io/gh/polybar/polybar/branch/master"><img src="https://codecov.io/gh/polybar/polybar/branch/master/graph/badge.svg"></a> <a href="https://github.com/polybar/polybar/blob/master/LICENSE"><img src="https://img.shields.io/github/license/polybar/polybar.svg"></a> <a href="https://www.codetriage.com/polybar/polybar"><img src="https://www.codetriage.com/polybar/polybar/badges/users.svg"></a> <a href="https://opencollective.com/polybar"><img src="https://opencollective.com/polybar/tiers/badge.svg"></a> </p> **[Documentation](https://github.com/polybar/polybar/wiki/) | [Installation](#installation) | [Support](SUPPORT.md) | [Donate](#donations)** **Polybar** aims to help users build beautiful and highly customizable status bars for their desktop environment, without the need of having a black belt in shell scripting. ![default configuration screenshot](doc/_static/default.png) ## Table of Contents * [Introduction](#introduction) * [Getting Help](#getting-help) * [Contributing](#contributing) * [Getting started](#getting-started) * [Installation](#installation) * [First Steps](#first-steps) * [Community](#community) * [Contributors](#contributors) * [Donations](#donations) * [Sponsors](#sponsors) * [Backers](#backers) * [License](#license) * [Signatures](#signatures) ## Introduction The main purpose of **Polybar** is to help users create awesome status bars. It has built-in functionality to display information about the most commonly used services. Some of the services included so far: - Systray icons - Window title - Playback controls and status display for [MPD](https://www.musicpd.org/) using [libmpdclient](https://www.musicpd.org/libs/libmpdclient/) - [ALSA](https://www.alsa-project.org/main/index.php/Main_Page) and [PulseAudio](https://www.freedesktop.org/wiki/Software/PulseAudio/) volume controls - Workspace and desktop panel for [bspwm](https://github.com/baskerville/bspwm) and [i3](https://github.com/i3/i3) - Workspace module for [EWMH compliant](https://specifications.freedesktop.org/wm-spec/wm-spec-1.3.html#idm140130320786080) window managers - Keyboard layout and indicator status - CPU and memory load indicator - Battery display - Network connection details - Backlight level - Date and time label - Time-based shell script execution - Command output tailing - User-defined menu tree - Inter-process messaging - And more... [See the wiki for more details](https://github.com/polybar/polybar/wiki). ## Getting Help If you find yourself stuck, have a look at our [Support](SUPPORT.md) page for resources where you can find help. ## Contributing Read our [contributing guidelines](CONTRIBUTING.md) for how to get started with contributing to polybar. ## Getting started ### Installation <a href="https://repology.org/metapackage/polybar"> <img src="https://repology.org/badge/vertical-allrepos/polybar.svg" alt="Packaging status" align="right"> </a> Polybar is already available in the package manager for many repositories. We list some of the more prominent ones here. Also click the [image on the right](https://repology.org/project/polybar/versions) to see a more complete list of available polybar packages. If you are using **Debian** (bullseye/11/stable) or later, you can install [polybar](https://tracker.debian.org/pkg/polybar) using `sudo apt install polybar`. Newer releases of polybar are sometimes provided in the [backports](https://wiki.debian.org/Backports) repository for stable users, you need to enable [backports](https://wiki.debian.org/Backports) and then install using `sudo apt -t bullseye-backports install polybar`. If you are using **Ubuntu** 20.10 (Groovy Gorilla) or later, you can install polybar using `sudo apt install polybar`. If you are using **Arch Linux**, you can install [polybar](https://archlinux.org/packages/community/x86_64/polybar/) to get the latest stable release using `sudo pacman -S polybar`. The latest unstable changes are also available in the [`polybar-git`](https://aur.archlinux.org/packages/polybar-git) package in the AUR. If you are using **Manjaro**, you can install [polybar](https://software.manjaro.org/package/polybar) to get the latest stable release using `sudo pacman -S polybar`. If you are using **Void Linux**, you can install [polybar](https://github.com/void-linux/void-packages/blob/master/srcpkgs/polybar/template) using `xbps-install -S polybar`. If you are using **NixOS**, polybar is available in both the stable and unstable channels and can be installed with the command `nix-env -iA nixos.polybar`. If you are using **Slackware**, polybar is available from the [SlackBuilds](https://slackbuilds.org/repository/14.2/desktop/polybar/) repository. If you are using **Source Mage GNU/Linux**, polybar spell is available in test grimoire and can be installed via `cast polybar`. If you are using **openSUSE Leap** or **openSUSE Tumbleweed**, polybar is available from the [official repositories](https://build.opensuse.org/package/show/X11:Utilities/polybar) and can be installed via `zypper install polybar`. The package is available for openSUSE Leap 15.3 and above. If you are using **FreeBSD**, [polybar](https://svnweb.freebsd.org/ports/head/x11/polybar/) can be installed using `pkg install polybar`. Make sure you are using the `latest` package branch. If you are using **Gentoo**, both release and git-master versions are available in the [main](https://packages.gentoo.org/packages/x11-misc/polybar) repository. If you are using **Fedora**, you can install [polybar](https://src.fedoraproject.org/rpms/polybar) using `sudo dnf install polybar`. If you can't find your distro here, you will have to [build from source](https://github.com/polybar/polybar/wiki/Compiling). ### First Steps [See the wiki for details on how to run and configure polybar](https://github.com/polybar/polybar/wiki). ## Community Want to get in touch? * Visit our [Discussion page](https://github.com/polybar/polybar/discussions) * Join our Gitter room at [`gitter.im/polybar/polybar`](https://gitter.im/polybar/polybar) * We have our own subreddit at [`r/polybar`](https://www.reddit.com/r/polybar) * Chat with us in the `#polybar` IRC channel on the [`irc.libera.chat:6697`](https://libera.chat/) server ## Contributors ### Maintainers * Patrick Ziegler [**@patrick96**](https://github.com/patrick96) ### Owner * Michael Carlberg [**@jaagr**](https://github.com/jaagr/) ### Former Maintainers * [**@Lomadriel**](https://github.com/Lomadriel) * [**@NBonaparte**](https://github.com/NBonaparte) * Chase Geigle [**@skystrife**](https://github.com/skystrife) ### Logo Design by * [**@Tobaloidee**](https://github.com/Tobaloidee) ### [All Contributors](https://github.com/polybar/polybar/graphs/contributors) ## Donations Polybar accepts donations through [open collective](https://opencollective.com/polybar). [Become a backer](https://opencollective.com/polybar) and support polybar! ### Sponsors <a href="https://opencollective.com/polybar/sponsor/0/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/sponsor/0/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/sponsor/1/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/sponsor/1/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/sponsor/2/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/sponsor/2/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/sponsor/3/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/sponsor/3/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/sponsor/4/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/sponsor/4/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/sponsor/5/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/sponsor/5/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/sponsor/6/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/sponsor/6/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/sponsor/7/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/sponsor/7/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/sponsor/8/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/sponsor/8/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/sponsor/9/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/sponsor/9/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/sponsor/10/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/sponsor/10/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/sponsor/11/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/sponsor/11/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/sponsor/12/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/sponsor/12/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/sponsor/13/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/sponsor/13/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/sponsor/14/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/sponsor/14/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/sponsor/15/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/sponsor/15/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/sponsor/16/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/sponsor/16/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/sponsor/17/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/sponsor/17/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/sponsor/18/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/sponsor/18/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/sponsor/19/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/sponsor/19/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/sponsor/20/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/sponsor/20/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/sponsor/21/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/sponsor/21/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/sponsor/22/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/sponsor/22/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/sponsor/23/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/sponsor/23/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/sponsor/24/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/sponsor/24/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/sponsor/25/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/sponsor/25/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/sponsor/26/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/sponsor/26/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/sponsor/27/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/sponsor/27/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/sponsor/28/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/sponsor/28/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/sponsor/29/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/sponsor/29/avatar.svg?requireActive=false"></a> ### Backers <a href="https://opencollective.com/polybar/backer/0/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/backer/0/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/backer/1/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/backer/1/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/backer/2/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/backer/2/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/backer/3/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/backer/3/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/backer/4/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/backer/4/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/backer/5/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/backer/5/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/backer/6/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/backer/6/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/backer/7/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/backer/7/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/backer/8/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/backer/8/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/backer/9/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/backer/9/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/backer/10/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/backer/10/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/backer/11/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/backer/11/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/backer/12/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/backer/12/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/backer/13/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/backer/13/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/backer/14/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/backer/14/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/backer/15/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/backer/15/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/backer/16/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/backer/16/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/backer/17/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/backer/17/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/backer/18/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/backer/18/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/backer/19/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/backer/19/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/backer/20/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/backer/20/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/backer/21/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/backer/21/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/backer/22/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/backer/22/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/backer/23/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/backer/23/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/backer/24/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/backer/24/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/backer/25/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/backer/25/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/backer/26/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/backer/26/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/backer/27/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/backer/27/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/backer/28/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/backer/28/avatar.svg?requireActive=false"></a> <a href="https://opencollective.com/polybar/backer/29/website?requireActive=false" target="_blank"><img src="https://opencollective.com/polybar/backer/29/avatar.svg?requireActive=false"></a> ## License Polybar is licensed under the MIT license. [See LICENSE for more information](https://github.com/polybar/polybar/blob/master/LICENSE). ## Signatures Release archives and tags are signed by a maintainer using GPG. Currently everything is signed by [Patrick Ziegler](https://www.patrickziegler.ch/gpg) with fingerprint `1D5791352D51A228D4DDDBA4521E5E03AEBCA1A7`
551
📦 Get a clean, ready-to-go Linux box in seconds.
<p align="right">En | <a href="./docs/README-zh_cn.md">简</a> | <a href="./docs/README-zh_tw.md">繁</a></p> <div align="center"> ![logo](https://user-images.githubusercontent.com/5880908/53614582-6ebdfc80-3ba8-11e9-819e-d96a3f7c22f0.png) # instantbox Get a clean, ready-to-go Linux box in seconds. [![Travis CI](https://badgen.net/travis/instantbox/instantbox)](https://travis-ci.com/instantbox/instantbox) [![Docker](https://badgen.net/badge/icon/instantbox?icon=docker&label)](https://hub.docker.com/r/instantbox/instantbox) ![Python 3.6](https://badgen.net/badge/python/3.6/3776ab) ![Code Style Pep8](https://badgen.net/badge/code%20style/pep8/ffd343) [![Chat on Telegram](https://badgen.net/badge/chat/on%20telegram/0088cc)](https://t.me/joinchat/HtYtxRSerOwrMLg_2_wZTQ) [![MIT](https://badgen.net/badge/license/MIT/3da639)](LICENSE) </div> ## Introduction ### What is instantbox? It's a project that spins up temporary Linux systems with instant webshell access from any browser. ### What can an instantbox do? 1. provides a clean Linux environment for a presentation 2. let students experience the charm of Linux at your school or your next LUG meet 3. run with an inspiration in a clean environment 4. manage servers from any device 5. experiment with an open source project 6. test software performance under resource constraints and more! ideas are endless... ### Which Linux distributions are available? We currently supports various versions of Ubuntu, CentOS, Arch Linux, Debian, Fedora and Alpine. ## Quickstart ![Demo screenshot](https://user-images.githubusercontent.com/5880908/53613565-6237a500-3ba4-11e9-9e39-8ea48cee73ee.png) ## Deploy Prerequisite: docker [[More Information]](https://docs.docker.com/install/) ```bash mkdir instantbox && cd $_ bash <(curl -sSL https://raw.githubusercontent.com/instantbox/instantbox/master/init.sh) ``` ## Questions Please submit an issue or join the conversation on [telegram](https://t.me/joinchat/HtYtxRSerOwrMLg_2_wZTQ). ## Donations We are in urgent need for donations in the form of server resources. Please contact us at [email protected] if you are able to help. We appreciate it! ## Credits * [tsl0922/ttyd](https://github.com/tsl0922/ttyd) - webshell ## License [MIT](LICENSE)
552
Modular file scanning/analysis framework
MultiScanner ============ [![Build Status](https://travis-ci.org/mitre/multiscanner.svg)](https://travis-ci.org/mitre/multiscanner) Introduction ------------ MultiScanner is a file analysis framework that assists the user in evaluating a set of files by automatically running a suite of tools for the user and aggregating the output. Tools can be custom built Python scripts, web APIs, software running on another machine, etc. Tools are incorporated by creating modules that run in the MultiScanner framework. Modules are designed to be quickly written and easily incorporated into the framework. Currently written and maintained modules are related to malware analytics, but the framework is not limited to that scope. For a list of modules you can look in [modules/](modules). Descriptions and config options can be found on the [Analysis Modules](http://multiscanner.readthedocs.io/en/latest/use/use-analysis-mods.html) page. MultiScanner also supports a distributed workflow for sample storage, analysis, and report viewing. This functionality includes a web interface, a REST API, a distributed file system (GlusterFS), distributed report storage / searching (Elasticsearch), and distributed task management (Celery / RabbitMQ). Please see [Architecture](http://multiscanner.readthedocs.io/en/latest/arch.html) for more details. Usage ----- MultiScanner can be used as a command-line interface, a Python API, or a distributed system with a web interface. See the documentation for more detailed information on [installation](http://multiscanner.readthedocs.io/en/latest/install.html) and [usage](http://multiscanner.readthedocs.io/en/latest/use/index.html). ### Command-Line ### Install Python (2.7 or 3.4+) if you haven't already. Then run the following (substituting the actual file you want to scan for `<file>`): ``` bash $ git clone https://github.com/mitre/multiscanner.git $ cd multiscanner $ sudo -HE ./install.sh $ multiscanner init ``` This will generate a default configuration for you. Check `config.ini` to see what modules are enabled. See [Configuration](http://multiscanner.readthedocs.io/en/latest/install.html#configuration) for more information. Now you can scan a file (substituting the actual file you want to scan for `<file>`): ``` bash $ multiscanner <file> ``` You can run the following to get a list of all of MultiScanner's command-line options: ``` bash $ multiscanner --help ``` **Note**: If you are not on a RedHat or Debian based Linux distribution, instead of running the `install.sh` script, install pip (if you haven't already) and run the following: ``` bash $ pip install -r requirements.txt ``` ### Python API ### ``` python import multiscanner multiscanner.config_init(filepath) output = multiscanner.multiscan(file_list) results = multiscanner.parse_reports(output, python=True) ``` ### Web Interface ### Install the latest versions of [Docker](https://docs.docker.com/engine/installation/) and [Docker Compose](https://docs.docker.com/compose/install/) if you haven't already. ``` bash $ git clone https://github.com/mitre/multiscanner.git $ cd multiscanner $ docker-compose up ``` You may have to wait a while until all the services are up and running, but then you can use the web interface by going to `http://localhost:8000` in your web browser. *Note*: this should not be used in production; it is simply an introduction to what a full installation would look like. See [here](http://multiscanner.readthedocs.io/en/latest/install.html#standalone-docker-installation) for more details. Documentation ------------- For more information, see the [full documentation](http://multiscanner.readthedocs.io/) on ReadTheDocs.
553
Qt binding for Go (Golang) with support for Windows / macOS / Linux / FreeBSD / Android / iOS / Sailfish OS / Raspberry Pi / AsteroidOS / Ubuntu Touch / JavaScript / WebAssembly
Introduction ------------ [Qt](https://en.wikipedia.org/wiki/Qt_(software)) is a free and open-source widget toolkit for creating graphical user interfaces as well as cross-platform applications that run on various software and hardware platforms with little or no change in the underlying codebase. [Go](https://en.wikipedia.org/wiki/Go_(programming_language)), also known as Golang, is a programming language designed at Google. [therecipe/qt](https://github.com/therecipe/qt) allows you to write Qt applications entirely in Go, [JavaScript/TypeScript](https://github.com/therecipe/entry), [Dart/Flutter](https://github.com/therecipe/flutter), [Haxe](https://github.com/therecipe/haxe) and [Swift](https://github.com/therecipe/swift) Beside the language bindings provided, `therecipe/qt` also greatly simplifies the deployment of Qt applications to various software and hardware platforms. At the time of writing, almost all Qt functions and classes are accessible, and you should be able to find everything you need to build fully featured Qt applications. Impressions ----------- [Gallery](https://github.com/therecipe/qt/wiki/Gallery) of example applications. [JavaScript Demo](https://therecipe.github.io/entry) | *[source](https://github.com/therecipe/entry)* Installation ------------ The following instructions assume that you already installed [Go](https://golang.org/dl/) and [Git](https://git-scm.com/downloads) #### (Experimental) cgo-less version (try this first, if you are new and want to test the binding) ##### Windows ```powershell go get -ldflags="-w" github.com/therecipe/examples/basic/widgets && for /f %v in ('go env GOPATH') do %v\bin\widgets.exe ``` ##### macOS/Linux ```bash go get -ldflags="-w" github.com/therecipe/examples/basic/widgets && $(go env GOPATH)/bin/widgets ``` #### Default version ##### Windows [(more info)](https://github.com/therecipe/qt/wiki/Installation-on-Windows) ```powershell set GO111MODULE=off go get -v github.com/therecipe/qt/cmd/... && for /f %v in ('go env GOPATH') do %v\bin\qtsetup test && %v\bin\qtsetup -test=false ``` ##### macOS [(more info)](https://github.com/therecipe/qt/wiki/Installation-on-macOS) ```bash export GO111MODULE=off; xcode-select --install; go get -v github.com/therecipe/qt/cmd/... && $(go env GOPATH)/bin/qtsetup test && $(go env GOPATH)/bin/qtsetup -test=false ``` ##### Linux [(more info)](https://github.com/therecipe/qt/wiki/Installation-on-Linux) ```bash export GO111MODULE=off; go get -v github.com/therecipe/qt/cmd/... && $(go env GOPATH)/bin/qtsetup test && $(go env GOPATH)/bin/qtsetup -test=false ``` Resources --------- - [Installation](https://github.com/therecipe/qt/wiki/Installation) - [Getting Started](https://github.com/therecipe/qt/wiki/Getting-Started) - [Wiki](https://github.com/therecipe/qt/wiki) - [Qt Documentation](https://doc.qt.io/qt-5/classes.html) - [FAQ](https://github.com/therecipe/qt/wiki/FAQ) - [#qt-binding](https://gophers.slack.com/messages/qt-binding/details) Slack channel ([invite](https://invite.slack.golangbridge.org)\) Deployment Targets ------------------ | Target | Arch | Linkage | Docker Deployment | Host OS | |:------------------------:|:----------------:|:-------------------------:|:-----------------:|:-------:| | Windows | 32 / 64 | dynamic / static | Yes | Any | | macOS | 64 | dynamic | Yes | Any | | Linux | arm / arm64 / 64 | dynamic / static / system | Yes | Any | | Android (+Wear) | arm / arm64 | dynamic | Yes | Any | | Android-Emulator (+Wear) | 32 | dynamic | Yes | Any | | SailfishOS | arm | system | Yes | Any | | SailfishOS-Emulator | 32 | system | Yes | Any | | Raspberry Pi (1/2/3) | arm | dynamic / system | Yes | Any | | Ubuntu Touch | arm / 64 | system | Yes | Any | | JavaScript | 32 | static | Yes | Any | | WebAssembly | 32 | static | Yes | Any | | iOS | arm64 | static | No | macOS | | iOS-Simulator | 64 | static | No | macOS | | AsteroidOS | arm | system | No | Linux | | FreeBSD | 32 / 64 | system | No | FreeBSD | License ------- This package is released under [LGPLv3](https://opensource.org/licenses/LGPL-3.0) Qt itself is licensed and available under multiple [licenses](https://www.qt.io/licensing).
554
The flexible game engine.
The flexible game engine. [![Build Status](https://github.com/crownengine/crown/workflows/build_and_test/badge.svg)](https://github.com/crownengine/crown/actions) ===================================== Crown is a general purpose and data-driven game engine, written in [orthodox C++](https://gist.github.com/bkaradzic/2e39896bc7d8c34e042b) with a minimalistic and data-oriented design philosophy in mind. Crown isn't tied to a particular game type or genre but instead it offers a set of generic primitives and facilities to help you create a wide gamut of interactive 2D and 3D products. Check out the [Introduction](https://docs.crownengine.org/html/latest/introduction.html) for more info. ## Download ### Binaries * [Changelog](https://docs.crownengine.org/html/latest/changelog.html) * [Crown v0.47.0 for Linux 64-bits](https://github.com/crownengine/crown/releases/download/v0.47.0/crown-0.47.0-linux-x64.tar.gz) * [Crown v0.47.0 for Windows 64-bits](https://github.com/crownengine/crown/releases/download/v0.47.0/crown-0.47.0-windows-x64.zip) * [Crown v0.47.0 all releases](https://github.com/crownengine/crown/releases/tag/v0.47.0) ### Arch Linux ([AUR](https://aur.archlinux.org/packages/crown/)) yay -S crown ## Documentation ### Unstable (master) * [User Manual](https://docs.crownengine.org/html/master) * [Lua API](https://docs.crownengine.org/html/master/lua_api.html) * [Building](https://docs.crownengine.org/html/master/hackers/building.html) ### Latest Stable (v0.47.0) * [User Manual](https://docs.crownengine.org/html/latest) * [Lua API](https://docs.crownengine.org/html/latest/lua_api.html) ## Community Support & Development * [Discord](https://discord.gg/CeXVWCT): [![Discord Chat](https://img.shields.io/discord/572468149358690314.svg)](https://discord.gg/CeXVWCT) * [Trello Roadmap](https://trello.com/b/h88kbJNm/crown-game-engine) ## Screenshots ### [Level Editor](https://github.com/crownengine/crown/tree/master/tools/level_editor) ![level-editor](https://raw.githubusercontent.com/crownengine/crown/master/docs/shots/level-editor.png) ### [00-empty](https://github.com/crownengine/crown/tree/master/samples/00-empty) Engine initialization and shutdown. ### [01-physics](https://github.com/crownengine/crown/tree/master/samples/01-physics) ![01-physics](https://raw.githubusercontent.com/crownengine/crown/master/docs/shots/01-physics.png) ### [02-animation](https://github.com/crownengine/crown/tree/master/samples/02-animation) ![02-animation](https://raw.githubusercontent.com/crownengine/crown/master/docs/shots/02-animation.png) ### [03-joypad](https://github.com/crownengine/crown/tree/master/samples/03-joypad) ![03-joypad](https://raw.githubusercontent.com/crownengine/crown/master/docs/shots/03-joypad.png) Contact ------- Daniele Bartolini ([@aa_dani_bart](https://twitter.com/aa_dani_bart)) Project page: https://github.com/crownengine/crown Contributors ------------ In chronological order. Daniele Bartolini ([@dbartolini](https://github.com/dbartolini)) Simone Boscaratto ([@Xed89](https://github.com/Xed89)) Michele Rossi ([@mikymod](https://github.com/mikymod)) Michela Iacchelli - Pepper logo. Raphael de Vasconcelos Nascimento ([@vasconssa](https://github.com/vasconssa)) Giulia Gazzoli - Crown logo.
555
:snake: Syntax, working with Shell commands, Files, Text Processing, and more...
<br> --- :warning: :warning: I'm archiving this repo, as I don't intend to work on this repo further. I'm re-using materials in this repo for the **100 Page Python Intro** book (https://github.com/learnbyexample/100_page_python_intro). I'm also working on **Practice Python Projects** book (https://github.com/learnbyexample/practice_python_projects), which I had intended in this repo for the `mini_projects` folder. --- <br> <br> <br> # <a name="python-basics"></a>Python Basics Introduction to Python - Syntax, working with Shell commands, Files, Text Processing, and more... * Suitable for a one/two day workshop for Python beginners * Visit [Python re(gex)?](https://github.com/learnbyexample/py_regular_expressions) repo for a book on regular expressions * [Python resources for everybody](https://learnbyexample.github.io/py_resources/) for a curated and searchable collection, including resources for complete beginners to programming * For more related resources, visit [scripting course](https://github.com/learnbyexample/scripting_course) and my programming blog https://learnbyexample.github.io <br> # <a name="chapters"></a>Chapters * [Introduction](./Introduction.md) * Installation, Hello World example, Python Interpreter, Python Standard Library * [Number and String data types](./Number_and_String_datatypes.md) * Numbers, String, Constants, Built-in Operators * [Functions](./Functions.md) * def, print function, range function, type function, Variable Scope * [Getting User input](./User_input.md) * Integer input, Floating point input, String input * [Executing external commands](./Executing_external_commands.md) * Calling Shell commands, Calling Shell commands with expansion, Getting command output and redirections * [Control Structures](./Control_structures.md) * Condition checking, if, for, while, continue and break * [Lists](./Lists.md) * Assigning List variables, Slicing and Modifying Lists, Copying Lists, List Methods and Miscellaneous, Looping, List Comprehension, Getting List as user input, Getting random items from list * [Sequence, Set and Dict data types](./Sequence_Set_Dict_data_types.md) * Strings, Tuples, Set, Dictionary * [Text Processing](./Text_Processing.md) * String methods, Regular Expressions, Pattern matching and extraction, Search and Replace, Compiling Regular Expressions, Further Reading on Regular Expressions * [File handling](./File_handling.md) * open function, Reading files, Writing to files, Inplace editing with fileinput * [Command line arguments](./Command_line_arguments.md) * Known number of arguments, Varying number of arguments, Using program name in code, Command line switches * [Exception Handling and Debugging](./Exception_Handling_and_Debugging.md) * Exception Handling, Syntax check, pdb, Importing program * [Docstrings](./Docstrings.md) * Style guide, Palindrome example * [Testing](./Testing.md) * assert statement, Using assert to test a program, Using unittest framework, Using unittest.mock to test user input and program output, Other testing frameworks * [Exercises](./Exercises.md) * [Further Reading](./Further_Reading.md) * Standard topics not covered, Useful links on coding, Python extensions <br> ## <a name="contributing"></a>Contributing * Please open an issue for typos/bugs/suggestions/etc * As this repo is no longer actively worked upon, **please do not submit pull requests** * Share the repo with friends/colleagues, on social media, etc to help reach other learners * In case you need to reach me, mail me at `echo 'bGVhcm5ieWV4YW1wbGUubmV0QGdtYWlsLmNvbQo=' | base64 --decode` or send a DM via [twitter](https://twitter.com/learn_byexample) <br> # <a name="ebook"></a>ebook * Read as ebook on [gitbook](https://learnbyexample.gitbooks.io/python-basics/content/index.html) * All `legacy.gitbook.com` links are now automatically redirected to `gitbook.com`, so there's no longer an option to download ebooks for offline reading <br> # <a name="acknowledgements"></a>Acknowledgements * [automatetheboringstuff](https://automatetheboringstuff.com/) for getting me started with Python * [/r/learnpython/](https://www.reddit.com/r/learnpython/) - helpful forum for beginners and experienced programmers alike * [stackoverflow](https://stackoverflow.com/) - for getting answers to pertinent questions as well as sharpening skills by understanding and answering questions * [Devs and Hackers](http://devup.in/) - helpful slack group * [Weekly Coders, Hackers & All Tech related thread](https://www.reddit.com/r/india/search?q=Weekly+Coders%2C+Hackers+%26+All+Tech+related+thread+author%3Aavinassh&amp;restrict_sr=on&amp;sort=new&amp;t=all) - for suggestions and critique <br> # <a name="license"></a>License This work is licensed under a [Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License](https://creativecommons.org/licenses/by-nc-sa/4.0/)
556
A lightweight, fast and extensible game server for Minecraft
# Cuberite [![Jenkins Build Status](https://img.shields.io/jenkins/build?jobUrl=https%3A%2F%2Fbuilds.cuberite.org%2Fjob%2Fcuberite%2Fjob%2Fmaster&label=Jenkins)](https://builds.cuberite.org/job/cuberite/job/master/) [![AppVeyor Build Status](https://img.shields.io/appveyor/ci/cuberite/cuberite/master.svg?label=AppVeyor)](https://ci.appveyor.com/project/cuberite/cuberite) Cuberite is a Minecraft-compatible multiplayer game server that is written in C++ and designed to be efficient with memory and CPU, as well as having a flexible Lua Plugin API. Cuberite is compatible with the Java Edition Minecraft client. Cuberite runs on Windows, *nix and Android operating systems. This includes Android phones and tablets as well as Raspberry Pis. Currently we support Release 1.8 - 1.12.2 Minecraft protocol versions. Subscribe to [the newsletter][1] for important updates and project news. ## Installation There are several ways to obtain Cuberite. ### Binaries - The easiest method is downloading for Windows or Linux from the [website][2]. - You can use the EasyInstall script for Linux and macOS, which automatically downloads the correct binary. The script is described below. #### The EasyInstall script This script will download the correct binary from the project site. curl -sSfL https://download.cuberite.org | sh ### Compiling - You can compile automatically for Linux, macOS and FreeBSD with the `compile.sh` script. The script is described below. - You can also compile manually. See [COMPILING.md][4]. Compiling may provide better performance (1.5-3x as fast) and it supports more operating systems. #### The compile.sh script This script downloads the source code and compiles it. The script is smart enough to notify you of missing dependencies and instructing you on how to install them. The script doesn't work for Windows. Using curl: sh -c "$(curl -sSfL -o - https://compile.cuberite.org)" Or using wget: sh -c "$(wget -O - https://compile.cuberite.org)" ### Hosted services - Hosted Cuberite is available via [Gamocosm][5]. ## Contributing Cuberite is licensed under the Apache License V2, and we welcome anybody to fork and submit a Pull Request back with their changes, and if you want to join as a permanent member we can add you to the team. Cuberite is developed in C++ and Lua. To contribute code, please check out [GETTING-STARTED.md][6] and [CONTRIBUTING.md][7] for more details. Plugins are written in Lua. You can contribute by developing plugins and submitting them to the [plugin repository][8] or the [forum][9]. Please check out our [plugin introduction guide][10] for more info. If you are not a programmer, you can help by testing Cuberite and reporting bugs. See [TESTING.md][11] for details. You can also help with documentation by contributing to the [User's Manual][12]. ## Other Stuff For other stuff, check out the [homepage][13], the [Users' Manual][14], the [forums][15], and the [Plugin API][16]. Support the Cuberite development team on [Liberapay][17] [1]: https://cuberite.org/news/#subscribe [2]: https://cuberite.org/ [4]: https://github.com/cuberite/cuberite/blob/master/COMPILING.md [5]: https://gamocosm.com/ [6]: https://github.com/cuberite/cuberite/blob/master/GETTING-STARTED.md [7]: https://github.com/cuberite/cuberite/blob/master/CONTRIBUTING.md [8]: https://plugins.cuberite.org/ [9]: https://forum.cuberite.org/forum-2.html [10]: https://api.cuberite.org/Writing-a-Cuberite-plugin.html [11]: https://github.com/cuberite/cuberite/blob/master/TESTING.md [12]: https://github.com/cuberite/users-manual [13]: https://cuberite.org/ [14]: https://book.cuberite.org/ [15]: https://forum.cuberite.org/ [16]: https://api.cuberite.org/ [17]: https://liberapay.com/Cuberite
557
HackSys Extreme Vulnerable Windows Driver (HEVD)
# HackSys Extreme Vulnerable Driver ooooo ooooo oooooooooooo oooooo oooo oooooooooo. `888' `888' `888' `8 `888. .8' `888' `Y8b 888 888 888 `888. .8' 888 888 888ooooo888 888oooo8 `888. .8' 888 888 888 888 888 " `888.8' 888 888 888 888 888 o `888' 888 d88' o888o o888o o888ooooood8 `8' o888bood8P' ------------------------------------------------------------------------ [![Black Hat Arsenal](https://www.toolswatch.org/badges/arsenal/2016.svg)](https://www.blackhat.com/asia-16/arsenal.html#hacksys-extreme-vulnerable-driver) [![Appveyor Build Status](https://ci.appveyor.com/api/projects/status/o0i4crgqxjfnqf1s/branch/master?svg=true)](https://ci.appveyor.com/project/hacksysteam/hacksysextremevulnerabledriver/branch/master) [![GitHub all Releases](https://img.shields.io/github/downloads/hacksysteam/HackSysExtremeVulnerableDriver/total)](https://github.com/hacksysteam/HackSysExtremeVulnerableDriver/releases) [![Twitter Follow](https://img.shields.io/twitter/follow/HackSysTeam?style=social)](https://twitter.com/HackSysTeam) [![Mastodon Follow](https://img.shields.io/mastodon/follow/109291325205105061?domain=https%3A%2F%2Finfosec.exchange&style=social)](https://infosec.exchange/@hacksysteam) The **HackSys Extreme Vulnerable Driver (HEVD)** is a **Windows Kernel** driver that is intentionally vulnerable. It has been developed for **security researchers** and **enthusiasts** to improve their skills in **kernel-level** exploitation. **HEVD** offers a range of vulnerabilities, from simple **stack buffer overflows** to more complex issues such as **use-after-free**, **pool buffer overflows**, and **race conditions**. This allows researchers to explore exploitation techniques for each implemented vulnerability. ## Black Hat Arsenal 2016 [Presentation](https://www.blackhat.com/docs/asia-16/materials/arsenal/asia-16-Ansari-HackSys-Extreme-Vulnerable-Driver.pdf) [White Paper](https://www.blackhat.com/docs/asia-16/materials/arsenal/asia-16-Ansari-HackSys-Extreme-Vulnerable-Driver-wp.pdf) ## Blog Post [http://www.payatu.com/hacksys-extreme-vulnerable-driver/](http://www.payatu.com/hacksys-extreme-vulnerable-driver/) ## External Exploits [https://github.com/sam-b/HackSysDriverExploits](https://github.com/sam-b/HackSysDriverExploits) [https://github.com/sizzop/HEVD-Exploits](https://github.com/sizzop/HEVD-Exploits) [https://github.com/badd1e/bug-free-adventure](https://github.com/badd1e/bug-free-adventure) [https://github.com/FuzzySecurity/HackSysTeam-PSKernelPwn](https://github.com/FuzzySecurity/HackSysTeam-PSKernelPwn) [https://github.com/theevilbit/exploits/tree/master/HEVD](https://github.com/theevilbit/exploits/tree/master/HEVD) [https://github.com/GradiusX/HEVD-Python-Solutions](https://github.com/GradiusX/HEVD-Python-Solutions) [http://pastebin.com/ALKdpDsF](http://pastebin.com/ALKdpDsF) [https://github.com/Cn33liz/HSEVD-StackOverflow](https://github.com/Cn33liz/HSEVD-StackOverflow) [https://github.com/Cn33liz/HSEVD-StackOverflowX64](https://github.com/Cn33liz/HSEVD-StackOverflowX64) [https://github.com/Cn33liz/HSEVD-StackCookieBypass](https://github.com/Cn33liz/HSEVD-StackCookieBypass) [https://github.com/Cn33liz/HSEVD-ArbitraryOverwrite](https://github.com/Cn33liz/HSEVD-ArbitraryOverwrite) [https://github.com/Cn33liz/HSEVD-ArbitraryOverwriteGDI](https://github.com/Cn33liz/HSEVD-ArbitraryOverwriteGDI) [https://github.com/Cn33liz/HSEVD-StackOverflowGDI](https://github.com/Cn33liz/HSEVD-StackOverflowGDI) [https://github.com/Cn33liz/HSEVD-ArbitraryOverwriteLowIL](https://github.com/Cn33liz/HSEVD-ArbitraryOverwriteLowIL) [https://github.com/mgeeky/HEVD_Kernel_Exploit](https://github.com/mgeeky/HEVD_Kernel_Exploit) [https://github.com/tekwizz123/HEVD-Exploit-Solutions](https://github.com/tekwizz123/HEVD-Exploit-Solutions) [https://github.com/FULLSHADE/Windows-Kernel-Exploitation-HEVD](https://github.com/FULLSHADE/Windows-Kernel-Exploitation-HEVD) [https://github.com/w4fz5uck5/3XPL01t5/tree/master/OSEE_Training](https://github.com/w4fz5uck5/3XPL01t5/tree/master/OSEE_Training) ## External Blog Posts [http://niiconsulting.com/checkmate/2016/01/windows-kernel-exploitation/](http://niiconsulting.com/checkmate/2016/01/windows-kernel-exploitation/) [http://samdb.xyz/2016/01/16/intro_to_kernel_exploitation_part_0.html](http://samdb.xyz/2016/01/16/intro_to_kernel_exploitation_part_0.html) [http://samdb.xyz/2016/01/17/intro_to_kernel_exploitation_part_1.html](http://samdb.xyz/2016/01/17/intro_to_kernel_exploitation_part_1.html) [http://samdb.xyz/2016/01/18/intro_to_kernel_exploitation_part_2.html](http://samdb.xyz/2016/01/18/intro_to_kernel_exploitation_part_2.html) [http://samdb.xyz/2017/06/22/intro_to_kernel_exploitation_part_3.html](http://samdb.xyz/2017/06/22/intro_to_kernel_exploitation_part_3.html) [https://sizzop.github.io/2016/07/05/kernel-hacking-with-hevd-part-1.html](https://sizzop.github.io/2016/07/05/kernel-hacking-with-hevd-part-1.html) [https://sizzop.github.io/2016/07/06/kernel-hacking-with-hevd-part-2.html](https://sizzop.github.io/2016/07/06/kernel-hacking-with-hevd-part-2.html) [https://sizzop.github.io/2016/07/07/kernel-hacking-with-hevd-part-3.html](https://sizzop.github.io/2016/07/07/kernel-hacking-with-hevd-part-3.html) [https://sizzop.github.io/2016/07/08/kernel-hacking-with-hevd-part-4.html](https://sizzop.github.io/2016/07/08/kernel-hacking-with-hevd-part-4.html) [https://www.fuzzysecurity.com/tutorials/expDev/14.html](https://www.fuzzysecurity.com/tutorials/expDev/14.html) [https://www.fuzzysecurity.com/tutorials/expDev/15.html](https://www.fuzzysecurity.com/tutorials/expDev/15.html) [https://www.fuzzysecurity.com/tutorials/expDev/16.html](https://www.fuzzysecurity.com/tutorials/expDev/16.html) [https://www.fuzzysecurity.com/tutorials/expDev/17.html](https://www.fuzzysecurity.com/tutorials/expDev/17.html) [https://www.fuzzysecurity.com/tutorials/expDev/18.html](https://www.fuzzysecurity.com/tutorials/expDev/18.html) [https://www.fuzzysecurity.com/tutorials/expDev/19.html](https://www.fuzzysecurity.com/tutorials/expDev/19.html) [https://www.fuzzysecurity.com/tutorials/expDev/20.html](https://www.fuzzysecurity.com/tutorials/expDev/20.html) [http://dokydoky.tistory.com/445](http://dokydoky.tistory.com/445) [https://hshrzd.wordpress.com/2017/05/28/starting-with-windows-kernel-exploitation-part-1-setting-up-the-lab/](https://hshrzd.wordpress.com/2017/05/28/starting-with-windows-kernel-exploitation-part-1-setting-up-the-lab/) [https://hshrzd.wordpress.com/2017/06/05/starting-with-windows-kernel-exploitation-part-2/](https://hshrzd.wordpress.com/2017/06/05/starting-with-windows-kernel-exploitation-part-2/) [https://hshrzd.wordpress.com/2017/06/22/starting-with-windows-kernel-exploitation-part-3-stealing-the-access-token/](https://hshrzd.wordpress.com/2017/06/22/starting-with-windows-kernel-exploitation-part-3-stealing-the-access-token/) [https://osandamalith.com/2017/04/05/windows-kernel-exploitation-stack-overflow/](https://osandamalith.com/2017/04/05/windows-kernel-exploitation-stack-overflow/) [https://osandamalith.com/2017/06/14/windows-kernel-exploitation-arbitrary-overwrite/](https://osandamalith.com/2017/06/14/windows-kernel-exploitation-arbitrary-overwrite/) [https://osandamalith.com/2017/06/22/windows-kernel-exploitation-null-pointer-dereference/](https://osandamalith.com/2017/06/22/windows-kernel-exploitation-null-pointer-dereference/) [http://dali-mrabet1.rhcloud.com/windows-kernel-exploitation-arbitrary-memory-overwrite-hevd-challenges/](http://dali-mrabet1.rhcloud.com/windows-kernel-exploitation-arbitrary-memory-overwrite-hevd-challenges/) [https://blahcat.github.io/2017/08/31/arbitrary-write-primitive-in-windows-kernel-hevd/](https://blahcat.github.io/2017/08/31/arbitrary-write-primitive-in-windows-kernel-hevd/) [https://klue.github.io/blog/2017/09/hevd_stack_gs/](https://klue.github.io/blog/2017/09/hevd_stack_gs/) [https://glennmcgui.re/introduction-to-windows-kernel-exploitation-pt-1/](https://glennmcgui.re/introduction-to-windows-kernel-exploitation-pt-1/) [https://glennmcgui.re/introduction-to-windows-kernel-driver-exploitation-pt-2/](https://glennmcgui.re/introduction-to-windows-kernel-driver-exploitation-pt-2/) [https://kristal-g.github.io/2021/02/07/HEVD_StackOverflowGS_Windows_10_RS5_x64.html](https://kristal-g.github.io/2021/02/07/HEVD_StackOverflowGS_Windows_10_RS5_x64.html) [https://kristal-g.github.io/2021/02/20/HEVD_Type_Confusion_Windows_10_RS5_x64.html](https://kristal-g.github.io/2021/02/20/HEVD_Type_Confusion_Windows_10_RS5_x64.html) [https://wafzsucks.medium.com/hacksys-extreme-vulnerable-driver-arbitrary-write-null-new-solution-7d45bfe6d116](https://wafzsucks.medium.com/hacksys-extreme-vulnerable-driver-arbitrary-write-null-new-solution-7d45bfe6d116) ## Author > **Ashfaq Ansari** > ashfaq[at]hacksys[dot]io > **[Blog](https://hacksys.io/ "HackSys Team") | [@HackSysTeam](https://twitter.com/HackSysTeam)** > [![HackSys Inc](https://hacksys.io/android-chrome-192x192.png "HackSys Inc")](https://hacksys.io) > [https://hacksys.io/](https://hacksys.io/ "HackSys Inc") ## Screenshots ![Driver Banner](Screenshots/hevd-banner.png "Driver Banner") ![Help](Screenshots/hevd-help.png "Help") ![Exploitation](Screenshots/hevd-exploitation.png "Exploitation") ![Driver Debug Print](Screenshots/hevd-debug-print.png "Driver Debug Print") ## Vulnerabilities Implemented * **Write NULL** * **Double Fetch** * **Buffer Overflow** * **Stack** * **Stack GS** * **NonPagedPool** * **NonPagedPoolNx** * **PagedPoolSession** * **Use After Free** * **NonPagedPool** * **NonPagedPoolNx** * **Type Confusion** * **Integer Overflow** * **Arithmetic Overflow** * **Memory Disclosure** * **NonPagedPool** * **NonPagedPoolNx** * **Arbitrary Increment** * **Arbitrary Overwrite** * **Null Pointer Dereference** * **Uninitialized Memory** * **Stack** * **NonPagedPool** * **Insecure Kernel Resource Access** ## Building the driver 1. [Install Visual Studio 2017](https://visualstudio.microsoft.com/downloads/) 2. [Install Windows Driver Kit](https://docs.microsoft.com/en-us/windows-hardware/drivers/download-the-wdk) 3. Run the appropriate driver builder `Build_HEVD_Vulnerable_x86.bat` or `Build_HEVD_Vulnerable_x64.bat` ## Download If you do not want to build **HackSys Extreme Vulnerable Driver** from source, you could download pre-built executables for the latest release: [https://github.com/hacksysteam/HackSysExtremeVulnerableDriver/releases](https://github.com/hacksysteam/HackSysExtremeVulnerableDriver/releases) ## Installing the driver Use [OSR Driver Loader](https://www.osronline.com/article.cfm?article=157) to install **HackSys Extreme Vulnerable Driver** ## Testing The **HackSys Extreme Vulnerable Driver** and the respective exploits have been tested on **Windows 7 SP1 x86** and **Windows 10 x64** ## Sessions Conducted * [Windows Kernel Exploitation 1](http://null.co.in/event_sessions/156-windows-kernel-exploitation) * [Windows Kernel Exploitation 2](http://null.co.in/event_sessions/186-windows-kernel-exploitation-2) * [Windows Kernel Exploitation 3](http://null.co.in/event_sessions/226-windows-kernel-exploitation-3) * [Windows Kernel Exploitation 4](http://null.co.in/event_sessions/234-windows-kernel-exploitation-4) * [Windows Kernel Exploitation 5](http://null.co.in/event_sessions/309-windows-kernel-exploitation-5) * [Windows Kernel Exploitation 6](https://null.co.in/event_sessions/482-windows-kernel-exploitation-6) * [Windows Kernel Exploitation 7](https://null.co.in/event_sessions/845-windows-kernel-exploitation-7) ## Workshops Conducted * [Windows Kernel Exploitation Humla Pune](http://null.co.in/event_sessions/280-windows-kernel-exploitation) * [Windows Kernel Exploitation Humla Mumbai](http://null.co.in/event_sessions/327-windows-kernel-exploitation) ## License Please see the file `LICENSE` for copying permission ## Contribution Guidelines Please see the file `CONTRIBUTING.md` for contribution guidelines ## TODO & Bug Reports Please file any enhancement request or bug report via **GitHub** issue tracker at the below-given address: [https://github.com/hacksysteam/HackSysExtremeVulnerableDriver/issues](https://github.com/hacksysteam/HackSysExtremeVulnerableDriver/issues) ## Acknowledgments Thanks go to these wonderful people: 🎉 <a href="https://github.com/hacksysteam/HackSysExtremeVulnerableDriver/graphs/contributors"> <img src="https://contrib.rocks/image?repo=hacksysteam/HackSysExtremeVulnerableDriver" /> </a> ------------------------------------------------------------------------ [![HackSys Inc](https://hacksys.io/android-chrome-192x192.png "HackSys Inc")](https://hacksys.io)
558
Native, lightweight modal code editor
[![Build Status](https://dev.azure.com/onivim/oni2/_apis/build/status/onivim.oni2?branchName=master)](https://dev.azure.com/onivim/oni2/_build/latest?definitionId=1?branchName=master) [![Discord](https://img.shields.io/discord/417774914645262338.svg)](https://discord.gg/7maEAxV) # Onivim 2 ### Lightweight, Modal Code Editor :warning: Currently in alpha - may have bugs or instability - use with caution :warning: <p align="center"> <img width="800" alt="Onivim 2" src="https://user-images.githubusercontent.com/13532591/109881233-c88cad80-7c2c-11eb-83a1-67a7adcbbd7e.png"> </p> ## Introduction Onivim 2 is a reimagination of the [Oni](https://www.onivim.io) editor. Onivim 2 aims to bring the _speed_ of Sublime, the _language integration_ of VSCode, and the _modal editing experience_ of Vim together, in a single package. Onivim 2 is built in [`reason`](https://reasonml.github.io) using the [`revery`](https://github.com/revery-ui/revery) framework. Onivim 2 uses [`libvim`](https://github.com/onivim/libvim) to manage buffers and provide authentic modal editing, and features a fast, native front-end. In addition, Onivim 2 leverages the VSCode Extension Host process in its entirety - meaning, eventually, complete support for VSCode extensions and configuration. ### Goals - __Modern UX__ - an experience on par with modern code editors like VSCode and Atom - __VSCode Plugin Support__ - use all of the features of VSCode plugins, including language servers and debuggers - __Cross-Platform__ - works on Windows, OSX, and Linux - __Batteries Included__ - works out of the box - __Performance__ - no compromises: native performance, minimal input latency - __Easy to Learn__ - Onivim 2 should be comfortable for non-vimmers, too! The goal of this project is to build an editor that doesn't exist today - the _speed_ of a native code editor like Sublime, the _power_ of modal editing, and the _rich tooling_ that comes with a lightweight editor like VSCode. ### Non-goals - __100% VimL compatibility__ - we may not support all features of VimL plugins / configuration. ## Documentation - Onivim User Manual - [Getting Started](https://onivim.github.io/docs/getting-started/why-onivim) - [Basic Usage](https://onivim.github.io/docs/using-onivim/moving-in-onivim) - [FAQ](https://onivim.github.io/docs/other/faq) ## Contributing We'd :heart: help building Onivim 2! If you are interested in fixing issues and contributing directly to the code, please see the [How to Contribute](https://onivim.github.io/docs/for-developers/contributing) document, which includes the following: - [How to build and run from source](https://onivim.github.io/docs/for-developers/building) - [Pull Request Guidelines](https://onivim.github.io/docs/for-developers/contributing) Please also see our [Code of Conduct](./CODE_OF_CONDUCT.md). ## Feedback - [Tweet us](https://twitter.com/oni_vim) with feedback - Come visit us on [Discord](https://discord.gg/7maEAxV) - Join the discussion on [Reddit](https://reddit.com/r/onivim) - [File an issue](https://github.com/onivim/oni2/issues) on GitHub ## License Onivim 2 source code is licensed under the [MIT](LICENSE.md) license. Onivim 2 downloads, available at https://v2.onivim.io/, are licensed under the [Outrun Labs EULA 1.1](./Outrun-Labs-EULA-v1.1.md). #### Third-Party Code Several dependencies have their own set of license terms here: [ThirdPartyLicenses.txt](ThirdPartyLicenses.txt) Copyright (c) 2019-2020 Outrun Labs, LLC.
559
Daemon to ban hosts that cause multiple authentication errors
__ _ _ ___ _ / _|__ _(_) |_ ) |__ __ _ _ _ | _/ _` | | |/ /| '_ \/ _` | ' \ |_| \__,_|_|_/___|_.__/\__,_|_||_| v1.0.1.dev1 20??/??/?? ## Fail2Ban: ban hosts that cause multiple authentication errors Fail2Ban scans log files like `/var/log/auth.log` and bans IP addresses conducting too many failed login attempts. It does this by updating system firewall rules to reject new connections from those IP addresses, for a configurable amount of time. Fail2Ban comes out-of-the-box ready to read many standard log files, such as those for sshd and Apache, and is easily configured to read any log file of your choosing, for any error you wish. Though Fail2Ban is able to reduce the rate of incorrect authentication attempts, it cannot eliminate the risk presented by weak authentication. Set up services to use only two factor, or public/private authentication mechanisms if you really want to protect services. <img src="http://www.worldipv6launch.org/wp-content/themes/ipv6/downloads/World_IPv6_launch_logo.svg" height="52pt"/> | Since v0.10 fail2ban supports the matching of IPv6 addresses. ------|------ This README is a quick introduction to Fail2Ban. More documentation, FAQ, and HOWTOs to be found on fail2ban(1) manpage, [Wiki](https://github.com/fail2ban/fail2ban/wiki), [Developers documentation](https://fail2ban.readthedocs.io/) and the website: https://www.fail2ban.org Installation: ------------- **It is possible that Fail2Ban is already packaged for your distribution. In this case, you should use that instead.** Required: - [Python2 >= 2.7 or Python >= 3.2](https://www.python.org) or [PyPy](https://pypy.org) - python-setuptools, python-distutils or python3-setuptools for installation from source Optional: - [pyinotify >= 0.8.3](https://github.com/seb-m/pyinotify), may require: * Linux >= 2.6.13 - [gamin >= 0.0.21](http://www.gnome.org/~veillard/gamin) - [systemd >= 204](http://www.freedesktop.org/wiki/Software/systemd) and python bindings: * [python-systemd package](https://www.freedesktop.org/software/systemd/python-systemd/index.html) - [dnspython](http://www.dnspython.org/) To install: tar xvfj fail2ban-1.0.1.tar.bz2 cd fail2ban-1.0.1 sudo python setup.py install Alternatively, you can clone the source from GitHub to a directory of Your choice, and do the install from there. Pick the correct branch, for example, master or 0.11 git clone https://github.com/fail2ban/fail2ban.git cd fail2ban sudo python setup.py install This will install Fail2Ban into the python library directory. The executable scripts are placed into `/usr/bin`, and configuration in `/etc/fail2ban`. Fail2Ban should be correctly installed now. Just type: fail2ban-client -h to see if everything is alright. You should always use fail2ban-client and never call fail2ban-server directly. You can verify that you have the correct version installed with fail2ban-client version Please note that the system init/service script is not automatically installed. To enable fail2ban as an automatic service, simply copy the script for your distro from the `files` directory to `/etc/init.d`. Example (on a Debian-based system): cp files/debian-initd /etc/init.d/fail2ban update-rc.d fail2ban defaults service fail2ban start Configuration: -------------- You can configure Fail2Ban using the files in `/etc/fail2ban`. It is possible to configure the server using commands sent to it by `fail2ban-client`. The available commands are described in the fail2ban-client(1) manpage. Also see fail2ban(1) and jail.conf(5) manpages for further references. Code status: ------------ * travis-ci.org: [![tests status](https://secure.travis-ci.org/fail2ban/fail2ban.svg?branch=master)](https://travis-ci.org/fail2ban/fail2ban?branch=master) / [![tests status](https://secure.travis-ci.org/fail2ban/fail2ban.svg?branch=0.11)](https://travis-ci.org/fail2ban/fail2ban?branch=0.11) (0.11 branch) / [![tests status](https://secure.travis-ci.org/fail2ban/fail2ban.svg?branch=0.10)](https://travis-ci.org/fail2ban/fail2ban?branch=0.10) (0.10 branch) * coveralls.io: [![Coverage Status](https://coveralls.io/repos/fail2ban/fail2ban/badge.svg?branch=master)](https://coveralls.io/github/fail2ban/fail2ban?branch=master) / [![Coverage Status](https://coveralls.io/repos/fail2ban/fail2ban/badge.svg?branch=0.11)](https://coveralls.io/github/fail2ban/fail2ban?branch=0.11) (0.11 branch) / [![Coverage Status](https://coveralls.io/repos/fail2ban/fail2ban/badge.svg?branch=0.10)](https://coveralls.io/github/fail2ban/fail2ban?branch=0.10) / (0.10 branch) * codecov.io: [![codecov.io](https://codecov.io/gh/fail2ban/fail2ban/coverage.svg?branch=master)](https://codecov.io/gh/fail2ban/fail2ban/branch/master) / [![codecov.io](https://codecov.io/gh/fail2ban/fail2ban/coverage.svg?branch=0.11)](https://codecov.io/gh/fail2ban/fail2ban/branch/0.11) (0.11 branch) / [![codecov.io](https://codecov.io/gh/fail2ban/fail2ban/coverage.svg?branch=0.10)](https://codecov.io/gh/fail2ban/fail2ban/branch/0.10) (0.10 branch) Contact: -------- ### Bugs, feature requests, discussions? See [CONTRIBUTING.md](https://github.com/fail2ban/fail2ban/blob/master/CONTRIBUTING.md) ### You just appreciate this program: Send kudos to the original author ([Cyril Jaquier](mailto:[email protected])) or *better* to the [mailing list](https://lists.sourceforge.net/lists/listinfo/fail2ban-users) since Fail2Ban is "community-driven" for years now. Thanks: ------- See [THANKS](https://github.com/fail2ban/fail2ban/blob/master/THANKS) file. License: -------- Fail2Ban is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. Fail2Ban is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with Fail2Ban; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110, USA
560
Legacy code of the WebCatalog app.
# WebCatalog [![License: MPL 2.0](https://img.shields.io/badge/License-MPL%202.0-brightgreen.svg)](LICENSE) ## Archived This repository is archived. To help us better improve the product and protect our intellectual assets, WebCatalog app's development has been moved to a closed source code base. ## Introduction |macOS| |---| |[![macOS](https://github.com/webcatalog/webcatalog-app/workflows/macOS/badge.svg)](https://github.com/webcatalog/webcatalog-app/actions?query=workflow:%22macOS%22)| |Windows| |---| |[![Windows](https://github.com/webcatalog/webcatalog-app/workflows/Windows/badge.svg)](https://github.com/webcatalog/webcatalog-app/actions?query=workflow:%22Windows%22)| |Linux (x64)|Linux (arm64)| |---|---| |[![Linux (x64)](https://github.com/webcatalog/webcatalog-app/workflows/Linux%20(x64)/badge.svg)](https://github.com/webcatalog/webcatalog-app/actions?query=workflow%3A%22Linux+%28x64%29%22)|[![Linux (arm64)](https://github.com/webcatalog/webcatalog-app/workflows/Linux%20(arm64)/badge.svg)](https://github.com/webcatalog/webcatalog-app/actions?query=workflow%3A%22Linux+%28arm64%29%22)| **[WebCatalog](https://webcatalog.io/webcatalog/)** - Turn Websites into Desktop Apps. **master** branch only includes the source code of WebCatalog 13 and above. For older versions, check out the **legacy-** branches. --- ## Licensing ### Usage **WebCatalog is a commercial product.** [Learn more about our pricing](https://webcatalog.io/webcatalog/pricing/). ### Source Code On the other hand, **the source code is freely available** for use, modification and distribution under the permissions, limitations and conditions listed in the [Mozilla Public License 2.0](LICENSE). --- ## Development This repository only contains the source code of the WebCatalog app. For the source code of the core that powers the apps created with WebCatalog, check out <https://github.com/webcatalog/neutron>. For the app to be fully functional, set these environment variables: ``` REACT_APP_AMPLITUDE_API_KEY= REACT_APP_ELASTIC_CLOUD_APP_SEARCH_SEARCH_KEY= REACT_APP_ELASTIC_CLOUD_APP_SEARCH_API_ENDPOINT= REACT_APP_ELASTIC_CLOUD_APP_SEARCH_ENGINE_NAME= ELECTRON_APP_SENTRY_DSN= ``` Then, run: ```bash # clone the project: git clone https://github.com/webcatalog/webcatalog-app.git cd webcatalog-app # install the dependencies yarn # run the app yarn electron-dev # Build for production yarn dist ```
561
generate CobaltStrike's cross-platform payload
# CrossC2 framework [README](README.md) | [中文文档](README_zh.md) 🚀 For a faster way, see **cna** introduction [GO📌](#cna-plugin-way) 🔥 **Linux** & **MacOS** supports no file landing, load and execute from memory **dynamic library** or **executable file** [GO📖](https://gloxec.github.io/CrossC2/en/api/) 🔥 Flexibly customize the data return type of the execution file, **portscan**, **screenshot**, **keystrokes**, **credentials** and other user-defined development to achieve more convenient implementation [GO📖](https://gloxec.github.io/CrossC2/en/api/commons.html) ( [Sample: GO📌](#CustomExtension) ) 🔥 Custom communication protocol [GO📖](https://gloxec.github.io/CrossC2/en/protocol/) 🔥 Now supports lateral movement [GO📌](#Lateral-movement:-Usage) 🔥 Now supports loading scripts from memory [GO📌](#Run script-in-memory) 🎉 **Android** & **iPhone** support [GO📌](#Mobile) # CrossC2 framework - Generator CobaltStrike's cross-platform beacon ``` ▄████▄ ██▀███ ▒█████ ██████ ██████ ▄████▄ ██████▄ ▒██▀ ▀█ ▓██ ▒ ██▒▒██▒ ██▒▒██ ▒ ▒██ ▒ ▒██▀ ▀█ ██░ ▒▓█ ▄ ▓██ ░▄█ ▒▒██░ ██▒░ ▓██▄ ░ ▓██▄ ▒▓█ █████▒ ▒▓▓▄ ▄██▒▒██▀▀█▄ ▒██ ██░ ▒ ██▒ ▒ ██▒ ▒▓▓▄ ▄█ ░▒██ ▒ ▓███▀ ░░██▓ ▒██▒░ ████▓▒░▒██████▒▒▒██████▒▒ ▒ ▓███▀ ░▒▓█████▓ ░ ░▒ ▒ ░░ ▒▓ ░▒▓░░ ▒░▒░▒░ ▒ ▒▓▒ ▒ ░▒ ▒▓▒ ▒ ░ ░ ░▒ ▒ ░▒ ░▓ ░░ ░ ▒ ░▒ ░ ▒░ ░ ▒ ▒░ ░ ░▒ ░ ░░ ░▒ ░ ░ ░ ▒ ░ ░░ ░ ░ ░░ ░ ░ ░ ░ ▒ ░ ░ ░ ░ ░ ░ CrossC2 v2.0 @hook ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ``` ![](media/15901534124389/15985513904454.jpg) ![](media/15848885324084/15848892759774.jpg) # Description A security framework for enterprises and Red Team personnel, supports CobaltStrike's penetration testing of other platforms (Linux / MacOS / ...), supports custom modules, and includes some commonly used penetration modules. `Only for internal use by enterprises and organizations, this framework has a certain degree of instability. Non-professionals are not allowed to use it. Anyone shall not use it for illegal purposes and profitability. Besides that, publishing unauthorized modified version is also prohibited, or otherwise bear legal responsibilities.` | | Windows | Linux | MacOS | iOS | Android | Embedded | | --- | --- | --- | --- | --- | --- | --- | | Run Env (x86) | | √ | | | | | | Run Env (x64) | √ | √ | √ | | | | | gen beacon (x86) | | √ | | | √ | | | gen beacon (x64) | | √ | √ | | | | | gen beacon (armv7) | | | | ⍻ | √ | | | gen beacon (arm64) | | | | √ | √ | | | gen beacon (mips[el]) | | | | | | ⍻ | Restricted description: * CobaltStrike: currently only supports the last version of cs 3.14(bug fixs) and 4.x versions are supported (see the cs4.1 branch for details). * Linux: For particularly old systems, you can choose "Linux-GLIBC" option in cna (around 2010) * MacOS: Latest systems only support 64-bit programs * iOS: sandbox, restricted cmd * Embedded: only *nix * ⍻ : Loader is still in progress # Install & Usage > Download: * **CrossC2.cna** * **genCrossC2** `(If it is a Windows system, download genCrossC2.Win.exe)` 1. choose `Script Manager`,add `CrossC2.cna` (If successfully installed, the menu bar will have an additional item `CrossC2`) 2. Modify the `genCC2` path in the` CrossC2.cna` script to the **real path** ``` 77: $genCC2 = "/xxx/xx/xx/genCrossC2.MacOS"; # <-------- fix ``` > Create listener and copy key: For some reasons, only HTTPS beacon is currently supported. **Copy `.cobaltstrike.beacon_keys` from the cs directory on the server to the local directory.** ## Reference documents: [📖 Wiki](https://gloxec.github.io/CrossC2/en/usage/) ## Module: API introduction [📖 Wiki](https://gloxec.github.io/CrossC2/en/api/) It adopts the method of loading memory without landing, and supports dynamic libraries (.so/.dylib) and executable files (ELF/MachO). `⚠️: Although the file is loaded directly from memory, the process can be viewed in ps when the executable file is passed in, but the process name can be customized.` The type of output information can be freely specified at the time of execution. The return type has been predetermined and can be docked with the native return data type of CS. `⚠️: For special data types, such as passwords, port scan results, etc., please refer to the information returned by the native function of cs, which will be matched according to the regular.` 1. Password dump module: cc2_mimipenguin uses the open source project MimiPenguin2.0, see CrossC2Kit/ mimipenguin/mimipenguin.cna 2. Authentication backdoor modules: cc2_auth, cc2_ssh sudo / su / passwd and other authentication backdoors, ssh is connected and the credentials to connect to other hosts will be recorded. 3. Information collection modules: cc2_safari_dump, cc2_chrome_dump, cc2_iMessage_dump, cc2_keychain_dump access records of common browsers, as well as iMessage chat content and authentication credentials saved in the keychain will be obtained. 4. Traffic proxy module: cc2_frp supports fast TCP/KCP(UDP) reverse socks5 encrypted traffic proxy. 5. Keylogger module: cc2_keylogger records user's keyboard input. 6. Network detection module: cc2_portscan, cc2_serverscan for port scanning and service version scanning. 7. Privilege promotion module: cc2_prompt_spoof induces deception to obtain user account password. 8. Task management module: cc2_job manages the modules running in memory. 9. ... ## Custom communication protocol: API introduction [📖 Wiki](https://gloxec.github.io/CrossC2/en/protocol/) Can more easily realize C2Profile configuration and custom communication protocol TCP / UDP and so on. ## Lateral movement 1. Generate beacon of `Linux-bind` / `MacOS-bind` type 2. The target in the intranet runs `./MacOS-bind.beacon <port>` to start the service 3. Run `connect <targetIP>:<port>` in the session of China Unicom ## Run script in memory The script interpreter such as **bash** / **python** / **ruby** / **perl** / **php** in the host can be called directly in the session to execute the script passed into the memory. `There is no information in the process, all running content is transferred from the memory to the interpreter` 1. python c:\getsysteminfo.py 2. python import base64;print base64.b64encode('whoami'); print 'a'*40 3. php <?php phpinfo()?> Try to load local script: ![](media/15901534124389/16041501958652.jpg) Try to run the scripting language directly: ![](media/15901534124389/16041502298949.jpg) # Coming soon 1. Rich C2Profile support ✔︎ (Choose custom HTTP module when CNA generates beaocn) 2. Staged Type Shellcode Generation ✔︎ (Only Linux is temporarily supported, and stagerServer needs to be started on the server) 3. http-proxy (auth) & socks proxy back connection support 4. Proxy-Pivots ✔︎ (Temporarily adopt the method of connecting back to socks proxy) 5. node beacon? (Single node type, can host other beacon without relying on teamserver) # Examples ## Mobile ![](media/15848885324084/15848892759774.jpg) ![](media/15848885324084/15848892902723.jpg) ## MacOS & Linux ![](media/15794884596715/15795001494711.jpg) ![](media/15824278372797/15824282351545.jpg) ## CustomExtension Develop dynamic libraries and customize data return types, such as implementing some built-in functions. ### keystrokes ![](media/15854585486601/15854592406527.jpg) ### credentials ![](media/15854585486601/15854601104042.jpg) ### portscan ![](media/15854585486601/15854593957704.jpg) # ChangeLog ## release v2.1 : * +support Support for parsing and executing scripts from memory * +support Support CobaltStrike 4.1 (see cs4.1 branch for details) ## release v2.0 : * -fix Fix the problem of path errors caused by backslashes when uploading files in the file management office * -fix Long-term testing in various scenarios in the real environment, fixing some hidden problems, and now more stable * +support Support for lower kernel version systems * +support Environment variables are automatically set at startup * +support Delete sensitive env records at startup * +support The background service process can be linked to the init process at startup * +support Increase session spawn function * +support Increase the function of session setting environment variables * +support Increase the privilege escalation function of session getsystem * +support Increase session analysis function to handle multiple merge tasks * +support Increase Mac & Linux lateral movement function ## release v1.5 : * -fix genCrossC2's bug about protocol rebinding. ## release v1.4 : * -fix Linux daemon process and joblist display problem. ## release v1.3 : * +support Support custom communication protocol (HTTP, TCP, UDP...) . * +support A new joblist module has been added to manage programs running without files in persistent memory. * +support Reverse proxy module{TCP/KCP(UDP)} that executes without files in memory. md5(genCrossC2.Linux) = 221b3ede4e78fee80f59946f116d7245 md5(genCrossC2.MacOS) = d216cad3fe3c25ead46b85c7ad7051f1 md5(genCrossC2.Win.exe) = a573506e8825b46b041ac3b9307a656b ## release v1.2 : * +support Support manual selection of key files. * +support Support to generate shellcode. * -change No longer rely on cobaltstrike.jar (plug-ins can be placed in any directory). * -change More flexible and convenient Script Unix Web Delivery. md5(genCrossC2.Linux) = 2ef7250cc3787d3cbd1e6f99c3c434aa md5(genCrossC2.MacOS) = eaabde94dd7fed8dabb37cd67a1171c4 md5(genCrossC2.Win.exe) = c65ac808ed3a1000b3ff4ebb8c48ea4e ## release v1.1 : * -fix Multi-language garbled problem fix for memory load execution function md5(genCrossC2.Linux) = 2347ed6e30e4655b793a6dbb4d33d25c md5(genCrossC2.MacOS) = f530333500a76fe228864f8901af4104 md5(genCrossC2.Win.exe) = c223e31b2674a8a11d3254f92259e87a ## release v1.0 : * -fix Test multiple times for a long time in multiple scenarios in real environment, fix some hidden problems, now more stable * +support Linux & MacOS Supports no file landing, loading and executing from memory * +support Reserved CS built-in data types, richer user-defined plug-in return data types, free and easy to implement 'portscan' and other native functions md5(genCrossC2.Linux) = 12295998d4bffd5b4c4a411fb33428bb md5(genCrossC2.MacOS) = c88ce9df47529b243e2215a866d445c5 md5(genCrossC2.Win.exe) = 51d1814f1ebbab634bce0373ceb7cee6 ## release v0.4 : * -change Multi-threaded background when shell commands are executed * -change Redirect error output to standard output when shell command is executed. * +support Add background file download function. md5(genCrossC2.Linux) = b2e34f721ec2543b6625e33c8c2935df md5(genCrossC2.MacOS) = 4e38a9d9a3eeff309648afc02e2e7664 ## release v0.3 : * +support Compatibility with older versions of GLIBC on older systems Linux (around 2010). ## release v0.2 : * -fix genCrossC2.Linux crash. * -fix uploading large file error. * +support GUI file manager. md5(genCrossC2.Linux) = 8256374d88c2149efc102aff7e90b3f9 md5(genCrossC2.MacOS) = 08fce0a5d964a091d8bf2344d7ab809e ## release v0.1 : * Support Linux & MacOS beacon generation. md5(genCrossC2.Linux) = f4c0cc85c7cdd096d2b7febedc037538 md5(genCrossC2.MacOS) = 79fff0505092fc2055824ed1289ce8f9
562
HTTP and WebSocket built on Boost.Asio in C++11
<img width="880" height = "80" alt = "Boost.Beast Title" src="https://raw.githubusercontent.com/boostorg/beast/master/doc/images/readme2.png"> # HTTP and WebSocket built on Boost.Asio in C++11 Branch | Linux / Windows | Coverage | Documentation | Matrix | ----------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------|---------------------------------------------------------------------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------| [master](https://github.com/boostorg/beast/tree/master) | [![Build Status](https://drone.cpp.al/api/badges/boostorg/beast/status.svg?ref=refs/heads/master)](https://drone.cpp.al/boostorg/beast) | [![codecov](https://img.shields.io/codecov/c/github/boostorg/beast/master.svg)](https://codecov.io/gh/boostorg/beast/branch/master) | [![Documentation](https://img.shields.io/badge/documentation-master-brightgreen.svg)](http://www.boost.org/doc/libs/master/libs/beast/doc/html/index.html) | [![Matrix](https://img.shields.io/badge/matrix-master-brightgreen.svg)](http://www.boost.org/development/tests/master/developer/beast.html) | [develop](https://github.com/boostorg/beast/tree/develop) | [![Build Status](https://drone.cpp.al/api/badges/boostorg/beast/status.svg?ref=refs/heads/develop)](https://drone.cpp.al/boostorg/beast) | [![codecov](https://img.shields.io/codecov/c/github/boostorg/beast/develop.svg)](https://codecov.io/gh/boostorg/beast/branch/develop) | [![Documentation](https://img.shields.io/badge/documentation-develop-brightgreen.svg)](https://www.boost.org/doc/libs/develop/libs/beast/index.html) | [![Matrix](https://img.shields.io/badge/matrix-develop-brightgreen.svg)](https://www.boost.org/development/tests/develop/developer/beast.html) | ## Contents - [Introduction](#introduction) - [Appearances](#appearances) - [Description](#description) - [Requirements](#requirements) - [Git Branches](#branches) - [Building](#building) - [Usage](#usage) - [License](#license) - [Contact](#contact) - [Contributing](#contributing-we-need-your-help) ## Introduction Beast is a C++ header-only library serving as a foundation for writing interoperable networking libraries by providing **low-level HTTP/1, WebSocket, and networking protocol** vocabulary types and algorithms using the consistent asynchronous model of Boost.Asio. This library is designed for: * **Symmetry:** Algorithms are role-agnostic; build clients, servers, or both. * **Ease of Use:** Boost.Asio users will immediately understand Beast. * **Flexibility:** Users make the important decisions such as buffer or thread management. * **Performance:** Build applications handling thousands of connections or more. * **Basis for Further Abstraction.** Components are well-suited for building upon. ## Appearances | <a href="https://github.com/vinniefalco/CppCon2018">CppCon 2018</a> | <a href="https://www.bishopfox.com/case_study/securing-beast/">Bishop Fox 2018</a> | | ------------ | ------------ | | <a href="https://www.youtube.com/watch?v=7FQwAjELMek"><img width="320" height = "180" alt="Beast" src="https://raw.githubusercontent.com/vinniefalco/CppCon2018/master/CppCon2018.png"></a> | <a href="https://youtu.be/4TtyYbGDAj0"><img width="320" height = "180" alt="Beast Security Review" src="https://raw.githubusercontent.com/vinniefalco/BeastAssets/master/BishopFox2018.png"></a> | | <a href="https://github.com/vinniefalco/CppCon2018">CppCon 2017</a> | <a href="http://cppcast.com/2017/01/vinnie-falco/">CppCast 2017</a> | <a href="https://raw.githubusercontent.com/vinniefalco/BeastAssets/master/CppCon2016.pdf">CppCon 2016</a> | | ------------ | ------------ | ----------- | | <a href="https://www.youtube.com/watch?v=WsUnnYEKPnI"><img width="320" height = "180" alt="Beast" src="https://raw.githubusercontent.com/vinniefalco/CppCon2017/master/CppCon2017.png"></a> | <a href="http://cppcast.com/2017/01/vinnie-falco/"><img width="180" height="180" alt="Vinnie Falco" src="https://avatars1.githubusercontent.com/u/1503976?v=3&u=76c56d989ef4c09625256662eca2775df78a16ad&s=180"></a> | <a href="https://www.youtube.com/watch?v=uJZgRcvPFwI"><img width="320" height = "180" alt="Beast" src="https://raw.githubusercontent.com/vinniefalco/BeastAssets/master/CppCon2016.png"></a> | ## Description This software is in its first official release. Interfaces may change in response to user feedback. For recent changes see the [CHANGELOG](CHANGELOG.md). * [Official Site](https://github.com/boostorg/beast) * [Documentation](https://www.boost.org/doc/libs/master/libs/beast/) (master branch) * [Autobahn|Testsuite WebSocket Results](https://vinniefalco.github.io/boost/beast/reports/autobahn/index.html) ## Requirements This library is for programmers familiar with Boost.Asio. Users who wish to use asynchronous interfaces should already know how to create concurrent network programs using callbacks or coroutines. * **C++11:** Robust support for most language features. * **Boost:** Boost.Asio and some other parts of Boost. * **OpenSSL:** Required for using TLS/Secure sockets and examples/tests When using Microsoft Visual C++, Visual Studio 2017 or later is required. One of these components is required in order to build the tests and examples: * Properly configured bjam/b2 * CMake 3.5.1 or later (Windows only) ## Building Beast is header-only. To use it just add the necessary `#include` line to your source files, like this: ```C++ #include <boost/beast.hpp> ``` If you use coroutines you'll need to link with the Boost.Coroutine library. Please visit the Boost documentation for instructions on how to do this for your particular build system. ## GitHub To use the latest official release of Beast, simply obtain the latest Boost distribution and follow the instructions for integrating it into your development environment. If you wish to build the examples and tests, or if you wish to preview upcoming changes and features, it is suggested to clone the "Boost superproject" and work with Beast "in-tree" (meaning, the libs/beast subdirectory of the superproject). The official repository contains the following branches: * [**master**](https://github.com/boostorg/beast/tree/master) This holds the most recent snapshot with code that is known to be stable. * [**develop**](https://github.com/boostorg/beast/tree/develop) This holds the most recent snapshot. It may contain unstable code. Each of these branches requires a corresponding Boost branch and all of its subprojects. For example, if you wish to use the **master** branch version of Beast, you should clone the Boost superproject, switch to the **master** branch in the superproject and acquire all the Boost libraries corresponding to that branch including Beast. To clone the superproject locally, and switch into the main project's directory use: ``` git clone --recursive https://github.com/boostorg/boost.git cd boost ``` "bjam" is used to build Beast and the Boost libraries. On a non-Windows system use this command to build bjam: ``` ./bootstrap.sh ``` From a Windows command line, build bjam using this command: ``` .\BOOTSTRAP.BAT ``` ## Building tests and examples Building tests and examples requires OpenSSL installed. If OpenSSL is installed in a non-system location, you will need to copy the [user-config.jam](tools/user-config.jam) file into your home directory and set the `OPENSSL_ROOT` environment variable to the path that contains an installation of OpenSSL. ### Ubuntu/Debian If installed into a system directory, OpenSSL will be automatically found and used. ```bash sudo apt install libssl-dev ``` ### Windows Replace `path` in the following code snippets with the path you installed vcpkg to. Examples assume a 32-bit build, if you build a 64-bit version replace `x32-windows` with `x64-windows` in the path. - Using [vcpkg](https://github.com/Microsoft/vcpkg) and CMD: ```bat vcpkg install openssl --triplet x32-windows SET OPENSSL_ROOT=path\installed\x32-windows ``` - Using [vcpkg](https://github.com/Microsoft/vcpkg) and PowerShell: ```powershell vcpkg install openssl --triplet x32-windows $env:OPENSSL_ROOT = "path\x32-windows" ``` - Using [vcpkg](https://github.com/Microsoft/vcpkg) and bash: ```bash vcpkg.exe install openssl --triplet x32-windows export OPENSSL_ROOT=path/x32-windows ``` ### Mac OS Using [brew](https://github.com/Homebrew/brew): ```bash brew install openssl export OPENSSL_ROOT=$(brew --prefix openssl) # install bjam tool user specific configuration file to read OPENSSL_ROOT # see https://www.bfgroup.xyz/b2/manual/release/index.html cp ./libs/beast/tools/user-config.jam $HOME ``` Make sure the bjam tool (also called "b2") is available in the path your shell uses to find executables. The Beast project is located in "libs/beast" relative to the directory containing the Boot superproject. To build the Beast tests, examples, and documentation use these commands: ``` export PATH=$PWD:$PATH b2 -j2 libs/beast/test cxxstd=11 # bjam must be in your $PATH b2 -j2 libs/beast/example cxxstd=11 # "-j2" means use two processors b2 libs/beast/doc # Doxygen and Saxon are required for this ``` Additional instructions for configuring, using, and building libraries in superproject may be found in the [Boost Wiki](https://github.com/boostorg/boost/wiki/Getting-Started). ## Visual Studio CMake may be used to generate a very nice Visual Studio solution and a set of Visual Studio project files using these commands: ``` cd libs/beast mkdir bin cd bin cmake .. # for 32-bit Windows builds, or cmake -G"Visual Studio 15 2017 Win64" .. # for 64-bit Windows builds (VS2017) ``` The files in the repository are laid out thusly: ``` ./ bin/ Create this to hold executables and project files bin64/ Create this to hold 64-bit Windows executables and project files doc/ Source code and scripts for the documentation include/ Where the header files are located example/ Self contained example programs meta/ Metadata for Boost integration test/ The unit tests for Beast tools/ Scripts used for CI testing ``` ## Usage These examples are complete, self-contained programs that you can build and run yourself (they are in the `example` directory). https://www.boost.org/doc/libs/develop/libs/beast/doc/html/beast/quick_start.html ## License Distributed under the Boost Software License, Version 1.0. (See accompanying file [LICENSE_1_0.txt](LICENSE_1_0.txt) or copy at https://www.boost.org/LICENSE_1_0.txt) ## Contact Please report issues or questions here: https://github.com/boostorg/beast/issues --- ## Contributing (We Need Your Help!) If you would like to contribute to Beast and help us maintain high quality, consider performing code reviews on active pull requests. Any feedback from users and stakeholders, even simple questions about how things work or why they were done a certain way, carries value and can be used to improve the library. Code review provides these benefits: * Identify bugs * Documentation proof-reading * Adjust interfaces to suit use-cases * Simplify code You can look through the Closed pull requests to get an idea of how reviews are performed. To give a code review just sign in with your GitHub account and then add comments to any open pull requests below, don't be shy! <p>https://github.com/boostorg/beast/pulls</p> Here are some resources to learn more about code reviews: * <a href="https://blog.scottnonnenberg.com/top-ten-pull-request-review-mistakes/">Top 10 Pull Request Review Mistakes</a> * <a href="https://static1.smartbear.co/smartbear/media/pdfs/best-kept-secrets-of-peer-code-review_redirected.pdf">Best Kept Secrets of Peer Code Review (pdf)</a> * <a href="https://static1.smartbear.co/support/media/resources/cc/11_best_practices_for_peer_code_review_redirected.pdf">11 Best Practices for Peer Code Review (pdf)</a> * <a href="http://www.evoketechnologies.com/blog/code-review-checklist-perform-effective-code-reviews/">Code Review Checklist – To Perform Effective Code Reviews</a> * <a href="https://www.codeproject.com/Articles/524235/Codeplusreviewplusguidelines">Code review guidelines</a> * <a href="https://github.com/isocpp/CppCoreGuidelines/blob/master/CppCoreGuidelines.md">C++ Core Guidelines</a> * <a href="https://www.oreilly.com/library/view/c-coding-standards/0321113586/">C++ Coding Standards (Sutter & Alexandrescu)</a> Beast thrives on code reviews and any sort of feedback from users and stakeholders about its interfaces. Even if you just have questions, asking them in the code review or in issues provides valuable information that can be used to improve the library - do not hesitate, no question is insignificant or unimportant!
563
Text, samples and website for my 'Effective Shell' series.
# effective-shell <!-- ALL-CONTRIBUTORS-BADGE:START - Do not remove or modify this section --> [![All Contributors](https://img.shields.io/badge/all_contributors-14-orange.svg?style=flat-square)](#contributors-) <!-- ALL-CONTRIBUTORS-BADGE:END --> [![Release Please](https://github.com/dwmkerr/effective-shell/actions/workflows/release-please.yaml/badge.svg)](https://github.com/dwmkerr/effective-shell/actions/workflows/release-please.yaml) ![Version Badge](https://img.shields.io/github/v/tag/dwmkerr/effective-shell?label=version) [![Creative Commons BY-NC-SA](https://i.creativecommons.org/l/by-nc-sa/3.0/80x15.png)](http://creativecommons.org/licenses/by-nc-sa/3.0/) Text, samples and references for my 'Effective Shell' series. This website is hosted at [effective-shell.com](https://effective-shell.com). If you find this book useful, please do consider [sponsoring me](https://github.com/sponsors/dwmkerr) to help support my open-source work! <!-- vim-markdown-toc GFM --> * [Introduction](#introduction) * [Installing the Samples](#installing-the-samples) * [The Website](#the-website) * [Building the Website](#building-the-website) * [Custom Components](#custom-components) * [Versioning](#versioning) * [Contributing](#contributing) * [Copyright & Licensing](#copyright--licensing) * [ASCII Terminal Recordings](#ascii-terminal-recordings) * [Thanks!](#thanks) * [Contributors ✨](#contributors-) <!-- vim-markdown-toc --> ## Introduction This repository contains all of the content for the [Effective Shell](https://effective-shell.com/) online book. ## Installing the Samples You can install the samples into your `~/effective-shell` folder with this command: ```sh curl effective.sh | sh ``` Or can also manually download them using from any of these locations: - [https://effective-shell.com/downloads/effective-shell-samples.zip](https://effective-shell.com/downloads/effective-shell-samples.zip) - [https://effective-shell.com/downloads/effective-shell-samples.tar.gz](https://effective-shell.com/downloads/effective-shell-samples.tar.gz) The one-line shell installer is hosted at [github.com/dwmkerr/effective-shell-installer](https://github.com/dwmkerr/effective-shell-installer) ## The Website The content in this repository is built into a static site available at [effective-shell.com](https://effective-shell.com). This site is generated using [Docusaurus](https://docusaurus.io). This section contains information on how to built, use and edit the site. To help you quickly edit the site, some tips are below: - The book content is at [./docs/](./docs/) - The menu structure is defined at [sidebars.js](sidebars.js). ### Building the Website To setup dependencies, run: ```bash make setup ``` To test that TypeScript types compile, run: ```bash make typescript-check ``` To serve the site locally, run: ```bash make serve ``` To build the site, run: ```bash make build ``` The built site is generated at `./build`. Note that the [`samples`](./samples) folder is automatically zipped up and added to the website, meaning it can be downloaded directly from: ``` https://effective-shell.com/downloads/effective-shell-samples.zip https://effective-shell.com/downloads/effective-shell-samples.tar.gz ``` ## Custom Components Custom Components to support styling are available at: ``` src/components ``` There is a live view that can be used to preview each component: http://localhost:3000/zz-developer-guide/components Components can be added to global scope, i.e. available in call pages, by adding to the `MDXComponents.js` swizzled file: ``` src/theme/MDXComponents.js ``` ## Versioning The version of the site and the code is defined in the [`package.json`](./package.json) file. Releasing in managed via [Release Please](https://github.com/googleapis/release-please) in the [`release-please.yaml`](./.github/workflows/release-please.yaml) workflow file. ## Contributing Please carefully read the [Contributing Guide](./.github/contributing.md) before working on changes. ## Copyright & Licensing All content is Copyright (©) Dave Kerr. Please get in touch by opening an issue if you have questions on copyright or licensing. [![Creative Commons BY-NC-SA](https://i.creativecommons.org/l/by-nc-sa/3.0/88x31.png)](http://creativecommons.org/licenses/by-nc-sa/3.0/) This work is licensed under a [Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License](http://creativecommons.org/licenses/by-nc-sa/3.0/). ## ASCII Terminal Recordings All terminal recordings used in this project are built using the superb '[asciinema](https://asciinema.org/)' tool. Many thanks to Marcin Kulik for building such an excellent piece of software. ## Thanks! Thanks to the following people who have helped with reviews, comments, suggestions. - Andrew Bestbier, Thomas Neumann, Tam Nguyen, Rahul Maliakkal, Peter Mondlock, Samantha Baldwin, Niklas Schmuecker for the proofing, comments and suggestions - [Ogus Ismail](https://stackoverflow.com/users/10248678/oguz-ismail) for helping me understand some of the [nuances of word splitting and filename expansion](https://stackoverflow.com/questions/67648392/how-can-i-confirm-whether-whitespace-or-special-characters-are-escaped-in-a-wild) - [Josh Timmons](https://github.com/josh-59) for proof-reading and suggesting structural improvements as well as grammar and spelling fixes - [Joel Schwarzmann](https://github.com/datajoely) for proofing and adding content on the Python code in the 'How to avoid shell scripting' chapter - [Xiaoyou "Elsie" Jiang](https://github.com/xiaoyou-elsie-jiang) for proof-reading and improvements to Chapter 30 ## Contributors ✨ Thanks goes to these wonderful people ([emoji key](https://allcontributors.org/docs/en/emoji-key)): <!-- ALL-CONTRIBUTORS-LIST:START - Do not remove or modify this section --> <!-- prettier-ignore-start --> <!-- markdownlint-disable --> <table> <tbody> <tr> <td align="center" valign="top" width="14.28%"><a href="https://github.com/xiaoyou-elsie-jiang"><img src="https://avatars.githubusercontent.com/u/101381124?v=4?s=100" width="100px;" alt="Xiaoyou "Elsie" Jiang"/><br /><sub><b>Xiaoyou "Elsie" Jiang</b></sub></a><br /><a href="https://github.com/dwmkerr/effective-shell/commits?author=xiaoyou-elsie-jiang" title="Documentation">📖</a> <a href="https://github.com/dwmkerr/effective-shell/pulls?q=is%3Apr+reviewed-by%3Axiaoyou-elsie-jiang" title="Reviewed Pull Requests">👀</a></td> <td align="center" valign="top" width="14.28%"><a href="http://linkedin.com/in/tbueschel"><img src="https://avatars.githubusercontent.com/u/13087421?v=4?s=100" width="100px;" alt="Tobias Büschel"/><br /><sub><b>Tobias Büschel</b></sub></a><br /><a href="https://github.com/dwmkerr/effective-shell/pulls?q=is%3Apr+reviewed-by%3Atobiasbueschel" title="Reviewed Pull Requests">👀</a></td> <td align="center" valign="top" width="14.28%"><a href="http://foostack.ai"><img src="https://avatars.githubusercontent.com/u/15166953?v=4?s=100" width="100px;" alt="Doug Foo"/><br /><sub><b>Doug Foo</b></sub></a><br /><a href="https://github.com/dwmkerr/effective-shell/commits?author=dougfoo" title="Documentation">📖</a> <a href="https://github.com/dwmkerr/effective-shell/pulls?q=is%3Apr+reviewed-by%3Adougfoo" title="Reviewed Pull Requests">👀</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/skokaina"><img src="https://avatars.githubusercontent.com/u/2756985?v=4?s=100" width="100px;" alt="Sallah Kokaina"/><br /><sub><b>Sallah Kokaina</b></sub></a><br /><a href="https://github.com/dwmkerr/effective-shell/commits?author=skokaina" title="Documentation">📖</a> <a href="https://github.com/dwmkerr/effective-shell/pulls?q=is%3Apr+reviewed-by%3Askokaina" title="Reviewed Pull Requests">👀</a></td> <td align="center" valign="top" width="14.28%"><a href="http://www.fetch-template.com"><img src="https://avatars.githubusercontent.com/u/26925206?v=4?s=100" width="100px;" alt="samhinton88"/><br /><sub><b>samhinton88</b></sub></a><br /><a href="https://github.com/dwmkerr/effective-shell/commits?author=samhinton88" title="Documentation">📖</a> <a href="https://github.com/dwmkerr/effective-shell/pulls?q=is%3Apr+reviewed-by%3Asamhinton88" title="Reviewed Pull Requests">👀</a></td> <td align="center" valign="top" width="14.28%"><a href="https://www.alexvinall.com"><img src="https://avatars.githubusercontent.com/u/5629393?v=4?s=100" width="100px;" alt="Alex Vinall"/><br /><sub><b>Alex Vinall</b></sub></a><br /><a href="https://github.com/dwmkerr/effective-shell/commits?author=alexvinall" title="Documentation">📖</a> <a href="https://github.com/dwmkerr/effective-shell/pulls?q=is%3Apr+reviewed-by%3Aalexvinall" title="Reviewed Pull Requests">👀</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/JosephFKnight"><img src="https://avatars.githubusercontent.com/u/45918817?v=4?s=100" width="100px;" alt="Joseph Knight"/><br /><sub><b>Joseph Knight</b></sub></a><br /><a href="https://github.com/dwmkerr/effective-shell/commits?author=JosephFKnight" title="Documentation">📖</a> <a href="https://github.com/dwmkerr/effective-shell/pulls?q=is%3Apr+reviewed-by%3AJosephFKnight" title="Reviewed Pull Requests">👀</a></td> </tr> <tr> <td align="center" valign="top" width="14.28%"><a href="http://bit.ly/doug-todd"><img src="https://avatars.githubusercontent.com/u/53582591?v=4?s=100" width="100px;" alt="Doug Todd"/><br /><sub><b>Doug Todd</b></sub></a><br /><a href="https://github.com/dwmkerr/effective-shell/commits?author=Zambrella" title="Documentation">📖</a> <a href="https://github.com/dwmkerr/effective-shell/pulls?q=is%3Apr+reviewed-by%3AZambrella" title="Reviewed Pull Requests">👀</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/jdhzzz"><img src="https://avatars.githubusercontent.com/u/1476690?v=4?s=100" width="100px;" alt="jdhzzz"/><br /><sub><b>jdhzzz</b></sub></a><br /><a href="https://github.com/dwmkerr/effective-shell/commits?author=jdhzzz" title="Documentation">📖</a> <a href="https://github.com/dwmkerr/effective-shell/pulls?q=is%3Apr+reviewed-by%3Ajdhzzz" title="Reviewed Pull Requests">👀</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/valankar"><img src="https://avatars.githubusercontent.com/u/31250800?v=4?s=100" width="100px;" alt="valankar"/><br /><sub><b>valankar</b></sub></a><br /><a href="https://github.com/dwmkerr/effective-shell/commits?author=valankar" title="Documentation">📖</a> <a href="https://github.com/dwmkerr/effective-shell/pulls?q=is%3Apr+reviewed-by%3Avalankar" title="Reviewed Pull Requests">👀</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/Denpeer"><img src="https://avatars.githubusercontent.com/u/5969147?v=4?s=100" width="100px;" alt="Denpeer"/><br /><sub><b>Denpeer</b></sub></a><br /><a href="https://github.com/dwmkerr/effective-shell/pulls?q=is%3Apr+reviewed-by%3ADenpeer" title="Reviewed Pull Requests">👀</a> <a href="https://github.com/dwmkerr/effective-shell/commits?author=Denpeer" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/mbogatzki"><img src="https://avatars.githubusercontent.com/u/39946827?v=4?s=100" width="100px;" alt="Marek Bogatzki"/><br /><sub><b>Marek Bogatzki</b></sub></a><br /><a href="https://github.com/dwmkerr/effective-shell/commits?author=mbogatzki" title="Documentation">📖</a> <a href="https://github.com/dwmkerr/effective-shell/pulls?q=is%3Apr+reviewed-by%3Ambogatzki" title="Reviewed Pull Requests">👀</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/MichaelWarnecke"><img src="https://avatars.githubusercontent.com/u/7615963?v=4?s=100" width="100px;" alt="MWarnecke"/><br /><sub><b>MWarnecke</b></sub></a><br /><a href="https://github.com/dwmkerr/effective-shell/commits?author=MichaelWarnecke" title="Documentation">📖</a> <a href="https://github.com/dwmkerr/effective-shell/pulls?q=is%3Apr+reviewed-by%3AMichaelWarnecke" title="Reviewed Pull Requests">👀</a> <a href="https://github.com/dwmkerr/effective-shell/issues?q=author%3AMichaelWarnecke" title="Bug reports">🐛</a></td> <td align="center" valign="top" width="14.28%"><a href="https://taxodium.ink/"><img src="https://avatars.githubusercontent.com/u/30440218?v=4?s=100" width="100px;" alt="Spike"/><br /><sub><b>Spike</b></sub></a><br /><a href="https://github.com/dwmkerr/effective-shell/pulls?q=is%3Apr+reviewed-by%3ASpike-Leung" title="Reviewed Pull Requests">👀</a> <a href="https://github.com/dwmkerr/effective-shell/issues?q=author%3ASpike-Leung" title="Bug reports">🐛</a></td> </tr> </tbody> </table> <!-- markdownlint-restore --> <!-- prettier-ignore-end --> <!-- ALL-CONTRIBUTORS-LIST:END --> This project follows the [all-contributors](https://github.com/all-contributors/all-contributors) specification. Contributions of any kind welcome!
564
Linux Binary Exploitation
# Binary Exploitation I have another interesting project @[DockerENT](https://github.com/r0hi7/DockerENT), @[Trashemail](https://github.com/r0hi7/Trashemail) take some time to review it as well. #### Any Doubt...? [Let's Discuss](https://gitter.im/BinaryExploitation/Lobby?utm_source=share-link&utm_medium=link&utm_campaign=share-link) > ## Introduction > I am quite passionate about exploiting binary files. The first time when I came across Buffer Overflow(a simple technique of exploitation), then I was not able to implement the same with the same copy of code on my system. The reason for that was there was no consolidated document that would guide me thoroughly to write a perfect exploit payload for the program in case of system changes. > Also, there are very few descriptive blogs/tutorials that had helped me exploiting a given binary. > I have come up with the consolidation of Modern exploitation techniques (in the form of the tutorial) that will allow you to understand exploitation from scratch. I will be using [vagrant file](Vagrantfile) to set up the system on a virtual box. To do the same in your system follow: 1. `vagrant up` 2. `vagrant ssh` ## Topics 1. **[Lecture 1.](Lecture1/README.md)** * Memory Layout of C program. * ELF binaries. * Overview of stack during function call. * Assembly code for the function call and return. * Concept of `$ebp` and `$esp`. * Executable memory. 1. **[Lecture 1.5.](Lecture1.5/README.md)** * How Linux finds the binaries utilis? * Simple exploit using Linux $PATH variable. 1. **[Lecture 2.](Lecture2/README.md)** * What are stack overflows? * **ASLR** (basics), avoiding **Stack protection**. * Shellcodes * Buffer overflow: * Changing Control of the program to return to some other function * Shellcode injection in buffer and spawning the shell 1. **[Lecture 3.](Lecture3/README.md)** * **Shellcode** injection with **ASLR** enabled. * Environment variables. 1. **[Lecture 3.5](Lecture3.5/README.md)** * Return to Libc attacks. * Spawning `shell` in **non executable stack** * Stack organization in case `ret2libc` attack. 1. **[Lecture 4.](Lecture4/)** * This folder contains the set of questions to exploit binaries on the concept that we have learned so far. 1. **[Lecture 5.](Lecture5/README.md)** * What is format string Vulnerability? * Seeing the content of stack. * Writing onto the stack. * Writing to arbitrary memory location. 1. **[Lecture 6.](Lecture6/README.md)** * GOT * Overriding GOT entry. * Spawning shell with format string vuln. 1. **[Lecture 7.](Lecture7/README.md)** * Heaps * Arena, Bins, Chunks. * Use after free exploit. * Double free exploit.
565
:notebook: Books, reference guides and resources on Regular Expressions, CLI one-liners, Scripting Languages and Vim.
# Scripting Course Books, reference guides and resources on Regular Expressions, CLI one-liners, Scripting Languages and Vim. ## Ebooks Free to read online versions: * [Understanding Python re(gex)?](https://learnbyexample.github.io/py_regular_expressions/) * [JavaScript RegExp](https://learnbyexample.github.io/learn_js_regexp/) * [Ruby Regexp](https://learnbyexample.github.io/Ruby_Regexp/) * [GNU grep and ripgrep](https://learnbyexample.github.io/learn_gnugrep_ripgrep/) * [GNU sed](https://learnbyexample.github.io/learn_gnused/) * [GNU awk](https://learnbyexample.github.io/learn_gnuawk/) * [Ruby one-liners cookbook](https://learnbyexample.github.io/learn_ruby_oneliners/) * [Perl one-liners cookbook](https://learnbyexample.github.io/learn_perl_oneliners/) * [100 Page Python Intro](https://learnbyexample.github.io/100_page_python_intro/) * [Practice Python Projects](https://learnbyexample.github.io/practice_python_projects/) * [Command line text processing with GNU Coreutils](https://learnbyexample.github.io/cli_text_processing_coreutils/) * [Vim reference guide](https://learnbyexample.github.io/vim_reference/) * [Computing from the Command Line](https://learnbyexample.github.io/cli-computing/) * [Command line text processing with Rust tools](https://learnbyexample.github.io/cli_text_processing_rust/) — work-in-progress :information_source: :moneybag: You can buy PDF/EPUB versions from [Gumroad](https://learnbyexample.gumroad.com/) or [Leanpub](https://leanpub.com/u/learnbyexample) :loudspeaker: :loudspeaker: Use [this coupon link](https://learnbyexample.gumroad.com/l/all-books/HappyPrice) to get **All books bundle** with 25% discount. ### Ebook drafts * [Command Line Text Processing](https://github.com/learnbyexample/Command-line-text-processing) — From finding text to search and replace, from sorting to beautifying text and more * `grep`, `sed`, `awk`, `perl` and `ruby` got their own books * Coreutils like `head`, `paste`, `sort`, etc were collated into a single book * remaining commands (`find` for example) were added to the *Computing from the Command Line* ebook * [Python Basics](https://github.com/learnbyexample/Python_Basics) — older version of *100 Page Python Intro* * [Ruby Scripting](https://github.com/learnbyexample/Ruby_Scripting) — examples based tutorial for Ruby scripting * [Perl Introduction](https://github.com/learnbyexample/Perl_intro) — Introductory course for Perl 5 through examples, geared towards VLSI engineers <br> ## Blog https://learnbyexample.github.io/ — my super duper awesome programming blog <br> ## Newsletter [learnbyexample weekly](https://learnbyexample.gumroad.com/l/learnbyexample-weekly) — programming resources, tips, tools, free ebooks and more. This is a free newsletter, delivered every Friday <br> ## Curated resources Here's my collection of learning resources. Thanks to [mdBook](https://github.com/rust-lang/mdBook), these lists also have an intelligent search feature to find resources based on keywords. * [Computer Science and Programming](https://learnbyexample.github.io/curated_resources/cs_programming.html) * [Python](https://learnbyexample.github.io/py_resources/) * [Linux CLI and Shell scripting](https://learnbyexample.github.io/curated_resources/linux_cli_scripting.html) * [Vim](https://learnbyexample.github.io/curated_resources/vim.html) * [Perl](https://learnbyexample.github.io/curated_resources/perl.html) * [Git and GitHub](https://learnbyexample.github.io/curated_resources/git_and_github.html) <br> ## dot files This repo also includes Bash and Vim customization files (files starting with `.`) based on my personal preferences. ⚠️ Do NOT copy these files directly to your home directory. You might overwrite useful settings already present. Understand the customizations and apply them manually. <br> ## Contributing * Please open an issue for typos/bugs/suggestions/etc * Even for pull requests, open an issue for discussion before submitting PRs * Share the repo with friends/colleagues, on social media, etc to help reach other learners * In case you need to reach me, mail me at `echo 'bGVhcm5ieWV4YW1wbGUubmV0QGdtYWlsLmNvbQo=' | base64 --decode` or ping me on [twitter](https://twitter.com/learn_byexample) <br> ## License This work is licensed under a [Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License](https://creativecommons.org/licenses/by-nc-sa/4.0/)
566
The `io_uring` library for Rust
# Linux IO Uring [![github actions](https://github.com/tokio-rs/io-uring/workflows/ci/badge.svg)](https://github.com/tokio-rs/io-uring/actions) [![crates](https://img.shields.io/crates/v/io-uring.svg)](https://crates.io/crates/io-uring) [![license](https://img.shields.io/badge/License-MIT-blue.svg)](https://github.com/tokio-rs/io-uring/blob/master/LICENSE-MIT) [![license](https://img.shields.io/badge/License-Apache%202.0-blue.svg)](https://github.com/tokio-rs/io-uring/blob/master/LICENSE-APACHE) [![docs.rs](https://docs.rs/io-uring/badge.svg)](https://docs.rs/io-uring/) The low-level [`io_uring`](https://kernel.dk/io_uring.pdf) userspace interface for Rust. ## Usage To use `io-uring` crate, first add this to your `Cargo.toml`: ```toml [dependencies] io-uring = "0.5" ``` Next we can start using `io-uring` crate. The following is quick introduction using `Read` for file. ```rust use io_uring::{opcode, types, IoUring}; use std::os::unix::io::AsRawFd; use std::{fs, io}; fn main() -> io::Result<()> { let mut ring = IoUring::new(8)?; let fd = fs::File::open("README.md")?; let mut buf = vec![0; 1024]; let read_e = opcode::Read::new(types::Fd(fd.as_raw_fd()), buf.as_mut_ptr(), buf.len() as _) .build() .user_data(0x42); // Note that the developer needs to ensure // that the entry pushed into submission queue is valid (e.g. fd, buffer). unsafe { ring.submission() .push(&read_e) .expect("submission queue is full"); } ring.submit_and_wait(1)?; let cqe = ring.completion().next().expect("completion queue is empty"); assert_eq!(cqe.user_data(), 0x42); assert!(cqe.result() >= 0, "read error: {}", cqe.result()); Ok(()) } ``` Note that opcode `Read` is only available after kernel 5.6. If you use a kernel lower than 5.6, this example will fail. ## Test and Benchmarks You can run the test and benchmark of the library with the following commands. ``` $ cargo run --package io-uring-test $ cargo bench --package io-uring-bench ``` ### License This project is licensed under either of * Apache License, Version 2.0, ([LICENSE-APACHE](LICENSE-APACHE) or http://www.apache.org/licenses/LICENSE-2.0) * MIT license ([LICENSE-MIT](LICENSE-MIT) or http://opensource.org/licenses/MIT) at your option. ### Contribution Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in io-uring by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.
567
AuthPass - Password Manager based on Flutter for all platforms. Keepass 2.x (kdbx 3.x) compatible.
[![Contribute](https://img.shields.io/badge/contribute-now-green?logo=discourse&style=for-the-badge)](https://forum.authpass.app/c/contributors/contribute/13) [![Contribute](https://img.shields.io/discourse/topics?label=Forum%20Discussions&logo=discourse&server=https%3A%2F%2Fforum.authpass.app&style=for-the-badge)](https://forum.authpass.app/) [<img align="right" src="https://badges.crowdin.net/e/df2e0329a54542fef35ab5412a893d23/localized.svg">](https://authpass.crowdin.com/authpass) [![AuthPass.app](_docs/logo-header.png)](https://authpass.app) # AuthPass.app - Open Source Password Manager for mobile and desktop AuthPass - Password Manager based on Flutter for all platforms. Keepass 2.x (kdbx 3.x) compatible. * Mac Desktop: [Mac App Store](https://apps.apple.com/app/authpass-password-manager/id1478552452?ls=1&mt=12) or [check the releases](https://github.com/authpass/authpass/releases) * Android: [Google Play Store](https://play.google.com/store/apps/details?id=design.codeux.authpass) * iOS: [App Store](https://apps.apple.com/app/authpass-password-manager/id1479297675?ls=1&at=11l8ru) * Linux Desktop: [Snapcraft Store](https://snapcraft.io/authpass), [Flathub flatpak](https://flathub.org/apps/details/app.authpass.AuthPass) [Check out our blog post for installation instructions](https://authpass.app/articles/linux-desktop-release-authpass-1.6.3/) * Windows Desktop: [Microsoft Store](https://www.microsoft.com/store/apps/9P5N6ZNPSFBN?cid=readme) or [Windows Install Guide](https://authpass.app/docs/install/windows-installation/) * Browser/Web: https://web.authpass.app/ ![Mac OS, iOS and Android Screenshot](_docs/authpass-platform-composition.png) ## Contribute to AuthPass [Need ideas how to contribute? Visit the forum for many different ways to contribute.](https://forum.authpass.app/c/contributors/contribute/13) [![Contribute](https://img.shields.io/badge/contribute-now-green?logo=discourse)](https://forum.authpass.app/c/contributors/contribute/13) If you like AuthPass, and want to contribute. First, spread the word ;-) Writing reviews, vote or share AuthPass on twitter, reddit, etc. * Help us translate AuthPass (work in progress): [![Crowdin](https://badges.crowdin.net/e/df2e0329a54542fef35ab5412a893d23/localized.svg)](https://authpass.crowdin.com/authpass) * [Contact us for new languages](https://authpass.app/docs/contact/) * Interested in writing documentation? Let us know in our [discord channel](https://authpass.app/go/discord) * Want to code? See [CONTRIBUTING.md](https://github.com/authpass/authpass/blob/master/CONTRIBUTING.md). * If you need some slight introduction to the code, ask in the [discord channel](https://authpass.app/go/discord). * Good at design? Or marketing? Just get in contact ;-) ## Roadmap/TODOs see also https://github.com/authpass/authpass/issues [![GitHub issues](https://img.shields.io/github/issues-raw/authpass/authpass)](https://github.com/authpass/authpass/issues) * [x] Read/Decrypt kdbx 3.x using password * [x] Download of kdbx files through url * [x] Parse decrypted XML/handle protected values * [x] Flutter scaffold for mobile (ios/android) * [X] Platforms 🎉️👍️✅️ * [x] iOS: [App Store](https://apps.apple.com/app/authpass-password-manager/id1479297675?ls=1&at=11l8ru) * [x] Android: [Google Play Store](https://play.google.com/store/apps/details?id=design.codeux.authpass) * [x] Mac OS [Mac App Store](https://apps.apple.com/app/authpass-password-manager/id1478552452?ls=1&mt=12) * [x] [Windows](https://authpass.app/articles/authpass-released-for-windows-desktop-authpass-1.7.0/) https://github.com/authpass/authpass/issues/27 * [x] [Linux](https://authpass.app/articles/linux-desktop-release-authpass-1.6.3/) https://github.com/authpass/authpass/issues/26 * [x] Decrypt with keyfile https://github.com/authpass/authpass/issues/3 * [x] List of password entries * [x] 👆️ Search through entries * [x] 👆️ Entry details * [x] 👆️ mobile: copy usernames, passwords * [x] mobile: integrate with biometrics (fingerprint) * [ ] mac: Auto-Type https://github.com/authpass/authpass/issues/13 * [ ] 👆️ Auto-lock after x minutes of inactivity. https://github.com/authpass/authpass/issues/14 * [x] Editing existing entries * [x] Saving of changes into kdbx file. * [x] Creating of new kdbx files. * [ ] Syncing of kdbx files via custom cloud service and QR codes. https://github.com/authpass/authpass/issues/29 * [x] Syncing with cloud services like dropbox or google drive? * [x] 👆️ CI pipeline/continous builds, releases * [x] kdbx 4 support (missing argon2) compatibility https://github.com/authpass/authpass/issues/4 * [x] Android: Auto Fill https://github.com/authpass/authpass/issues/30 * [ ] iOS: Auto Fill https://github.com/authpass/authpass/issues/31 # Donations If you like AuthPass check out the [website for ways to support us](https://authpass.app/docs/support-authpass-get-involved/). * Bitcoin: 3NcBacCmJbYWpwxj6rWzpM7sx48etMrPtc * GitHub Sponsor: https://github.com/sponsors/hpoul (Or just hit the *Sponsor* button up top).
568
A web-based interface for CNC milling controller running Grbl, Marlin, Smoothieware, or TinyG.
# CNCjs [![Backers on Open Collective](https://opencollective.com/cncjs/backers/badge.svg)](#backers) [![Sponsors on Open Collective](https://opencollective.com/cncjs/sponsors/badge.svg)](#sponsors) [![Travis CI Build Status](https://travis-ci.org/cncjs/cncjs.svg)](https://travis-ci.org/cncjs/cncjs) [![AppVeyor Build status](https://ci.appveyor.com/api/projects/status/qxx53wq32w3edule?svg=true)](https://ci.appveyor.com/project/cheton/cncjs) [![Coverage Status](https://coveralls.io/repos/github/cncjs/cncjs/badge.svg?branch=master)](https://coveralls.io/github/cncjs/cncjs?branch=master) [![NPM](https://nodei.co/npm/cncjs.png?downloads=true&stars=true)](https://www.npmjs.com/package/cncjs) ![cncjs](https://raw.githubusercontent.com/cncjs/cncjs/master/media/banner.png) CNCjs is a full-featured web-based interface for CNC controllers running [Grbl](https://github.com/grbl/grbl), [Marlin](https://github.com/MarlinFirmware/Marlin), [Smoothieware](https://github.com/Smoothieware/Smoothieware), or [TinyG](https://github.com/synthetos/TinyG). For a more complete introduction, see the [Introduction](https://github.com/cncjs/cncjs/wiki/Introduction) section of the wiki page. ![cncjs](https://cloud.githubusercontent.com/assets/447801/24392019/aa2d725e-13c4-11e7-9538-fd5f746a2130.png) ## Features * Supported controllers - [Grbl](https://github.com/gnea/grbl) ([Download](https://github.com/gnea/grbl/releases)) - [Grbl-Mega](https://github.com/gnea/grbl-Mega) ([Download](https://github.com/gnea/grbl-Mega/releases)) - [Marlin](https://github.com/MarlinFirmware/Marlin) ([Download](http://marlinfw.org/meta/download/)) - [Smoothieware](https://github.com/Smoothieware/Smoothieware) ([Download](https://github.com/Smoothieware/Smoothieware/tree/edge/FirmwareBin)) - [TinyG](https://github.com/synthetos/TinyG) (_Recommend: firmware version 0.97 build 449.xx_) ([Download](http://synthetos.github.io/)) - [g2core](https://github.com/synthetos/g2) * [Desktop App for Linux, Mac OS X, and Windows](https://github.com/cncjs/cncjs/wiki/Desktop-App) * 6-axis digital readout (DRO) * Tool path 3D visualization * Simultaneously communicate with multiple clients * Responsive view for small screen display with device width less than 720px - <i>Safari on an iPhone 5S</i> [\[1\]](https://cloud.githubusercontent.com/assets/447801/15633749/b817cd4a-25e7-11e6-9beb-600c65ea1324.PNG) [\[2\]](https://cloud.githubusercontent.com/assets/447801/15633750/b819b5f6-25e7-11e6-8bfe-d3e6247e443b.PNG) * Customizable workspace * [Custom widget](https://github.com/cncjs/cncjs-widget-boilerplate) (since 1.9.10) * Custom MDI (Multiple Document Interface) command buttons (since 1.9.13) * My Account * Commands * Events * [Keyboard Shortcuts](https://cnc.js.org/docs/user-guide/#keyboard-shortcuts) * [Contour ShuttleXpress](https://cnc.js.org/docs/user-guide/#contour-shuttlexpress) * Multi-Language Support * Watch Directory * [Tool Change](https://github.com/cncjs/cncjs/wiki/Tool-Change) (since 1.9.11) * Z-Probe ## Custom Widgets * [cncjs-widget-boilerplate](https://github.com/cncjs/cncjs-widget-boilerplate) - Creating custom widgets for CNCjs. ## Pendants ### Boilerplate Code * [cncjs-pendant-boilerplate](https://github.com/cncjs/cncjs-pendant-boilerplate) - A bare minimum example to develop a cncjs pendant. ### Existing Pendants * [cncjs-pendant-keyboard](https://github.com/cncjs/cncjs-pendant-keyboard) - A simple pendant (using wireless keyboard or usb) to CNCJS. * [cncjs-pendant-numpad](https://github.com/mariolukas/cncjs-pendant-numpad) - A simple pendant (using wireless numpad or usb) to CNCJS. * [cncjs-pendant-lcd](https://github.com/cncjs/cncjs-pendant-lcd) - CNCjs Web Kiosk for Raspberry Pi Touch Displays. * [cncjs-pendant-ps3](https://github.com/cncjs/cncjs-pendant-ps3) - Dual Shock / PS3 Bluetooth Remote Pendant for CNCjs. * [cncjs-pendant-raspi-gpio](https://github.com/cncjs/cncjs-pendant-raspi-gpio) - Simple Raspberry Pi GPIO Pendant control for CNCjs. ## Tablet UI * [cncjs-pendant-tinyweb](https://github.com/cncjs/cncjs-pendant-tinyweb) - A tiny web console for small 320x240 LCD display.<br> ![cncjs-pendant-tinyweb](https://raw.githubusercontent.com/cncjs/cncjs/master/media/tinyweb-axes.png) * [cncjs-shopfloor-tablet](https://github.com/cncjs/cncjs-shopfloor-tablet) - A simplified UI for cncjs optimized for tablet computers in a production (shop floor) environment.<br> ![cncjs-shopfloor-tablet](https://user-images.githubusercontent.com/4861133/33970662-4a8244b2-e018-11e7-92ab-5a379e3de461.PNG) ## Browser Support ![Chrome](https://raw.github.com/alrra/browser-logos/master/src/chrome/chrome_48x48.png)<br>Chrome | ![Edge](https://raw.github.com/alrra/browser-logos/master/src/edge/edge_48x48.png)<br>Edge | ![Firefox](https://raw.github.com/alrra/browser-logos/master/src/firefox/firefox_48x48.png)<br>Firefox | ![IE](https://raw.github.com/alrra/browser-logos/master/src/archive/internet-explorer_9-11/internet-explorer_9-11_48x48.png)<br>IE | ![Opera](https://raw.github.com/alrra/browser-logos/master/src/opera/opera_48x48.png)<br>Opera | ![Safari](https://raw.github.com/alrra/browser-logos/master/src/safari/safari_48x48.png)<br>Safari --- | --- | --- | --- | --- | --- | Yes | Yes | Yes| Not supported | Yes | Yes | ## Supported Node.js Versions | Version | Supported Level | | :------ |:--------------- | | <= 10 | Not supported | | 12 | Supported | | >= 14 | Recommended | ## Getting Started ### Node.js Installation Node.js 14 or higher is recommended. You can install [Node Version Manager](https://github.com/creationix/nvm) to manage multiple Node.js versions. If you have `git` installed, just clone the `nvm` repo, and check out the latest version: ``` git clone https://github.com/creationix/nvm.git ~/.nvm cd ~/.nvm git checkout `git describe --abbrev=0 --tags` cd .. . ~/.nvm/nvm.sh ``` Add these lines to your `~/.bash_profile`, `~/.bashrc`, or `~/.profile` file to have it automatically sourced upon login: ```bash export NVM_DIR="$HOME/.nvm" [ -s "$NVM_DIR/nvm.sh" ] && . "$NVM_DIR/nvm.sh" # This loads nvm ``` Once installed, you can select Node.js versions with: ``` nvm install 14 nvm use 14 ``` It's also recommended that you upgrade npm to the latest version. To upgrade, run: ``` npm install npm@latest -g ``` ### Installation Install cncjs as a non-root user, or the [serialport](https://github.com/node-serialport/node-serialport) module may not install correctly on some platforms like Raspberry Pi. ``` npm install -g cncjs ``` If you're going to use sudo or root to install cncjs, you need to specify the `--unsafe-perm` option to run npm as the root account. ``` sudo npm install --unsafe-perm -g cncjs ``` Check out [https://github.com/cncjs/cncjs/wiki/Installation](https://github.com/cncjs/cncjs/wiki/Installation) for other installation methods. ### Upgrade Run `npm install -g cncjs@latest` to install the latest version. To determine the version, use `cncjs -V`. ### Usage Run `cncjs` to start the server, and visit `http://yourhostname:8000/` to view the web interface. Pass `--help` to `cncjs` for more options. ``` pi@rpi3$ cncjs -h Usage: cncjs [options] Options: -V, --version output the version number -p, --port <port> Set listen port (default: 8000) -H, --host <host> Set listen address or hostname (default: 0.0.0.0) -b, --backlog <backlog> Set listen backlog (default: 511) -c, --config <filename> Set config file (default: ~/.cncrc) -v, --verbose Increase the verbosity level (-v, -vv, -vvv) -m, --mount <route-path>:<target> Add a mount point for serving static files -w, --watch-directory <path> Watch a directory for changes --access-token-lifetime <lifetime> Access token lifetime in seconds or a time span string (default: 30d) --allow-remote-access Allow remote access to the server (default: false) --controller <type> Specify CNC controller: Grbl|Marlin|Smoothie|TinyG|g2core (default: '') -h, --help output usage information Examples: $ cncjs -vv $ cncjs --mount /pendant:/home/pi/tinyweb $ cncjs --mount /widget:~+/widget --mount /pendant:~/pendant $ cncjs --mount /widget:https://cncjs.github.io/cncjs-widget-boilerplate/v1/ $ cncjs --watch-directory /home/pi/watch $ cncjs --access-token-lifetime 60d # e.g. 3600, 30m, 12h, 30d $ cncjs --allow-remote-access $ cncjs --controller Grbl ``` Instead of passing command line options for `--watch-directory`, `--access-token-lifetime`, `--allow-remote-access`, and `--controller`, you can create a `~/.cncrc` file that contains the following configuration in JSON format: ```json { "mountPoints": [ { "route": "/pendant", "target": "/home/pi/tinyweb" }, { "route": "/widget", "target": "https://cncjs.github.io/cncjs-widget-boilerplate/v1/" } ], "watchDirectory": "/path/to/dir", "accessTokenLifetime": "30d", "allowRemoteAccess": false, "controller": "" } ``` To troubleshoot issues, run: ``` cncjs -vvv ``` ### Configuration File The configuration file <b>.cncrc</b> contains settings that are equivalent to the cncjs command-line options. The configuration file is stored in user's home directory. To find out the actual location of the home directory, do the following: * Linux/Mac ```sh echo $HOME ``` * Windows ```sh echo %USERPROFILE% ``` Check out an example configuration file [here](https://github.com/cncjs/cncjs/blob/master/examples/.cncrc). ### File Format See https://github.com/cncjs/cncjs/issues/242#issuecomment-352294549 for a detailed explanation. ```json { "ports": [ { "path": "/dev/ttyAMA0", "manufacturer": "" } ], "baudrates": [115200, 250000], "mountPoints": [ { "route": "/widget", "target": "https://cncjs.github.io/cncjs-widget-boilerplate/v1/" } ], "watchDirectory": "/path/to/dir", "accessTokenLifetime": "30d", "allowRemoteAccess": false, "controller": "", "state": { "checkForUpdates": true, "controller": { "exception": { "ignoreErrors": false } } }, "commands": [ { "title": "Update (root user)", "commands": "sudo npm install -g cncjs@latest --unsafe-perm; pkill -f cncjs" }, { "title": "Update (non-root user)", "commands": "npm install -g cncjs@latest; pkill -f cncjs" }, { "title": "Reboot", "commands": "sudo /sbin/reboot" }, { "title": "Shutdown", "commands": "sudo /sbin/shutdown" } ], "events": [], "macros": [], "users": [] } ``` ## Documentation https://cnc.js.org/docs/ ## Examples There are several *.gcode files in the [examples](https://github.com/cncjs/cncjs/tree/master/examples) directory. You can use the GCode widget to load a GCode file and make a trial run. If you don't have a CAM software, try using [jscut](http://jscut.org/) to create G-Code from *.svg. It's a simple CAM package that runs in the browser. Check out a live demo at http://jscut.org/jscut.html. ## Contributions Use [GitHub issues](https://github.com/cncjs/cncjs/issues) for requests. Pull requests welcome! Learn how to [contribute](CONTRIBUTING.md). ## Localization You can help translate resource files in both of [app](https://github.com/cncjs/cncjs/tree/master/src/app/i18n) and [server](https://github.com/cncjs/cncjs/tree/master/src/server/i18n) directories from English to other languages. Check out [Localization guide](https://github.com/cncjs/cncjs/blob/master/CONTRIBUTING.md#localization) to learn how to get started. If you are not familiar with GitHub development, you can [open an issue](https://github.com/cncjs/cncjs/issues) or send your translations to [email protected]. Locale | Language | Status | Contributors :----- | :------- | :----- | :----------- [cs](https://github.com/cncjs/cncjs/tree/master/src/web/i18n/cs) | Čeština (Czech) | ✔ | [Miroslav Zuzelka](https://github.com/dronecz) [de](https://github.com/cncjs/cncjs/tree/master/src/web/i18n/de) | Deutsch (German) | ✔ | [Thorsten Godau](https://github.com/dl9sec), [Max B.](https://github.com/mbs38) [es](https://github.com/cncjs/cncjs/tree/master/src/web/i18n/es) | Español (Spanish) | ✔ | [Juan Biondi](https://github.com/yeyeto2788) [fr](https://github.com/cncjs/cncjs/tree/master/src/web/i18n/fr) | Français (French) | ✔ | [Simon Maillard](https://github.com/maisim), [CorentinBrulé](https://github.com/CorentinBrule) [hu](https://github.com/cncjs/cncjs/tree/master/src/web/i18n/hu) | Magyar (Hungarian) | ✔ | Sipos Péter [it](https://github.com/cncjs/cncjs/tree/master/src/web/i18n/it) | Italiano (Italian) | ✔ | [vince87](https://github.com/vince87) [ja](https://github.com/cncjs/cncjs/tree/master/src/web/i18n/ja) | 日本語 (Japanese) | ✔ | [Naoki Okamoto](https://github.com/toonaoki) [nl](https://github.com/cncjs/cncjs/tree/master/src/web/i18n/nl) | Nederlands (Netherlands) | ✔ | [dutchpatriot](https://github.com/dutchpatriot) [pt-br](https://github.com/cncjs/cncjs/tree/master/src/web/i18n/pt-br) | Português (Brasil) | ✔ | [cmsteinBR](https://github.com/cmsteinBR) [ru](https://github.com/cncjs/cncjs/tree/master/src/web/i18n/ru) | Ру́сский (Russian) | ✔ | [Denis Yusupov](https://github.com/minithc) [tr](https://github.com/cncjs/cncjs/tree/master/src/web/i18n/tr) | Türkçe (Turkish) | ✔ | Ali GÜNDOĞDU [zh-cn](https://github.com/cncjs/cncjs/tree/master/src/web/i18n/zh-cn) | 简体中文 (Simplified Chinese) | ✔ | [Mandy Chien](https://github.com/MandyChien), [Terry Lee](https://github.com/TerryShampoo) [zh-tw](https://github.com/cncjs/cncjs/tree/master/src/web/i18n/zh-tw) | 繁體中文 (Traditional Chinese) | ✔ | [Cheton Wu](https://github.com/cheton) ## Donate If you would like to support this project, you can make a donation using PayPal. Thank you! [![Donate](https://www.paypalobjects.com/en_US/i/btn/btn_donateCC_LG.gif)](https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=38CYN33CWPBR2) ## Contributors This project exists thanks to all the people who contribute. [[Contribute](CONTRIBUTING.md)]. <a href="graphs/contributors"><img src="https://opencollective.com/cncjs/contributors.svg?width=890&button=false" /></a> ## Backers Thank you to all our backers! 🙏 [[Become a backer](https://opencollective.com/cncjs#backer)] <a href="https://opencollective.com/cncjs#backers" target="_blank"><img src="https://opencollective.com/cncjs/backers.svg?width=890"></a> ## Sponsors Support this project by becoming a sponsor. Your logo will show up here with a link to your website. [[Become a sponsor](https://opencollective.com/cncjs#sponsor)] <a href="https://opencollective.com/cncjs/sponsor/0/website" target="_blank"><img src="https://opencollective.com/cncjs/sponsor/0/avatar.svg"></a> <a href="https://opencollective.com/cncjs/sponsor/1/website" target="_blank"><img src="https://opencollective.com/cncjs/sponsor/1/avatar.svg"></a> <a href="https://opencollective.com/cncjs/sponsor/2/website" target="_blank"><img src="https://opencollective.com/cncjs/sponsor/2/avatar.svg"></a> <a href="https://opencollective.com/cncjs/sponsor/3/website" target="_blank"><img src="https://opencollective.com/cncjs/sponsor/3/avatar.svg"></a> <a href="https://opencollective.com/cncjs/sponsor/4/website" target="_blank"><img src="https://opencollective.com/cncjs/sponsor/4/avatar.svg"></a> <a href="https://opencollective.com/cncjs/sponsor/5/website" target="_blank"><img src="https://opencollective.com/cncjs/sponsor/5/avatar.svg"></a> <a href="https://opencollective.com/cncjs/sponsor/6/website" target="_blank"><img src="https://opencollective.com/cncjs/sponsor/6/avatar.svg"></a> <a href="https://opencollective.com/cncjs/sponsor/7/website" target="_blank"><img src="https://opencollective.com/cncjs/sponsor/7/avatar.svg"></a> <a href="https://opencollective.com/cncjs/sponsor/8/website" target="_blank"><img src="https://opencollective.com/cncjs/sponsor/8/avatar.svg"></a> <a href="https://opencollective.com/cncjs/sponsor/9/website" target="_blank"><img src="https://opencollective.com/cncjs/sponsor/9/avatar.svg"></a> ## License Licensed under the [MIT License](https://raw.githubusercontent.com/cncjs/cncjs/master/LICENSE).
569
An open source re-implementation of Chris Sawyer's Locomotion
# OpenLoco An open source re-implementation of Chris Sawyer's Locomotion. A construction and management simulation video game that simulates running a transport company. --- ![](https://user-images.githubusercontent.com/604665/55420349-1a2aea00-5577-11e9-87da-78fe5cdb09e1.png) # Contents - 1 - [Introduction](#1-introduction) - 2 - [Downloading the game (pre-built)](#2-downloading-the-game-pre-built) - 3 - [Contributing](#3-contributing) - 4 - [Compiling the game](#4-compiling-the-game) - 4.1 - [Building prerequisites](#41-building-prerequisites) - 4.2 - [Compiling and running](#42-compiling-and-running) - 5 - [Licence](#5-licence) - 6 - [More information](#6-more-information) --- ### Build Status | | Windows / Linux | Download | |-------------|-----------------|----------| | **master** | ![CI](https://github.com/OpenLoco/OpenLoco/workflows/CI/badge.svg) | [![GitHub release](https://img.shields.io/github/release/OpenLoco/OpenLoco.svg)](https://github.com/OpenLoco/OpenLoco/releases) | ### Chat Feel free to join our Discord server to talk about developing the game, or for help getting it to run. [![Discord](https://img.shields.io/discord/689445672390361176)](https://discord.gg/vEuNRHD) # 1 Introduction **OpenLoco** is an open-source re-implementation of Chris Sawyer's Locomotion (CSL). CSL is the spiritual successor to Transport Tycoon and OpenLoco aims to improve the game similar to how [OpenTTD](https://openttd.org) improved Transport Tycoon and [OpenRCT2](https://openrct2.io) improved RollerCoaster Tycoon. Chris Sawyer's Locomotion was originally written by Chris Sawyer in x86 assembly, building on top of his RollerCoaster Tycoon 2 engine. Much of the code is 1:1 with RollerCoaster Tycoon 2. However, the engine has changed substantially enough that OpenLoco currently does not share its codebase with OpenRCT2. Recent implementation efforts have focussed on re-implementing the UI, so that the data structures involved may be better understood. Once this is done, it is our hope the game logic will be easier to understand and implement. --- # 2 Downloading the game (pre-built) The latest releases can be [downloaded from GitHub](https://github.com/OpenLoco/OpenLoco/releases). Releases are currently provided for Windows and macOS (32-bit only). For Linux and BSD distributions, we currently do not provide any builds. Please refer to the next section to compile the game manually. Please note that OpenLoco requires the asset files of the original Chris Sawyer's Locomotion to play the game. It can be bought at e.g. [Steam](https://store.steampowered.com/app/356430/) or [GOG.com](https://www.gog.com/game/chris_sawyers_locomotion). --- # 3 Contributing We warmly welcome any contributions to the project, e.g. for C++ code (game implementation, bug fixes, features) or localisation (new translations). Please have a look at our [issues for newcomers](https://github.com/OpenLoco/OpenLoco/issues?q=is%3Aopen+label%3A%22good+first+issue%22%2C%22hacktoberfest%22). For code contributions, please stick to our [code style](https://github.com/OpenLoco/OpenLoco/wiki/Coding-Style). You can use `clang-format` to apply these guidelines automatically. --- # 4 Compiling the game If you would like to contribute code to OpenLoco, please follow the instructions below to get started compiling the game. Alternatively, we have platform-specific guides for [Ubuntu](https://github.com/OpenLoco/OpenLoco/wiki/Building-on-Ubuntu) and [macOS](https://github.com/OpenLoco/OpenLoco/wiki/Building-on-macOS). If you just want to play the game, you can just [download the latest release](https://github.com/OpenLoco/OpenLoco/releases) from GitHub. Releases are currently provided for Windows and macOS (32-bit only). ## 4.1 Building prerequisites The following libraries/dependencies are required: - [libpng](http://www.libpng.org/pub/png/libpng.html) - [libzip](https://libzip.org) - [OpenAL](https://www.openal.org/) - [SDL2](https://www.libsdl.org/download-2.0.php) - [yaml-cpp](https://github.com/jbeder/yaml-cpp) (fetched during CMake generation) - [breakpad](https://github.com/google/breakpad) (only required on Windows) ### Windows - 7 / 8 / 10 / 11 - [Visual Studio 2022](https://www.visualstudio.com/vs/community/) - Desktop development with C++ - Dependencies are managed with [vcpkg](https://github.com/Microsoft/vcpkg) ### Linux - cmake 3.22+ - make or ninja - 32-bit versions of the libraries mentioned above --- ## 4.2 Compiling and running ### Windows: Note: The game can currently only be built for 32-bit architectures. 1. Check out the repository. This can be done using [GitHub Desktop](https://desktop.github.com) or [other tools](https://help.github.com/articles/which-remote-url-should-i-use). 2. With VS 2022 use the "Open a local folder" option to start the project file generation. This may take some time as it downloads dependencies. 3. After successful generation of the project files open "build/windows-msvc/openloco.sln". 4. Select a config Debug or Release and run Build -> Build Solution. 4. Run the game from "build/windows-msvc/<config>/OpenLoco.exe" or within VS. Alternatively using CMake use the following commands. 1. Run `cmake --preset windows-msvc` 2. Run `cmake --build --preset windows-msvc-release` ### Linux: Due to issues with yaml-cpp package we download it during CMake generation. The standard CMake build procedure is to install the required libraries, then: ``` cmake --preset linux cmake --build --preset linux-release ``` Note that installing some packages can be problematic on desktop AMD64 distributions, you can use our docker images for compilation. Running the game will need the data directory from the root of the source code next to the binary. Assuming you're in `$SRC/build`, ``` ln -s ../data OR cp -r ../data ./data ``` ### MacOS For technical reasons OpenLoco can only be built as 32-bit x86 application, for which Apple dropped support in Mac OS 10.15. We can't provide MacOS builds at this time. --- # 5 Licence **OpenLoco** is licensed under the MIT License. --- # 6 More information - [GitHub](https://github.com/OpenLoco/OpenLoco) - [TT-Forums](https://www.tt-forums.net) - [Locomotion subreddit](https://www.reddit.com/r/locomotion/)
570
A real-time monitoring system with custom-monitor and agentless. Aim to monitor everything! Web, database, os, middleware, cloudnative and more. Notified support discord, slack, email, telegram, dingding, wechat, feishu, webhook, sms.
<p align="center"> <a href="https://hertzbeat.com"> <img alt="hertzbeat" src="https://cdn.jsdelivr.net/gh/dromara/hertzbeat/home/static/img/hertzbeat-brand.svg" width="260"> </a> </p> [comment]: <> (<img alt="sureness" src="https://cdn.jsdelivr.net/gh/dromara/hertzbeat/home/static/img/hertzbeat-brand.svg" width="300">) ## HertzBeat | [中文文档](README_CN.md) > An open-source, real-time monitoring system with custom-monitor and agentLess. | 易用友好的实时监控告警系统,无需Agent,强大自定义监控能力. [![discord](https://img.shields.io/badge/chat-on%20discord-brightgreen)](https://discord.gg/Fb6M73htGr) [![Gitter](https://badges.gitter.im/hertzbeat/community.svg)](https://gitter.im/hertzbeat/community?utm_source=badge&utm_medium=badge&utm_campaign=pr-badge) [![QQ](https://img.shields.io/badge/qq-718618151-orange)](https://jq.qq.com/?_wv=1027&k=Bud9OzdI) ![hertzbeat](https://cdn.jsdelivr.net/gh/dromara/hertzbeat@gh-pages/img/badge/web-monitor.svg) ![hertzbeat](https://cdn.jsdelivr.net/gh/dromara/hertzbeat@gh-pages/img/badge/ping-connect.svg) ![hertzbeat](https://cdn.jsdelivr.net/gh/dromara/hertzbeat@gh-pages/img/badge/port-available.svg) ![hertzbeat](https://cdn.jsdelivr.net/gh/dromara/hertzbeat@gh-pages/img/badge/database-monitor.svg) ![hertzbeat](https://cdn.jsdelivr.net/gh/dromara/hertzbeat@gh-pages/img/badge/os-monitor.svg) ![hertzbeat](https://img.shields.io/badge/monitor-cloud%20native-brightgreen) ![hertzbeat](https://img.shields.io/badge/monitor-middleware-blueviolet) ![hertzbeat](https://cdn.jsdelivr.net/gh/dromara/hertzbeat@gh-pages/img/badge/custom-monitor.svg) ![hertzbeat](https://cdn.jsdelivr.net/gh/dromara/hertzbeat@gh-pages/img/badge/threshold.svg) ![hertzbeat](https://cdn.jsdelivr.net/gh/dromara/hertzbeat@gh-pages/img/badge/alert.svg) **Home: [hertzbeat.com](https://hertzbeat.com)** **Cloud: [tancloud.cn](https://tancloud.cn)** ## 🎡 <font color="green">Introduction</font> > [HertzBeat](https://github.com/dromara/hertzbeat) is an open-source, real-time monitoring system with custom-monitor and agentless. > **Monitor+Alerter+Notify** all in one. Support monitoring web service, database, os, middleware, cloud-native and more. > Most important is HertzBeat supports [Custom Monitoring](https://hertzbeat.com/docs/advanced/extend-point), just by editing YML file, we can customize monitor type and metrics what we want. > More liberal threshold alarm configuration (calculation expression), timely notification delivery by `Discord` `Slack` `Telegram` `Email` `DingDing` `WeChat` `FeiShu` `Webhook` `SMS`. > We make protocols such as `Http, Jmx, Ssh, Snmp, Jdbc` configurable, and you only need to configure YML to use these protocols to custom collect any metrics you want. > Do you believe that you can immediately adapt a new monitoring type such as K8s or Docker just by configuring YML? > `HertzBeat`'s powerful custom-define, multi-type support, easy expansion, low coupling, hope to help developers and micro teams to quickly build their own monitoring system. > We also provide **[Monitoring Saas Cloud](https://console.tancloud.cn)**, users no longer need to deploy a cumbersome monitoring system in order to monitor resources. **[Get started for free](https://console.tancloud.cn)**. ---- [![hertzbeat](home/static/img/home/1.png)](https://www.bilibili.com/video/BV1DY4y1i7ts) ---- ## 🥐 Architecture ![hertzBeat](home/static/img/docs/hertzbeat-arch.png) ## ⛄ Supported - [Website](manager/src/main/resources/define/app/app-website.yml), [Port Telnet](manager/src/main/resources/define/app/app-port.yml), [Http Api](manager/src/main/resources/define/app/app-api.yml), [Ping Connect](manager/src/main/resources/define/app/app-ping.yml), [Jvm](manager/src/main/resources/define/app/app-jvm.yml), [SiteMap](manager/src/main/resources/define/app/app-fullsite.yml), [Ssl Certificate](manager/src/main/resources/define/app/app-ssl_cert.yml), [SpringBoot](manager/src/main/resources/define/app/app-springboot2.yml), [FTP Server](manager/src/main/resources/define/app/app-ftp.yml) - [Mysql](manager/src/main/resources/define/app/app-mysql.yml), [PostgreSQL](manager/src/main/resources/define/app/app-postgresql.yml), [MariaDB](manager/src/main/resources/define/app/app-mariadb.yml), [Redis](manager/src/main/resources/define/app/app-redis.yml), [ElasticSearch](manager/src/main/resources/define/app/app-elasticsearch.yml), [SqlServer](manager/src/main/resources/define/app/app-sqlserver.yml), [Oracle](manager/src/main/resources/define/app/app-oracle.yml), [MongoDB](manager/src/main/resources/define/app/app-mongodb.yml), [DM](manager/src/main/resources/define/app/app-dm.yml), [OpenGauss](manager/src/main/resources/define/app/app-opengauss.yml), [ClickHouse](manager/src/main/resources/define/app/app-clickhouse.yml), [IoTDB](manager/src/main/resources/define/app/app-iotdb.yml) - [Linux](manager/src/main/resources/define/app/app-linux.yml), [Ubuntu](manager/src/main/resources/define/app/app-ubuntu.yml), [CentOS](manager/src/main/resources/define/app/app-centos.yml), [Windows](manager/src/main/resources/define/app/app-windows.yml) - [Tomcat](manager/src/main/resources/define/app/app-tomcat.yml), [Nacos](manager/src/main/resources/define/app/app-nacos.yml), [Zookeeper](manager/src/main/resources/define/app/app-zookeeper.yml), [RabbitMQ](manager/src/main/resources/define/app/app-rabbitmq.yml), [Flink](manager/src/main/resources/define/app/app-flink.yml), [Kafka](manager/src/main/resources/define/app/app-kafka.yml), [ShenYu](manager/src/main/resources/define/app/app-shenyu.yml), [DynamicTp](manager/src/main/resources/define/app/app-dynamic_tp.yml), [Jetty](manager/src/main/resources/define/app/app-jetty.yml), [ActiveMQ](manager/src/main/resources/define/app/app-activemq.yml) - [Kubernetes](manager/src/main/resources/define/app/app-kubernetes.yml), [Docker](manager/src/main/resources/define/app/app-docker.yml) - And More Your Custom Define. - Notified Support `Discord` `Slack` `Telegram` `Email` `DingDing` `WeChat` `FeiShu` `Webhook` `SMS`. ## 🐕 Quick Start - If you don’t want to deploy but use it directly, we provide [SAAS Monitoring Cloud-TanCloud](https://console.tancloud.cn), **[Log In And Register For Free](https://console.tancloud.cn)**. - If you want to deploy HertzBeat local, please refer to the following Deployment Documentation for operation. ### 🍞 Install HertzBeat > HertzBeat supports installation through source code, docker or package, cpu support X86/ARM64. ##### 1:Install quickly via docker 1. Just one command to get started: `docker run -d -p 1157:1157 --name hertzbeat tancloud/hertzbeat` 2. Access `localhost:1157` to start, default account: `admin/hertzbeat` Detailed config refer to [Install HertzBeat via Docker](https://hertzbeat.com/docs/start/docker-deploy) ##### 2:Install via package 1. Download the installation package [GITEE Release](https://gitee.com/dromara/hertzbeat/releases) [GITHUB Release](https://github.com/dromara/hertzbeat/releases) 2. Need Jdk Environment, `jdk11` 3. [optional]Configure the HertzBeat configuration yml file `hertzbeat/config/application.yml` 4. Run shell `$ ./startup.sh ` 5. Access `localhost:1157` to start, default account: `admin/hertzbeat` Detailed config refer to [Install HertzBeat via Package](https://hertzbeat.com/docs/start/package-deploy) ##### 3:Start via source code 1. Local source code debugging needs to start the back-end project `manager` and the front-end project `web-app`. 2. Backend:need `maven3+`, `java11`, `lombok`, start the `manager` service. 3. Web:need `nodejs npm angular-cli` environment, Run `ng serve --open` in `web-app` directory after backend startup. 4. Access `localhost:4200` to start, default account: `admin/hertzbeat` Detailed steps refer to [CONTRIBUTING](CONTRIBUTING.md) ##### 4:Install All(hertzbeat+mysql+iotdb/tdengine) via Docker-compose Install and deploy the mysql database, iotdb/tdengine database and hertzbeat at one time through [docker-compose deployment script](script/docker-compose). Detailed steps refer to [Install via Docker-Compose](script/docker-compose/README.md) **HAVE FUN** ## 🥐 Roadmap ![hertzBeat](home/static/img/docs/hertzbeat-roadmap.png) ## ✨ Contributors Thanks these wonderful people, welcome to join us: [Contributor Guide](CONTRIBUTING.md) <!-- ALL-CONTRIBUTORS-LIST:START - Do not remove or modify this section --> <!-- prettier-ignore-start --> <!-- markdownlint-disable --> <table> <tbody> <tr> <td align="center" valign="top" width="14.28%"><a href="https://github.com/tomsun28"><img src="https://avatars.githubusercontent.com/u/24788200?v=4?s=100" width="100px;" alt="tomsun28"/><br /><sub><b>tomsun28</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=tomsun28" title="Code">💻</a> <a href="https://github.com/dromara/hertzbeat/commits?author=tomsun28" title="Documentation">📖</a> <a href="#design-tomsun28" title="Design">🎨</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/wang1027-wqh"><img src="https://avatars.githubusercontent.com/u/71161318?v=4?s=100" width="100px;" alt="会编程的王学长"/><br /><sub><b>会编程的王学长</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=wang1027-wqh" title="Code">💻</a> <a href="https://github.com/dromara/hertzbeat/commits?author=wang1027-wqh" title="Documentation">📖</a> <a href="#design-wang1027-wqh" title="Design">🎨</a></td> <td align="center" valign="top" width="14.28%"><a href="https://www.maxkey.top/"><img src="https://avatars.githubusercontent.com/u/1563377?v=4?s=100" width="100px;" alt="MaxKey"/><br /><sub><b>MaxKey</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=shimingxy" title="Code">💻</a> <a href="#design-shimingxy" title="Design">🎨</a> <a href="#ideas-shimingxy" title="Ideas, Planning, & Feedback">🤔</a></td> <td align="center" valign="top" width="14.28%"><a href="https://blog.gcdd.top/"><img src="https://avatars.githubusercontent.com/u/26523525?v=4?s=100" width="100px;" alt="观沧海"/><br /><sub><b>观沧海</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=gcdd1993" title="Code">💻</a> <a href="#design-gcdd1993" title="Design">🎨</a> <a href="https://github.com/dromara/hertzbeat/issues?q=author%3Agcdd1993" title="Bug reports">🐛</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/a25017012"><img src="https://avatars.githubusercontent.com/u/32265356?v=4?s=100" width="100px;" alt="yuye"/><br /><sub><b>yuye</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=a25017012" title="Code">💻</a> <a href="https://github.com/dromara/hertzbeat/commits?author=a25017012" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/jx10086"><img src="https://avatars.githubusercontent.com/u/5323228?v=4?s=100" width="100px;" alt="jx10086"/><br /><sub><b>jx10086</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=jx10086" title="Code">💻</a> <a href="https://github.com/dromara/hertzbeat/issues?q=author%3Ajx10086" title="Bug reports">🐛</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/winnerTimer"><img src="https://avatars.githubusercontent.com/u/76024658?v=4?s=100" width="100px;" alt="winnerTimer"/><br /><sub><b>winnerTimer</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=winnerTimer" title="Code">💻</a> <a href="https://github.com/dromara/hertzbeat/issues?q=author%3AwinnerTimer" title="Bug reports">🐛</a></td> </tr> <tr> <td align="center" valign="top" width="14.28%"><a href="https://github.com/goo-kits"><img src="https://avatars.githubusercontent.com/u/13163673?v=4?s=100" width="100px;" alt="goo-kits"/><br /><sub><b>goo-kits</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=goo-kits" title="Code">💻</a> <a href="https://github.com/dromara/hertzbeat/issues?q=author%3Agoo-kits" title="Bug reports">🐛</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/brave4Time"><img src="https://avatars.githubusercontent.com/u/105094014?v=4?s=100" width="100px;" alt="brave4Time"/><br /><sub><b>brave4Time</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=brave4Time" title="Code">💻</a> <a href="https://github.com/dromara/hertzbeat/issues?q=author%3Abrave4Time" title="Bug reports">🐛</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/walkerlee-lab"><img src="https://avatars.githubusercontent.com/u/8426753?v=4?s=100" width="100px;" alt="WalkerLee"/><br /><sub><b>WalkerLee</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=walkerlee-lab" title="Code">💻</a> <a href="https://github.com/dromara/hertzbeat/issues?q=author%3Awalkerlee-lab" title="Bug reports">🐛</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/fullofjoy"><img src="https://avatars.githubusercontent.com/u/30247571?v=4?s=100" width="100px;" alt="jianghang"/><br /><sub><b>jianghang</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=fullofjoy" title="Code">💻</a> <a href="https://github.com/dromara/hertzbeat/issues?q=author%3Afullofjoy" title="Bug reports">🐛</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/ChineseTony"><img src="https://avatars.githubusercontent.com/u/24618786?v=4?s=100" width="100px;" alt="ChineseTony"/><br /><sub><b>ChineseTony</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=ChineseTony" title="Code">💻</a> <a href="https://github.com/dromara/hertzbeat/issues?q=author%3AChineseTony" title="Bug reports">🐛</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/wyt199905"><img src="https://avatars.githubusercontent.com/u/85098809?v=4?s=100" width="100px;" alt="wyt199905"/><br /><sub><b>wyt199905</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=wyt199905" title="Code">💻</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/weifuqing"><img src="https://avatars.githubusercontent.com/u/13931013?v=4?s=100" width="100px;" alt="卫傅庆"/><br /><sub><b>卫傅庆</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=weifuqing" title="Code">💻</a> <a href="https://github.com/dromara/hertzbeat/issues?q=author%3Aweifuqing" title="Bug reports">🐛</a></td> </tr> <tr> <td align="center" valign="top" width="14.28%"><a href="https://github.com/zklmcookle"><img src="https://avatars.githubusercontent.com/u/107192352?v=4?s=100" width="100px;" alt="zklmcookle"/><br /><sub><b>zklmcookle</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=zklmcookle" title="Code">💻</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/DevilX5"><img src="https://avatars.githubusercontent.com/u/13269921?v=4?s=100" width="100px;" alt="DevilX5"/><br /><sub><b>DevilX5</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=DevilX5" title="Documentation">📖</a> <a href="https://github.com/dromara/hertzbeat/commits?author=DevilX5" title="Code">💻</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/djzeng"><img src="https://avatars.githubusercontent.com/u/14074864?v=4?s=100" width="100px;" alt="tea"/><br /><sub><b>tea</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=djzeng" title="Code">💻</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/yangshihui"><img src="https://avatars.githubusercontent.com/u/28550208?v=4?s=100" width="100px;" alt="yangshihui"/><br /><sub><b>yangshihui</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=yangshihui" title="Code">💻</a> <a href="https://github.com/dromara/hertzbeat/issues?q=author%3Ayangshihui" title="Bug reports">🐛</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/DreamGirl524"><img src="https://avatars.githubusercontent.com/u/81132838?v=4?s=100" width="100px;" alt="DreamGirl524"/><br /><sub><b>DreamGirl524</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=DreamGirl524" title="Code">💻</a> <a href="https://github.com/dromara/hertzbeat/commits?author=DreamGirl524" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/gzwlly"><img src="https://avatars.githubusercontent.com/u/83171907?v=4?s=100" width="100px;" alt="gzwlly"/><br /><sub><b>gzwlly</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=gzwlly" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/cuipiheqiuqiu"><img src="https://avatars.githubusercontent.com/u/76642201?v=4?s=100" width="100px;" alt="cuipiheqiuqiu"/><br /><sub><b>cuipiheqiuqiu</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=cuipiheqiuqiu" title="Code">💻</a> <a href="https://github.com/dromara/hertzbeat/commits?author=cuipiheqiuqiu" title="Tests">⚠️</a> <a href="#design-cuipiheqiuqiu" title="Design">🎨</a></td> </tr> <tr> <td align="center" valign="top" width="14.28%"><a href="https://github.com/oyiyou"><img src="https://avatars.githubusercontent.com/u/39228891?v=4?s=100" width="100px;" alt="lambert"/><br /><sub><b>lambert</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=oyiyou" title="Code">💻</a></td> <td align="center" valign="top" width="14.28%"><a href="http://mroldx.xyz/"><img src="https://avatars.githubusercontent.com/u/34847828?v=4?s=100" width="100px;" alt="mroldx"/><br /><sub><b>mroldx</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=mroldx" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/woshiniusange"><img src="https://avatars.githubusercontent.com/u/91513022?v=4?s=100" width="100px;" alt="woshiniusange"/><br /><sub><b>woshiniusange</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=woshiniusange" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://vampireachao.github.io/"><img src="https://avatars.githubusercontent.com/u/52746628?v=4?s=100" width="100px;" alt="VampireAchao"/><br /><sub><b>VampireAchao</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=VampireAchao" title="Code">💻</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/Ceilzcx"><img src="https://avatars.githubusercontent.com/u/48920254?v=4?s=100" width="100px;" alt="zcx"/><br /><sub><b>zcx</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=Ceilzcx" title="Code">💻</a> <a href="https://github.com/dromara/hertzbeat/issues?q=author%3ACeilzcx" title="Bug reports">🐛</a> <a href="#design-Ceilzcx" title="Design">🎨</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/CharlieXCL"><img src="https://avatars.githubusercontent.com/u/91540487?v=4?s=100" width="100px;" alt="CharlieXCL"/><br /><sub><b>CharlieXCL</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=CharlieXCL" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/Privauto"><img src="https://avatars.githubusercontent.com/u/36581456?v=4?s=100" width="100px;" alt="Privauto"/><br /><sub><b>Privauto</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=Privauto" title="Code">💻</a> <a href="https://github.com/dromara/hertzbeat/commits?author=Privauto" title="Documentation">📖</a></td> </tr> <tr> <td align="center" valign="top" width="14.28%"><a href="https://github.com/emrys-he"><img src="https://avatars.githubusercontent.com/u/5848915?v=4?s=100" width="100px;" alt="emrys"/><br /><sub><b>emrys</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=emrys-he" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/SxLiuYu"><img src="https://avatars.githubusercontent.com/u/95198625?v=4?s=100" width="100px;" alt="SxLiuYu"/><br /><sub><b>SxLiuYu</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/issues?q=author%3ASxLiuYu" title="Bug reports">🐛</a></td> <td align="center" valign="top" width="14.28%"><a href="https://allcontributors.org"><img src="https://avatars.githubusercontent.com/u/46410174?v=4?s=100" width="100px;" alt="All Contributors"/><br /><sub><b>All Contributors</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=all-contributors" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/gxc-myh"><img src="https://avatars.githubusercontent.com/u/85919258?v=4?s=100" width="100px;" alt="铁甲小宝"/><br /><sub><b>铁甲小宝</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=gxc-myh" title="Code">💻</a> <a href="https://github.com/dromara/hertzbeat/commits?author=gxc-myh" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/click33"><img src="https://avatars.githubusercontent.com/u/36243476?v=4?s=100" width="100px;" alt="click33"/><br /><sub><b>click33</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=click33" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://jpom.io/"><img src="https://avatars.githubusercontent.com/u/16408873?v=4?s=100" width="100px;" alt="蒋小小"/><br /><sub><b>蒋小小</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=bwcx-jzy" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://www.zhihu.com/people/kevinbauer"><img src="https://avatars.githubusercontent.com/u/28581579?v=4?s=100" width="100px;" alt="Kevin Huang"/><br /><sub><b>Kevin Huang</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=kevinhuangwl" title="Documentation">📖</a></td> </tr> <tr> <td align="center" valign="top" width="14.28%"><a href="https://github.com/TJxiaobao"><img src="https://avatars.githubusercontent.com/u/85919258?v=4?s=100" width="100px;" alt="铁甲小宝"/><br /><sub><b>铁甲小宝</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/issues?q=author%3ATJxiaobao" title="Bug reports">🐛</a> <a href="https://github.com/dromara/hertzbeat/commits?author=TJxiaobao" title="Code">💻</a> <a href="https://github.com/dromara/hertzbeat/commits?author=TJxiaobao" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/Jack-123-power"><img src="https://avatars.githubusercontent.com/u/84333501?v=4?s=100" width="100px;" alt="Captain Jack"/><br /><sub><b>Captain Jack</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=Jack-123-power" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/haibo-duan"><img src="https://avatars.githubusercontent.com/u/7974845?v=4?s=100" width="100px;" alt="haibo.duan"/><br /><sub><b>haibo.duan</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=haibo-duan" title="Tests">⚠️</a> <a href="https://github.com/dromara/hertzbeat/commits?author=haibo-duan" title="Code">💻</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/assassinfym"><img src="https://avatars.githubusercontent.com/u/15188754?v=4?s=100" width="100px;" alt="assassin"/><br /><sub><b>assassin</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/issues?q=author%3Aassassinfym" title="Bug reports">🐛</a> <a href="https://github.com/dromara/hertzbeat/commits?author=assassinfym" title="Code">💻</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/csyshu"><img src="https://avatars.githubusercontent.com/u/46591658?v=4?s=100" width="100px;" alt="Reverse wind"/><br /><sub><b>Reverse wind</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=csyshu" title="Tests">⚠️</a> <a href="https://github.com/dromara/hertzbeat/commits?author=csyshu" title="Code">💻</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/luxx-lq"><img src="https://avatars.githubusercontent.com/u/58515565?v=4?s=100" width="100px;" alt="luxx"/><br /><sub><b>luxx</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=luxx-lq" title="Code">💻</a></td> <td align="center" valign="top" width="14.28%"><a href="https://bandism.net/"><img src="https://avatars.githubusercontent.com/u/22633385?v=4?s=100" width="100px;" alt="Ikko Ashimine"/><br /><sub><b>Ikko Ashimine</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=eltociear" title="Documentation">📖</a></td> </tr> <tr> <td align="center" valign="top" width="14.28%"><a href="https://github.com/zenan08"><img src="https://avatars.githubusercontent.com/u/80514991?v=4?s=100" width="100px;" alt="leizenan"/><br /><sub><b>leizenan</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=zenan08" title="Code">💻</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/BKing2020"><img src="https://avatars.githubusercontent.com/u/28869121?v=4?s=100" width="100px;" alt="BKing"/><br /><sub><b>BKing</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=BKing2020" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/xingshuaiLi"><img src="https://avatars.githubusercontent.com/u/119487588?v=4?s=100" width="100px;" alt="xingshuaiLi"/><br /><sub><b>xingshuaiLi</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=xingshuaiLi" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/wangke6666"><img src="https://avatars.githubusercontent.com/u/113656595?v=4?s=100" width="100px;" alt="wangke6666"/><br /><sub><b>wangke6666</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=wangke6666" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/LWBobo"><img src="https://avatars.githubusercontent.com/u/50368698?v=4?s=100" width="100px;" alt="刺猬"/><br /><sub><b>刺猬</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/issues?q=author%3ALWBobo" title="Bug reports">🐛</a> <a href="https://github.com/dromara/hertzbeat/commits?author=LWBobo" title="Code">💻</a></td> <td align="center" valign="top" width="14.28%"><a href="http://www.zanglikun.com"><img src="https://avatars.githubusercontent.com/u/61591648?v=4?s=100" width="100px;" alt="Haste"/><br /><sub><b>Haste</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=zanglikun" title="Code">💻</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/SuitSmile"><img src="https://avatars.githubusercontent.com/u/38679717?v=4?s=100" width="100px;" alt="zhongshi.yi"/><br /><sub><b>zhongshi.yi</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=SuitSmile" title="Documentation">📖</a></td> </tr> <tr> <td align="center" valign="top" width="14.28%"><a href="https://www.smallq.cn"><img src="https://avatars.githubusercontent.com/u/39754275?v=4?s=100" width="100px;" alt="Qi Zhang"/><br /><sub><b>Qi Zhang</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=zzzhangqi" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/MrAndyMing"><img src="https://avatars.githubusercontent.com/u/49541483?v=4?s=100" width="100px;" alt="MrAndyMing"/><br /><sub><b>MrAndyMing</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=MrAndyMing" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://idongliming.github.io/"><img src="https://avatars.githubusercontent.com/u/31564353?v=4?s=100" width="100px;" alt="idongliming"/><br /><sub><b>idongliming</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=idongliming" title="Code">💻</a></td> <td align="center" valign="top" width="14.28%"><a href="https://earthjasonlin.github.io"><img src="https://avatars.githubusercontent.com/u/83632110?v=4?s=100" width="100px;" alt="Zichao Lin"/><br /><sub><b>Zichao Lin</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=earthjasonlin" title="Code">💻</a> <a href="https://github.com/dromara/hertzbeat/commits?author=earthjasonlin" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="http://blog.liudonghua.com"><img src="https://avatars.githubusercontent.com/u/2276718?v=4?s=100" width="100px;" alt="liudonghua"/><br /><sub><b>liudonghua</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=liudonghua123" title="Code">💻</a> <a href="#ideas-liudonghua123" title="Ideas, Planning, & Feedback">🤔</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/orangeyts"><img src="https://avatars.githubusercontent.com/u/4250869?v=4?s=100" width="100px;" alt="Jerry"/><br /><sub><b>Jerry</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=orangeyts" title="Code">💻</a> <a href="https://github.com/dromara/hertzbeat/commits?author=orangeyts" title="Tests">⚠️</a> <a href="#ideas-orangeyts" title="Ideas, Planning, & Feedback">🤔</a></td> <td align="center" valign="top" width="14.28%"><a href="https://dynamictp.cn"><img src="https://avatars.githubusercontent.com/u/13051908?v=4?s=100" width="100px;" alt="yanhom"/><br /><sub><b>yanhom</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=yanhom1314" title="Documentation">📖</a></td> </tr> <tr> <td align="center" valign="top" width="14.28%"><a href="https://www.jianshu.com/u/a8f822c04f67"><img src="https://avatars.githubusercontent.com/u/18587688?v=4?s=100" width="100px;" alt="fsl"/><br /><sub><b>fsl</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=fengshunli" title="Code">💻</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/xttttv"><img src="https://avatars.githubusercontent.com/u/116323904?v=4?s=100" width="100px;" alt="xttttv"/><br /><sub><b>xttttv</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=xttttv" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/NavinKumarBarnwal"><img src="https://avatars.githubusercontent.com/u/44504274?v=4?s=100" width="100px;" alt="NavinKumarBarnwal"/><br /><sub><b>NavinKumarBarnwal</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=NavinKumarBarnwal" title="Code">💻</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/z641205699"><img src="https://avatars.githubusercontent.com/u/45276423?v=4?s=100" width="100px;" alt="Zakkary"/><br /><sub><b>Zakkary</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=z641205699" title="Documentation">📖</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/898349230"><img src="https://avatars.githubusercontent.com/u/21972532?v=4?s=100" width="100px;" alt="sunxinbo"/><br /><sub><b>sunxinbo</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=898349230" title="Code">💻</a> <a href="https://github.com/dromara/hertzbeat/commits?author=898349230" title="Tests">⚠️</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/ldzbook"><img src="https://avatars.githubusercontent.com/u/13903790?v=4?s=100" width="100px;" alt="ldzbook"/><br /><sub><b>ldzbook</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=ldzbook" title="Documentation">📖</a> <a href="https://github.com/dromara/hertzbeat/issues?q=author%3Aldzbook" title="Bug reports">🐛</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/SurryChen"><img src="https://avatars.githubusercontent.com/u/91116490?v=4?s=100" width="100px;" alt="余与雨"/><br /><sub><b>余与雨</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=SurryChen" title="Code">💻</a> <a href="https://github.com/dromara/hertzbeat/commits?author=SurryChen" title="Tests">⚠️</a></td> </tr> <tr> <td align="center" valign="top" width="14.28%"><a href="https://github.com/MysticalDream"><img src="https://avatars.githubusercontent.com/u/78899028?v=4?s=100" width="100px;" alt="MysticalDream"/><br /><sub><b>MysticalDream</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=MysticalDream" title="Code">💻</a> <a href="https://github.com/dromara/hertzbeat/commits?author=MysticalDream" title="Tests">⚠️</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/zhouyoulin12"><img src="https://avatars.githubusercontent.com/u/17086633?v=4?s=100" width="100px;" alt="zhouyoulin12"/><br /><sub><b>zhouyoulin12</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=zhouyoulin12" title="Code">💻</a> <a href="https://github.com/dromara/hertzbeat/commits?author=zhouyoulin12" title="Tests">⚠️</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/jerjjj"><img src="https://avatars.githubusercontent.com/u/93431283?v=4?s=100" width="100px;" alt="jerjjj"/><br /><sub><b>jerjjj</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=jerjjj" title="Code">💻</a></td> <td align="center" valign="top" width="14.28%"><a href="https://wjl110.xyz/"><img src="https://avatars.githubusercontent.com/u/53851034?v=4?s=100" width="100px;" alt="wjl110"/><br /><sub><b>wjl110</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=wjl110" title="Code">💻</a></td> <td align="center" valign="top" width="14.28%"><a href="https://github.com/ngyhd"><img src="https://avatars.githubusercontent.com/u/29095207?v=4?s=100" width="100px;" alt="Sean"/><br /><sub><b>Sean</b></sub></a><br /><a href="https://github.com/dromara/hertzbeat/commits?author=ngyhd" title="Documentation">📖</a></td> </tr> </tbody> </table> <!-- markdownlint-restore --> <!-- prettier-ignore-end --> <!-- ALL-CONTRIBUTORS-LIST:END --> ## 💬 Join discussion HertzBeat is a project under the [Dromara Open Source Community](https://dromara.org/). ##### Channel **WeChat Group** : Add friend `tan-cloud`, and will invite you to the group. [QQ Group](https://jq.qq.com/?_wv=1027&k=Bud9OzdI) : Add group num `718618151` [Gitter Channel](https://gitter.im/hertzbeat/community) [Github Discussion](https://github.com/usthe/hertzbeat/discussions) [User Club](https://support.qq.com/products/379369) ##### Public <img alt="tan-cloud" src="https://cdn.jsdelivr.net/gh/dromara/hertzbeat/home/static/img/wechat.png" width="400"/> <br/> <img alt="planet" src="https://cdn.jsdelivr.net/gh/dromara/hertzbeat@gh-pages/img/planet.jpg" width="400"/> ##### Friends - [Hippo4j](https://github.com/opengoofy/hippo4j/) : 强大的动态线程池框架,附带监控报警功能 - [Jpom](https://gitee.com/dromara/Jpom) : 简而轻的低侵入式在线构建、自动部署、日常运维、项目监控软件 ##### Sponsor - Postcat [An Open Source API Tool](https://postcat.com/?utm_source=sponsor&utm_campaign=s-hertzbeat) supporting api test, mock, documentation, team collaboration etc. - Thanks [吉实信息(构建全新的微波+光交易网络)](https://www.flarespeed.com) sponsored server node. - Thanks [蓝易云(全新智慧上云)](https://www.tsyvps.com/aff/BZBEGYLX) sponsored server node. ## 🛡️ License [`Apache License, Version 2.0`](https://www.apache.org/licenses/LICENSE-2.0.html)
571
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
<div align="center"> <h1><code>moonwalk</code></h1> <p><strong><em>Cover your tracks during Linux Exploitation / Penetration Testing by leaving zero traces on system logs and filesystem timestamps.</em></strong></p> <img height="90" width="90" src="https://user-images.githubusercontent.com/26198477/146671442-78bb6781-b283-4f43-8754-d1d3b62ae627.gif"> <img height="90" width="90" src="https://user-images.githubusercontent.com/26198477/146671305-5ffc26b4-1e0e-4436-9a1e-1e0dfc81f40e.gif"> </div> --- ## 📖 Table of Contents - [Introduction](#%E2%84%B9%EF%B8%8F-introduction) - [Features](#features) - [Installation](#installation) - [Usage](#usage) - [Contribution](#contribution) - [License](#license) ## ℹ️ Introduction **moonwalk** is a 400 KB single-binary executable that can clear your traces while penetration testing a **Unix** machine. It saves the state of system logs pre-exploitation and reverts that state including the filesystem timestamps post-exploitation leaving zero traces of a _ghost in the shell_. ⚠️ **NOTE:** This tool is open-sourced to assist solely in [**Red Team**](https://en.wikipedia.org/wiki/Red_team) operations and in no means is the author liable for repercussions caused by any prohibited use of this tool. Only make use of this in a machine you have permission to test. ## Features - **Small Executable:** Get started quickly with a `curl` fetch to your target machine. - **Fast:** Performs all session commands including logging, trace clearing, and filesystem operations in under 5 milliseconds. - **Reconnaissance:** To save the state of system logs, `moonwalk` finds a world-writable path and saves the session under a dot directory which is removed upon ending the session. - **Shell History:** Instead of clearing the whole history file, `moonwalk` reverts it back to how it was including the invokation of `moonwalk`. - **Filesystem Timestamps:** Hide from the Blue Team by reverting the access/modify timestamps of files back to how it was using the [`GET`](#usage) command. ## Installation ``` $ curl -L https://github.com/mufeedvh/moonwalk/releases/download/v1.0.0/moonwalk_linux -o moonwalk ``` (`AMD x86-64`) **OR** Download the executable from [**Releases**](https://github.com/mufeedvh/moonwalk/releases) OR Install with `cargo`: $ cargo install --git https://github.com/mufeedvh/moonwalk.git [Install Rust/Cargo](https://rust-lang.org/tools/install) ## Build From Source **Prerequisites:** * [Git](https://git-scm.org/downloads) * [Rust](https://rust-lang.org/tools/install) * Cargo (Automatically installed when installing Rust) * A C linker (Only for Linux, generally comes pre-installed) ``` $ git clone https://github.com/mufeedvh/moonwalk.git $ cd moonwalk/ $ cargo build --release ``` The first command clones this repository into your local machine and the last two commands enters the directory and builds the source in release mode. ## Usage <div align="center"> <table> <tr> <td><img height="300" width="400" src="https://user-images.githubusercontent.com/26198477/146672354-9db1e7e5-bb8a-43e5-8b64-b2d1bbea547e.png"></td> </tr> </table> </div> Once you get a shell into the target Unix machine, start a moonwalk session by running this command: $ moonwalk start While you're doing recon/exploitation and messing with any files, get the `touch` timestamp command of a file beforehand to revert it back after you've accessed/modified it: $ moonwalk get ~/.bash_history Post-exploitation, clear your traces and close the session with this command: $ moonwalk finish That's it! ## Contribution Ways to contribute: - Suggest a feature - Report a bug - Fix something and open a pull request - Help me document the code - Spread the word - Find something I missed which leaves any trace! ## License Licensed under the MIT License, see <a href="https://github.com/mufeedvh/moonwalk/blob/master/LICENSE">LICENSE</a> for more information.
572
The Tcl Core. (Mirror of core.tcl-lang.org)
# README: Tcl This is the **Tcl 9.0a4** source distribution. You can get any source release of Tcl from [our distribution site](https://sourceforge.net/projects/tcl/files/Tcl/). 8.6 (production release, daily build) [![Build Status](https://github.com/tcltk/tcl/workflows/Linux/badge.svg?branch=core-8-6-branch)](https://github.com/tcltk/tcl/actions?query=workflow%3A%22Linux%22+branch%3Acore-8-6-branch) [![Build Status](https://github.com/tcltk/tcl/workflows/Windows/badge.svg?branch=core-8-6-branch)](https://github.com/tcltk/tcl/actions?query=workflow%3A%22Windows%22+branch%3Acore-8-6-branch) [![Build Status](https://github.com/tcltk/tcl/workflows/macOS/badge.svg?branch=core-8-6-branch)](https://github.com/tcltk/tcl/actions?query=workflow%3A%22macOS%22+branch%3Acore-8-6-branch) <br> 8.7 (in development, daily build)) [![Build Status](https://github.com/tcltk/tcl/workflows/Linux/badge.svg?branch=core-8-branch)](https://github.com/tcltk/tcl/actions?query=workflow%3A%22Linux%22+branch%3Acore-8-branch) [![Build Status](https://github.com/tcltk/tcl/workflows/Windows/badge.svg?branch=core-8-branch)](https://github.com/tcltk/tcl/actions?query=workflow%3A%22Windows%22+branch%3Acore-8-branch) [![Build Status](https://github.com/tcltk/tcl/workflows/macOS/badge.svg?branch=core-8-branch)](https://github.com/tcltk/tcl/actions?query=workflow%3A%22macOS%22+branch%3Acore-8-branch) <br> 9.0 (in development, daily build)) [![Build Status](https://github.com/tcltk/tcl/workflows/Linux/badge.svg?branch=main)](https://github.com/tcltk/tcl/actions?query=workflow%3A%22Linux%22+branch%3Amain) [![Build Status](https://github.com/tcltk/tcl/workflows/Windows/badge.svg?branch=main)](https://github.com/tcltk/tcl/actions?query=workflow%3A%22Windows%22+branch%3Amain) [![Build Status](https://github.com/tcltk/tcl/workflows/macOS/badge.svg?branch=main)](https://github.com/tcltk/tcl/actions?query=workflow%3A%22macOS%22+branch%3Amain) ## Contents 1. [Introduction](#intro) 2. [Documentation](#doc) 3. [Compiling and installing Tcl](#build) 4. [Development tools](#devtools) 5. [Tcl newsgroup](#complangtcl) 6. [The Tcler's Wiki](#wiki) 7. [Mailing lists](#email) 8. [Support and Training](#support) 9. [Tracking Development](#watch) 10. [Thank You](#thanks) ## <a id="intro">1.</a> Introduction Tcl provides a powerful platform for creating integration applications that tie together diverse applications, protocols, devices, and frameworks. When paired with the Tk toolkit, Tcl provides the fastest and most powerful way to create GUI applications that run on PCs, Unix, and Mac OS X. Tcl can also be used for a variety of web-related tasks and for creating powerful command languages for applications. Tcl is maintained, enhanced, and distributed freely by the Tcl community. Source code development and tracking of bug reports and feature requests take place at [core.tcl-lang.org](https://core.tcl-lang.org/). Tcl/Tk release and mailing list services are [hosted by SourceForge](https://sourceforge.net/projects/tcl/) with the Tcl Developer Xchange hosted at [www.tcl-lang.org](https://www.tcl-lang.org). Tcl is a freely available open-source package. You can do virtually anything you like with it, such as modifying it, redistributing it, and selling it either in whole or in part. See the file `license.terms` for complete information. ## <a id="doc">2.</a> Documentation Extensive documentation is available on our website. The home page for this release, including new features, is [here](https://www.tcl-lang.org/software/tcltk/9.0.html). Detailed release notes can be found at the [file distributions page](https://sourceforge.net/projects/tcl/files/Tcl/) by clicking on the relevant version. Information about Tcl itself can be found at the [Developer Xchange](https://www.tcl-lang.org/about/). There have been many Tcl books on the market. Many are mentioned in [the Wiki](https://wiki.tcl-lang.org/_/ref?N=25206). The complete set of reference manual entries for Tcl 9.0 is [online, here](https://www.tcl-lang.org/man/tcl9.0/). ### <a id="doc.unix">2a.</a> Unix Documentation The `doc` subdirectory in this release contains a complete set of reference manual entries for Tcl. Files with extension "`.1`" are for programs (for example, `tclsh.1`); files with extension "`.3`" are for C library procedures; and files with extension "`.n`" describe Tcl commands. The file "`doc/Tcl.n`" gives a quick summary of the Tcl language syntax. To print any of the man pages on Unix, cd to the "doc" directory and invoke your favorite variant of troff using the normal -man macros, for example groff -man -Tpdf Tcl.n >output.pdf to print Tcl.n to PDF. If Tcl has been installed correctly and your "man" program supports it, you should be able to access the Tcl manual entries using the normal "man" mechanisms, such as man Tcl ### <a id="doc.win">2b.</a> Windows Documentation The "doc" subdirectory in this release contains a complete set of Windows help files for Tcl. Once you install this Tcl release, a shortcut to the Windows help Tcl documentation will appear in the "Start" menu: Start | Programs | Tcl | Tcl Help ## <a id="build">3.</a> Compiling and installing Tcl There are brief notes in the `unix/README`, `win/README`, and `macosx/README` about compiling on these different platforms. There is additional information about building Tcl from sources [online](https://www.tcl-lang.org/doc/howto/compile.html). ## <a id="devtools">4.</a> Development tools ActiveState produces a high-quality set of commercial quality development tools that is available to accelerate your Tcl application development. Tcl Dev Kit builds on the earlier TclPro toolset and provides a debugger, static code checker, single-file wrapping utility, bytecode compiler, and more. More information can be found at https://www.activestate.com/products/tcl/ ## <a id="complangtcl">5.</a> Tcl newsgroup There is a USENET newsgroup, "`comp.lang.tcl`", intended for the exchange of information about Tcl, Tk, and related applications. The newsgroup is a great place to ask general information questions. For bug reports, please see the "Support and bug fixes" section below. ## <a id="wiki">6.</a> Tcl'ers Wiki There is a [wiki-based open community site](https://wiki.tcl-lang.org/) covering all aspects of Tcl/Tk. It is dedicated to the Tcl programming language and its extensions. A wealth of useful information can be found there. It contains code snippets, references to papers, books, and FAQs, as well as pointers to development tools, extensions, and applications. You can also recommend additional URLs by editing the wiki yourself. ## <a id="email">7.</a> Mailing lists Several mailing lists are hosted at SourceForge to discuss development or use issues (like Macintosh and Windows topics). For more information and to subscribe, visit [here](https://sourceforge.net/projects/tcl/) and go to the Mailing Lists page. ## <a id="support">8.</a> Support and Training We are very interested in receiving bug reports, patches, and suggestions for improvements. We prefer that you send this information to us as tickets entered into [our issue tracker](https://core.tcl-lang.org/tcl/reportlist). We will log and follow-up on each bug, although we cannot promise a specific turn-around time. Enhancements may take longer and may not happen at all unless there is widespread support for them (we're trying to slow the rate at which Tcl/Tk turns into a kitchen sink). It's very difficult to make incompatible changes to Tcl/Tk at this point, due to the size of the installed base. The Tcl community is too large for us to provide much individual support for users. If you need help we suggest that you post questions to `comp.lang.tcl` or ask a question on [Stack Overflow](https://stackoverflow.com/questions/tagged/tcl). We read the newsgroup and will attempt to answer esoteric questions for which no one else is likely to know the answer. In addition, see the wiki for [links to other organizations](https://wiki.tcl-lang.org/training) that offer Tcl/Tk training. ## <a id="watch">9.</a> Tracking Development Tcl is developed in public. You can keep an eye on how Tcl is changing at [core.tcl-lang.org](https://core.tcl-lang.org/). ## <a id="thanks">10.</a> Thank You We'd like to express our thanks to the Tcl community for all the helpful suggestions, bug reports, and patches we have received. Tcl/Tk has improved vastly and will continue to do so with your help.
573
A lightweight free Spotify 🎧 crossplatform-client 🖥📱 which handles playback manually, streams music using Youtube & no Spotify premium account is needed 😱
<p align="center"><img width="700" src="assets/spotube_banner.png" alt="Spotube Logo"></p> <p align="center"> <a href="https://spotube.netlify.app/">spotube.netlify.app</a> </p> <p align="center"> <a href="https://github.com/KRTirtho/spotube/actions/workflows/spotube-nightly.yml"> <img alt="GitHub Workflow Status" src="https://img.shields.io/github/actions/workflow/status/KRTirtho/spotube/spotube-nightly.yml?color=1585be&style=flat-square"> </a> <a href="https://github.com/KRTirtho/Spotube/releases"> <img alt="GitHub release" src="https://img.shields.io/github/v/release/KRTirtho/spotube?color=1585be&style=flat-square"/> </a> <a href="LICENSE"> <img alt="License" src="https://img.shields.io/aur/license/spotube-bin?color=1585be&style=flat-square"/> </a> <a href="https://github.com/KRTirtho"> <img alt="Maintainer" src="https://img.shields.io/badge/Maintainer-KRTirtho-1585be?style=flat-square"/> </a> <a href="https://opencollective.com/spotube"> <img alt="Open Collective backers and sponsors" src="https://img.shields.io/opencollective/all/spotube?color=1585be&style=flat-square"/> </a> <a href="https://discord.gg/uJ94vxB6vg"> <img alt="Discord" src="https://img.shields.io/discord/1012234096237350943?color=1585be&label=Discord%20Server&logoColor=1585be&style=flat-square"> </a> </p> Spotube is a [Flutter](https://flutter.dev) based lightweight spotify client. It utilizes the power of Spotify & Youtube's public API & creates a hazardless, performant & resource friendly User Experience #### <p align="center">Desktop</p> ![Application Desktop Screenshot](assets/spotube-screenshot.jpg) #### <p align="center">Mobile</p> ![Application Mobile Screenshot](assets/mobile-screenshots/mobile-combined.jpg) <p align="center"> <a href="https://discord.gg/uJ94vxB6vg"> <img src="https://discord.com/api/guilds/1012234096237350943/widget.png?style=banner2"> </a> </p> # Features Following are the features that currently spotube offers: - Open Source - Anonymous/Guest Login - Cross platform - No telemetry, diagnostics or user data collection - Lightweight & resource friendly - Native performance (Thanks to Flutter+Skia) - Playback control is on user's machine instead of server based - Small size & less data hungry - No spotify or youtube ads since it uses all public & free APIs (But it's recommended to support the creators by watching/liking/subscribing to the artists youtube channel or add as favourite track in spotify. Mostly buying spotify premium is the best way to support their valuable creations) - Synced Lyrics - Downloadable track # Support this project <a href="https://patreon.com/krtirtho"><img src="https://user-images.githubusercontent.com/61944859/180249027-678b01b8-c336-451e-b147-6d84a5b9d0e7.png" width="250"/></a> [!["Donate to out Collective"](https://opencollective.com/spotube/donate/button.png?color=blue)](https://opencollective.com/spotube) [!["Buy Me A Coffee"](https://www.buymeacoffee.com/assets/img/custom_images/orange_img.png)](https://www.buymeacoffee.com/krtirtho) # Installation I'm always releasing newer versions of binary of the software each 2-3 month with minor changes & each 6-8 month with major changes. Grab the binaries | Platform | Package/Installation Method | | ----------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | | Android | [<img width='240' alt='Android Download' src='https://www.remcsteuben.com/sites/default/files/images/apkdaddy%20download.png'/>][android-dlink]<br/>[<img width='240' alt='Android Download' src='https://user-images.githubusercontent.com/61944859/174589876-bace24c0-b3fd-4c4a-bdb4-6fa82b5853ec.png'/>][fdroid-dlink] | | Debian/Ubuntu | [<img width='240' alt='Linux Debian/Ubuntu Download' src='https://user-images.githubusercontent.com/61944859/169097994-e92aff78-fd75-4c93-b6e4-f072a4b5a7ed.png'/>][deb-dlink] <br/> Then run: `sudo apt install Spotube-linux-x86_64.deb` | | Flatpak | `flatpak install com.github.KRTirtho.Spotube` <br/> <a href='https://flathub.org/apps/details/com.github.KRTirtho.Spotube'><img width='240' alt='Download on Flathub' src='https://flathub.org/assets/badges/flathub-badge-en.png'/></a> | | Arch/Manjaro | pamac: `pamac install spotube-bin` <br/> yay: `yay -Sy spotube-bin` | | AppImage | [<img width='240' alt='AppImage Download' src='https://user-images.githubusercontent.com/61944859/169455015-13385466-8901-48fe-ba90-b62d58b0be64.png'/>][appimage-dlink]<br/> **Note**: AppImages require [appimage-launcher](https://github.com/TheAssassin/AppImageLauncher) to be installed | | Linux (tarball) | [<img width='240' alt='Tarball Download' src='https://user-images.githubusercontent.com/61944859/169456985-e0ba1fd4-10e8-4cc0-ab94-337acc6e0295.png'/>][linux-dlink] | | Windows | [<img width='240' alt='Windows Download' src='https://get.todoist.help/hc/article_attachments/4403191721234/WindowsButton.svg'/>][win32-dlink] | | Windows (Chocolatey) | `choco install spotube` | | Windows (<a href="https://scoop.sh/">Scoop</a>) | `scoop bucket add extras` <br/> `scoop install spotube` | | Windows (WinGet) | `winget install --id KRTirtho.Spotube` | | MacOS | [<img width='240' alt='MacOS Download' src='https://reachify.io/wp-content/uploads/2018/09/mac-download-button-1.png'/>][mac-dlink] | > **Note!:** If you don't understand this download table. You can read [installation instructions][wiki-installation-instructions] from the wiki ## Nightly Builds Get the latest nightly builds of Spotube [here](https://github.com/KRTirtho/spotube/releases/tag/nightly) # TODO: - [ ] Windows OS Media Control & Media Keys Support - [ ] Spotify Listen Along - [x] Skip non-music sections from Audio Track - [ ] Language Translations/Localization # Building from source You can find the details [here](CONTRIBUTION.md#your-first-code-contribution) # Things that don't work - Shows & Podcasts aren't supported as it'd require premium anyway # License [BSD-4-Clause](/LICENSE) But why? You can learn about it [here](https://dev.to/krtirtho/choosing-open-source-license-wisely-1m3p) # Financial Contributors ## Backers ![Backers](https://opencollective.com/spotube/backer.svg?button=false) ![Donors](https://opencollective.com/spotube/tiers/donor.svg?button=false) ## Sponsors ![Donors](https://opencollective.com/spotube/tiers/sponsor.svg) # Library/Plugin/Framework Credits - [Flutter](https://flutter.dev/) - Flutter transforms the app development process. Build, test, and deploy beautiful mobile, web, desktop, and embedded apps from a single codebase - [Linux](https://www.linux.org/) - Linux is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged in a Linux distribution - [AUR](https://aur.archlinux.org/) - AUR stands for Arch User Repository. It is a community-driven repository for Arch-based Linux distributions users - [Flatpak](https://flatpak.org/) - Flatpak is a utility for software deployment and package management for Linux - [rentanadviser](https://www.rentanadviser.com/) - Generous Synced lyrics API provider service - [SponsorBlock](https://sponsor.ajay.app/) - SponsorBlock is an open-source crowdsourced browser extension and open API for skipping sponsor segments in YouTube videos. - [spotify (dart)](https://github.com/rinukkusu/spotify-dart) - A dart library for interfacing with the Spotify API - [audioplayers](https://github.com/bluefireteam/audioplayers) - A Flutter plugin to play multiple audio files simultaneously (Android/iOS) - [youtube_explode_dart](https://github.com/Hexer10/youtube_explode_dart) - YoutubeExplode is a library that provides an interface to query metadata of YouTube videos, playlists and channels, as well as to resolve and download video streams and closed caption tracks - [bitsdojo_window](https://github.com/bitsdojo/bitsdojo_window) - A Flutter package that makes it easy to customize and work with your Flutter desktop app window on Windows, macOS and Linux - [Inno Setup](https://jrsoftware.org/isinfo.php) - Inno Setup is a free installer for Windows programs by Jordan Russell and Martijn Laan - [collection](https://github.com/dart-lang/collection) - The collection package for Dart contains a number of separate libraries with utility functions and classes that makes working with collections easier - [flutter_riverpod](https://riverpod.dev/) - A Reactive Caching and Data-binding Framework - [flutter_hooks](https://github.com/rrousselGit/flutter_hooks) - React hooks for Flutter. Hooks are a new kind of object that manages a Widget life-cycles. They are used to increase code sharing between widgets and as a complete replacement for StatefulWidget - [hooks_riverpod](https://riverpod.dev/) - Riverpod with hooks - [go_router](https://github.com/flutter/packages/tree/main/packages/go_router) - A declarative router for Flutter based on Navigation 2 supporting deep linking, data-driven routes and more - [palette_generator](https://github.com/flutter/packages/tree/main/packages/palette_generator) - Flutter package for generating palette colors from a source image. - [logger](https://github.com/leisim/logger) - Small, easy to use and extensible logger which prints beautiful logs - [flutter_launcher_icons](https://github.com/fluttercommunity/flutter_launcher_icons) - A package which simplifies the task of updating your Flutter app's launcher icon. - [permission_handler](https://github.com/baseflow/flutter-permission-handler) - Permission plugin for Flutter. This plugin provides a cross-platform (iOS, Android) API to request and check permissions. - [marquee](https://github.com/MarcelGarus/marquee) - ⏩ A Flutter widget that scrolls text infinitely. Provides many customizations including custom scroll directions, durations, curves as well as pauses after every round - [scroll_to_index](https://github.com/quire-io/scroll-to-index) - scroll to index with fixed/variable row height inside Flutter scrollable widget - [package_info_plus](https://github.com/fluttercommunity/plus_plugins/tree/main/packages/) - This Flutter plugin provides an API for querying information about an application package. - [version](https://github.com/dartninja/version) - A dart library providing a Version class - [audio_service](https://github.com/ryanheise/audio_service) - Flutter plugin to play audio in the background while the screen is off. - [skeleton_text](https://github.com/101Loop/Skeleton-Text) - Flutter package for Skeleton Text Animation - [hive](https://github.com/hivedb/hive) - Lightweight and blazing fast key-value database written in pure Dart. - [dbus](https://github.com/canonical/dbus.dart) - Native Dart client library to use DBus - [introduction_screen](https://github.com/pyozer/introduction_screen) - Add easily to your app an introduction screen to provide informations to new users - [audio_session](https://github.com/ryanheise/audio_session) - Sets the iOS audio session category and Android audio attributes for your app, and manages your app's audio focus, mixing and ducking behaviour. - [file_picker](https://github.com/miguelpruivo/flutter_file_picker) - A Flutter plugin to let users pick a file from the file system, be it from a local storage or a remote one (e.g. Google Drive, Dropbox, iCloud, etc). - [popover](https://github.com/minikin/popover) - Popover for Flutter. A popover is a transient view that appears above other content onscreen when you tap a control or in an area. - [queue](https://github.com/rknell/dart_queue) - A library to easily handle sequential queueing of futures in dart - [auto_size_text](https://github.com/leisim/auto_size_text) - Flutter widget that automatically resizes text to fit perfectly within its bounds. - [badges](https://github.com/yako-dev/flutter_badges) - A flutter package for creating badges. - [mime](https://github.com/dart-lang/mime) - Dart package for working with MIME type definitions and for processing streams of MIME multipart media types. - [metadata_god](https://github.com/KRTirtho/metadata_god) - Audio file Metadata reading and writing library for Flutter - [visibility_detector](https://github.com/google/flutter.widgets/tree/master/packages/visibility_detector) - A widget that detects the visibility of its child and notifies a callback - [fl_query](https://github.com/KRTirtho/fl-query) - Asynchronous data caching, refetching & invalidation library for Flutter - [fl_query_hooks](https://github.com/KRTirtho/fl-query/tree/main/packages/fl_query_hooks) - Elite flutter_hooks compatible library for fl_query, the Asynchronous data caching, refetching & invalidation library for Flutter - [flutter_inappwebview](https://github.com/pichillilorenzo/flutter_inappwebview) - A Flutter plugin that allows you to add an inline webview, to use a headless webview, and to open an in-app browser window # The Team - [Kingkor Roy Tirtho](https://github.com/KRTirtho) - The Founder, Maintainer and Lead Developer - [Owen Conor](https://github.com/owencz1998) - The Cool Discord Moderator - [Piotr Rogowski](https://github.com/karniv00l) - The MacOS Developer - [Rusty Apple](https://github.com/RustyApple) - The Mysterious Unknown Guy # Social handlers Follow me on [Twitter](https://twitter.com/@krtirtho) for newer updates about this application <p align="center">&copy; 2022 Spotube</p> <!-- Variables/Text References --> [win32-dlink]: https://github.com/KRTirtho/spotube/releases/latest/download/Spotube-windows-x86_64-setup.exe [deb-dlink]: https://github.com/KRTirtho/spotube/releases/latest/download/Spotube-linux-x86_64.deb [linux-dlink]: https://github.com/KRTirtho/spotube/releases/latest/download/Spotube-linux-x86_64.tar.xz [appimage-dlink]: https://github.com/KRTirtho/spotube/releases/latest/download/Spotube-linux-x86_64.AppImage [mac-dlink]: https://github.com/KRTirtho/spotube/releases/latest/download/Spotube-macos-x86_64.dmg [android-dlink]: https://github.com/KRTirtho/spotube/releases/latest/download/Spotube-android-all-arch.apk [fdroid-dlink]: https://f-droid.org/packages/oss.krtirtho.spotube/ [wiki-installation-instructions]: https://github.com/KRTirtho/spotube/wiki/Installation-Instrcutions
574
Install and Update Proton-GE
## Introduction CLI program and API to automate the installation and update of [GloriousEggroll](https://github.com/GloriousEggroll/)'s [Proton-GE](https://github.com/GloriousEggroll/proton-ge-custom) [![Downloads](https://pepy.tech/badge/protonup)](https://pepy.tech/project/protonup) ## Installation Install from Python Package Index ``` pip3 install protonup ``` Install from source ``` git clone https://github.com/AUNaseef/protonup && cd protonup python3 setup.py install --user ``` If you get a `command not found` error, add the following to your `~/.profile` (if it's not already present) and run `source ~/.profile` ``` if [ -d "$HOME/.local/bin" ] ; then PATH="$HOME/.local/bin:$PATH" fi ``` ## Usage Set your installation directory before running the program with `-d "your/compatibilitytools.d/directory"` Example: ``` protonup -d "~/.steam/root/compatibilitytools.d/" ``` --- To update to the latest version, just run `protonup` from a command line Example: ``` protonup ``` --- List available versions with `--releases` Example: ``` protonup --releases ``` --- Install a specific version with `-t "version tag"` Example: ``` protonup -t 6.5-GE-2 ``` --- By default the downloads are stored in a temporary folder. Change it with `-o "custom/download/directory"` Example: ``` protonup -o ~/Downloads ``` --- List existing installations with `-l` Example: ``` protonup -l ``` --- Remove existing installations with `-r "version tag` Example: ``` protonup -r 6.5-GE-2 ``` --- Use `--download` to download Proton-GE to the current working directory without installing it, you can override destination with `-o` Example: ``` protonup --download ``` --- Use `-y` toggle to carry out actions without any logging or interaction Example: ``` protonup --download -o ~/Downloads -y ``` --- ### Restart Steam after making changes
575
Emulator for rapid prototyping of Software Defined Networks
Mininet: Rapid Prototyping for Software Defined Networks ======================================================== *The best way to emulate almost any network on your laptop!* Mininet 2.3.1b1 [![Build Status][1]](https://github.com/mininet/mininet/actions) ### What is Mininet? Mininet emulates a complete network of hosts, links, and switches on a single machine. To create a sample two-host, one-switch network, just run: `sudo mn` Mininet is useful for interactive development, testing, and demos, especially those using OpenFlow and SDN. OpenFlow-based network controllers prototyped in Mininet can usually be transferred to hardware with minimal changes for full line-rate execution. ### How does it work? Mininet creates virtual networks using process-based virtualization and network namespaces - features that are available in recent Linux kernels. In Mininet, hosts are emulated as `bash` processes running in a network namespace, so any code that would normally run on a Linux server (like a web server or client program) should run just fine within a Mininet "Host". The Mininet "Host" will have its own private network interface and can only see its own processes. Switches in Mininet are software-based switches like Open vSwitch or the OpenFlow reference switch. Links are virtual ethernet pairs, which live in the Linux kernel and connect our emulated switches to emulated hosts (processes). ### Features Mininet includes: * A command-line launcher (`mn`) to instantiate networks. * A handy Python API for creating networks of varying sizes and topologies. * Examples (in the `examples/` directory) to help you get started. * Full API documentation via Python `help()` docstrings, as well as the ability to generate PDF/HTML documentation with `make doc`. * Parametrized topologies (`Topo` subclasses) using the Mininet object. For example, a tree network may be created with the command: `mn --topo tree,depth=2,fanout=3` * A command-line interface (`CLI` class) which provides useful diagnostic commands (like `iperf` and `ping`), as well as the ability to run a command to a node. For example, `mininet> h11 ifconfig -a` tells host h11 to run the command `ifconfig -a` * A "cleanup" command to get rid of junk (interfaces, processes, files in /tmp, etc.) which might be left around by Mininet or Linux. Try this if things stop working! `mn -c` ### Python 3 Support - Mininet 2.3.1b1 supports Python 3 and Python 2! - You can install both the Python 3 and Python 2 versions of Mininet side by side, but the most recent installation will determine which Python version is used by default by `mn`. - You can run `mn` directly with Python 2 or Python 3, as long as the appropriate version of Mininet is installed, e.g. $ sudo python2 `which mn` - More information regarding Python 3 and Python 2 support may be found in the release notes on http://docs.mininet.org. ### Other Enhancements and Information - Support for Ubuntu 20.04 LTS (and 18.04) - More reliable testing and CI via github actions - Minor bug fixes (2.3.1) - Additional information about this release and previous releases may be found in the release notes on http://docs.mininet.org. ### Installation See `INSTALL` for installation instructions and details. ### Documentation In addition to the API documentation (`make doc`), much useful information, including a Mininet walkthrough and an introduction to the Python API, is available on the [Mininet Web Site](http://mininet.org). There is also a wiki which you are encouraged to read and to contribute to, particularly the Frequently Asked Questions (FAQ) at http://faq.mininet.org. ### Support Mininet is community-supported. We encourage you to join the Mininet mailing list, `mininet-discuss` at: <https://mailman.stanford.edu/mailman/listinfo/mininet-discuss> ### Join Us Thanks again to all of the Mininet contributors and users! Mininet is an open source project and is currently hosted at <https://github.com/mininet>. You are encouraged to download, examine, and modify the code, and to submit bug reports, bug fixes, feature requests, new features, and other issues and pull requests. Thanks to everyone who has contributed code to the Mininet project (see CONTRIBUTORS for more info!) It is because of everyone's hard work that Mininet continues to grow and improve. ### Enjoy Mininet Have fun! We look forward to seeing what you will do with Mininet to change the networking world. Bob Lantz, on behalf of the Mininet Contributors [1]: https://github.com/mininet/mininet/workflows/mininet-tests/badge.svg
576
A powerful, innovative and intuitive EDA tool for everyone!
# LibrePCB [![Azure Build Status](https://dev.azure.com/LibrePCB/LibrePCB/_apis/build/status/LibrePCB.LibrePCB?branchName=master)](https://dev.azure.com/LibrePCB/LibrePCB/_build/latest?definitionId=2&branchName=master) [![Become a Patron](https://img.shields.io/badge/patreon-donate-orange.svg)](https://www.patreon.com/librepcb) [![Donate with Bitcoin](https://img.shields.io/badge/bitcoin-donate-yellow.svg)](https://blockchain.info/address/1FiXZxoXe3px1nNuNygRb1NwcYr6U8AvG8) [![irc.freenode.net](https://img.shields.io/badge/IRC-%23librepcb-blue.svg)](https://webchat.freenode.net/?channels=#librepcb) ## About LibrePCB LibrePCB is a free [EDA](https://en.wikipedia.org/wiki/Electronic_design_automation) software to develop printed circuit boards. It runs on Linux, Windows and Mac. The project is still in a rather early development stage. See [Project Status](https://docs.librepcb.org/#projectstatus) for more information about the currently available features, limitations and known bugs. ![Screenshot](doc/screenshot.png) ### Features - Cross-platform (Unix/Linux/BSD/Solaris, macOS, Windows) - Multilingual (both application and library elements) - All-In-One: project management + library/schematic/board editors - Intuitive, modern and easy-to-use graphical user interface - Very powerful library design with some innovative concepts - Human-readable file formats for both libraries and projects - Multi-PCB feature (different PCB variants of the same schematic) - Automatic netlist synchronisation between schematic and board ## Installation & Usage **Official stable releases are provided at our [download page](https://librepcb.org/download/).** **Please read our [user manual](https://docs.librepcb.org/) to see how you can install and use LibrePCB.** The [Getting Started](https://docs.librepcb.org/#gettingstarted) guide gives you a quick introduction to LibrePCB. ## Contributing Contributions are welcome! See our [Contributing Guide](CONTRIBUTING.md) for details. For internal details take a look at the [automatically generated documentation (doxygen)](https://doxygen.librepcb.org/) ## Development ***WARNING: The `master` branch always contains the latest UNSTABLE version of LibrePCB. Everything you do with this unstable version could break your workspace, libraries or projects, so you should not use it productively! For productive use, please install an official release as described in the [user manual](https://docs.librepcb.org/). For development, please read details [here](https://developers.librepcb.org/df/d30/doc_developers.html#doc_developers_unstable_versions).*** Instead of building LibrePCB manually, Arch Linux users could install the package [librepcb-git](https://aur.archlinux.org/packages/librepcb-git/) from the AUR. The package clones and builds the latest (unstable!) version of the `master` branch from GitHub. ### Requirements To compile LibrePCB, you need the following software components: - g++ >= 4.8, MinGW >= 4.8, or Clang >= 3.3 (C++11 support is required) - [Qt](http://www.qt.io/download-open-source/) >= 5.5 - [zlib](http://www.zlib.net/) - [OpenSSL](https://www.openssl.org/) - [CMake](https://cmake.org/) 3.5 or newer #### Prepared Docker Image Instead of installing the dependencies manually on your system (see instructions below), you can also use one of our [Docker images](https://hub.docker.com/r/librepcb/librepcb-dev) with all dependencies pre-installed (except GUI tools like QtCreator). These images are actually used for CI, but are also useful to build LibrePCB locally. #### Installation on Debian/Ubuntu/Mint *Note: For Ubuntu older than 22.04, replace `qtbase5-dev` by `qt5-default`.* ```bash sudo apt-get install git build-essential qtbase5-dev qttools5-dev-tools qttools5-dev \ libglu1-mesa-dev openssl zlib1g zlib1g-dev libqt5opengl5-dev libqt5svg5-dev cmake sudo apt-get install qt5-doc qtcreator # optional ``` #### Installation on Arch Linux ```bash sudo pacman -S git base-devel qt5-base qt5-svg qt5-tools desktop-file-utils shared-mime-info \ openssl zlib cmake sudo pacman -S qt5-doc qtcreator # optional ``` #### Installation on Mac OS X 1. Install Xcode through the app store and start it at least once (for the license) 2. Install [homebrew](https://github.com/Homebrew/brew) (**the** package manager) 3. Install *qt5* and *cmake*: `brew update && brew install qt5 cmake` 4. Make the toolchain available: `brew unlink qt && brew link --force qt5` #### Installation on Windows Download and run the [Qt for Windows (MinGW) installer](http://download.qt.io/official_releases/qt/5.8/5.8.0/qt-opensource-windows-x86-mingw530-5.8.0.exe) from [here](https://www.qt.io/download-open-source/). LibrePCB does not compile with MSVC, so you must install following components with the Qt installer: - The MinGW compiler itself - The Qt libraries for MinGW - cmake ### Cloning It's important to clone the repository recursively to get all submodules too: ```bash git clone --recursive https://github.com/LibrePCB/LibrePCB.git && cd LibrePCB ``` ### Updating When updating the repository, make sure to also update all the submodules recursively. Otherwise you may get strange compilation errors: ```bash git submodule update --init --recursive ``` ### Building You can either build LibrePCB using Qt Creator, or you can build on the command line using cmake. To build LibrePCB using cmake/make: ```bash mkdir build && cd build cmake .. make -j8 ``` The binary can then be found in `build/apps/librepcb/`. For more detailed instructions (including how to set up Qt Creator), see https://developers.librepcb.org/d5/d96/doc_building.html ## Credits - First of all, many thanks to all of our [contributors](AUTHORS.md)! - Thanks also to [cloudscale.ch](https://www.cloudscale.ch/) for sponsoring our API server! ## License LibrePCB is published under the [GNU GPLv3](http://www.gnu.org/licenses/gpl-3.0.html) license.
577
Mumble is an open-source, low-latency, high quality voice chat software.
![Mumble screenshot](screenshots/Mumble.png) # Mumble - Open Source voice-chat software [![https://www.mumble.info](https://img.shields.io/badge/Website-https%3A%2F%2Fwww.mumble.info-blue?style=for-the-badge)](https://www.mumble.info) [![#mumble:matrix.org](https://img.shields.io/matrix/mumble:matrix.org?label=%23mumble:matrix.org&style=for-the-badge)](https://matrix.to/#/#mumble:matrix.org) [![Codacy](https://img.shields.io/codacy/grade/262a5e20c83a40599050e22e700d8a3e?label=Codacy&style=for-the-badge)](https://app.codacy.com/manual/mumble-voip/mumble) [![Azure](https://img.shields.io/azure-devops/build/Mumble-VoIP/c819eb06-7b22-4ef3-bbcd-860094454eb3/1?label=Azure&style=for-the-badge)](https://dev.azure.com/Mumble-VoIP/Mumble) [![Cirrus CI](https://img.shields.io/cirrus/github/mumble-voip/mumble?label=Cirrus%20CI&style=for-the-badge)](https://cirrus-ci.com/github/mumble-voip/mumble) [![Travis CI](https://img.shields.io/travis/com/mumble-voip/mumble?label=Travis%20CI&style=for-the-badge)](https://travis-ci.com/mumble-voip/mumble) Mumble is an Open Source, low-latency and high-quality voice-chat program written on top of Qt and Opus. There are two modules in Mumble; the client (mumble) and the server (murmur). The client works on Windows, Linux, FreeBSD, OpenBSD and macOS, while the server should work on anything Qt can be installed on. Please note that with "Windows" we mean 7 and newer. Vista may be supported, but we can't guarantee it. If you don't want to encounter potential issues, you may download Mumble 1.3.x, the last version to provide support for XP. The documentation of the project can be found on the [wiki](https://wiki.mumble.info/wiki/Main_Page). The [FAQ](https://wiki.mumble.info/wiki/FAQ/English) can also be found there. ## Contributing We always welcome contributions to the project. If you have code that you would like to contribute, please go ahead and create a PR. While doing so, please try to make sure that you follow our [commit guidelines](COMMIT_GUIDELINES.md). If you are new to the Mumble project, you may want to check out the general [introduction to the Mumble source code](docs/dev/TheMumbleSourceCode.md). ### Translating Mumble supports various languages. We are always looking for qualified people to contribute translations. We are using Weblate as a translation platform. [Register on Weblate](https://hosted.weblate.org/accounts/register/), and join [our translation project](https://hosted.weblate.org/projects/mumble/). ### Writing plugins Mumble supports general-purpose plugins that can provide functionality that is not implemented in the main Mumble application. You can find more information on how this works and on how these have to be created in the [plugin documentation](docs/dev/plugins/README.md). ## Building For information on how to build Mumble, checkout [the dedicated documentation](docs/dev/build-instructions/README.md). ## Reporting issues If you want to report a bug or create a feature-request, you can open a new issue (after you have checked that there is none already) on [GitHub](https://github.com/mumble-voip/mumble/issues/new/choose). ## Windows ### Running Mumble After installation, you should have a new Mumble folder in your Start Menu, from which you can start Mumble. ### Running Murmur Doubleclick the Murmur icon to start murmur. There will be a small icon on your taskbar from which you can view the log. To set the superuser password, run murmur with the parameters `-supw <password>`. ## MacOS ### Running Mumble To install Mumble, drag the application from the downloaded disk image into your `/Applications` folder. ### Running Murmur Murmur is distributed separately from the Mumble client on MacOS. It is called Static OS X Server and can be downloaded from the main webpage. Once downloaded it can be run in the same way as on any other Unix-like system. For more information please see the "Running Murmur" in the Linux/Unix section below. ## Linux/Unix ### Running Mumble If you have installed Mumble through your distributon's package repository, you should be able to find Mumble in your start menu. No additional steps necessary. ### Running Murmur Murmur should be run from the command line, so start a shell (command prompt) and go to wherever you installed Mumble. Run murmur as ``` murmurd [-supw <password>] [-ini <inifile>] [-fg] [v] -supw Set a new password for the user SuperUser, which is hardcoded to bypass ACLs. Keep this password safe. Until you set a password, the SuperUser is disabled. If you use this option, murmur will set the password in the database and then exit. -ini Use an inifile other than murmur.ini, use this to run several instances of murmur from the same directory. Make sure each instance is using a separate database. -fg Run in the foreground, logging to standard output. -v More verbose logging. ``` #### Build and run from Docker On recent Docker versions you can build images directly from sources on GitHub: ```bash docker build --pull -t mumble-server github.com/mumble-voip/mumble#master ``` Example `--pull`s each time to check for updated base image, then downloads and builds `master` branch. You can also specify user id (UID) and group id (GID) for the *murmur* user in the image. This allows users who use bind mount volumes to use the same UID/GID in the container as in the host: ```bash docker build --pull -t mumble-server --build-arg UID=1234 --build-arg GID=1234 github.com/mumble-voip/mumble#master ``` ### OpenGL Overlay The OpenGL overlay works by intercepting the call to switch buffers, and just before the buffer switch, we draw our nice GUI. To load a game with the overlay enabled, start the game like this: ```bash LD_PRELOAD=/path/to/libmumble.so.1.1 gamename ``` If you have Mumble installed through the binary packages, this can be done by simply typing: ```bash mumble-overlay gamename ```
578
Upgrade all the things
<div align="center"> <h1> <img alt="Topgrade" src="doc/topgrade_transparent.png" width="850px"> </h1> <a href="https://github.com/topgrade-rs/topgrade/releases"><img alt="GitHub Release" src="https://img.shields.io/github/release/topgrade-rs/topgrade.svg"></a> <a href="https://crates.io/crates/topgrade"><img alt="crates.io" src="https://img.shields.io/crates/v/topgrade.svg"></a> <a href="https://aur.archlinux.org/packages/topgrade"><img alt="AUR" src="https://img.shields.io/aur/version/topgrade.svg"></a> <a href="https://formulae.brew.sh/formula/topgrade"><img alt="Homebrew" src="https://img.shields.io/homebrew/v/topgrade.svg"></a> <img alt="Demo" src="doc/screenshot.gif" width="550px"> </div> ## Introduction > **Note** > This is a fork of [topgrade by r-darwish](https://github.com/r-darwish/topgrade) to keep it maintained. Keeping your system up to date usually involves invoking multiple package managers. This results in big, non-portable shell one-liners saved in your shell. To remedy this, **Topgrade** detects which tools you use and runs the appropriate commands to update them. ## Installation [![Packaging status](https://repology.org/badge/vertical-allrepos/topgrade.svg)](https://repology.org/project/topgrade/versions) - Arch Linux: [AUR](https://aur.archlinux.org/packages/topgrade) - NixOS: [Nixpkgs](https://search.nixos.org/packages?show=topgrade) - Void Linux: [XBPS](https://voidlinux.org/packages/?arch=x86_64&q=topgrade) - macOS: [Homebrew](https://formulae.brew.sh/formula/topgrade) or [MacPorts](https://ports.macports.org/port/topgrade/) Other systems users can either use `cargo install` or the compiled binaries from the release page. The compiled binaries contain a self-upgrading feature. Topgrade requires Rust 1.60 or above. ## Usage Just run `topgrade`. Visit the documentation at [topgrade-rs.github.io](https://topgrade-rs.github.io/) for more information. > **Warning** > Work in Progress ## Customization See `config.example.toml` for an example configuration file. ### Configuration Path The configuration should be placed in the following paths depending on the operating system: - **Windows** - `%APPDATA%/topgrade.toml` - **macOS** and **other Unix systems** - `${XDG_CONFIG_HOME:-~/.config}/topgrade.toml` ## Remote Execution You can specify a key called `remote_topgrades` in the configuration file. This key should contain a list of hostnames that have Topgrade installed on them. Topgrade will use `ssh` to run `topgrade` on remote hosts before acting locally. To limit the execution only to specific hosts use the `--remote-host-limit` parameter. ## Contribution ### Problems or missing features? Open a new issue describing your problem and if possible provide a solution. ### Missing a feature or found an unsupported tool/distro? Just let us now what you are missing by opening an issue. For tools, please open an issue describing the tool, which platforms it supports and if possible, give us an example of its usage. ### Want to contribute to the code? Just fork the repository and start coding. ### Contribution Guidelines - Check if your code passes `cargo fmt` and `cargo clippy`. - Check if your code is self explanatory, if not it should be documented by comments. ## Roadmap - [ ] Add a proper testing framework to the code base. - [ ] Add unit tests for package managers. - [ ] Split up code into more maintainable parts, eg. putting every linux package manager in a own submodule of linux.rs.
579
Small C Compiler generating ELF executable Arm architecture, supporting JIT execution
# AMaCC = Arguably Minimalist Arm C Compiler ## Introduction AMaCC is built from scratch, targeted at 32-bit Arm architecture. It is a stripped down version of C meant as a pedagogical tool for learning about compilers, linkers, and loaders. There are 2 execution modes AMaCC implements: * Just-in-Time compiler (JITC) for Arm backend * Generate valid GNU/Linux executables with Executable and Linkable Format (ELF) It is worth mentioning that AMaCC is designed to compile a subset of C required to self-host with the above execution modes. For example, global variables and, in particular, global arrays are there. A simple stack based AST is generated through cooperating `stmt()` and `expr()` parsing functions, both of which are fed by a token generating function. The `expr()` function does some literal constant optimizations. The AST is transformed into a stack-based VM Intermediate Representation via a `gen()` function. The IR can be examined through a command-line option. Finally, a `codegen()` function is used to generate ARM32 instructions from the IR which can be executed via either `jit()` or `elf32()` executable generation. AMACC mixes classical recursive descent and operator precedence parsing. An operator precedence parser is actually quite a bit faster than recursive descent parser (RDP) for expressions when operator precedence is defined using grammar productions that would otherwise get turned into methods. ## Compatibility AMaCC is capable of compiling C source files written in the following syntax: * support for all C89 statements except typedef. * support for all C89 expression operators. * data types: char, int, enum, struct, union, and multi-level pointers - type modifiers, qualifiers, and storage class specifiers are currently unsupported, though many keywords of this nature are not routinely used, and can be easily worked around with simple alternative constructs. - struct/union assignments are not supported at the language level in AMaCC, e.g. s1 = s2. This also applies to function return values and parameters. Passing and returning pointers is recommended. Use memcpy if you want to copy a full struct, e.g. memcpy(&s1, &s2, sizeof(struct xxx)); * global/local variable initializations for supported data types - e.g., `int i = [expr]` - New variables are allowed to be declared within functions anywhere. - item-by-item array initialization is supported - but aggregate array declaration and initialization is yet to be supported e.g., `int foo[2][2] = { { 1, 0 }, { 0, 1 } };` The architecture support targets armv7hf with Linux ABI, verified on Raspberry Pi 2/3/4 with GNU/Linux. ## Prerequisites * Code generator in AMaCC relies on several GNU/Linux behaviors, and it is necessary to have Arm/Linux installed in your build environment. * Install [GNU Toolchain for the A-profile Architecture](https://developer.arm.com/tools-and-software/open-source-software/developer-tools/gnu-toolchain/gnu-a/downloads) - Select `arm-linux-none-gnueabihf` (AArch32 target with hard float) * Install QEMU for Arm user emulation ```shell sudo apt-get install qemu-user ``` ## Running AMaCC Run `make check` and you should see this: ``` [ C to IR translation ] Passed [ JIT compilation + execution ] Passed [ ELF generation ] Passed [ nested/self compilation ] Passed [ Compatibility with GCC/Arm ] ........................................ ---------------------------------------------------------------------- Ran 52 tests in 8.842s OK ``` Check the messages generated by `make help` to learn more. ## Benchmark AMaCC is able to generate machine code really fast and provides 70% of the performance of `gcc -O0`. Test environment: * Raspberry Pi 4B (SoC: bcm2711, ARMv8-A architecture) * Raspbian GNU/Linux, kernel 5.10.17-v7l+, gcc 8.3.0 (armv7l userland) Input source file: `amacc.c` | comiler driver | binary size (KiB) | compile time (s) | | ---------------------------------- | ----------------- | ---------------- | | gcc with `-O0 -ldl` (compile+link) | 56 | 0.5683 | | gcc with `-O0 -c` (compile only) | 56 | 0.4884 | | AMaCC | 100 | 0.0217 | ## Internals Check [Intermediate Representation (IR) for AMaCC Compilation](docs/IR.md). ## Acknowledgements AMaCC is based on the infrastructure of [c4](https://github.com/rswier/c4). ## Related Materials * [Curated list of awesome resources on Compilers, Interpreters and Runtimes](http://aalhour.com/awesome-compilers/) * [Hacker News discussions](https://news.ycombinator.com/item?id=11411124) * [A Compiler Writing Journey](https://github.com/DoctorWkt/acwj) by Warren Toomey.
580
Open source STM32 MCU programming toolset
# Open source version of the STMicroelectronics STlink Tools [![BSD licensed](https://img.shields.io/badge/license-BSD-blue.svg)](https://raw.githubusercontent.com/hyperium/hyper/master/LICENSE) [![GitHub release](https://img.shields.io/github/release/stlink-org/stlink.svg)](https://github.com/stlink-org/stlink/releases/latest) [![Downloads](https://img.shields.io/github/downloads/stlink-org/stlink/total)](https://github.com/stlink-org/stlink/releases/latest) ![GitHub commits](https://img.shields.io/github/commits-since/stlink-org/stlink/v1.7.0/develop) ![GitHub activity](https://img.shields.io/github/commit-activity/m/stlink-org/stlink) ![GitHub contributors](https://img.shields.io/github/contributors/stlink-org/stlink) [![CodeQL](https://github.com/stlink-org/stlink/actions/workflows/codeql-analysis.yml/badge.svg)](https://github.com/stlink-org/stlink/actions/workflows/codeql-analysis.yml) [![C/C++ CI](https://github.com/stlink-org/stlink/actions/workflows/c-cpp.yml/badge.svg?branch=testing)](https://github.com/stlink-org/stlink/actions/workflows/c-cpp.yml) [![Linux Status](https://img.shields.io/travis/stlink-org/stlink/master?env=BADGE=linux&label=linux)](https://travis-ci.org/stlink-org/stlink) [![macOS Status](https://img.shields.io/travis/stlink-org/stlink/master?env=BADGE=osx&label=osx)](https://travis-ci.org/stlink-org/stlink) Recent new features and bugfixes can be found in the [Changelog](CHANGELOG.md) of this software project. #### License The stlink library and tools are licensed under the **[BSD-3 License](LICENSE.md)**. ## Introduction stlink is an open source toolset to program and debug STM32 devices and boards manufactured by STMicroelectronics. It supports several so called STLINK programmer boards (and clones thereof) which use a microcontroller chip to translate commands from USB to JTAG/SWD. There are four generations available on the market which are _all_ supported by this toolset: - **STLINK/V1** _[obsolete as of 21-11-2019, continued support by this toolset] \*)_ - transport layer: SCSI passthru commands over USB - stand-alone programmer - on-board on STM32VL Discovery boards - **STLINK/V2** - transport layer: raw USB commands - stand-alone programmer - on-board on STM32L Discovery and STM32 Nucleo boards - **STLINK/V2-1** - transport layer: raw USB commands - on-board on some STM32 Nucleo boards - **STLINK-V3** - transport layer: raw USB commands - stand-alone programmer (STLINK-V3SET, STLINK-V3MINI, STLINK-V3MODS) - on-board on some STM32 Nucleo boards (STLINK-V3E) _\*)_ **Note: Support for the STLINK/V1 on macOS is limited to 10.14 - 10.15. Due to the deprecation and removal of macOS Kernel Extensions (KEXT) there will be no support for this programmer on macOS 11 or any later version.** On the user level there is no difference in handling or operation between these different revisions. The STlink toolset includes: - `st-info` - a programmer and chip information tool - `st-flash` - a flash manipulation tool - `st-trace` - a logging tool to record information on execution - `st-util` - a GDB server (supported in Visual Studio Code / VSCodium via the [Cortex-Debug](https://github.com/Marus/cortex-debug) plugin) - `stlink-lib` - a communication library - `stlink-gui` - a GUI-Interface _[optional]_ ## Supported operating systems and hardware combinations Currently known working combinations of programmers and targets are listed in [devices_boards.md](doc/devices_boards.md). Supported operating systems are listed in [version_support.md](doc/version_support.md). ## Tutorial & HOWTO Our [tutorial](doc/tutorial.md) may help you along with some advanced tasks and additional info. ## Installation **Windows**: As of Release v1.6.1 stand-alone Windows binaries are made available (again) on the release page of the project. Please ensure to select the correct version for your system (i686 or x86_64). The archive file can be unzipped to any desired location as it does not contain any hardcoded paths. However we suggest to move the unzipped application folder to `C:\Program Files\` on 32-bit systems and to `C:\Program Files (x86)\` on 64-bit systems (the toolset is 32-bit). Alternatively one may compile and install from source as described in our [compiling manual](doc/compiling.md#Windows). **macOS**: We recommend to install from: - [homebrew](https://formulae.brew.sh/formula/stlink) or - [MacPorts](https://ports.macports.org/port/stlink) Alternatively one can compile and install from source as described in our [compiling manual](doc/compiling.md#macOS). **Linux**: We recommend to install `stlink-tools` from the package repository of the used distribution: **Note:** As packages distributed via the [Debian](https://packages.debian.org/buster/stlink-tools) and [Ubuntu](https://packages.ubuntu.com/stlink-tools) repositories differ from our self-maintained deb-package, we recommend to use the latter instead (see link below). It provides the opportunity to handle and fix user-reported package issues directly within the project and is not redundant to any limitations deriving from external maintenance guidelines. - Debian Linux: [(Link)](https://github.com/stlink-org/stlink/releases) - Ubuntu Linux: [(Link)](https://github.com/stlink-org/stlink/releases) - Arch Linux: [(Link)](https://www.archlinux.org/packages/community/x86_64/stlink) - Alpine Linux: [(Link)](https://pkgs.alpinelinux.org/packages?name=stlink) - Fedora: [(Link)](https://src.fedoraproject.org/rpms/stlink) - Gentoo Linux: [(Link)](https://packages.gentoo.org/packages/dev-embedded/stlink) **Other Operating Systems**: - RedHat/CentOS 8: Users can install from [EPEL repository](https://src.fedoraproject.org/rpms/stlink/branch/epel8) - FreeBSD: Users can install from [freshports](https://www.freshports.org/devel/stlink) ## Installation from source (advanced users) When there is no executable available for your platform or you need the latest (possible unstable) version you need to compile the toolset yourself. This procedure is explained in the [compiling manual](doc/compiling.md). ## Contributing and versioning - The semantic versioning scheme is used. Read more at [semver.org](http://semver.org) - Before creating a pull request, please _ALWAYS_ open a new issue for the discussion of the intended new features. Bugfixes don't require a discussion via a ticket-issue. However they should always be described in a few words as soon as they appear to help others as well. - Contributors and/or maintainers may submit comments or request changes to patch-proposals and/or pull-requests. - **ATTENTION: _NEVER EVER_ use the '#' character to count-up single points within a listing as '#' is _exclusively_ reserved for referencing GitHub issues and pull-requests. Otherwise you accidentally introduce false cross references within the project.** - Please start new forks from the develop branch, as pull requests will go into this branch as well. Please also refer to our [Contribution Guidelines](CONTRIBUTING.md).
581
Unofficial Notion.so app for Linux
<p align="center"><img width="35%" height="35%" src="http://i.imgur.com/6dtC91m.png" alt="Notion.so"><br>unofficial Notion.so Desktop app for Linux</p> ------ `Version: 0.05.1` # Introduction Welcome! This is an unofficial version of `Notion.so` electron app. Since NotionHQ is busy doing other amazing feature developments, Linux is low on its priority. Here is the tweet from them explaining that <blockquote class="twitter-tweet" data-lang="en"><p lang="en" dir="ltr">Hey we don&#39;t want to release on platforms that we cannot ensure the quality – the team is still small and we don&#39;t use Linux ourselves </p>&mdash; Notion (@NotionHQ) <a href="https://twitter.com/NotionHQ/status/912737143327301634?ref_src=twsrc%5Etfw">September 26, 2017</a></blockquote> So I decided to build my own app using `nativefier` Here is how it looks ![image](https://user-images.githubusercontent.com/6509604/115094341-2e867900-9eeb-11eb-8305-a0cc50426283.png) > Is it your first time finding out about the Notion app? > > Use this [link](https://www.notion.so/?r=55d4c384b54a457490f6cc1799bedc76) to sign up and get ready to manage your life like you have never managed before ([Notion.so](https://www.notion.so/?r=55d4c384b54a457490f6cc1799bedc76)) --- ⚠️ **NOTE** ⚠️ Before you go ahead and install Lotion, I've found a better implementation called [notion-enhancer](https://notion-enhancer.github.io/getting-started/installation) which works seamlessly. You can try it out and if that solution works for you please use that instead. Lotion is **Not** actively maintained at this point, I might start working again at a later time. Thanks for all your support! --- # Installation Download setup script ```bash wget https://raw.githubusercontent.com/puneetsl/lotion/master/setup.sh # Or curl https://raw.githubusercontent.com/puneetsl/lotion/master/setup.sh > setup.sh # Make the script executable chmod +x setup.sh # Run (with sudo for global installation, without sudo for local installation) [sudo] ./setup.sh native # Or for web installation [sudo] ./setup.sh web ``` To install into a specific directory (creating a portable linux install) clone the repository and run this in the folder: ```bash ./portable.sh ``` During set up select `web` or `native`. The native version supports offline mode while the web version is the most up to date Notion web client. If the script has errors or you would like to install manually, you can refer to [these](https://github.com/puneetsl/lotion/issues/1) instructions. # Features - Better Icon (courtesy: [Konrad Kolasa](https://dribbble.com/shots/4886987-Notion-Icon-Replacement) ) <img width="15%" height="15%" src="https://github.com/puneetsl/lotion/blob/master/icon.png?raw=true" alt="Notion Icon"> <br>looks stunning in actual usage:<br> <img width="75%" height="75%" src="https://user-images.githubusercontent.com/6509604/115094448-86bd7b00-9eeb-11eb-9be5-2ac125825fa1.png"> - Everything you would expect from Windows or Mac application - [Here](https://github.com/puneetsl/lotion/issues/1) are the instructions to manually install natively if the installer script doesn't work. - Tray icon ------- Thanks to [sysdrum](https://github.com/sysdrum/notion-app), I used some of his code and improved upon it ------- # Uninstall ```bash ./uninstall.sh ``` # Login issues At this point the web version does not support Google SSO logins, this is an issue with [Google](https://security.googleblog.com/2019/04/better-protection-against-man-in-middle.html), they have stopped allowing login from unidentified browser. Earlier this could have been solved by adding a useragent, but now Google is doing sophisticated checks (and rightly so), making it harder for us to bypass. The only solution is to implement our own oAuth, which would require extreme amount of work. So a simple solution to this issue is, use email address ![image](https://user-images.githubusercontent.com/6509604/114249493-c541bb80-9968-11eb-9a79-fd242aa9010c.png) you will be emailed by Notion a login code that you can use to login. Some helpful issue threads for this problem: [Google issue](https://github.com/puneetsl/lotion/issues/78), [Apple issue](https://github.com/puneetsl/lotion/issues/70) Other way to not have this issue is to use Native version of this app.
582
Distributed systems runtime daemon written in Rust.
<!-- THE DOCUMENT --> ![Workflow in progress: deploy] ![Workflow in progress: documentation] ![Workflow in progress: build] <p align="center"> <img src="https://raw.githubusercontent.com/aurae-runtime/aurae/main/docs/assets/logo/aurae.png" width="450"> </p> # Mission Aurae is on a mission to be the most loved and effective way of managing workloads on a node. Our hope is that by bringing a better set of controls to a node, we can unlock brilliant higher order distributed systems in the future. # Introduction [Aurae] deploys a memory-safe [^memory-safe] runtime daemon, process manager, and PID-1 initialization system to remotely schedule processes, containers, and virtual machines as well as set node configurations (e.g., like networking storage). Through system proportioning and enterprise workload isolation techniques, the Aurae [open-source] project can complement higher order schedulers and control planes (such as Kubernetes) as Aurae supports the usage of multi-tenant workloads and enterprise identities all the way down to the socket layer. ## FOSDEM 2023 Presentation - Slides: [Link to presentation](https://docs.google.com/presentation/d/1GxKN5tyv4lV2aZdEOUqy3R9tVCat-vrFJyelgFX7b1A/edit#slide=id.g1eef12fba1d_21_88) - Website : [Link to abstract](https://fosdem.org/2023/schedule/event/rust_aurae_a_new_pid_1_for_distributed_systems/) <a href="https://www.youtube.com/watch?v=5a277u4j6fU" target="_blank"><img src="http://img.youtube.com/vi/5a277u4j6fU/hqdefault.jpg" width="480" height="360" border="10" /></a> ## Project Status > **STILL IN EARLY DEVELOPMENT!**<br> > **The Aurae project and API can change without notice.**<br> > **Do not run the project in production until further notice!** - The Aurae project welcomes contributions of all kinds and sizes. - Please read the "[getting involved]" documentation before contributing to the project. - You do not have to know [Rust] to join the project. By joining the project in its early stages, you will help to create a milestone contender for corporate distributed systems and automation that will remain accessible to anyone. # **Expanded Overview** By [introducing Aurae cells] on top of a [Linux kernel] the control of each internal runtime process on a given node becomes possible. The auraed runtime maintains ownership of every process by managing everything from [PID]-1 to nested processes. Maintainable and predefined [.proto]-files contribute to the core definition of the distributed systems runtime and the standard library. During the build process, these [.proto]-files can allow for greater customization possibilities. The [TypeScript] file format replaces static manifests (like the [YAML] file format) for direct interactions with a running system. --- ||| | :--- | :--- | | **Auraed** | To ensure memory safety, Aurae serves the generic system's runtime daemon ([auraed]).| | **AuraeScript** | The [AuraeScript] (a Turing-complete scripting language built on TypeScript) library automatically generates itself from the pre-defined [.proto] files defined in the Aurae standard library.<br>It also directly embeds [Deno] source code to provide an SDK and the functionality to attach remote clients for the direct remote communication with Aurae. | ||| ```typescript #!/usr/bin/env auraescript let cells = new runtime.CellServiceClient(); let allocated = await cells.allocate(<runtime.AllocateCellRequest>{ cell: runtime.Cell.fromPartial({ name: "my-cell", cpus: "2", }), }); let started = await cells.start(<runtime.StartExecutableRequest>{ executable: runtime.Executable.fromPartial({ cellName: "my-cell", command: "sleep 4000", description: "Sleep for 4000 seconds", name: "sleep-4000", }), }); ``` ||| | :--- | :--- | | **Authentication** | Aurae extends [SPIFFE]/[SPIRE] (x509 mTLS)-backed identity, authentication (authn), and authorization (authz) in a distributed system down to the Unix domain socket layer. | | **Principle of Least Awareness** | A single Aurae instance has no awareness of higher order scheduling mechanisms such as the Kubernetes control plane. | | **Runtime Workloads** | The Aurae runtime API can manage [virtual machines], [executables], [cells], [pods], and other [spawned Aurae instances]. | | **The Aurae Standard Library** | The Aurae project exposes its functionality as a gRPC API through the [Aurae standard library]. The [V0 API reference] contains the current library definition. | ||| --- <!-- # **Getting Started** ## **Building Aurae from Source** ### **Dependencies** ### **Prepare the Environment** ## **Aurae Quick Start** ### **Running the Daemon** ### **Running your first Cell** ## **Developing on an M1** ### **Environment** ### **VM Setup** ### **CLion Setup** ### **Back to the VM (setting up Aurae)** --> <!-- All the links!! --> <!-- +Footnotes [^cells]: Additionally, with Aurae cells, the project provides various ways to partition and slice up systems allowing for isolation strategies in enterprise workloads. [^compare]: As a low-level building block, the Aurae Project works well with any higher-order system by offering a thoughtful set of API calls and controls for managing workloads on a single node. [^medium]: Learn more from the [Medium Blog: Why fix Kubernetes and Systemd?] by [Kris Nóva]). --> [^memory-safe]: The reliability and effectiveness of the Rust systems language make it an excellent choice for the development of the Aurae project. [Learn more about Rust] <!-- +Status Badges --> [workflow in progress: deploy]: https://github.com/aurae-runtime/aurae/actions/workflows/291-deploy-website-documentation-aurae-builder-make-docs.yml/badge.svg?branch=main "https://github.com/aurae-runtime/aurae/actions/workflows/291-deploy-website-documentation-aurae-builder-make-docs.yml" [workflow in progress: documentation]: https://github.com/aurae-runtime/aurae/actions/workflows/290-check-website-documentation-aurae-builder-make-docs.yml/badge.svg "https://github.com/aurae-runtime/aurae/actions/workflows/290-check-website-documentation-aurae-builder-make-docs.yml" [workflow in progress: build]: https://github.com/aurae-runtime/aurae/actions/workflows/001-tester-ubuntu-make-test.yml/badge.svg "https://github.com/aurae-runtime/aurae/actions/workflows/001-tester-ubuntu-make-test.yml" <!-- +aurae.io/ --> [aurae cells]: https://aurae.io/blog/24-10-2022-aurae-cells/ "Learn more about Aurae cells" [aurae standard library]: https://aurae.io/stdlib/ "Learn more about Auraes standard library" [aurae]: https://aurae.io/ "Visit aurae.io" [cells]: https://aurae.io/stdlib/v0/#cell "Processes running in a shared cgroup namespace" [executables]: https://aurae.io/stdlib/v0/#executable "Basic runtime processes" [getting involved]: https://aurae.io/community/#getting-involved "Participate and contribute!" [pods]: https://aurae.io/stdlib/v0/#pod "Cells running in spawned instances" [spawned aurae instances]: https://aurae.io/stdlib/v0/#instance "Short lived nested virtual instances of Aurae" [v0 api reference]: https://aurae.io/stdlib/v0/ "Learn more about the current Aurae library definitions" [virtual machines]: https://aurae.io/stdlib/v0/#virtualmachine "Long-lived arbitrary virtual machines" [introducing aurae cells]: https://aurae.io/blog/2022-10-24-aurae-cells/#IntroducingAuraeCells "Aurae Blog: 2022-10-24" <!-- +Wiki --> [grpc]: https://en.wikipedia.org/wiki/GRPC "Read about gRPC" [mtls]: https://en.wikipedia.org/wiki/Mutual_authentication#mTLS "Read about mTLS" [pid]: https://en.wikipedia.org/wiki/Process_identifier "Read about PID" <!-- +Github --> [auraescript]: https://github.com/aurae-runtime/aurae/tree/main/auraescript "Check out the Auraescript on Github 🌟" [containerd]: https://github.com/containerd/containerd "Read about containerd on GH" [firecracker]: https://github.com/firecracker-microvm/firecracker "Read about firecracker on Github" [kris nóva]: https://github.com/krisnova "Check out Kris Nóva on Github 🌟" [open-source]: https://github.com/aurae-runtime/aurae/blob/main/LICENSE "Apache License 2.0" [spiffe]: https://github.com/spiffe "Read about SPIFFE" [spire]: https://github.com/spiffe/spire "Read about SPIRE" <!-- +External links --> [.proto]: https://protobuf.dev/ "Read more about Protocol Buffers" [deno]: https://deno.land "Read more about Deno" [learn more about rust]: https://doc.rust-lang.org/book/ "The book about the Rust programming language" [linux kernel]: https://git.kernel.org/ "Learn about the Linux kernels" [medium blog: why fix kubernetes and systemd?]: https://medium.com/@kris-nova/why-fix-kubernetes-and-systemd-782840e50104 "Learn more about the possibilies of Aurae" [rust]: https://www.rust-lang.org/ "Read and learn more about the Rust language" [systemd]: https://www.freedesktop.org/wiki/Software/systemd/ "Read more about Systemd" [typescript]: https://www.typescriptlang.org/docs/handbook/ "Read more about TypeScript" [yaml]: https://yaml.org/ "Read more about YAML"
583
htop - an interactive process viewer
README
584
DevOps Roadmap for 2022. with learning resources
# DevOps Roadmap 2022. This is a step by step guide on how to become a DevOps engineer, with links to relevant learning resources. ![DevOps roadmap](devops%20tools.png) ## Disclaimer > The purpose of this roadmap is to give you an idea about the landscape. The road map will guide you if you are confused about what to learn next, rather than encouraging you to pick what is hype and trendy. You should grow some understanding of why one tool would be better suited for some cases than the other and remember hype and trendy does not always mean best suited for the job. ## Give a Star! :star: If you like or are using this project to learn or start your solution, please give it a star. Thanks! ![DevOps roadmap](DevOps%20Roadmap.png) Download [Version without background](DevOps%20Roadmap%20No%20Background.png). ## PDF version [![DevOps roadmap](pdfversion.png)](DevOps%20Roadmap.pdf) Download [PDF version](DevOps%20Roadmap.pdf). ## Learning resources for DevOps Engineers (mostly free) ### 1. GIT - [Pro Git Book](https://git-scm.com/book/en/v2) <sup>FREE</sup> - [Learn Git by Atlassian](https://www.atlassian.com/git) <sup>FREE</sup> - [Learn Git Branching](https://learngitbranching.js.org/) <sup>FREE</sup> - [Learn Git & GitHub on CodeAcademy](https://www.codecademy.com/learn/learn-git) <sup>FREE</sup> - [Git Command Explorer](https://gitexplorer.com/) <sup>FREE</sup> - [Git Immersion](https://gitimmersion.com/index.html) <sup>FREE</sup> - [A Visual Git Reference](http://marklodato.github.io/visual-git-guide/index-en.html) <sup>FREE</sup> ### 2. Learn programming language - [Automate the Boring Stuff with Python book](https://automatetheboringstuff.com/) <sup>FREE</sup> - [Python Crash Course](https://ehmatthes.github.io/pcc/) <sup>FREE</sup> - [The Modern JavaScript Tutorial](https://javascript.info/) <sup>FREE</sup> - [JavaScript Crash Course For Beginners](https://www.youtube.com/watch?v=hdI2bqOjy3c) <sup>FREE</sup> - [Eloquent JavaScript, 3rd edition](https://eloquentjavascript.net/), Marjin Haverbeke <sup>FREE book</sup> - [Go by Example](https://gobyexample.com/) <sup>FREE</sup> ### 3. Learn Linux & Scripting - [Operating System - Overview](https://www.tutorialspoint.com/operating_system/os_overview.htm) <sup>FREE</sup> - [Shell Scripting Tutorial](https://www.shellscript.sh/) <sup>FREE</sup> - [Powershell Tutorial for Beginners: Learn Powershell Scripting](https://www.guru99.com/powershell-tutorial.html) <sup>FREE</sup> - [Bash Reference Manual](https://www.gnu.org/savannah-checkouts/gnu/bash/manual/bash.html) <sup>FREE</sup> - [Ultimate Guide: Getting Started With Ubuntu](https://itsfoss.com/getting-started-with-ubuntu/) <sup>FREE</sup> - [FreeBSD Handbook](https://docs.freebsd.org/en/books/handbook/) <sup>FREE</sup> - [Linux command handbook](https://www.freecodecamp.org/news/the-linux-commands-handbook/) <sup>FREE</sup> ### 4. Learn Networking & Security - [OSI Model Explained](https://www.cloudflare.com/en-gb/learning/ddos/glossary/open-systems-interconnection-model-osi/) <sup>FREE</sup> - [Computer Networking: A Top-Down Approach](https://www.amazon.com/Computer-Networking-Top-Down-Approach-7th/dp/0133594149) <sup>book</sup> - [TCP/IP and Networking Fundamentals for IT Pros](https://www.pluralsight.com/courses/tcpip-networking-it-pros) <sup>Pluralsight course</sup> - [DevSecOps : Master Securing CI/CD | DevOps Pipeline](https://www.udemy.com/course/devsecops/) <sup>Udemy course</sup> - [Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps](https://www.amazon.com/Hands-Security-DevOps-continuous-deployment/dp/1788995503) <sup> Book</sup> - [Securing DevOps: Security in the Cloud](https://www.amazon.com/Securing-DevOps-Security-Julien-Vehent/dp/1617294136/) <sup> Book</sup> ### 5. Learn Server Management - [What is a reverse proxy?](https://www.cloudflare.com/en-gb/learning/cdn/glossary/reverse-proxy/) <sup>FREE</sup> - [Cache Server](https://networkencyclopedia.com/cache-server/) <sup>FREE</sup> - [Reverse Proxy vs. Forward Proxy: The Differences](https://oxylabs.io/blog/reverse-proxy-vs-forward-proxy) <sup>FREE</sup> - [What is load balancing?](https://www.cloudflare.com/en-gb/learning/performance/what-is-load-balancing/) <sup>FREE</sup> - [What is a Firewall?](https://www.checkpoint.com/cyber-hub/network-security/what-is-firewall/) <sup>FREE</sup> - [The NGINX Handbook](https://www.freecodecamp.org/news/the-nginx-handbook/) <sup>FREE</sup> - [Learn Apache Server](https://www.twaino.com/en/blog/website-creation/apache-server-2/) <sup>FREE</sup> - [Learn IIS](https://www.dnsstuff.com/windows-iis-server-tools) <sup>FREE</sup> ### 6. Learn Containers - [What are Containers?](https://cloud.google.com/learn/what-are-containers) <sup>FREE</sup> - [Learning Containers From The Bottom Up](https://iximiuz.com/en/posts/container-learning-path/) <sup>FREE</sup> - [Docker Tutorial for Beginners by TechWorld with Nana](https://www.youtube.com/watch?v=3c-iBn73dDE) <sup>FREE</sup> - [Docker Mastery: with Kubernetes +Swarm from a Docker Captain](https://www.udemy.com/course/docker-mastery/) <sup>Udemy course</sup> - [What is Service Mesh?](https://www.redhat.com/en/topics/microservices/what-is-a-service-mesh) <sup>FREE</sup> ### 7. Learn Container Orchestration - [Kubernetes Crash Course for Absolute Beginners by TechWorld with Nana](https://www.youtube.com/watch?v=s_o8dwzRlu4) <sup>FREE</sup> - [Primer: How Kubernetes Came to Be, What It Is, and Why You Should Care](https://thenewstack.io/primer-how-kubernetes-came-to-be-what-it-is-and-why-you-should-care/) <sup>Article</sup> - [Certified Kubernetes Administrator (CKA) with Practice Tests](https://www.udemy.com/course/certified-kubernetes-administrator-with-practice-tests/) <sup>Udemy course</sup> - [Learn Kubernetes - Beginners to Advanced by KodeKloud](https://kodekloud.com/learning-path-kubernetes/) <sup>Course</sup> - [Understand when to use Cluster Services, Ingresses or API Gateways](https://gateway-api.sigs.k8s.io) <sup>FREE</sup> - [Understand which Problems Service Mesh solve (Use an Abstraction smi-spec.io](https://linkerd.io/2.12/features/) <sup>FREE</sup> - [Learn how to automate TLS](https://cert-manager.io/docs/) and [DNS](https://github.com/kubernetes-sigs/external-dns) <sup>FREE</sup> - [Kubernetes Up and Running](https://www.amazon.com/_/dp/1491935677?tag=oreilly20-20) <sup>Book</sup> ### 8. Learn Infrastructure as a code - [GUIs, CLI, APIs: Learn Basic Terms of Infrastructure-as-Code](https://thenewstack.io/guis-cli-apis-learn-basic-terms-of-infrastructure-as-code/) <sup>FREE</sup> - [Official Terraform Tutorials](https://learn.hashicorp.com/terraform) <sup>FREE</sup> - [A Comprehensive Guide to Terraform](https://blog.gruntwork.io/a-comprehensive-guide-to-terraform-b3d32832baca) <sup>FREE</sup> - [Automate Terraform documentation like a pro!](https://medium.com/google-cloud/automate-terraform-documentation-like-a-pro-ed3e19998808) <sup>FREE</sup> - [Writing reusable Terraform modules](https://thomasthornton.cloud/2022/06/02/writing-reusable-terraform-modules/) <sup>FREE</sup> - [What is Istio?](https://www.redhat.com/en/topics/microservices/what-is-istio) <sup>FREE</sup> - [Puppet overview](https://puppet.com/docs/puppet/latest/puppet_overview.html) <sup>FREE</sup> - [Puppet Courses](https://training.puppet.com/) <sup>FREE and PAID</sup> - [Getting Started With Ansible](https://docs.ansible.com/ansible/latest/getting_started/) <sup>FREE</sup> - [Learning Ansible Basics](https://www.redhat.com/en/topics/automation/learning-ansible-tutorial) - [Get started with Red Hat Ansible](https://www.ansible.com/resources/get-started) <sup>FREE and PAID</sup> - [Mastering Ansible](https://www.udemy.com/course/mastering-ansible/) <sup>Udemy Course</sup> - [Learn Chef](https://learn.chef.io/) <sup>FREE</sup> ### 9. Learn CI/CD - [CI/CD Pipeline: A Gentle Introduction](https://semaphoreci.com/blog/cicd-pipeline) <sup>FREE</sup> - [Learn GitLab with tutorials](https://docs.gitlab.com/ee/tutorials/) <sup>FREE</sup> - [Get started with GitLab CI/CD](https://docs.gitlab.com/ee/ci/quick_start/) <sup>FREE</sup> - [Jenkins, From Zero To Hero: Become a DevOps Jenkins Master](https://www.udemy.com/course/jenkins-from-zero-to-hero) <sup>Udemy course</sup> - [Learn GitHub actions](https://learn.microsoft.com/en-us/users/githubtraining/collections/n5p4a5z7keznp5) <sup>FREE</sup> - [Workflow syntax for GitHub Actions](https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions) <sup>FREE</sup> - [Learn Azure DevOps](https://milan.milanovic.org/post/ci-cd-with-azure-devops-yaml/) <sup>FREE</sup> - [GitLab Cheatsheets](https://dev.to/jphi_baconnais/series/12928) <sup>FREE</sup> ### 10. Learn Monitoring & Observability - [What Is Observability? Comprehensive Beginners Guide](https://devopscube.com/what-is-observability/) <sup>FREE</sup> - [The Hows, Whys and Whats of Monitoring Microservices](https://thenewstack.io/the-hows-whys-and-whats-of-monitoring-microservices/) <sup>FREE</sup> - [DevOps Monitoring](https://www.atlassian.com/devops/devops-tools/devops-monitoring) <sup>FREE</sup> - [Applying Basic vs. Advanced Monitoring Techniques](https://thenewstack.io/applying-basic-vs-advanced-monitoring-techniques/) <sup>FREE</sup> - [Learn Prometheus](https://prometheus.io/docs/tutorials/getting_started/) <sup>FREE</sup> - [Learn Grafana](https://grafana.com/tutorials/) <sup>FREE</sup> - [Elastic Stack](https://www.elastic.co/guide/index.html) <sup>FREE</sup> ### 11. Learn one Cloud provider - [Exam AZ-900: Microsoft Azure Fundamentals](https://learn.microsoft.com/en-us/certifications/exams/az-900) <sup>FREE</sup> - [Microsoft Azure Fundamentals Certification Course (AZ-900)](https://www.youtube.com/watch?v=NKEFWyqJ5XA) <sup>FREE</sup> - [AZ-900 | Microsoft Azure Fundamentals Full Course, Free Practice Tests, Website and Study Guides](https://www.youtube.com/watch?v=NPEsD6n9A_I&list=PLGjZwEtPN7j-Q59JYso3L4_yoCjj2syrM) <sup>FREE</sup> - [Ultimate AWS Certified Cloud Practitioner - 2022](https://www.udemy.com/course/aws-certified-cloud-practitioner-new) <sup>Udemy</sup> - [AWS Developer by A Cloud Guru](https://acloudguru.com/learning-paths/aws-developer) <sup>Learning path</sup> ### 12. Learn Software Engineering Practices - [What is Scrum?](https://www.atlassian.com/agile/scrum) <sup>FREE</sup> - [Ways To Learn About Scrum](https://www.scrum.org/resources/ways-learn-about-scrum) <sup>FREE</sup> - [Software Development Life Cycle (SDLC) Phases & Models](https://www.guru99.com/software-development-life-cycle-tutorial.html) <sup>FREE</sup> - [The Beginner's Guide to Agile in Jira: Course description](https://university.atlassian.com/student/page/1117976-the-beginner-s-guide-to-agile-in-jira-course-description?sid_i=8) <sup>FREE</sup> - [Learn SAFe](https://www.scaledagileframework.com/) <sup>FREE</sup> - [Learn Automation Testing](https://blog.testproject.io/2020/03/26/automation-testing-for-beginners-ultimate-guide/) <sup>FREE</sup> - [GitLab - Beginner's Guide to DevOps](https://page.gitlab.com/resources-ebook-beginners-guide-devops.html) <sup>FREE</sup> ### Additional resources (mostly books) - [The DevOps Handbook: How to Create World-Class Agility, Reliability, and Security in Technology Organizations](https://www.amazon.com/DevOps-Handbook-World-Class-Reliability-Organizations/dp/1942788002), Gene Kim, Patrick Debois, John Willis, Jez Humble <sup>Book</sup> - [Accelerate: The Science of Lean Software and DevOps: Building and Scaling High Performing Technology Organizations](https://www.amazon.com/Accelerate-Software-Performing-Technology-Organizations/dp/1942788339), Nicole Forsgren, Jez Humble, Gene Kim <sup>Book</sup> - [Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation ](https://www.amazon.com/Continuous-Delivery-Deployment-Automation-Addison-Wesley/dp/0321601912), Jez Humble, David Farley <sup>Book</sup> - [Team Topologies: Organizing Business and Technology Teams for Fast Flow](https://www.amazon.com/Team-Topologies-Organizing-Business-Technology/dp/1942788819), Matthew Skelton, Manuel Pais <sup>Book</sup> - [Effective DevOps: Building a Culture of Collaboration, Affinity, and Tooling at Scale](https://www.amazon.com/Effective-DevOps-Building-Collaboration-Affinity/dp/1491926309), Jennifer Davis, Ryn Daniels <sup>Book</sup> - [The Phoenix Project: A Novel about IT, DevOps, and Helping Your Business Win](https://www.amazon.com/Phoenix-Project-DevOps-Helping-Business/dp/0988262592), Gene Kim, Kevin Behr, George Spafford <sup>Book</sup> - [Site Reliability Engineering](https://sre.google/books/), Betsy Beyer, Chris Jones, Jennifer Petoff, Niall Richard Murphy <sup>Book</sup> ![DevOps books](DevOpsBooks.jpg) ## Wrap Up If you think the roadmap can be improved, please do open a PR with any updates and submit any issues. Also, I will continue to improve this, so you might want to star this repository to revisit. ## Contribution - Open a pull request with improvements - Discuss ideas in issues - Spread the word ## License [![License](https://img.shields.io/badge/License-Apache_2.0-blue.svg)](https://opensource.org/licenses/Apache-2.0) ## Authors - [Dr. Milan Milanović](https://milan.milanovic.org) - CTO at [3MD](https://3mdinc.com). - [Romano Roth](https://romanoroth.com) - Chief of DevOps at [Zühlke](https://www.zuehlke.com/en).
585
Sysdig Inspect - A powerful opensource interface for container troubleshooting and security investigation
<p align="center"> <img src="/public/assets/images/sysdig-inspect-logo-color-620x96.png" alt="Sysdig Inspect" /> </p> --- [Sysdig Inspect](https://sysdig.com/blog/sysdig-inspect) is a powerful opensource interface for container troubleshooting and security investigation Inspect's user interface is designed to intuitively navigate the data-dense sysdig captures that contain granular system, network, and application activity of a Linux system. Sysdig Inspect helps you understand trends, correlate metrics and find the needle in the haystack. It comes packed with features designed to support both performance and security investigations, with deep container introspection. To use Sysdig Inspect, you need capture files collected on Linux with [sysdig](https://github.com/draios/sysdig). Where to start? --- **Sysdig Inspect container** Sysdig Inspect is available as Docker container image. ``` docker run -d -v /local/path/to/captures:/captures -p8080:3000 sysdig/sysdig-inspect:latest ``` Sysdig Inspect will be available in your browser at http://localhost:8080! For more information, check out the [Sysdig Inspect repository on Docker Hub](https://hub.docker.com/r/sysdig/sysdig-inspect). **Sysdig Inspect desktop** Here are the installers available for the latest version: * MacOS installer: https://setns.run/install-inspect * Windows installer: https://setns.run/install-inspect-windows * Linux installer (RPM version): https://setns.run/install-inspect-rpm * Linux installer (DEB version): https://setns.run/install-inspect-deb You can check the changelog at https://github.com/draios/sysdig-inspect/releases. Main Features --- **Instant highlights** ![Instant Highlights](/assets/screenshots/Sysdig-Inspect-1.png) The overview page offers an out of the box, at a glance summary of the content of the capture file. Content is organized in tiles, each of which shows the value of a relevant metric and its trend. Tiles are organized in categories to surface useful information more clearly and are starting point for investigation and drill down. **Sub-second microtrends and metric correlation** ![Sub-second microtrends and metric correlation](/assets/screenshots/Sysdig-Inspect-2.png) Once you click on a tile, you will see the sub-second trend of the metric shown by the tile. Yes, sub-second. You will be amazed at how different your system, containers and applications look at this level of granularity. Multiple tiles can be selected to see how metrics correlate to each other and identify hot spots. **Intuitive drill-down-oriented workflow** ![Intuitive drill-down-oriented workflow](/assets/screenshots/Sysdig-Inspect-3.png) You can drill down into any tile to see the data behind it and start investigating. At this point you can either use the timeline to restrict what data you are seeing, or further drill down by double clicking on any line of data. You will be able to see processes, files, network connections and much more. **Payloads and system calls visualization** ![Payloads and system calls visualization](/assets/screenshots/Sysdig-Inspect-4.png) Every single byte of data that is read or written to a file (provided the appropriate `--snaplen` parameter is used while creating the capture), to a network connection to a pipe is recorded in the trace file and Sysdig Inspect makes it easy to observe it. Do you need to troubleshoot an intermittent network issue or determine what a malware wrote to the file system? All the data you need is there. And, of course, you can switch at any time into sysdig mode and look at every single system call. Collecting & Loading Captures --- **Creating a capture file** Sysdig Inspect works with capture files that have been collected by [sysdig](https://github.com/draios/sysdig) on a Linux system. The [sysdig user guide](https://github.com/draios/sysdig/wiki/Sysdig-User-Guide) contains a nice introduction to the tool and includes many examples that can guide you through the command line and filtering syntax. As a very easy quick start, here's how to capture all of the system events on a Linux box with sysdig: `sudo sysdig -w filename.scap` **Example Trace files** [502 Error](https://github.com/draios/sysdig-inspect/blob/master/capture-samples/502Error.scap) Troubleshooting an HAProxy 502 [404 Error](https://github.com/draios/sysdig-inspect/blob/master/capture-samples/404Error.scap) Troubleshooting a 404 error from a leaky file Join the Community --- * Join our [Public Slack](https://slack.sysdig.com) channel for announcements discussions, and help * Follow us on [Twitter](https://twitter.com/sysdig) * This is our [blog](https://sysdig.com/blog/sysdig-inspect). There are many like it, but this one is ours. License Terms --- Sysdig is licensed to you under the [GPL 2.0](https://github.com/draios/sysdig/blob/dev/COPYING) open source license.
586
:penguin: A list of awesome projects and resources that make Linux even more awesome. :penguin:
<h1 align="center"> <a href="http://awesome.re"><img src="https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg" alt="awesome"></a> Linux </h1> <p align="center">We all know that Linux is awesome, but here's a list of especially awesome things related to the Linux ecosystem.</p> ![linux graphic](http://i.imgur.com/3F0xXh8.jpg) --- <p align="center"> You might also want to check <a href="https://github.com/aleksandar-todorovic/awesome-c">awesome-c</a>, <a href="https://github.com/alebcay/awesome-shell">awesome-shell</a>, <a href="https://github.com/n1trux/awesome-sysadmin">awesome-sysadmin</a>, and <a href="https://github.com/sbilly/awesome-security">awesome-security</a>.</p> --- ## Table of Content * [Distributions](#distributions) * [Beginners](#beginners) * [elementary OS](#elementary-os) * [Fedora](#fedora) * [Linux Mint](#linux-mint) * [Ubuntu](#ubuntu) * [Intermediate](#intermediate) * [CentOS](#centos) * [Debian GNU/Linux](#debian-gnulinux) * [Mageia](#mageia) * [Manjaro](#manjaro) * [openSUSE](#opensuse) * [Advanced](#advanced) * [Arch Linux](#arch-linux) * [Special Purpose](#special-purpose) * [CoreOS](#coreos) * [Kali Linux](#kali-linux) * [Puppy Linux](#puppy-linux) * [Ubuntu Studio](#ubuntu-studio) * [Tails](#tails) * [Learning Resources](#learning-resources) * [Books](#books) * [Courses](#courses) * [X Desktop Environments](#x-desktop-environments) * [GNOME](#gnome) * [KDE](#kde) * [Xfce](#xfce) * [LXDE](#lxde) * [Other Desktop Environments](#other-desktop-environments) * [X Windows Managers](#x-windows-managers) * [Applications](#applications) * [GUI-based Applications](#gui-based-applications) * [GNOME-based](#gnome-based) * [Pantheon-based](#pantheon-based) * [KDE-based](#kde-based) * [Not based on any desktop environment](#not-based-on-any-desktop-environment) * [Third-party clients for online services](#third-party-clients-for-online-services) * [Package management and creation tools](#distro-based-package-management-tools) * [Console-based Applications and Tools](#console-based-applications-and-tools) * [Useful Websites](#useful-websites) * [License](#license) ## Distributions Distributions are organized into three different categories: for **beginners**, for **intermediate** users and for **advanced** users. In those categories, the distributions are organized in the alphabetical order. ### Beginners #### [elementary OS](http://elementary.io/) > elementary OS is an Ubuntu-based desktop distribution. Some of its more interesting features include a custom desktop environment called Pantheon and many custom apps including Photos, Music, Videos, Calendar, Terminal, Files, and more. It also comes with some familiar apps like the Epiphany web browser and a fork of Geary mail. **Latest version:** elementary OS Juno (5.0) **Default Desktop Environment:** Pantheon ![default look](https://elementary.io/images/screenshots/desktop.jpg) #### [Fedora](https://getfedora.org/) > Fedora (formerly Fedora Core) is a Linux distribution developed by the community-supported Fedora Project and owned by Red Hat. Fedora contains software distributed under a free and open-source license and aims to be on the leading edge of such technologies. Fedora has a reputation for focusing on innovation, integrating new technologies early on and working closely with upstream Linux communities. The default desktop in Fedora is the GNOME desktop environment and the default interface is the GNOME Shell. Other desktop environments, including KDE, Xfce, LXDE, MATE and Cinnamon, are available. Fedora Project also distributes custom variations of Fedora called Fedora spins. These are built with specific sets of software packages, offering alternative desktop environments or targeting specific interests such as gaming, security, design, scientific computing and robotics. **Latest version:** Fedora Twenty Nine (29) **Default Desktop Environment:** GNOME ![default look](https://distrowatch.com/images/cgfjoewdlbc/fedora.png) #### [Linux Mint](http://linuxmint.com/) > Linux Mint is an Ubuntu-based distribution whose goal is to provide a more complete out-of-the-box experience by including browser plugins, support for DVD playback, Java and other components. It also adds a custom desktop and menus, several unique configuration tools, and a web-based package installation interface. Linux Mint is compatible with Ubuntu software repositories. **Latest version:** Linux Mint Tessa (19.1) **Default Desktop Environment:** Cinnamon and MATE ![default look](https://distrowatch.com/images/cgfjoewdlbc/mint.png) #### [Ubuntu](http://www.ubuntu.com/) > Ubuntu is a complete desktop Linux operating system, freely available with both community and professional support. The Ubuntu community is built on the ideas enshrined in the Ubuntu Manifesto: that software should be available free of charge, that software tools should be usable by people in their local language and despite any disabilities, and that people should have the freedom to customise and alter their software in whatever way they see fit. "Ubuntu" is an ancient African word, meaning "humanity to others". The Ubuntu distribution brings the spirit of Ubuntu to the software world. **Latest version:** Ubuntu 18.10 **Default Desktop Environment:** GNOME ![default look](https://distrowatch.com/images/cgfjoewdlbc/ubuntu.png) ### Intermediate #### [CentOS](https://www.centos.org/) > CentOS as a group is a community of open source contributors and users. Typical CentOS users are organisations and individuals that do not need strong commercial support in order to achieve successful operation. CentOS is 100% compatible rebuild of the Red Hat Enterprise Linux, in full compliance with Red Hat's redistribution requirements. CentOS is for people who need an enterprise class operating system stability without the cost of certification and support. **Latest version:** CentOS 7.1810 **Default Desktop Environment:** GNOME ![default look](http://distrowatch.com/images/cgfjoewdlbc/centos.png) #### [Debian GNU/Linux](https://www.debian.org/) > The Debian Project is an association of individuals who have made common cause to create a free operating system. This operating system is called Debian. Debian systems currently use the Linux kernel. Linux is a completely free piece of software started by Linus Torvalds and supported by thousands of programmers worldwide. Of course, the thing that people want is application software: programs to help them get what they want to do done, from editing documents to running a business to playing games to writing more software. Debian comes with over 50,000 packages (precompiled software that is bundled up in a nice format for easy installation on your machine) - all of it free. It's a bit like a tower. At the base is the kernel. On top of that are all the basic tools. Next is all the software that you run on the computer. At the top of the tower is Debian -- carefully organizing and fitting everything so it all works together. **Latest version:** Debian Stretch (9.6) **Default Desktop Environment:** GNOME ![default look](http://distrowatch.com/images/cgfjoewdlbc/debian.png) #### [Mageia](http://www.mageia.org/) > Mageia is a fork of Mandriva Linux formed in September 2010 by former employees and contributors to the popular French Linux distribution. Unlike Mandriva, which is a commercial entity, the Mageia project is a community project and a non-profit organisation whose goal is to develop a free Linux-based operating system. **Latest version:** Mageia 6.1 **Default Desktop Environment:** KDE ![default look](http://distrowatch.com/images/cgfjoewdlbc/mageia.png) #### [Manjaro](https://manjaro.org/) > Manjaro Linux is a fast, user-friendly, desktop-oriented operating system based on Arch Linux. Key features include intuitive installation process, automatic hardware detection, stable rolling-release model, ability to install multiple kernels, special Bash scripts for managing graphics drivers and extensive desktop configurability. Manjaro Linux offers Xfce as the core desktop options, as well as a minimalist Net edition for more advanced users. Community-supported GNOME 3/Cinnamon and KDE flavours are available. Users also benefit from the supportive and vibrant Manjaro community forum. **Latest version:** Manjaro 18.0.2 **Default Desktop Environment:** XFCE, KDE ![default look](http://distrowatch.com/images/cgfjoewdlbc/manjaro.png) #### [openSUSE](http://www.opensuse.org/) > The openSUSE project is a community program sponsored by SUSE Linux and other companies. Promoting the use of Linux everywhere, this program provides free, easy access to openSUSE, a complete Linux distribution. The openSUSE project has three main goals: make openSUSE the easiest Linux for anyone to obtain and the most widely used Linux distribution; leverage open source collaboration to make openSUSE the world's most usable Linux distribution and desktop environment for new and experienced Linux users; dramatically simplify and open the development and packaging processes to make openSUSE the platform of choice for Linux developers and software vendors. **Latest version:** openSUSE Leap 15.0 and openSUSE Tumbleweed (Rolling Release system) **Default Desktop Environment:** KDE, GNOME, XFCE, LXDE (Choose on installation) ![default look](http://distrowatch.com/images/cgfjoewdlbc/opensuse.png) ### Advanced #### [Arch Linux](https://www.archlinux.org/) > Arch Linux is an independently developed, x86_64-optimised Linux distribution targeted at competent Linux users. It uses 'pacman', its home-grown package manager, to provide updates to the latest software applications with full dependency tracking. Operating on a rolling release system, Arch can be installed from a CD image or via an FTP server. The default install provides a solid base that enables users to create a custom installation. In addition, the Arch Build System (ABS) provides a way to easily build new packages, modify the configuration of stock packages, and share these packages with other users via the Arch Linux user repository. **Latest version:** Not applicable (Rolling Release system) **Default Desktop Environment:** Not applicable (there's no default Desktop environment) ### Special Purpose #### [CoreOS](https://coreos.com/) **Specialty:** Clusters > CoreOS is a Linux-based operating system for servers. Built from the ground up and designed primarily for the modern data centre, CoreOS provides specialist tools for making the system secure, reliable and up-to-date. Some of the more interesting features of the distribution include reliable updates and patches via FastPatch, a dashboard for managing rolling updates via CoreUpdate, a docker for packaging applications, as well as support for bare metal and many cloud providers. #### [Kali Linux](http://www.kali.org/) **Specialty:** Penetration testing > Kali Linux (formerly known as BackTrack) is a Debian-based distribution with a collection of security and forensics tools. It features timely security updates, support for the ARM architecture, a choice of four popular desktop environments, and seamless upgrades to newer versions. #### [Puppy Linux](http://puppylinux.org/) **Specialty:** Low system requirements > Puppy Linux is yet another Linux distribution. What's different here is that Puppy is extraordinarily small, yet quite full-featured. Puppy boots into a ramdisk and, unlike live CD distributions that have to keep pulling stuff off the CD, it loads into RAM. This means that all applications start in the blink of an eye and respond to user input instantly. Puppy Linux has the ability to boot off a flash card or any USB memory device, CDROM, Zip disk or LS/120/240 Superdisk, floppy disks, internal hard drive. It can even use a multisession formatted CD-RW/DVD-RW to save everything back to the CD/DVD with no hard drive required at all. #### [Ubuntu Studio](http://ubuntustudio.org/) **Specialty:** Multimedia creation > Ubuntu Studio is a variant of Ubuntu aimed at the GNU/Linux audio, video and graphic enthusiast as well as professional. The distribution provides a collection of open-source applications available for multimedia creation. #### [Tails](https://tails.boum.org/index.en.html) **Specialty:** Incognito live system > Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously and circumvent censorship almost anywhere you go and on any computer but leaving no trace unless you ask it to explicitly. It is a complete operating system designed to be used from a USB stick or a DVD independently of the computer's original operating system. It is Free Software and based on Debian GNU/Linux. Tails comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc. ## Learning Resources ### Books #### [The Linux Command Line](https://www.goodreads.com/book/show/11724436-the-linux-command-line) [4.36] [[FREE](http://linuxcommand.org/tlcl.php)] This is a great introduction to the Linux command line. - [@4iar](https://github.com/4iar/) > You've experienced the shiny, point-and-click surface of your Linux computer—now dive below and explore its depths with the power of the command line. #### [The Debian Administrator's Handbook, Debian Wheezy from Discovery to Mastery](https://www.goodreads.com/book/show/20839133-the-debian-administrator-s-handbook-debian-wheezy-from-discovery-to-mas) [4.83] [[FREE](https://debian-handbook.info/get/now/)] Good book that teaches you the basics of Debian GNU/Linux administration. - [@elninosi](https://github.com/elninosi) > It covers all the topics that a competent Linux administrator should master, from the installation, update of the system, up to the creation of packages and the compilation of the kernel, but also monitoring, backup and migration. Plus advanced topics to secure services, automated installations, or virtualization. #### Bash Shell Scripting [[FREE](https://en.wikibooks.org/wiki/Bash_Shell_Scripting)] > Currently this book provides an introduction level knowledge of Bash. ### Courses #### [Introduction to Linux (LFS101x-1)](https://www.edx.org/course/introduction-linux-linuxfoundationx-lfs101x-1) [Free] Organized by the Linux Foundation, it's a great free course to learn basics about Linux. - [@aleksandar-todorovic](https://github.com/aleksandar-todorovic) #### [Linux Alternatives to Windows Applications](https://www.udemy.com/linux-alternatives-for-windows-applications/?dtcode=nEiIHId38AHS) [Free] If you used Windows and decided to switch to Linux, this course should help you to find their alternatives. It's pretty short and you can finish it in a day. - [@aleksandar-todorovic](https://github.com/aleksandar-todorovic) ### Bash Learning Resources * [Beautiful Bash: Let's make reading and writing bash scripts fun again!](https://www.slideshare.net/a_z_e_t/inpresentation) * [Best Practices for Writing Bash Scripts](http://kvz.io/blog/2013/11/21/bash-best-practices/) * [Shell Style Guide](https://google.github.io/styleguide/shell.xml) * [Linux Fu: Better Bash Scripting](https://hackaday.com/2017/07/21/linux-fu-better-bash-scripting/) * [Bash Guide for Beginners](https://linux.die.net/Bash-Beginners-Guide/) * [Advanced Bash-Scripting Guide](https://linux.die.net/abs-guide/) ## X Desktop Environments > You cannot talk about a unified Linux look because there is no such thing. ![relevant XKCD](http://imgs.xkcd.com/comics/standards.png) #### [GNOME](https://www.gnome.org) > GNOME 3 is an easy and elegant way to use your computer. It is designed to put you in control and bring freedom to everybody. GNOME 3 is developed by the GNOME community, a diverse, international group of contributors that is supported by an independent, non-profit foundation. ![screenshot](https://www.gnome.org/wp-content/uploads/2015/03/activities-overview-3.16-940x529.png) #### [KDE](https://www.kde.org) > The KDE® Community is an international technology team dedicated to creating a free and user-friendly computing experience, offering an advanced graphical desktop, a wide variety of applications for communication, work, education and entertainment and a platform to easily build new applications upon. We have a strong focus on finding innovative solutions to old and new problems, creating a vibrant atmosphere open for experimentation. ![screenshot](https://www.kde.org/announcements/plasma5.0/screenshots/desktop.png) #### [Xfce](http://www.xfce.org/) > Xfce is a lightweight desktop environment for UNIX-like operating systems. It aims to be fast and low on system resources, while still being visually appealing and user friendly. ![screenshot](https://upload.wikimedia.org/wikipedia/commons/7/71/Xfce-4.4.png) #### [LXDE](http://lxde.org/) > The "Lightweight X11 Desktop Environment" is an extremely fast-performing and energy-saving desktop environment. Maintained by an international community of developers, it comes with a beautiful interface, multi-language support, standard keyboard short cuts and additional features like tabbed file browsing. LXDE uses less CPU and less RAM than other environments. It is especially designed for cloud computers with low hardware specifications, such as netbooks, mobile devices (e.g. MIDs) or older computers. LXDE can be installed on many Linux distributions including Debian, Fedora, OpenSUSE and Ubuntu. It is the standard for Knoppix and lubuntu. LXDE also runs on OpenSolaris and BSD. LXDE provides a fast desktop experience; connecting easily with applications in the cloud. LXDE supports a wealth of programs that can be installed locally with Linux systems. The source code of LXDE is licensed partly under the terms of the GNU General Public License and partly under the LGPL. ![screenshot](https://upload.wikimedia.org/wikipedia/commons/4/4c/LXDE_desktop_full.png) #### Other Desktop Environments * [Cinnamon](http://developer.linuxmint.com/projects/cinnamon-projects.html) - Strives to provide a traditional user experience. * [EDE](https://edeproject.org/) - Small desktop environment built to be responsive, light in resource usage and to have a familiar look and feel. * [LXQt](http://lxqt.org/) - Qt port and the upcoming version of LXDE, the Lightweight Desktop Environment. It is the product of the merge between the LXDE-Qt and the Razor-qt projects: A lightweight, modular, blazing-fast and user-friendly desktop environment. * [MATE](http://www.mate-desktop.org/) - Provides an intuitive and attractive desktop to Linux users using traditional metaphors. Fork of GNOME 2. * [Pantheon](https://elementary.io) - Pantheon is the default desktop environment originally created for the elementary OS distribution. The desktop has some similarities with GNOME Shell and macOS. ## X Windows Managers * [9wm](http://unauthorised.org/dhog/9wm.html) - Window manager that attempts to emulate the Plan 9 window manager 8-1/2 as far as possible within the constraints imposed by X. * [awesome](https://awesomewm.org/) - Highly configurable window manager for X. Fast and extensible. * [Blackbox](https://github.com/bradleythughes/blackbox) - Lightweight window manager for the X window system, without library dependencies. Built using C++. * [bspwm](https://github.com/baskerville/bspwm) - Tiling window manager that represents windows as the leaves of a full binary tree. * [Compiz](https://launchpad.net/compiz) - OpenGL compositing window manager. It has a plug-in system to be changed at runtime. * [dwm](http://dwm.suckless.org/) - Dynamic window manager for X. It manages windows in tiled, monocle and floating layouts. All of the layouts can be applied dynamically, optimising the environment for the application and task performed. * [Enlightenment](http://www.enlightenment.org/) - Window manager bundled with a whole suite of libraries to help you create beautiful user interfaces. * [Fluxbox](http://www.fluxbox.org/) - Window manager for X, lightweight and easy to handle but full of features to make an easy and fast desktop experience. Built using C++. * [FVWM](http://fvwm.org/) - ICCCM-compliant multiple virtual desktop window manager for X. Extremely powerful. * [i3](http://i3wm.org/) - Tiling window manager. BSD-licensed. Primarily targeted at advanced users and developers. * [IceWM](https://ice-wm.org/) - Window manager with the goal of being fast, simple, and not getting in the user's way. * [JWM](http://www.joewing.net/projects/jwm/) - Lightweight window manager for X11. Good choice for older and/or less powerful systems, though perfectly capable of running on modern systems. Built using C. * [Matchbox](https://www.yoctoproject.org/software-item/matchbox/) - Environment for X running on non-desktop embedded platforms such as handhelds, set-top boxes, kiosks and anything else for which screen space, input mechanisms or system resources are limited. * [Mutter](https://download.gnome.org/sources/mutter/) - Window manager for X. Default window manager in GNOME 3. * [Openbox](http://openbox.org/wiki/Main_Page) - Highly configurable window manager with extensive standards support. * [ratpoison](http://www.nongnu.org/ratpoison/) - A simple window manager with no library dependencies, no graphics, and no decorations. Modeled after GNU Screen. * [Sawfish](http://sawfish.tuxfamily.org/) - Extensible window manager. Its aim is to manage windows in the most flexible and attractive manner possible. Built using Lisp-based scripting language. * [wmii](https://code.google.com/p/wmii/) - Small, scriptable window manager, with a 9P filesystem interface and an acme-like layout. * [xmonad](http://xmonad.org/) - Dynamically tiling X11 window manager. Makes work easier by automating aligning and searching for windows. Built using Haskell. ## Applications The list of awesome Linux applications that you should be using. If you're looking for some pro-tips for your favorite text editor, you might be interested in [awesome-atom](https://github.com/mehcode/awesome-atom), [sublime-bookmarks](https://github.com/dreikanter/sublime-bookmarks), [vim-galore](https://github.com/mhinz/vim-galore), [awesome-emacs](https://github.com/emacs-tw/awesome-emacs), or [awesome-vscode](https://github.com/viatsko/awesome-vscode). ### GUI-based Applications #### GNOME-based * [Builder](https://wiki.gnome.org/Apps/Builder) - IDE for GNOME that is focused on bringing the power of the GNOME platform to more developers. * [Evince](https://wiki.gnome.org/Apps/Evince) - The most popular document viewer on the GNOME platform. * [Gedit](https://wiki.gnome.org/Apps/Gedit) - Powerful general purpose text editor. * [Polari](https://wiki.gnome.org/Apps/Polari) - IRC client built to be easy to use. * [To Do](https://wiki.gnome.org/Apps/Todo) - Minimalistic personal task manager designed to fit right into your GNOME desktop. For more GNOME-based apps, visit: https://wiki.gnome.org/Apps #### Pantheon-based * [FeedReader](https://jangernert.github.io/FeedReader/) - RSS desktop client able to integrate with multiple online services. * [Go For It!](http://manuel-kehl.de/projects/go-for-it/) - To-do list with built-in productivity timer. * [NaSC](http://parnold-x.github.io/nasc/) - Intelligent calculator app. * [Spice-Up](https://github.com/Philip-Scott/Spice-up) - Desktop presentation app. * [Vocal](http://vocalproject.net/) - Podcast client for the modern desktop. For more Pantheon-based apps, visit [elementary-apps](https://quassy.github.io/elementary-apps/). #### KDE-based * [Dolphin](https://userbase.kde.org/Dolphin) - File manager for KDE focusing on usability. * [Krita](https://krita.org/en/) - Painting program. For more KDE-based apps, visit: https://www.kde.org/applications/ #### Not based on any desktop environment * [Atom](https://atom.io) - Hackable text editor for the 21st century. * [ghostwriter](http://wereturtle.github.io/ghostwriter/) - Distraction-free Markdown editor. * [GParted](https://gparted.sourceforge.io/) - The most popular disk partitioning software out there. * [Kodi](https://kodi.tv/) - Most popular entertainment center. * [Zathura](https://pwmt.org/projects/zathura/) - Highly customizable document viewer. It provides a minimalistic and space saving interface as well as an easy usage that mainly focuses on keyboard interaction. * [Etcher](https://www.balena.io/etcher/) - Flash OS images to SD cards and USB drives, safely and easily. #### Third-party clients for online services > **Q:** Why third-party apps? Why not the official clients? > > **A:** Because, in 99% of the cases, official clients are proprietary. * [Corebird](http://corebird.baedert.org/) - Twitter client. * [GNOME Twitch](http://gnome-twitch.vinszent.com/) - Twitch player. * [Caprine](https://github.com/sindresorhus/caprine/) - Facebook's Messenger client with some added privacy features. * [PB for Desktop](https://github.com/sidneys/pb-for-desktop) - Pushbullet client. * [ramme](https://github.com/terkelg/ramme) - Instagram client. * [Whatever](https://github.com/CellarD0-0r/whatever) - Evernote client based on the web version. #### Package management and creation tools Distro-oriented: * [Y PPA Manager](https://launchpad.net/y-ppa-manager) (Ubuntu) - Manage PPAs and search for packages. * [pirut](http://fedoraproject.org/wiki/Tools/pirut) (Fedora) - Provides a set of graphical tools for managing software. * [Synaptics](http://www.nongnu.org/synaptic/) (Debian and `.deb` users) - Graphical package management program for `apt`. * [YaST](https://en.opensuse.org/YaST_Software_Management) (openSUSE) - Main package management tool on openSUSE. * [dnfdragora](https://github.com/manatools/dnfdragora) (Fedora) - A GUI for the `dnf` package manager. * [Yay](https://github.com/Jguer/yay) (Arch) - Yay is one of the many wrappers to `pacman` which automatically downloads and installs packages from AUR, a full list can be found [here](https://wiki.archlinux.org/index.php/AUR_helpers). * [Aura](https://github.com/aurapm/aura) (Arch) - Secure, multilingual package manager. Distro-independent: * [AppImageKit](https://github.com/probonopd/AppImageKit) - Using AppImageKit you can package applications in the [AppImage](http://appimage.org/) format that runs on common Linux-based operating systems, such as RHEL, CentOS, Ubuntu, Fedora, debian and derivatives; one app = one file. ### Console-based Applications and Tools You might also be interested in checking out [awesome-shell](https://github.com/alebcay/awesome-shell), [awesome-bash](https://github.com/awesome-lists/awesome-bash), [awesome-zsh-plugins](https://github.com/unixorn/awesome-zsh-plugins) or [awesome-fish](https://github.com/jbucaran/awesome-fish). * [cmus](https://cmus.github.io/) - Small, fast and powerful console music player. * [fuck](https://github.com/nvbn/thefuck) - Command line tool which corrects your previously mistyped command. * [git](https://git-scm.com/) - Distributed version control system designed to handle everything from small to very large projects with speed and efficiency. * [glances](https://nicolargo.github.io/glances/) - Cross-platform system monitoring tool. * [htop](http://hisham.hm/htop/) - Nice looking, customizable task manager. * [nano](http://www.nano-editor.org) - Simple to use text editor. * [photorec](http://www.cgsecurity.org/wiki/PhotoRec) - Useful tool for restoring deleted files. * [ranger](https://github.com/ranger/ranger) - Vim-inspired file manager for the console. * [screenFetch](https://github.com/KittyKatt/screenFetch) - Fetches system/theme information in terminal. * [shellcheck](https://github.com/koalaman/shellcheck) - Static analysis tool for shell scripts. * [speed-test](https://github.com/sindresorhus/speed-test) - Test your Internet connection speed and ping using [speedtest.net](http://www.speedtest.net/). * [testdisk](http://www.cgsecurity.org/wiki/TestDisk) - A tool for disk partition recovery. * [tig](https://github.com/jonas/tig) - Text-mode interface for git. It functions mainly as a Git repository browser. * [vim](http://vim.org) - Advanced text editor that seeks to provide the power of the de-facto Unix editor 'Vi', with a more complete feature set. * [vtop](https://github.com/MrRio/vtop) - Easily-extendable activity monitor. * [wavemon](https://github.com/uoaerg/wavemon) - Monitoring application for wireless network devices. * [youtube-dl](https://github.com/rg3/youtube-dl) - A tool to download videos from YouTube and other video sites. ## Useful Websites #### [Compute Freely](http://computefreely.org/) > A friendly place to start for the Free & Open Source Software and Linux curious. #### [AlternativeTo](http://alternativeto.net) > Find better alternatives to the software you already use or a replacement for software you cannot or do not want to use. #### [Linux Foundation](https://www.linuxfoundation.org/) > The Linux Foundation is a non-profit consortium dedicated to fostering the growth of Linux. Founded in 2000, The Linux Foundation sponsors the work of Linux creator Linus Torvalds and is supported by leading Linux and open source companies and developers from around the world. #### [Linux.com](http://www.linux.com/) > For the community, by the community, Linux.com strives to be the central source for informed, reasonable, and intelligent Linux information, software, documentation and answers across the server, desktop/netbook, mobile, and embedded areas. #### [Linux.org](http://www.linux.org/) Although its design is outdated, Linux.org is (probably) the most popular forum and it's full of awesome Linux tutorials categorized by their difficulty. - [@aleksandar-todorovic](https://github.com/aleksandar-todorovic) #### [Kernel.org](https://www.kernel.org/) > The Linux Kernel Organization is a California Public Benefit Corporation established in 2002 to distribute the Linux kernel and other Open Source software to the public without charge. #### [Opensource.com](http://opensource.com) > Opensource.com is an online publication focused on how open source is applied to different areas including business, education, government, health, law and other disciplines of life. > Our goal is to further the open source way by sharing the open source movement. Our community of readers is made up of those who believe that open participation and sharing can tackle the business, social, environmental, and technological challenges facing us today. #### [Linux.die](https://linux.die.net/) > Linux.die is a resource with documentation, tutorials, books, etc in Linux. ## License This repository is licensed under the [Do What the Fuck You Want to Public License](http://www.wtfpl.net/). Its full content is located in the `LICENSE` file.
587
System and process monitor for Linux
[atop](http://www.atoptool.nl) ============================== Created/maintained by Gerlof Langeveld <[email protected]> ## Introduction <img align="right" width="100" height="116" src="http://www.atoptool.nl/images/atoplogo.png"> Atop is an ASCII full-screen performance monitor for Linux that is capable of reporting the activity of all processes (even if processes have finished during the interval), daily logging of system and process activity for long-term analysis, highlighting overloaded system resources by using colors, etcetera. At regular intervals, it shows system-level activity related to the CPU, memory, swap, disks (including LVM) and network layers, and for every process (and thread) it shows e.g. the CPU utilization, memory growth, disk utilization, priority, username, state, and exit code. In combination with the optional kernel module *netatop*, it even shows network activity per process/thread. In combination with the optional daemon *atopgpud*, it also shows GPU activity on system level and process level. ## Highlights The command atop has some major advantages compared to other performance monitoring tools: * __Resource consumption by *all* processes.__ It shows the resource consumption by all processes that were active during the interval, so also the resource consumption by those processes that have finished during the interval. * __Utilization of *all* relevant resources.__ Obviously it shows system-level counters concerning utilization of cpu and memory/swap, however it also shows disk I/O and network utilization counters on system level. * __Permanent logging of resource utilization.__ It is able to store raw counters in a file for long-term analysis on system level and process level. These raw counters are compressed at the moment of writing to minimize disk space usage. By default, the daily logfiles are preserved for 28 days. System activity reports can be generated from a logfile by using the atopsar command. * __Highlight critical resources.__ It highlights resources that have (almost) reached a critical load by using colors for the system statistics. * __Scalable window width.__ It is able to add or remove columns dynamically at the moment that you enlarge or shrink the width of your window. * __Resource consumption by individual *threads*.__ It is able to show the resource consumption for each thread within a process. * __Watch activity only.__ By default, it only shows system resources and processes that were really active during the last interval, so output related to resources or processes that were completely passive during the interval is by default suppressed. * __Watch deviations only.__ For the active system resources and processes, only the load during the last interval is shown (not the accumulated utilization since system boot or process startup). * __Accumulated process activity per user.__ For each interval, it is able to accumulate the resource consumption for all processes per user. * __Accumulated process activity per program.__ For each interval, it is able to accumulate the resource consumption for all processes with the same name. * __Accumulated process activity per container.__ For each interval, it is able to accumulate the resource consumption for all processes within the same container. * __Network activity per process.__ In combination with the optional kernel module netatop, it shows process-level counters concerning the number of TCP and UDP packets transferred, and the consumed network bandwidth per process. * __GPU activity on system level and per process.__ In combination with the optional daemon atopgpud, it shows system-level and process-level counters concerning the load and memory utilization per GPU. ## Links * [A Web interface for atop](https://github.com/pizhenwei/atophttpd) * [Graphical representation of system resource utilization]( https://codeberg.org/mgellner/atopsar-plot)
588
🎉 An all-purpose toolbox app. | 一个万用的工具箱 🎉
<pre align="center"> ██╗ ██╗ ██╗ ████████╗ ██╗ ██╗ ██║ ██╔╝ ██║ ╚══██╔══╝ ╚██╗██╔╝ █████╔╝ ██║ ██║ █████╗ ╚███╔╝ ██╔═██╗ ██║ ██║ ╚════╝ ██╔██╗ ██║ ██╗ ██║ ██║ ██╔╝ ██╗ ╚═╝ ╚═╝ ╚═╝ ╚═╝ ╚═╝ ╚═╝ </pre> <a href="https://kitx.apps.catrol.cn/"> <img align="right" src="https://source.catrol.cn/icons/Project/Catrol/KitX/KitX.png" height="200" width="200"/> </a> ##### 💻 Support OS [![Windows](https://img.shields.io/badge/Windows-0078D6?style=for-the-badge&logo=windows&logoColor=white)](#) [![Linux](https://img.shields.io/badge/Linux-FCC624?style=for-the-badge&logo=linux&logoColor=black)](#) [![MacOS](https://img.shields.io/badge/mac%20os-000000?style=for-the-badge&logo=macos&logoColor=F0F0F0)](#) [![Android](https://img.shields.io/badge/Android-3DDC84?style=for-the-badge&logo=android&logoColor=white)](#) [![iOS](https://img.shields.io/badge/iOS-000000?style=for-the-badge&logo=ios&logoColor=white)](#) ##### 📢 Info [![LICENSE](https://img.shields.io/github/license/Crequency/KitX?style=for-the-badge)](./LICENSE) [![Downloads](https://img.shields.io/github/downloads/Crequency/KitX/total?style=for-the-badge&color=%239F7AEA)](https://github.com/Crequency/KitX/releases) [![Discussions](https://img.shields.io/github/discussions/Crequency/KitX?color=%23ED8936&style=for-the-badge)](https://github.com/Crequency/KitX/discussions) [![Code Size](https://img.shields.io/github/languages/code-size/Crequency/KitX?style=for-the-badge)](#) [![Commit Activity](https://img.shields.io/github/commit-activity/m/Crequency/KitX?style=for-the-badge)](https://github.com/Crequency/KitX/commits/) <details> <summary>状态 | Status</summary> [![Build Universal](https://img.shields.io/github/actions/workflow/status/Crequency/KitX/build.yml?branch=main&style=for-the-badge&label=Build%20Universal)](https://github.com/Crequency/KitX/actions/workflows/build.yml) [![Build Loaders](https://img.shields.io/github/actions/workflow/status/Crequency/KitX/build-loaders.yml?branch=main&style=for-the-badge&label=Build%20Loaders)](https://github.com/Crequency/KitX/actions/workflows/build-loaders.yml) [![Build Plugins](https://img.shields.io/github/actions/workflow/status/Crequency/KitX/build-plugins.yml?branch=main&style=for-the-badge&label=Build%20Plugins)](https://github.com/Crequency/KitX/actions/workflows/build-plugins.yml) </details> ##### 📧 Social [![Forks](https://img.shields.io/github/forks/Crequency/KitX?style=social)](https://github.com/Crequency/KitX/network/members) [![Stars](https://img.shields.io/github/stars/Crequency/KitX?style=social)](https://github.com/Crequency/KitX/stargazers) [![Watches](https://img.shields.io/github/watchers/Crequency/KitX?style=social)](https://github.com/Crequency/KitX/watchers) [![Discord](https://img.shields.io/discord/935095924785549372?style=social&label=Discord)](https://discord.gg/TGx3FYbUBb) --- ![ScreenShot of About View](https://raw.githubusercontent.com/Dynesshely/SmallStorge/master/Crequency-KitX/screenshot_about.png) <details> <summary>更多截图 More Screenshots</summary> ![ScreenShot of About View](https://raw.githubusercontent.com/Dynesshely/SmallStorge/master/Crequency-KitX/screenshot_plugins.png) ![ScreenShot of About View](https://raw.githubusercontent.com/Dynesshely/SmallStorge/master/Crequency-KitX/screenshot_devices.png) ![ScreenShot of About View](https://raw.githubusercontent.com/Dynesshely/SmallStorge/master/Crequency-KitX/screenshot_update.png) </details> --- <br> <p align="center"> 🌐 <a href="#-中文简介">中文简介</a> | <a href="#-english-introduction">English Introduction</a><br> </p> <br> <details> <summary>目录 | Toc</summary> - [文档总览 | Docs Preview](#文档总览-docs-preview) - [📃 中文简介](#中文简介) - [ℹ 应用简介](#ℹ-应用简介) - [🗃 应用架构](#应用架构) - [🪧 运行要求](#运行要求) - [KitX Dashboard (面向最终用户)](#kitx-dashboard-面向最终用户) - [系统支持](#系统支持) - [环境支持](#环境支持) - [桌面端支持](#桌面端支持) - [移动端支持](#移动端支持) - [⛏ 参与开发](#参与开发) - [📃 English Introduction](#english-introduction) - [ℹ App Description](#ℹ-app-description) - [🗃 Application Architecture](#application-architecture) - [🪧 Operating requirements](#operating-requirements) - [KitX Dashboard (For end users)](#kitx-dashboard-for-end-users) - [System Support](#system-support) - [Environmental support](#environmental-support) - [Desktop support](#desktop-support) - [Mobile support](#mobile-support) - [⛏ Participating in development](#participating-in-development) - [更新周期 Update Plan](#更新周期-update-plan) - [贡献者 Contributors](#贡献者-contributors) </details> --- # 文档总览 | Docs Preview <details> <summary>展开 | Expand</summary> | Languages | Docs | |-----------|----------------------------------------------------------------------------------| | zh-cn | [简体中文](https://github.com/Crequency/KitX-Docs/blob/main/zh-cn/README.md) | | zh-cnt | [繁體中文](https://github.com/Crequency/KitX-Docs/blob/main/zh-cnt/README.md) | | en-us | [English (US)](https://github.com/Crequency/KitX-Docs/blob/main/en-us/README.md) | | ja-jp | [日本語](https://github.com/Crequency/KitX-Docs/blob/main/ja-jp/README.md) | </details> --- # 📃 中文简介 <details> <summary>中文简介</summary> ## ℹ 应用简介 KitX 是一个开放, 共享, 免费的工具平台. 允许`开发者(第三方)`以任何`受支持的语言, 框架`为这个平台增添功能. `最终用户`可以从`市场`中自由下载免费插件或是购买付费插件来搭建符合自己`工作流`的`快捷自动化环境`. 基于 KitX 的`三层设计`, 使得`最终用户`可以轻易在`终端场景`中进行不同设备间的流转与同步, 也可以轻松进行`终端场景`中的`多设备协同`. 同样得益于优秀的`三层设计`, `第三方`可以使用自己熟悉的语言, 框架来工作, 同样可以很轻松将旧有的代码进行迁移, 甚至可以保持旧有逻辑的同时支持 KitX 平台. <details> <summary>注解</summary> > `开发者(第三方)` => 指为 KitX 平台开发插件, 新功能或是更新旧有代码使之支持 KitX 平台的开发者们. > `受支持的语言, 框架` => 取决于第一方开发者(即我们)为 KitX 开发了哪些 Loader (三层设计中的一层). > `最终用户` => 指在终端设备安装 KitX 来使用 KitX 平台以及社区功能并搭建符合自己工作流的用户. > `市场` => KitX 当然支持旁加载, 但市场是一个更加方便, 有组织, 安全的插件获取平台(KitX Marketplace). > `工作流` => KitX 所有的插件支持管道消息, 可以在插件间进行任务流动, 以达到插件间协作的目的. > `快捷自动化环境` => KitX 的`任务计划`模块允许用户设定触发条件, 触发钩子等使工作流自动化. > `三层设计` => 见下方`应用架构`部分. > `终端场景` => 最终用户具体使用 KitX 平台的具体场景, 某些语境下指最终用户的局域网环境. > `多设备协同` => KitX Dashboard (三层设计中的一层) 目前已支持的系统参见下方`运行要求`部分. > `第三方` => 同上`开发者(第三方)`. </details> ## 🗃 应用架构 <details> <summary>展开</summary> KitX 采用了三层设计 `第三方` 开发 =--> `Plugins` <--= 互操作 =--> `Loaders` <--= Socket 通信 =--> `Dashboard` <--= UI 操作 =--> 用户 第三方负责参照文档实现 Plugin 应该实现的接口, 具体如何实现每种语言不同框架以及选择实现的 Loaders 都不同. 每种语言或者说框架都会有一个对应的 Loader 来实现与 Plugin 的互操作, 而 Loader 与 Dashboard 通过 Socket 通信, 汇报情况以及传递命令. 而这三层设计中的每一层都是可以替换的, 任何一层都可以自定义或是采用第三方的解决方案. 如此一来, 局域网中的其它设备上的插件也可以连接到当前设备, 因此可以实现局域网互联. </details> ## 🪧 运行要求 <details> <summary>展开</summary> ### KitX Dashboard (面向最终用户) #### 系统支持 桌面端支持: Windows (10, 11) x64 arm, Linux x64 arm, MacOS x64 arm 移动端支持: Android (5+) arm, iOS (12+) arm #### 环境支持 ##### 桌面端支持 全平台支持 .NET AOT 编译, 进一步增强运行速度, 但是缺少测试, 稳定性没有保证 Windows: 可选 带环境 与 不带环境 的便携版, 以及 在线安装包 和 离线安装包. Linux: 可选 带环境 的便携版, 也可以在 snap 中在线安装, 或者使用 .deb .rpm 包进行安装. MacOS: 可选 带环境 的便携版, 也可以在 App Store 中在线安装. ##### 移动端支持 Android: 可选 .apk 直接安装, 以及 Crequency Hub 中在线安装. iOS: 可选 App Store 中在线安装. </details> ## ⛏ 参与开发 <details> <summary>展开</summary> 1. 获取源代码 ```shell git clone [email protected]:Crequency/KitX.git cd KitX ``` 2. 选择您要开发的领域 - Windows ```shell ToolKits/start.ps1 <type> ``` - Linux/MacOS ```shell chmod +x ToolKits/start.sh ToolKits/start.sh <type> ``` `<type>` 为您要开发的领域, 可选值为 `dashboard`, `mobile`, `loader`, `plugin`, `installer` 此脚本会帮助您获取该领域子模块的源代码, 包含其依赖的子模块 如果您要获取全部子模块的源代码, 请执行以下命令: ```shell git submodule update --init --recursive ``` </details> </details> --- # 📃 English Introduction <details> <summary>English Introduction</summary> ## ℹ App Description KitX is an open, shared, free tool platform. Allows `developers (3rd party)` to add functionality to the platform in any `supported languages, frameworks`. `End users` can freely download from `market` for free Plug-ins or purchase paid plug-ins to build a `quick automation environment` that conforms to your `workflow`. Based on the `three-layer design` of KitX, `end users` can easily transfer and exchange between different devices in the `terminal scene` Synchronization, you can also easily perform `multi-device collaboration` in `terminal scene`. Also thanks to the excellent `three-layer design`, `third parties` can use their familiar languages and frameworks to work, and can also easily integrate The old code can be migrated, and even the KitX platform can be supported while maintaining the old logic. <details> <summary>Annotation</summary> > `Developer (Third Party)` => Refers to developers who develop plugins for the KitX platform, new functions or update old code to support the KitX platform. > `Supported Languages, Frameworks` => Depends on what Loaders (one of the three-tier design) the first-party developer (i.e. us) has developed for KitX. > `End user` => Refers to installing KitX on the terminal device to use the KitX platform and community functions and build users who conform to their own workflow. > `Market` => KitX certainly supports sideloading, but the Marketplace is a much more convenient, organized, and secure platform for getting plugins (KitX Marketplace). > `Workflow` => All KitX plugins support pipeline messages, and tasks can flow between plugins to achieve the purpose of collaboration between plugins. > `Quick Automation Environment` => KitX's `Task Scheduler` module allows users to set trigger conditions, trigger hooks, etc. to automate workflows. > `Three-Tier Design` => See the `Application Architecture` section below. > `Terminal scene` => The specific scene of the end user using the KitX platform, in some contexts it refers to the end user's local area network environment. > `Multi-device collaboration` => KitX Dashboard (one layer of the three-tier design) Currently supported systems see the `Running Requirements` section below. > `Third Party` => Same as above `Developer (Third Party)`. </details> ## 🗃 Application Architecture <details> <summary>Expand</summary> KitX uses a three-layer design `Third Party` Development =--> `Plugins` <--= Interop =--> `Loaders` <--= Socket Communication =--> `Dashboard` <--= UI Operation =--> User The third party is responsible for referring to the documentation to implement the interface that the Plugin should implement, how to implement the different frameworks of each language and the Loaders chosen to implement are different. Each language or framework will have a corresponding Loader to achieve interoperability with Plugin, and Loader communicates with Dashboard through Socket, reporting the situation and passing commands. Each of these three-layer designs can be replaced, and any layer can be customized or a third-party solution can be used. In this way, plug-ins on other devices in the LAN can also be connected to the current device, so LAN interconnection can be achieved. </details> ## 🪧 Operating requirements <details> <summary>Expand</summary> ### KitX Dashboard (For end users) #### System Support Desktop support: Windows (10, 11) x64 arm, Linux x64 arm, MacOS x64 arm Mobile support: Android (5+) arm, iOS (12+) arm #### Environmental support ##### Desktop support Any platform supports .NET AOT compilation, which further enhances the running speed, but lacks testing and stability is not guaranteed. Windows: Optional with environment, and portable version without environment, as well as online installation package and offline installation package. Linux: Optional portable version with environment, can also be installed online in snap, or installed using .deb .rpm package. MacOS: Optional portable version with environment, can also be installed online in the App Store. ##### Mobile support Android: Optional .apk direct installation, and online installation in Crequency Hub. iOS: Optional online installation from the App Store. </details> ## ⛏ Participating in development <details> <summary>Expand</summary> 1. Get source code ```shell git clone [email protected]:Crequency/KitX.git cd KitX ``` 2. Select your development area - Windows ```shell ToolKits/start.ps1 <type> ``` - Linux/MacOS ```shell chmod +x ToolKits/start.sh ToolKits/start.sh <type> ``` `<type>` is area you want to develop, you can choose `dashboard`, `mobile`, `loader`, `plugin`, `installer` This script help you get source code of this area, include its dependencies. If you want to get source code of all submodules, please execute following command: ```shell git submodule update --init --recursive ``` </details> </details> --- # 更新周期 Update Plan <details> <summary>旧版 Old versions</summary> | Version | Info | Code | Support | Term | Require | Runs on | |-------------------------------------------------------------------------|---------|------------|---------|------|--------------------|---------| | Beta_10016 | Beta | Beta1 | :x: | 0 | .Net Framework 4.8 | Windows | | Beta_10213 | Beta | Beta2 | :x: | 0 | .Net Framework 4.8 | Windows | | Beta_10235 | Beta | Beta3 | :x: | 0 | .Net Framework 4.8 | Windows | | [v1.0.0](https://github.com/Crequency/KitX/releases/tag/v1.0.0) | Release | Hello | :x: | 0 | .Net Framework 4.8 | Windows | | [v1.0.4](https://github.com/Crequency/KitX/releases/tag/v1.0.4) | Release | WoW | :x: | 0 | .Net Framework 4.8 | Windows | | [v1.0.5](https://github.com/Crequency/KitX/releases/tag/v1.0.5) | Release | Nice Try | :x: | 0 | .Net Framework 4.8 | Windows | | [v1.1.0](https://github.com/Crequency/KitX/releases/tag/v1.1.0) | Release | Apple | :x: | 0 | .Net Framework 4.8 | Windows | | [v1.1.1](https://github.com/Crequency/KitX/releases/tag/v1.1.1-v1.1.5) | Release | Banana | :x: | 0 | .Net Framework 4.8 | Windows | | [v1.1.2](https://github.com/Crequency/KitX/releases/tag/v1.1.1-v1.1.5) | Release | Cabbage | :x: | 0 | .Net Framework 4.8 | Windows | | [v1.1.4](https://github.com/Crequency/KitX/releases/tag/v1.1.1-v1.1.5) | Release | Durin | :x: | 0 | .Net Framework 4.8 | Windows | | [v1.1.5](https://github.com/Crequency/KitX/releases/tag/v1.1.1-v1.1.5) | Release | Grape | :x: | 0 | .Net Framework 4.8 | Windows | | [v1.2.0](https://github.com/Crequency/KitX/releases/tag/v1.2.0) | Release | Herring | :x: | 0 | .Net Framework 4.8 | Windows | | [v1.2.1](https://github.com/Crequency/KitX/releases/tag/v1.2.1) | Release | Wonderful | :x: | 0 | .Net Framework 4.8 | Windows | | [v1.2.2](https://github.com/Crequency/KitX/releases/tag/v1.2.2) | Release | Abandon | :x: | 0 | .Net Framework 4.8 | Windows | | [v1.2.4](https://github.com/Crequency/KitX/releases/tag/v1.2.4-preview) | Preview | Panda | :x: | 0 | .Net Framework 4.8 | Windows | | [v1.2.4](https://github.com/Crequency/KitX/releases/tag/v1.2.4) | Release | Panda | :x: | 0 | .Net Framework 4.8 | Windows | | [v1.2.5](https://github.com/Crequency/KitX/releases/tag/v1.2.5) | Release | Orange | :x: | 0 | .Net Framework 4.8 | Windows | | [v1.2.6](https://github.com/Crequency/KitX/releases/tag/v1.2.6) | Release | Muik | :x: | 0 | .Net Framework 4.8 | Windows | | [v1.2.7](https://github.com/Crequency/KitX/releases/tag/v1.2.7) | Release | Cookie | :x: | 0 | .Net Framework 4.8 | Windows | | [v2.0.0](https://github.com/Crequency/KitX/releases/tag/v2.0.0) | Release | Sea | :x: | 0 | .Net Framework 4.8 | Windows | | [v2.0.1](https://github.com/Crequency/KitX/releases/tag/v2.0.1) | Release | Ocean | :x: | 0 | .Net Framework 4.8 | Windows | | [v2.0.2](https://github.com/Crequency/KitX/releases/tag/v2.0.2) | Release | Calculator | :x: | 0 | .Net Framework 4.8 | Windows | | [v2.0.3](https://github.com/Crequency/KitX/releases/tag/v2.0.3) | Release | Wood | :x: | 0 | .Net Framework 4.8 | Windows | | [v2.0.4](https://github.com/Crequency/KitX/releases/tag/v2.0.4) | Release | Computer | :x: | 0 | .Net Framework 4.8 | Windows | | [v2.0.5](https://github.com/Crequency/KitX/releases/tag/v2.0.5-preview) | Preview | Laptop | :x: | 0 | .Net Framework 4.8 | Windows | </details> | Version | Info | Code | Support | Term | Require | Runs on | |-----------------------------------------------------------------------------------|---------|-----------|--------------------|--------------------|------------------------------|------------------------------------------------------------| | [v3.0.6187.47831](https://github.com/Crequency/KitX/releases/tag/v3.0.6187.47831) | Preview | Fly | :white_check_mark: | 2022.04 -> 2023.04 | .Net 6 (Also Self-Contained) | Windows, Linux, MacOS, Android, iOS, Browser, Raspberry Pi | | [v3.22.04.6230](https://github.com/Crequency/KitX/releases/tag/v3.22.04.6230) | Preview | Telegram | :white_check_mark: | 2022.04 -> 2023.04 | .Net 6 (Also Self-Contained) | Windows, Linux, MacOS, Android, iOS, Browser, Raspberry Pi | | [v3.22.04.6235](https://github.com/Crequency/KitX/releases/tag/v3.22.04.6235) | Release | Break | :white_check_mark: | 2022.04 -> 2023.04 | .Net 6 (Also Self-Contained) | Windows, Linux, MacOS, Android, iOS, Browser, Raspberry Pi | | [v3.22.04.6287](https://github.com/Crequency/KitX/releases/tag/v3.22.04.6287) | Release | Evolution | :white_check_mark: | 2022.04 -> 2023.04 | .Net 6 (Also Self-Contained) | Windows, Linux, MacOS, Android, iOS, Browser, Raspberry Pi | | v3.22.10.x | Release | Hi | coding | 2022.10 -> 2023.04 | .Net 6 (Also Self-Contained) | Windows, Linux, MacOS, Android, iOS, Browser, Raspberry Pi | | v3.23.04.x | Release | ToYou | coding | 2023.04 -> 2024.04 | .Net 6 (Also Self-Contained) | Windows, Linux, MacOS, Android, iOS, Browser, Raspberry Pi | # 贡献者 Contributors <a href = "https://github.com/Crequency/KitX/graphs/contributors"> <img src = "https://contrib.rocks/image?repo=Crequency/KitX"/> </a>
589
This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).
<h2 align="center"><code>The Practical Linux Hardening Guide</code></h2> <br> <p align="center"> <a href="https://github.com/trimstray/the-practical-linux-hardening-guide"> <img src="https://github.com/trimstray/the-practical-linux-hardening-guide/blob/master/static/img/main_preview.jpg" alt="Master"> </a> </p> <br> <p align="center">"<i>Did you know all your doors were locked?</i>" - Riddick (The Chronicles of Riddick)</p> <br> <p align="center"> <a href="https://github.com/trimstray/the-practical-linux-hardening-guide/pulls"> <img src="https://img.shields.io/badge/PRs-welcome-brightgreen.svg?longCache=true" alt="Pull Requests"> </a> <a href="LICENSE.md"> <img src="https://img.shields.io/badge/License-MIT-lightgrey.svg?longCache=true" alt="MIT License"> </a> </p> <p align="center"> <a href="https://twitter.com/trimstray" target="_blank"> <img src="https://img.shields.io/twitter/follow/trimstray.svg?logo=twitter"> </a> </p> <div align="center"> <sub>Created by <a href="https://twitter.com/trimstray">trimstray</a> and <a href="https://github.com/trimstray/the-practical-linux-hardening-guide/graphs/contributors">contributors</a> </div> <br> **** # Table of Contents - **[Introduction](#introduction)** - [Prologue](#prologue) - [The Importance of Hardening Linux](#the-importance-of-hardening-linux) - [How to Harden Linux](#how-to-harden-linux) - [Which Distribution Should be Used](#which-distribution-should-be-used) - [How to Read This Guide](#how-to-read-this-guide) - [Okay. Let's start, 3, 2, 1... STOP!](#okay-lets-start-3-2-1-stop) - **[Policy Compliance](#policy-compliance)** - [Center of Internet Security (CIS)](#center-of-internet-security-cis) - [Security Technical Implementation Guide (STIG)](#security-technical-implementation-guide-stig) - [National Institute of Standards and Technology (NIST)](#national-institute-of-standards-and-technology-nist) - [Payment Card Industry Data Security Standard (PCI-DSS)](#payment-card-industry-data-security-standard-pci-dss) - **[Security Content Automation Protocol (SCAP)](#security-content-automation-protocol-scap)** - [SCAP Security Guide](#scap-security-guide) - [OpenSCAP Base](#openscap-base) - [SCAP Workbench](#scap-workbench) - **[DevSec Hardening Framework](#devsec-hardening-framework)** - **[Contributing & Support](#contributing--support)** - **[License](#license)** ## Introduction ### Prologue **[The Practical Linux Hardening Guide](https://trimstray.github.io/the-practical-linux-hardening-guide/)** provides a high-level overview of hardening GNU/Linux systems. It is not an official standard or handbook but it _touches_ and _uses_ industry standards. This guide also provides you with _practical step-by-step instructions_ for building your own hardened systems and services. One of the main goals is to create a single document covering _internal_ and _external_ threats. A few rules for this project: - useful, simple, and not tiring - include a lot of security tips from the C2S/CIS - contains also non-related rules with C2S/CIS - based on a minimal [RHEL7](https://www.redhat.com/en/technologies/linux-platforms/enterprise-linux) and [CentOS 7](https://www.centos.org/) installations - it's not exhaustive about Linux hardening - some hardening rules/descriptions can be done better - you can think of it as a checklist The Practical Linux Hardening Guide use following [OpenSCAP](https://www.open-scap.org/) configurations: - [U.S. Government Commercial Cloud Services (C2S) baseline inspired by CIS v2.1.1](https://static.open-scap.org/ssg-guides/ssg-rhel7-guide-C2S.html) > C2S for Red Hat Enterprise Linux 7 v0.1.43. - [Red Hat Enterprise Linux 7 Security Technical Implementation Guide (STIG)](https://www.stigviewer.com/stig/red_hat_enterprise_linux_7/) > The requirements are derived from the (NIST) 800-53 and related documents. Please also remember: > This guide contains my comments that may differ from certain industry principles. If you are not sure what to do please see **[Policy Compliance](#policy-compliance)**. ### The Importance of Hardening Linux Simply speaking, hardening is the process of making a system more secure. Out of the box, Linux servers don’t come "hardened" (e.g. with the attack surface minimized). It’s up to you to prepare for each eventuality and set up systems to notify you of any suspicious activity in the future. The process of hardening servers involves both IT ops. and security teams and require changes to the default configuration according to industry benchmarks. Also for me, hardening is the fine art of doing the right things, even if they don't always look to have a big impact. It's always a balance between ease of use and protection. You need to harden your system to protect your assets as much as possible. Why is it important? Please read a great, short article that [explains the hardening process](https://linux-audit.com/linux-server-hardening-most-important-steps-to-secure-systems/) step by step by [Michael Boelen](https://michaelboelen.com/). ### How to Harden Linux In my opinion, you should drop all non-industry policies, articles, manuals, and others especially on production environments and standalone home servers. These lists exist to give a false sense of security and aren't based on authority standards. <p align="center"> <a href="https://github.com/trimstray/the-practical-linux-hardening-guide"> <img src="https://github.com/trimstray/the-practical-linux-hardening-guide/blob/master/static/img/meme_01.png" alt="Master"> </a> </p> There are a lot of great GNU/Linux hardening policies available to provide safer operating systems compatible with security protocols. For me, CIS and the STIGs compliances are about the best prescriptive guides - but of course you can choose a different one (e.g. PCI-DSS, DISA). > Most of all you should use [Security Benchmarks/Policies](#policy-compliance) which describe consensus best practices for the secure configuration of target systems. Configuring your systems in compliance eliminates the most common vulnerabilities. For example, CIS has been shown to eliminate 80-95% of known vulnerabilities. On the other hand, these standards are complicated checklists (often for newbies, difficult to implement). In my opinion, ideally, real world implementation is automated via something like OpenSCAP. > You should use a rational approach because more is not better. Each environment is different, so even though security rules should all work in theory, sometimes things will not work as expected. Hardening is not a simple process. Here are general rules following common best practices: - never use root account for anything that does not require it - only `sudo` individual commands - never set a server to run as root (except for initialization time) and ensure that it exits all unnecessary privileges before accepting requests - secure your firewall the best you can and forbid all unnecessary access - do not install unnecessary or unstable software ### Which Distribution Should be Used This guide is tested on **Red Hat Enterprise Linux 7** and **CentOS 7** distributions because these are: - free (CentOS) and open source - enterprise-class - stable and reliable - with great community support - built on coherent snapshots of old packages Both distributions allow the use of **[certified tools](#scap-security-guide)** which can parse and evaluate each component of the SCAP standard. If you use another distribution - no problem, this guide is also for you. ### How to Read This Guide Here is the structure of the chapters: ``` Chapter - e.g. Core Layer | |-- Subsection - e.g. Maintaining Software | \ | |-- Rationale | |-- Solution (+ policies) | |-- Comments | |-- Useful resources | |-- Subsection - e.g. Accounts and Access | \ | |-- Rationale | |-- Solution (+ policies) | |-- Comments | |-- Useful resources ``` Levels of understanding: - _Chapter_ and _subsection_ offers a general overview - _Rationale_ tells you the reasoning behind the changes - _Solution_ and _policies_ are always compliant with the standard and on this basis, make changes - _Comments_ helps you figure out what you can change or add to the _solution_ - _Useful resources_ provide deeper understanding If you do not have the time to read hundreds of articles (just like me) this multipurpose handbook may be useful. This handbook does not get into all aspects of GNU/Linux hardening. I tried to put external resources in many places in this handbook in order to dispel any suspicion that may exist. I did my best to make this guid a single and consistent (but now I know that is really hard). It's organized in an order that makes logical sense to me. Do not treat this hardening guide as revealed knowledge. You should take a scientific approach when reading this document. If you have any doubts and disagree with me, please point out my mistakes. You should to discover cause and effect relationships by asking questions, carefully gathering and examining the evidence, and seeing if all the available information can be combined in to a logical answer. I create this handbook for one more reason. Rather than starting from scratch in, I putting together a plan for answering your questions to help you find the best way to do things and ensure that you don't repeat my mistakes from the past. So, what's most important: - ask a questions about something that you observe - do background research - do tests with an experiments - analyze and draw conclusions - communicate results (for us!) ### Okay. Let's start, 3, 2, 1... STOP! Making major changes to your systems can be risky. The most important rule of system hardening that reasonable admins follow is: > **`A production environment is the real instance of the app so make your changes on the dev/test!`** The second most important rule is: > **`Don’t do anything that will affect the availability of the service or your system.`** The third rule is: > **`Make backups of the entire virtual machine and important components.`** And the last rule is: > **`Think about what you actually do with your server.`** ## Policy Compliance ### Center of Internet Security (CIS) The Center of Internet Security (CIS) is a nonprofit organization focused on improving public and private sector cybersecurity readiness and response. Please see **[CIS Benchmarks](https://www.cisecurity.org/cis-benchmarks/)**. ### Security Technical Implementation Guide (STIG) A Security Technical Implementation Guide (STIG) is a cybersecurity methodology for standardizing security protocols within networks, servers, computers, and logical designs to enhance overall security. Please see **[Stigviewer](https://www.stigviewer.com/stigs)** to explore all stigs. ### National Institute of Standards and Technology (NIST) The National Institute of Standards and Technology (NIST) is a physical sciences laboratory and a non-regulatory agency of the United States Department of Commerce. Please see **[National Checklist Program (NCP)](https://nvd.nist.gov/ncp/repository)**. ### Payment Card Industry Data Security Standard (PCI-DSS) Payment Card Industry Data Security Standard (PCI-DSS) compliance is a requirement for any business that stores, processes, or transmits cardholder data. In accordance with PCI-DSS requirements, establish a formal policy and supporting procedures for developing configuration standards for system components that are consistent with industry-accepted hardening standards like: - Center of Internet Security (CIS) - International Organization for Standardization (ISO) - SysAdmin, Audit, Network, and Security (SANS) Institute - National Institute of Standards and Technology (NIST) ## Security Content Automation Protocol (SCAP) Security Content Automation Protocol (SCAP) provides a mechanism to check configurations, vulnerability management and evaluate policy compliance for a variety of systems. One of the most popular implementations of SCAP is OpenSCAP and it is very helpful for vulnerability assessment and as a hardening helper. OpenSCAP can easily handle the SCAP standards and generate neat, HTML-based reports. Please see **[SCAP Security Policies](https://www.open-scap.org/security-policies/)**, **[OpenSCAP User Manual](https://static.open-scap.org/openscap-1.2/oscap_user_manual.html)**, and **[OpenSCAP Static](https://static.open-scap.org/)**. ### SCAP Security Guide The auditing system settings with SCAP Security Guide project contains guidance for settings for Red Hat/CentOS and it's validated by NIST. You should inspect the security content of your system with `oscap info` module: ```bash # For RHEL: oscap info /usr/share/xml/scap/ssg/content/ssg-rhel7-ds.xml # For CentOS: oscap info /usr/share/xml/scap/ssg/content/ssg-centos7-ds.xml ``` ### OpenSCAP Base The OpenSCAP scanner will only provide meaningful results if the content you want it to process is correct and up to date. The `oscap` tool scans your system, validates security compliance content, and generates reports and guides based on these scans. Official [OpenSCAP Base](https://www.open-scap.org/tools/openscap-base/) documentation says: > _The command-line tool, called `oscap`, offers a multi-purpose tool designed to format content into documents or scan the system based on this content. Whether you want to evaluate DISA STIGs, NIST‘s USGCB, or Red Hat’s Security Response Team’s content, all are supported by OpenSCAP._ Before use, please read **[Using OSCAP](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/security_guide/sect-using_oscap)** documentation. ```bash # Installation: yum install openscap-scanner # Make a RHEL7 machine e.g. PCI-DSS compliant: oscap xccdf eval --report report.html --profile xccdf_org.ssgproject.content_profile_pci-dss /usr/share/xml/scap/ssg/content/ssg-rhel7-ds.xml # Make a CentOS machine e.g. PCI-DSS compliant: oscap xccdf eval --report report.html --profile xccdf_org.ssgproject.content_profile_pci-dss /usr/share/xml/scap/ssg/content/ssg-centos7-ds.xml ``` ### SCAP Workbench SCAP Workbench is a utility that offers an easy way to perform common `oscap` tasks on local or remote systems. Before use, please read **[Using SCAP Workbench](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/security_guide/sect-using_scap_workbench)** documentation. ```bash # Installation: yum install scap-security-guide scap-workbench ``` ## DevSec Hardening Framework > _Security + DevOps: Automatic Server Hardening._ This project covers some of the things in this guide which can be automated (e.g. setting of grub password or enforcing the permissions of the common directories). Its a good start if you want to make changes and see how it works from the level of automation tools. Project: **[DevSec Hardening Framework](https://dev-sec.io)** and :octocat: GitHub repository: **[dev-sec](https://github.com/dev-sec/)**. Thanks [@artem-sidorenko](https://github.com/artem-sidorenko)! ## Contributing & Support If you find something which doesn't make sense, or something doesn't seem right, please make a pull request and please add valid and well-reasoned explanations about your changes or comments. Before adding a pull request, please see the **[contributing guidelines](.github/CONTRIBUTING.md)**. If this project is useful and important for you or if you really like _The Practical Linux Hardening Guide_, you can bring **positive energy** by giving some **good words** or **supporting this project**. Thank you! ## License For license information, please see [LICENSE](https://github.com/trimstray/the-practical-linux-hardening-guide/blob/master/LICENSE.md). --- <h4><p align="center">:beginner: To start please go to the <a href="https://github.com/trimstray/the-practical-linux-hardening-guide/wiki">Wiki</a>.</p></h4>
590
This is the official repository for the back end of the Andronix app 🚀. Here you can know all the scripts you're installing 😎
<p align="center"> <img src="https://raw.githubusercontent.com/imprakharshukla/Readme-Resources/master/images/app_logo_verticle.png"> </p> <p align="center"> <a href="https://forum.andronix.app"><img src="https://img.shields.io/badge/Questions%3F-Join%20our%20forum-blue?style=flat-square"></a> <a href="https://chat.andronix.app"><img src="https://img.shields.io/badge/Join%20us%20on-Discord-blue?style=flat-square&logo=discord"></a> <a href="https://docs.andronix.app"><img src="https://img.shields.io/badge/Documentation-Read%20the%20docs-blue?style=flat-square"></a> <a href="https://play.google.com/store/apps/details?id=studio.com.techriz.andronix"><img src="https://img.shields.io/badge/Download-Google%20Play-orange?style=flat-square&logo=google-play"></a> <a href="https://github.com/AndronixApp/AndronixOrigin/releases"><img src="https://img.shields.io/badge/Download-GitHub%20Releases-orange?style=flat-square&logo=github"></a> <br> <h1 align="center">Install Linux on your Android 🔥</h1> <br> <p align="center"> <img src="https://raw.githubusercontent.com/imprakharshukla/Readme-Resources/master/images/app_dashboard_dark.png" width="250"> <img src="https://raw.githubusercontent.com/imprakharshukla/Readme-Resources/master/images/app_dashboard_light.png" width="250"> </p> # How does this work? Andronix is simple inside the hood (well not really, but most of it is simple to understand). Andronix uses **PRoot** to run your favourite Linux distribution on your Android devices. ### What exactly is PRoot? As stated in the official website of PRoot > PRoot is a user-space implementation of **chroot, mount --bind, and binfmt_misc**. This means that users don't need any privileges or setup to do things like using an arbitrary directory as the new root file system, making files accessible somewhere else in the file system hierarchy, or executing programs built for another CPU architecture transparently through QEMU user-mode. or in easier words, the benefits of enabling PRoot include running Linux operating systems in a Termux [chroot](https://en.m.wikipedia.org/wiki/Chroot) on an Android smartphone, tablet and Chromebook. We use **Termux** to provide the command line and the packages that are especially compiled for Termux implemented inside Andronix. # Get started now 🚀 Hey! 😊, let's introduce to the basics of the documentations around here. This is the doc-hub for Andronix, from development to installations, you can find almost everything here. [Read the documentation here](https://docs.andronix.app) ### Introduction Docs 📒 Here you can find all the information necessary to understand Andronix better. Diving deep in **PRoot**, **app structure** and **Shell scripts** that actually make you understand about what's actually happening. ### Installation Docs 📱 All and everything for you to get up and running with your favourite Linux Distribution. If you're seeking for help installing a distribution, this is place you need to be. [Read the installation docs](https://docs.andronix.app/installations/non-modded-os) ### Apps Installation 💻 Here are the installation procedures of few most popular apps like **VS Code, IntelliJ Idea, GIMP, Blender** etc. Easy to follow and quick! [Read the app installation docs](https://docs.andronix.app/software/browsers) ### Development Docs 👨‍💻 Looking into contributing and developing things around or for Andronix? Here you can find all the required documentation regarding **termux-packages, app, scripts** or anything to development. *We are working on it 👷‍♂️* # What can you do with Andronix? Pretty much anything you like to do. You're just limited by the lack of the full Linux kernel, the SELinux policies of your Android versions, your CPU architecture and your device's hardware. We have users replacing their entire laptops and computer with Andronix. We are looking for something that can support web-browsing, coding or anything else that is not really taxing on your phone's hardware then you can use Andronix without any issues. You don't have to worry about multi-booting your system which means you can have all the Un-Modded and Modded OS installed at once. **12 OS at once given that you have the storage for it.** Install as many as you like, uninstall them when you're done. [Here's what you can't do on Andronix systems](https://docs.andronix.app/) ## Is it free? Yes! ⚡ Andronix is completely **Ad-free** and all the Un-modded distros and **free to use as much as you want**. On the other hand [Modded OS](https://docs.andronix.app/installations/modded-os) are paid but they are very economical considering it is a **lifetime purchase with unlimited installs on unlimited devices.** (We spend hours optimizing and packing it, and these are very large files which we need to serve requiring a massive amount of bandwidth, which costs money). You can also get **Andronix Premium** which is another way to support the developers. You also get a few perks including online sync with Andronix Commands and a web-app to access it from any device you want. # What OS are supported? Andronix currently supports 8 Un-Modded OS and 4 Modded OS at the moment. ### Un-Modded OS 1. Ubuntu 2. Debian 3. Manjaro 4. Fedora 5. Kali 6. Void 7. Alpine 8. Arch ### Desktop Environment 1. LXDE 2. LXQT 3. XFCE ### Windows Managers 1. Awesome 2. Openbox 3. i3 ### Modded OS 1. Ubuntu XFCE 2. Debian XFCE 3. Ubuntu KDE 4. Manjaro XFCE # Are we open-source? 📖🔓 Yes but no. Andronix is partially open-source. All the free distro tar files and the shell scripts are available on our [GitHub repository](https://github.com/andronixapp). While all the paid things, like the actual Android app and all the files concerning Andronix Modded OS are close-source for obvious reasons. That doesn't mean that we don't love open-source, **we** 💘 **open-source**. In fact if you're a developer or a maintainer of an open-source project, **we will be more than happy to provide you everything for free** for life. Just get-in touch with us and complete the process of verification😊. <br> # Here are a few screenshots 🤘 <br> <p align="center"> <img src="https://raw.githubusercontent.com/imprakharshukla/Readme-Resources/master/example/example1.png" width="400" > <img src="https://raw.githubusercontent.com/imprakharshukla/Readme-Resources/master/example/example2.png" width="400" > <img src="https://raw.githubusercontent.com/imprakharshukla/Readme-Resources/master/example/example3.png" width="400" > <img src="https://raw.githubusercontent.com/imprakharshukla/Readme-Resources/master/example/example4.png" width="400" > </p>
591
Performance monitoring and benchmarking suite
-------------------------------------------------------------------------------- Introduction -------------------------------------------------------------------------------- Likwid is a simple to install and use toolsuite of command line applications and a library for performance oriented programmers. It works for Intel, AMD, ARMv8 and POWER9 processors on the Linux operating system. There is additional support for Nvidia GPUs. There is support for ARMv7 and POWER8 but there is currently no test machine in our hands to test them properly. [LIKWID Playlist (YouTube)](https://www.youtube.com/playlist?list=PLxVedhmuwLq2CqJpAABDMbZG8Whi7pKsk) [![Build Status](https://gitos.rrze.fau.de/ub55yzis/likwid/badges/master/pipeline.svg)](https://gitos.rrze.fau.de/ub55yzis/likwid/-/commits/master) [![General LIKWID DOI](https://zenodo.org/badge/DOI/10.5281/zenodo.4275676.svg)](https://doi.org/10.5281/zenodo.4275676) It consists of: - likwid-topology: print thread, cache and NUMA topology - likwid-perfctr: configure and read out hardware performance counters on Intel, AMD, ARM and POWER processors and Nvidia GPUs - likwid-powermeter: read out RAPL Energy information and get info about Turbo mode steps - likwid-pin: pin your threaded application (pthread, Intel and gcc OpenMP to dedicated processors) - likwid-bench: Micro benchmarking platform for CPU architectures - likwid-features: Print and manipulate cpu features like hardware prefetchers (x86 only) - likwid-genTopoCfg: Dumps topology information to a file - likwid-mpirun: Wrapper to start MPI and Hybrid MPI/OpenMP applications (Supports Intel MPI, OpenMPI, MPICH and SLURM) - likwid-perfscope: Frontend to the timeline mode of likwid-perfctr, plots live graphs of performance metrics using gnuplot - likwid-memsweeper: Sweep memory of NUMA domains and evict cachelines from the last level cache - likwid-setFrequencies: Tool to control the CPU and Uncore frequencies (x86 only) For further information please take a look at the [Wiki](https://github.com/RRZE-HPC/likwid/wiki) or contact us via Matrix chat [LIKWID General](https://matrix.to/#/#likwid:matrix.org?via=matrix.org). -------------------------------------------------------------------------------- Supported architectures -------------------------------------------------------------------------------- Intel - Intel Atom - Intel Pentium M - Intel Core2 - Intel Nehalem - Intel NehalemEX - Intel Westmere - Intel WestmereEX - Intel Xeon Phi (KNC) - Intel Silvermont & Airmont - Intel Goldmont - Intel SandyBridge - Intel SandyBridge EP/EN - Intel IvyBridge - Intel IvyBridge EP/EN/EX - Intel Xeon Phi (KNL, KNM) - Intel Haswell - Intel Haswell EP/EN/EX - Intel Broadwell - Intel Broadwell D - Intel Broadwell EP - Intel Skylake - Intel Kabylake - Intel Coffeelake - Intel Skylake SP - Intel Cascadelake SP - Intel Icelake - Intel Icelake SP - Intel Tigerlake (experimental) AMD - AMD K8 - AMD K10 - AMD Interlagos - AMD Kabini - AMD Zen - AMD Zen2 - AMD Zen3 (limited) ARM (experimental) - ARMv7 - ARMv8 - Special support for Marvell Thunder X2 - Fujitsu A64FX - ARM Neoverse N1 (AWS Graviton 2) POWER (experimental) - IBM POWER8 - IBM POWER9 Nvidia GPUs (experimental) -------------------------------------------------------------------------------- Download, Build and Install -------------------------------------------------------------------------------- You can get the releases of LIKWID at: http://ftp.fau.de/pub/likwid/ For build and installation hints see INSTALL file or check the build instructions page in the wiki https://github.com/RRZE-HPC/likwid/wiki/Build For quick install: ```bash VERSION=stable wget http://ftp.fau.de/pub/likwid/likwid-$VERSION.tar.gz tar -xaf likwid-$VERSION.tar.gz cd likwid-* vi config.mk # configure build, e.g. change installation prefix and architecture flags make sudo make install # sudo required to install the access daemon with proper permissions ``` For ARM builds, the `COMPILER` flag in `config.mk` needs to changed to `GCCARMv8` or `ARMCLANG` (experimental). For POWER builds, the `COMPILER` flag in `config.mk` needs to changed to `GCCPOWER` or `XLC` (experimental). -------------------------------------------------------------------------------- Documentation -------------------------------------------------------------------------------- For a detailed documentation on the usage of the tools have a look at the html documentation build with doxygen. Call `make docs` or after installation, look at the man pages. There is also a wiki at the github page: https://github.com/rrze-likwid/likwid/wiki If you have problems or suggestions please let me know on the likwid mailing list: http://groups.google.com/group/likwid-users or if it is bug, add an issue at: https://github.com/rrze-likwid/likwid/issues You can also chat with us through Matrix: - General chat: https://matrix.to/#/#likwid:matrix.org?via=matrix.org - Development chat: https://matrix.to/#/#likwid-dev:matrix.org?via=matrix.org -------------------------------------------------------------------------------- Extras -------------------------------------------------------------------------------- - If you want to use the Marker API with Java, you can find the Java module here: https://github.com/jacek-lewandowski/likwid-java-api - For Python you can find an interface to the LIKWID API here: https://github.com/RRZE-HPC/pylikwid or `pip install pylikwid` - A Julia interface to LIKWID is provided by the [Paderborn Center for Parallel Computing (PC²)](https://pc2.uni-paderborn.de) and the [MIT JuliaLab](https://julia.mit.edu/): https://github.com/JuliaPerf/LIKWID.jl or `] add LIKWID` -------------------------------------------------------------------------------- Survey -------------------------------------------------------------------------------- We opened a survey at the user mailing list to get a feeling who uses LIKWID and how. Moreover we would be interested if you are missing a feature or what annoys you when using LIKWID. Link to the survey: https://groups.google.com/forum/#!topic/likwid-users/F7TDho3k7ps -------------------------------------------------------------------------------- Funding -------------------------------------------------------------------------------- LIKWID development was funded by BMBF Germany under the FEPA project, grant 01IH13009. Since 2017 the development is further funded by BMBF Germany under the SeASiTe project, grant 01IH16012A. <div align=center><img src="https://raw.githubusercontent.com/wiki/RRZE-HPC/likwid/images/BMBF.png" alt="BMBF logo"/></div>
592
Quick and Easy server testing/validation
# Goss - Quick and Easy server validation [![Build Status](https://travis-ci.org/goss-org/goss.svg?branch=master)](https://travis-ci.org/goss-org/goss) [![Github All Releases](https://img.shields.io/github/downloads/goss-org/goss/total.svg?maxAge=604800)](https://github.com/goss-org/goss/releases) ** [![Blog](https://img.shields.io/badge/follow-blog-brightgreen.svg)](https://medium.com/@aelsabbahy) ## Goss in 45 seconds <a href="https://asciinema.org/a/4suhr8p42qcn6r7crfzt6cc3e?autoplay=1" target="_blank"><img src="https://cloud.githubusercontent.com/assets/6783261/17330426/ce7ad066-5894-11e6-84ea-29fd4207af58.gif" alt="asciicast"></a> **Note:** For an even faster way of doing this, see: [autoadd](https://github.com/goss-org/goss/blob/master/docs/manual.md#autoadd-aa---auto-add-all-matching-resources-to-test-suite) **Note:** For testing docker containers see the [dgoss](https://github.com/goss-org/goss/tree/master/extras/dgoss) wrapper. Also, user submitted wrapper scripts for Kubernetes [kgoss](https://github.com/goss-org/goss/tree/master/extras/kgoss) and Docker Compose [dcgoss](https://github.com/goss-org/goss/tree/master/extras/dcgoss). **Note:** For some Docker/Kubernetes healthcheck, health endpoint, and container ordering examples, see my blog post [here][kubernetes-simplified-health-checks]. ## Introduction ### What is Goss? Goss is a YAML based [serverspec](http://serverspec.org/) alternative tool for validating a server’s configuration. It eases the process of writing tests by allowing the user to generate tests from the current system state. Once the test suite is written they can be executed, waited-on, or served as a health endpoint. ### Why use Goss? * Goss is EASY! - [Goss in 45 seconds](#goss-in-45-seconds) * Goss is FAST! - small-medium test suites are near instantaneous, see [benchmarks](https://github.com/goss-org/goss/wiki/Benchmarks) * Goss is SMALL! - <10MB single self-contained binary ## Installation **Note:** For macOS and Windows, see: [platform-feature-parity]. This will install goss and [dgoss](https://github.com/goss-org/goss/tree/master/extras/dgoss). **Note:** Using `curl | sh` is not recommended for production systems, use manual installation below. ```bash # Install latest version to /usr/local/bin curl -fsSL https://goss.rocks/install | sh # Install v0.3.16 version to ~/bin curl -fsSL https://goss.rocks/install | GOSS_VER=v0.3.16 GOSS_DST=~/bin sh ``` ### Manual installation #### Latest ```bash curl -L https://github.com/goss-org/goss/releases/latest/download/goss-linux-amd64 -o /usr/local/bin/goss chmod +rx /usr/local/bin/goss curl -L https://github.com/goss-org/goss/releases/latest/download/dgoss -o /usr/local/bin/dgoss # Alternatively, using the latest master # curl -L https://raw.githubusercontent.com/goss-org/goss/master/extras/dgoss/dgoss -o /usr/local/bin/dgoss chmod +rx /usr/local/bin/dgoss ``` #### Specific Version ```bash # See https://github.com/goss-org/goss/releases for release versions VERSION=v0.3.10 curl -L "https://github.com/goss-org/goss/releases/download/${VERSION}/goss-linux-amd64" -o /usr/local/bin/goss chmod +rx /usr/local/bin/goss # (optional) dgoss docker wrapper (use 'master' for latest version) VERSION=v0.3.10 curl -L "https://github.com/goss-org/goss/releases/download/${VERSION}/dgoss" -o /usr/local/bin/dgoss chmod +rx /usr/local/bin/dgoss ``` ### Build it yourself ```bash make build ``` ## Full Documentation Documentation is available here: [manual](https://github.com/goss-org/goss/blob/master/docs/manual.md) ## Quick start ### Writing a simple sshd test An initial set of tests can be derived from the system state by using the [add](https://github.com/goss-org/goss/blob/master/docs/manual.md#add-a---add-system-resource-to-test-suite) or [autoadd](https://github.com/goss-org/goss/blob/master/docs/manual.md#autoadd-aa---auto-add-all-matching-resources-to-test-suite) commands. Let's write a simple sshd test using autoadd. ```txt # Running it as root will allow it to also detect ports $ sudo goss autoadd sshd ``` Generated `goss.yaml`: ```yaml $ cat goss.yaml port: tcp:22: listening: true ip: - 0.0.0.0 tcp6:22: listening: true ip: - '::' service: sshd: enabled: true running: true user: sshd: exists: true uid: 74 gid: 74 groups: - sshd home: /var/empty/sshd shell: /sbin/nologin group: sshd: exists: true gid: 74 process: sshd: running: true ``` Now that we have a test suite, we can: * Run it once ```txt goss validate ............... Total Duration: 0.021s # <- yeah, it's that fast.. Count: 15, Failed: 0 ``` * Edit it to use [templates](https://github.com/goss-org/goss/blob/master/docs/manual.md#templates), and run with a vars file ```txt goss --vars vars.yaml validate ``` * keep running it until the system enters a valid state or we timeout ```txt goss validate --retry-timeout 30s --sleep 1s ``` * serve the tests as a health endpoint ```txt goss serve & curl localhost:8080/healthz # JSON endpoint goss serve --format json & curl localhost:8080/healthz # rspecish response via content negotiation goss serve --format json & curl -H "Accept: application/vnd.goss-rspecish" localhost:8080/healthz ``` ### Manually editing Goss files Goss files can be manually edited to improve readability and expressiveness of tests. A [Json draft 7 schema](https://github.com/json-schema-org/json-schema-spec/blob/draft-07/schema.json) available in [docs/goss-json-schema.yaml](./docs/goss-json-schema.yaml) makes it easier to edit simple goss.yaml files in IDEs, providing usual coding assistance such as inline documentation, completion and static analysis. See [PR 793](https://github.com/goss-org/goss/pull/793) for screenshots. For example, to configure the Json schema in JetBrains intellij IDEA, follow [documented instructions](https://www.jetbrains.com/help/idea/json.html#ws_json_schema_add_custom), with arguments such as `schema url=https://raw.githubusercontent.com/goss-org/goss/master/docs/goss-json-schema.yaml`, `schema version=Json schema version 7`, `file path pattern=*/goss.yaml` In addition, Goss files can also be further manually edited (without yet full json support) to use: * [Patterns](https://github.com/goss-org/goss/blob/master/docs/manual.md#patterns) * [Advanced Matchers](https://github.com/goss-org/goss/blob/master/docs/manual.md#advanced-matchers) * [Templates](https://github.com/goss-org/goss/blob/master/docs/manual.md#templates) * `title` and `meta` (arbitrary data) attributes are persisted when adding other resources with `goss add` Some examples: ```yaml user: sshd: title: UID must be between 50-100, GID doesn't matter. home is flexible meta: desc: Ensure sshd is enabled and running since it's needed for system management sev: 5 exists: true uid: # Validate that UID is between 50 and 100 and: gt: 50 lt: 100 home: # Home can be any of the following or: - /var/empty/sshd - /var/run/sshd package: kernel: installed: true versions: # Must have 3 kernels and none of them can be 4.4.0 and: - have-len: 3 - not: contain-element: 4.4.0 # Loaded from --vars YAML/JSON file {{.Vars.package}}: installed: true {{if eq .Env.OS "centos"}} # This test is only when $OS environment variable is set to "centos" libselinux: installed: true {{end}} ``` Goss.yaml files with templates can still be validated through the Json schema after being rendered using the `goss render` command. See example below ```bash cd docs goss --vars ./vars.yaml render > rendered_goss.yaml # proceed with json schema validation of rendered_goss.yaml in your favorite IDE # or in one of the Json schema validator listed in https://json-schema.org/implementations.html # The following example is for a Linux AMD64 host curl -LO https://github.com/neilpa/yajsv/releases/download/v1.4.1/yajsv.linux.amd64 chmod a+x yajsv.linux.amd64 sudo mv yajsv.linux.amd64 /usr/sbin/yajsv yajsv -s goss-json-schema.yaml rendered_goss.yaml rendered_goss.yaml: fail: process.chrome: skip is required rendered_goss.yaml: fail: service.sshd: skip is required 1 of 1 failed validation rendered_goss.yaml: fail: process.chrome: skip is required rendered_goss.yaml: fail: service.sshd: skip is required ``` Full list of available Json schema validators can be found in https://json-schema.org/implementations.html#validator-command%20line ## Supported resources * package - add new package * file - add new file * addr - add new remote address:port - ex: google.com:80 * port - add new listening [protocol]:port - ex: 80 or udp:123 * service - add new service * user - add new user * group - add new group * command - add new command * dns - add new dns * process - add new process name * kernel-param - add new kernel-param * mount - add new mount * interface - add new network interface * http - add new network http url with proxy support * goss - add new goss file, it will be imported from this one * matching - test for matches in supplied content ## Supported output formats * rspecish - **(default)** Similar to rspec output * documentation - Verbose test results * json - JSON, detailed test result * tap - TAP style * junit - JUnit style * nagios - Nagios/Sensu compatible output /w exit code 2 for failures. * prometheus - Prometheus compatible output. * silent - No output. Avoids exposing system information (e.g. when serving tests as a healthcheck endpoint). ## Community Contributions * [goss-ansible](https://github.com/indusbox/goss-ansible) - Ansible module for Goss. * [degoss](https://github.com/naftulikay/ansible-role-degoss) - Ansible role for installing, running, and removing Goss in a single go. * [kitchen-goss](https://github.com/ahelal/kitchen-goss) - A test-kitchen verifier plugin for Goss. * [goss-fpm-files](https://github.com/deanwilson/unixdaemon-fpm-cookery-recipes) - Might be useful for building goss system packages. * [molecule](https://github.com/metacloud/molecule) - Automated testing for Ansible roles, with native Goss support. * [packer-provisioner-goss](https://github.com/YaleUniversity/packer-provisioner-goss) - A packer plugin to run Goss as a provision step. * [gossboss](https://github.com/mdb/gossboss) - Collect and view aggregated Goss test results from multiple remote Goss servers. ## Limitations `goss` works well on Linux, but support on Windows & macOS is alpha. See [platform-feature-parity]. The following tests have limitations. Package: * rpm * deb * Alpine apk * pacman Service: * systemd * sysV init * OpenRC init * Upstart [kubernetes-simplified-health-checks]: https://medium.com/@aelsabbahy/docker-1-12-kubernetes-simplified-health-checks-and-container-ordering-with-goss-fa8debbe676c [platform-feature-parity]: docs/platform-feature-parity.md
593
Learn where some of the network sysctl variables fit into the Linux/Kernel network flow
# TOC * [Introduction](#introduction) * [Linux network queues overview](#linux-network-queues-overview) * [Fitting the sysctl variables into the Linux network flow](#fitting-the-sysctl-variables-into-the-linux-network-flow) * Ingress - they're coming * Egress - they're leaving * How to check - perf * [What, Why and How - network and sysctl parameters](#what-why-and-how---network-and-sysctl-parameters) * Ring Buffer - rx,tx * Interrupt Coalescence (IC) - rx-usecs, tx-usecs, rx-frames, tx-frames (hardware IRQ) * Interrupt Coalescing (soft IRQ) and Ingress QDisc * Egress QDisc - txqueuelen and default_qdisc * TCP Read and Write Buffers/Queues * Honorable mentions - TCP FSM and congestion algorithm * [Network tools](#network-tools-for-testing-and-monitoring) * [References](#references) # Introduction Sometimes people are looking for [sysctl](https://www.kernel.org/doc/Documentation/networking/ip-sysctl.txt) cargo cult values that bring high throughput and low latency with no trade-off and that works on every occasion. That's not realistic, although we can say that the **newer kernel versions are very well tuned by default**. In fact, you might [hurt performance if you mess with the defaults](https://medium.com/@duhroach/the-bandwidth-delay-problem-c6a2a578b211). This brief tutorial shows **where some of the most used and quoted sysctl/network parameters are located into the Linux network flow**, it was heavily inspired by [the illustrated guide to Linux networking stack](https://blog.packagecloud.io/eng/2016/10/11/monitoring-tuning-linux-networking-stack-receiving-data-illustrated/) and many of [Marek Majkowski's posts](https://blog.cloudflare.com/how-to-achieve-low-latency/). > #### Feel free to send corrections and suggestions! :) # Linux network queues overview ![linux network queues](/img/linux_network_flow.png "A graphic representation of linux/kernel network main buffer / queues") # Fitting the sysctl variables into the Linux network flow ## Ingress - they're coming 1. Packets arrive at the NIC 1. NIC will verify `MAC` (if not on promiscuous mode) and `FCS` and decide to drop or to continue 1. NIC will [DMA packets at RAM](https://en.wikipedia.org/wiki/Direct_memory_access), in a region previously prepared (mapped) by the driver 1. NIC will enqueue references to the packets at receive [ring buffer](https://en.wikipedia.org/wiki/Circular_buffer) queue `rx` until `rx-usecs` timeout or `rx-frames` 1. NIC will raise a `hard IRQ` 1. CPU will run the `IRQ handler` that runs the driver's code 1. Driver will `schedule a NAPI`, clear the `hard IRQ` and return 1. Driver raise a `soft IRQ (NET_RX_SOFTIRQ)` 1. NAPI will poll data from the receive ring buffer until `netdev_budget_usecs` timeout or `netdev_budget` and `dev_weight` packets 1. Linux will also allocate memory to `sk_buff` 1. Linux fills the metadata: protocol, interface, setmacheader, removes ethernet 1. Linux will pass the skb to the kernel stack (`netif_receive_skb`) 1. It will set the network header, clone `skb` to taps (i.e. tcpdump) and pass it to tc ingress 1. Packets are handled to a qdisc sized `netdev_max_backlog` with its algorithm defined by `default_qdisc` 1. It calls `ip_rcv` and packets are handled to IP 1. It calls netfilter (`PREROUTING`) 1. It looks at the routing table, if forwarding or local 1. If it's local it calls netfilter (`LOCAL_IN`) 1. It calls the L4 protocol (for instance `tcp_v4_rcv`) 1. It finds the right socket 1. It goes to the tcp finite state machine 1. Enqueue the packet to the receive buffer and sized as `tcp_rmem` rules 1. If `tcp_moderate_rcvbuf` is enabled kernel will auto-tune the receive buffer 1. Kernel will signalize that there is data available to apps (epoll or any polling system) 1. Application wakes up and reads the data ## Egress - they're leaving 1. Application sends message (`sendmsg` or other) 1. TCP send message allocates skb_buff 1. It enqueues skb to the socket write buffer of `tcp_wmem` size 1. Builds the TCP header (src and dst port, checksum) 1. Calls L3 handler (in this case `ipv4` on `tcp_write_xmit` and `tcp_transmit_skb`) 1. L3 (`ip_queue_xmit`) does its work: build ip header and call netfilter (`LOCAL_OUT`) 1. Calls output route action 1. Calls netfilter (`POST_ROUTING`) 1. Fragment the packet (`ip_output`) 1. Calls L2 send function (`dev_queue_xmit`) 1. Feeds the output (QDisc) queue of `txqueuelen` length with its algorithm `default_qdisc` 1. The driver code enqueue the packets at the `ring buffer tx` 1. The driver will do a `soft IRQ (NET_TX_SOFTIRQ)` after `tx-usecs` timeout or `tx-frames` 1. Re-enable hard IRQ to NIC 1. Driver will map all the packets (to be sent) to some DMA'ed region 1. NIC fetches the packets (via DMA) from RAM to transmit 1. After the transmission NIC will raise a `hard IRQ` to signal its completion 1. The driver will handle this IRQ (turn it off) 1. And schedule (`soft IRQ`) the NAPI poll system 1. NAPI will handle the receive packets signaling and free the RAM ## How to check - perf If you want to see the network tracing within Linux you can use [perf](https://man7.org/linux/man-pages/man1/perf-trace.1.html). ``` docker run -it --rm --cap-add SYS_ADMIN --entrypoint bash ljishen/perf apt-get update apt-get install iputils-ping # this is going to trace all events (not syscalls) to the subsytem net:* while performing the ping perf trace --no-syscalls --event 'net:*' ping globo.com -c1 > /dev/null ``` ![perf trace network](https://user-images.githubusercontent.com/55913/147019725-69624e67-b3ca-48b4-a823-10521d2bed83.png) # What, Why and How - network and sysctl parameters ## Ring Buffer - rx,tx * **What** - the driver receive/send queue a single or multiple queues with a fixed size, usually implemented as FIFO, it is located at RAM * **Why** - buffer to smoothly accept bursts of connections without dropping them, you might need to increase these queues when you see drops or overrun, aka there are more packets coming than the kernel is able to consume them, the side effect might be increased latency. * **How:** * **Check command:** `ethtool -g ethX` * **Change command:** `ethtool -G ethX rx value tx value` * **How to monitor:** `ethtool -S ethX | grep -e "err" -e "drop" -e "over" -e "miss" -e "timeout" -e "reset" -e "restar" -e "collis" -e "over" | grep -v "\: 0"` ## Interrupt Coalescence (IC) - rx-usecs, tx-usecs, rx-frames, tx-frames (hardware IRQ) * **What** - number of microseconds/frames to wait before raising a hardIRQ, from the NIC perspective it'll DMA data packets until this timeout/number of frames * **Why** - reduce CPUs usage, hard IRQ, might increase throughput at cost of latency. * **How:** * **Check command:** `ethtool -c ethX` * **Change command:** `ethtool -C ethX rx-usecs value tx-usecs value` * **How to monitor:** `cat /proc/interrupts` ## Interrupt Coalescing (soft IRQ) and Ingress QDisc * **What** - maximum number of microseconds in one [NAPI](https://en.wikipedia.org/wiki/New_API) polling cycle. Polling will exit when either `netdev_budget_usecs` have elapsed during the poll cycle or the number of packets processed reaches `netdev_budget`. * **Why** - instead of reacting to tons of softIRQ, the driver keeps polling data; keep an eye on `dropped` (# of packets that were dropped because `netdev_max_backlog` was exceeded) and `squeezed` (# of times ksoftirq ran out of `netdev_budget` or time slice with work remaining). * **How:** * **Check command:** `sysctl net.core.netdev_budget_usecs` * **Change command:** `sysctl -w net.core.netdev_budget_usecs value` * **How to monitor:** `cat /proc/net/softnet_stat`; or a [better tool](https://raw.githubusercontent.com/majek/dump/master/how-to-receive-a-packet/softnet.sh) * **What** - `netdev_budget` is the maximum number of packets taken from all interfaces in one polling cycle (NAPI poll). In one polling cycle interfaces which are registered to polling are probed in a round-robin manner. Also, a polling cycle may not exceed `netdev_budget_usecs` microseconds, even if `netdev_budget` has not been exhausted. * **How:** * **Check command:** `sysctl net.core.netdev_budget` * **Change command:** `sysctl -w net.core.netdev_budget value` * **How to monitor:** `cat /proc/net/softnet_stat`; or a [better tool](https://raw.githubusercontent.com/majek/dump/master/how-to-receive-a-packet/softnet.sh) * **What** - `dev_weight` is the maximum number of packets that kernel can handle on a NAPI interrupt, it's a Per-CPU variable. For drivers that support LRO or GRO_HW, a hardware aggregated packet is counted as one packet in this. * **How:** * **Check command:** `sysctl net.core.dev_weight` * **Change command:** `sysctl -w net.core.dev_weight value` * **How to monitor:** `cat /proc/net/softnet_stat`; or a [better tool](https://raw.githubusercontent.com/majek/dump/master/how-to-receive-a-packet/softnet.sh) * **What** - `netdev_max_backlog` is the maximum number of packets, queued on the INPUT side (_the ingress qdisc_), when the interface receives packets faster than kernel can process them. * **How:** * **Check command:** `sysctl net.core.netdev_max_backlog` * **Change command:** `sysctl -w net.core.netdev_max_backlog value` * **How to monitor:** `cat /proc/net/softnet_stat`; or a [better tool](https://raw.githubusercontent.com/majek/dump/master/how-to-receive-a-packet/softnet.sh) ## Egress QDisc - txqueuelen and default_qdisc * **What** - `txqueuelen` is the maximum number of packets, queued on the OUTPUT side. * **Why** - a buffer/queue to face connection burst and also to apply [tc (traffic control).](http://tldp.org/HOWTO/Traffic-Control-HOWTO/intro.html) * **How:** * **Check command:** `ifconfig ethX` * **Change command:** `ifconfig ethX txqueuelen value` * **How to monitor:** `ip -s link` * **What** - `default_qdisc` is the default queuing discipline to use for network devices. * **Why** - each application has different load and need to traffic control and it is used also to fight against [bufferbloat](https://www.bufferbloat.net/projects/codel/wiki/) * **How:** * **Check command:** `sysctl net.core.default_qdisc` * **Change command:** `sysctl -w net.core.default_qdisc value` * **How to monitor:** `tc -s qdisc ls dev ethX` ## TCP Read and Write Buffers/Queues > The policy that defines what is [memory pressure](https://wwwx.cs.unc.edu/~sparkst/howto/network_tuning.php) is specified at tcp_mem and tcp_moderate_rcvbuf. * **What** - `tcp_rmem` - min (size used under memory pressure), default (initial size), max (maximum size) - size of receive buffer used by TCP sockets. * **Why** - the application buffer/queue to the write/send data, [understand its consequences can help a lot](https://blog.cloudflare.com/the-story-of-one-latency-spike/). * **How:** * **Check command:** `sysctl net.ipv4.tcp_rmem` * **Change command:** `sysctl -w net.ipv4.tcp_rmem="min default max"`; when changing default value, remember to restart your user space app (i.e. your web server, nginx, etc) * **How to monitor:** `cat /proc/net/sockstat` * **What** - `tcp_wmem` - min (size used under memory pressure), default (initial size), max (maximum size) - size of send buffer used by TCP sockets. * **How:** * **Check command:** `sysctl net.ipv4.tcp_wmem` * **Change command:** `sysctl -w net.ipv4.tcp_wmem="min default max"`; when changing default value, remember to restart your user space app (i.e. your web server, nginx, etc) * **How to monitor:** `cat /proc/net/sockstat` * **What** `tcp_moderate_rcvbuf` - If set, TCP performs receive buffer auto-tuning, attempting to automatically size the buffer. * **How:** * **Check command:** `sysctl net.ipv4.tcp_moderate_rcvbuf` * **Change command:** `sysctl -w net.ipv4.tcp_moderate_rcvbuf value` * **How to monitor:** `cat /proc/net/sockstat` ## Honorable mentions - TCP FSM and congestion algorithm > Accept and SYN Queues are governed by net.core.somaxconn and net.ipv4.tcp_max_syn_backlog. [Nowadays net.core.somaxconn caps both queue sizes.](https://blog.cloudflare.com/syn-packet-handling-in-the-wild/#queuesizelimits) * `sysctl net.core.somaxconn` - provides an upper limit on the value of the backlog parameter passed to the [`listen()` function](https://eklitzke.org/how-tcp-sockets-work), known in userspace as `SOMAXCONN`. If you change this value, you should also change your application to a compatible value (i.e. [nginx backlog](http://nginx.org/en/docs/http/ngx_http_core_module.html#listen)). * `cat /proc/sys/net/ipv4/tcp_fin_timeout` - this specifies the number of seconds to wait for a final FIN packet before the socket is forcibly closed. This is strictly a violation of the TCP specification but required to prevent denial-of-service attacks. * `cat /proc/sys/net/ipv4/tcp_available_congestion_control` - shows the available congestion control choices that are registered. * `cat /proc/sys/net/ipv4/tcp_congestion_control` - sets the congestion control algorithm to be used for new connections. * `cat /proc/sys/net/ipv4/tcp_max_syn_backlog` - sets the maximum number of queued connection requests which have still not received an acknowledgment from the connecting client; if this number is exceeded, the kernel will begin dropping requests. * `cat /proc/sys/net/ipv4/tcp_syncookies` - enables/disables [syn cookies](https://en.wikipedia.org/wiki/SYN_cookies), useful for protecting against [syn flood attacks](https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/). * `cat /proc/sys/net/ipv4/tcp_slow_start_after_idle` - enables/disables tcp slow start. **How to monitor:** * `netstat -atn | awk '/tcp/ {print $6}' | sort | uniq -c` - summary by state * `ss -neopt state time-wait | wc -l` - counters by a specific state: `established`, `syn-sent`, `syn-recv`, `fin-wait-1`, `fin-wait-2`, `time-wait`, `closed`, `close-wait`, `last-ack`, `listening`, `closing` * `netstat -st` - tcp stats summary * `nstat -a` - human-friendly tcp stats summary * `cat /proc/net/sockstat` - summarized socket stats * `cat /proc/net/tcp` - detailed stats, see each field meaning at the [kernel docs](https://www.kernel.org/doc/Documentation/networking/proc_net_tcp.txt) * `cat /proc/net/netstat` - `ListenOverflows` and `ListenDrops` are important fields to keep an eye on * `cat /proc/net/netstat | awk '(f==0) { i=1; while ( i<=NF) {n[i] = $i; i++ }; f=1; next} \ (f==1){ i=2; while ( i<=NF){ printf "%s = %d\n", n[i], $i; i++}; f=0} ' | grep -v "= 0`; a [human readable `/proc/net/netstat`](https://sa-chernomor.livejournal.com/9858.html) ![tcp finite state machine](https://upload.wikimedia.org/wikipedia/commons/a/a2/Tcp_state_diagram_fixed.svg "A graphic representation of tcp tcp finite state machine") Source: https://commons.wikimedia.org/wiki/File:Tcp_state_diagram_fixed_new.svg # Network tools for testing and monitoring * [iperf3](https://iperf.fr/) - network throughput * [vegeta](https://github.com/tsenart/vegeta) - HTTP load testing tool * [netdata](https://github.com/firehol/netdata) - system for distributed real-time performance and health monitoring # References * https://www.kernel.org/doc/Documentation/sysctl/net.txt * https://www.kernel.org/doc/Documentation/networking/ip-sysctl.txt * https://www.kernel.org/doc/Documentation/networking/scaling.txt * https://www.kernel.org/doc/Documentation/networking/proc_net_tcp.txt * https://www.kernel.org/doc/Documentation/networking/multiqueue.txt * http://man7.org/linux/man-pages/man7/tcp.7.html * http://man7.org/linux/man-pages/man8/tc.8.html * http://www.ece.virginia.edu/cheetah/documents/papers/TCPlinux.pdf * https://netdevconf.org/1.2/papers/bbr-netdev-1.2.new.new.pdf * https://blog.cloudflare.com/how-to-receive-a-million-packets/ * https://blog.cloudflare.com/how-to-achieve-low-latency/ * https://blog.packagecloud.io/eng/2016/06/22/monitoring-tuning-linux-networking-stack-receiving-data/ * https://www.youtube.com/watch?v=6Fl1rsxk4JQ * https://oxnz.github.io/2016/05/03/performance-tuning-networking/ * https://www.intel.com/content/dam/www/public/us/en/documents/reference-guides/xl710-x710-performance-tuning-linux-guide.pdf * https://access.redhat.com/sites/default/files/attachments/20150325_network_performance_tuning.pdf * https://medium.com/@matteocroce/linux-and-freebsd-networking-cbadcdb15ddd * https://blogs.technet.microsoft.com/networking/2009/08/12/where-do-resets-come-from-no-the-stork-does-not-bring-them/ * https://www.intel.com/content/dam/www/public/us/en/documents/white-papers/multi-core-processor-based-linux-paper.pdf * http://syuu.dokukino.com/2013/05/linux-kernel-features-for-high-speed.html * https://www.bufferbloat.net/projects/codel/wiki/Best_practices_for_benchmarking_Codel_and_FQ_Codel/ * https://software.intel.com/en-us/articles/setting-up-intel-ethernet-flow-director * https://courses.engr.illinois.edu/cs423/sp2014/Lectures/LinuxDriver.pdf * https://www.coverfire.com/articles/queueing-in-the-linux-network-stack/ * http://vger.kernel.org/~davem/skb.html * https://www.missoulapubliclibrary.org/ftp/LinuxJournal/LJ13-07.pdf * https://opensourceforu.com/2016/10/network-performance-monitoring/ * https://www.yumpu.com/en/document/view/55400902/an-adventure-of-analysis-and-optimisation-of-the-linux-networking-stack * https://lwn.net/Articles/616241/ * https://medium.com/@duhroach/tools-to-profile-networking-performance-3141870d5233 * https://www.lmax.com/blog/staff-blogs/2016/05/06/navigating-linux-kernel-network-stack-receive-path/ * https://es.net/host-tuning/100g-tuning/ * http://tcpipguide.com/free/t_TCPOperationalOverviewandtheTCPFiniteStateMachineF-2.htm * http://veithen.github.io/2014/01/01/how-tcp-backlog-works-in-linux.html * https://people.cs.clemson.edu/~westall/853/tcpperf.pdf * http://tldp.org/HOWTO/Traffic-Control-HOWTO/classless-qdiscs.html * https://es.net/assets/Papers-and-Publications/100G-Tuning-TechEx2016.tierney.pdf * https://www.kernel.org/doc/ols/2009/ols2009-pages-169-184.pdf * https://devcentral.f5.com/articles/the-send-buffer-in-depth-21845 * http://packetbomb.com/understanding-throughput-and-tcp-windows/ * https://www.speedguide.net/bdp.php * https://www.switch.ch/network/tools/tcp_throughput/ * https://www.ibm.com/support/knowledgecenter/en/SSQPD3_2.6.0/com.ibm.wllm.doc/usingethtoolrates.html * https://blog.tsunanet.net/2011/03/out-of-socket-memory.html * https://unix.stackexchange.com/questions/12985/how-to-check-rx-ring-max-backlog-and-max-syn-backlog-size * https://serverfault.com/questions/498245/how-to-reduce-number-of-time-wait-processes * https://unix.stackexchange.com/questions/419518/how-to-tell-how-much-memory-tcp-buffers-are-actually-using * https://eklitzke.org/how-tcp-sockets-work * https://www.linux.com/learn/intro-to-linux/2017/7/introduction-ss-command * https://staaldraad.github.io/2017/12/20/netstat-without-netstat/ * https://loicpefferkorn.net/2016/03/linux-network-metrics-why-you-should-use-nstat-instead-of-netstat/ * http://assimilationsystems.com/2015/12/29/bufferbloat-network-best-practice/ * https://wwwx.cs.unc.edu/~sparkst/howto/network_tuning.php
594
Porting Windows Dynamic Link Libraries to Linux
# Porting Windows Dynamic Link Libraries to Linux ## Introduction This repository contains a library that allows native Linux programs to load and call functions from a Windows DLL. As a demonstration, I've ported Windows Defender to Linux. ``` $ ./mpclient eicar.com main(): Scanning eicar.com... EngineScanCallback(): Scanning input EngineScanCallback(): Threat Virus:DOS/EICAR_Test_File identified. ``` ### How does it work? The `peloader` directory contains a custom PE/COFF loader derived from ndiswrapper. The library will process the relocations and imports, then provide a `dlopen`-like API. The code supports debugging with gdb (including symbols), basic block coverage collection, and runtime hooking and patching. ![Is such a thing even possible?](https://media.giphy.com/media/2pDSW8QQU6jRe/giphy.gif) ### What works? The intention is to allow scalable and efficient fuzzing of self-contained Windows libraries on Linux. Good candidates might be video codecs, decompression libraries, virus scanners, image decoders, and so on. * C++ exception dispatch and unwinding. * Loading additional symbols from IDA. * Debugging with gdb (including symbols), breakpoints, stack traces, etc. * Runtime hooking and patching. * Support for ASAN and Valgrind to detect subtle memory corruption bugs. If you need to add support for any external imports, writing stubs is usually quick and easy. ### Why? Distributed, scalable fuzzing on Windows can be challenging and inefficient. This is especially true for endpoint security products, which use complex interconnected components that span across kernel and user space. This often requires spinning up an entire virtualized Windows environment to fuzz them or collect coverage data. This is less of a problem on Linux, and I've found that porting components of Windows Antivirus products to Linux is often possible. This allows me to run the code I’m testing in minimal containers with very little overhead, and easily scale up testing. This is just personal opinion, but I also think Linux has better tools. `¯\_(ツ)_/¯` ## Windows Defender MsMpEng is the Malware Protection service that is enabled by default on Windows 8, 8.1, 10, Windows Server 2016, and so on. Additionally, Microsoft Security Essentials, System Centre Endpoint Protection and various other Microsoft security products share the same core engine. The core component of MsMpEng responsible for scanning and analysis is called mpengine. Mpengine is a vast and complex attack surface, comprising of handlers for dozens of esoteric archive formats, executable packers, full system emulators for various architectures and interpreters for various languages. All of this code is accessible to remote attackers. ### Building To build the test client, simply type `make`. ``` $ make ``` ### Dependencies *Note that the `.i686` or `:i386` suffixes are important, we need the 32bit libraries to use the 32bit dll.* | Fedora / RedHat | Ubuntu / Debian | Comment | | --------------------- | ----------------------------------- |:---------------------------- | | `glibc-devel.i686` | `libc6-dev:i386` / `libc6-dev-i386` | Name varies with version. | | `libgcc.i686` | `gcc-multilib` | | | `readline-devel.i686` | `libreadline-dev:i386` | Optional, used in mpscript. | | `cabextract` | `cabextract` | Used to extract definitions. | You will need to download the 32-bit antimalware update file from this page: * https://www.microsoft.com/security/portal/definitions/adl.aspx#manual This should be a direct link to the right file: * https://go.microsoft.com/fwlink/?LinkID=121721&arch=x86 This will download a file called `mpam-fe.exe`, which is a cabinet file that can be extracted with `cabextract`. Extract the files into the `engine` directory: ``` $ cabextract mpam-fe.exe Extracting cabinet: mpam-fe.exe extracting MPSigStub.exe extracting mpavdlta.vdm extracting mpasdlta.vdm extracting mpavbase.vdm extracting mpasbase.vdm extracting mpengine.dll All done, no errors. ``` If you want to know which version you got, try this: ``` $ exiftool mpengine.dll | grep 'Product Version Number' Product Version Number : 1.1.13701.0 ``` ### Running The main mpengine loader is called `mpclient`, it accepts filenames to scan as a parameter. ``` $ ./mpclient netsky.exe main(): Scanning netsky.exe... EngineScanCallback(): Scanning input EngineScanCallback(): Threat Worm:Win32/Netsky.P@mm identified. ``` There are some other sample tools, `mpstreamfuzz` and `mpscript`. ### Debugging If you want to debug a crash, single step through a routine or set breakpoints, follow these examples. First, you need a map file from IDA. Microsoft doesn't release public symbols for every build, and sometimes the symbols lag behind for a few months after release. Make sure you're using an mpengine version with public symbols available. Use the following sample commandline to generate map and idb files. ``` > idaw -A -P+ -S"createmap.idc mpengine.map" mpengine.dll ``` If you generate the map files on Windows, you'll get CRLF line terminators, fix them like this: ``` $ dos2unix mpengine.map ``` When you run mpclient under gdb, it will detect a debugger and print the commands you need to enter to teach gdb about the symbols: ``` $ gdb -q ./mpclient (gdb) r testfile.txt Starting program: mpclient main(): GDB: add-symbol-file engine/mpengine.dll 0xf6af4008+0x1000 main(): GDB: shell bash genmapsym.sh 0xf6af4008+0x1000 symbols_19009.o < mpengine.map main(): GDB: add-symbol-file symbols_19009.o 0 Program received signal SIGTRAP, Trace/breakpoint trap. 0x0804d213 in main (argc=1, argv=0xffffcc64, envp=0xffffcc6c) at mpclient.c:156 156 __debugbreak(); (gdb) ``` If you enter the commands it shows into gdb, you will have symbols available. > *Note that `genmapsym.sh` assumes you're using GNU awk.* ``` (gdb) add-symbol-file engine/mpengine.dll 0xf6af4008+0x1000 add symbol table from file "engine/mpengine.dll" at .text_addr = 0xf6af5008 Reading symbols from engine/mpengine.dll...done. (gdb) shell bash genmapsym.sh 0xf6af4008+0x1000 symbols_19009.o < mpengine.map (gdb) add-symbol-file symbols_19009.o 0 add symbol table from file "symbols_19009.o" at .text_addr = 0x0 Reading symbols from symbols_19009.o...done. (gdb) p as3_parsemetadata_swf_vars_t $1 = {void (void)} 0xf6feb842 <as3_parsemetadata_swf_vars_t> ``` Then you can continue, and it will run as normal. ``` (gdb) c ``` Breakpoints, watchpoints and backtraces all work as normal, although it may be more reliable to use hardware breakpoints than software breakpoints. To use hardware breakpoints in gdb, you just use `hb` or `hbreak` instead of `break`. Note that you only get a limited number of hardware breakpoints. ``` (gdb) b as3_parsemethodinfo_swf_vars_t Breakpoint 1 at 0xf6feb8da (gdb) c Continuing. main(): Scanning test/input.swf... EngineScanCallback(): Scanning input Breakpoint 1, 0xf6feb8da in as3_parsemethodinfo_swf_vars_t () (gdb) bt #0 0xf6feb8da in as3_parsemethodinfo_swf_vars_t () #1 0xf6dbad7f in SwfScanFunc () #2 0xf6d73ec3 in UfsScannerWrapper__ScanFile_scanresult_t () #3 0xf6d6c9e3 in UfsClientRequest__fscan_SCAN_REPLY () #4 0xf6d6a818 in UfsNode__ScanLoopHelper_wchar_t () #5 0xf6d6a626 in UfsNode__Analyze_UfsAnalyzeSetup () #6 0xf6d71f7f in UfsClientRequest__AnalyzeLeaf_wchar_t () #7 0xf6d71bb9 in UfsClientRequest__AnalyzePath_wchar_t () #8 0xf6dbbd88 in std___String_alloc_std___String_base_types_char_std__allocator_char______Myptr_void_ () #9 0xf6d75e72 in UfsCmdBase__ExecuteCmd__lambda_c80a88e180c1f4524a759d69aa15f87e____lambda_c80a88e180c1f4524a759d69aa15f87e__ () Backtrace stopped: previous frame inner to this frame (corrupt stack?) (gdb) x/3i $pc => 0xf6feb8da <as3_parsemethodinfo_swf_vars_t+7>: lea ebx,[edx+0x1c] 0xf6feb8dd <as3_parsemethodinfo_swf_vars_t+10>: push esi 0xf6feb8de <as3_parsemethodinfo_swf_vars_t+11>: mov edx,ebx ``` ## What about Wine and Winelib? This project does not replace Wine or Winelib. Winelib is used to port Windows C++ projects to Linux, and Wine is intended to run full Windows applications. This project is intended to allow native Linux code to load simple Windows DLLs. The closest analogy would be ndiswrapper but for userspace. ## Further Examples * [avscript](https://github.com/taviso/avscript) - Loading another antivirus engine, demonstrates hooking and patching. ## License GPL2
595
Performance monitoring tools for Linux
## sysstat - System performance tools for the Linux operating system [![Coverity Scan Build Status](https://scan.coverity.com/projects/4040/badge.svg)](https://scan.coverity.com/projects/sysstat-sysstat) [![Build Status](https://travis-ci.org/sysstat/sysstat.svg?branch=master)](https://travis-ci.org/sysstat/sysstat) [![Donate](https://img.shields.io/badge/Donate-PayPal-blue.svg)](https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=45U6F9R73ESFQ) (C) 1999-2023 Sebastien GODARD (sysstat (at) orange (dot) fr) ### Introduction The sysstat package contains various utilities, common to many commercial Unixes, to monitor system performance and usage activity: * **iostat** reports CPU statistics and input/output statistics for block devices and partitions. * **mpstat** reports individual or combined processor related statistics. * **pidstat** reports statistics for Linux tasks (processes) : I/O, CPU, memory, etc. * **tapestat** reports statistics for tape drives connected to the system. * **cifsiostat** reports CIFS statistics. Sysstat also contains tools you can schedule via cron or systemd to collect and historize performance and activity data: * **sar** collects, reports and saves system activity information (see below a list of metrics collected by sar). * **sadc** is the system activity data collector, used as a backend for sar. * **sa1** collects and stores binary data in the system activity daily data file. It is a front end to sadc designed to be run from cron or systemd. * **sa2** writes a summarized daily activity report. It is a front end to sar designed to be run from cron or systemd. * **sadf** displays data collected by sar in multiple formats (CSV, XML, JSON, etc.) and can be used for data exchange with other programs. This command can also be used to draw graphs for the various activities collected by sar using SVG (Scalable Vector Graphics) format. Default sampling interval is 10 minutes but this can be changed of course (it can be as small as 1 second). #### System statistics collected by sar: - Input / Output and transfer rate statistics (global, per device, per partition and per network filesystem) - CPU statistics (global and per CPU), including support for virtualization architectures - Memory, hugepages and swap space utilization statistics - Virtual memory, paging and fault statistics - Process creation activity - Interrupt statistics (global, per CPU and per interrupt, including potential APIC interrupt sources, hardware and software interrupts) - Extensive network statistics: network interface activity (number of packets and kB received and transmitted per second, etc.) including failures from network devices; network traffic statistics for IP, TCP, ICMP and UDP protocols based on SNMPv2 standards; support for IPv6-related protocols - Fibre Channel traffic statistics - Software-based network processing (softnet) statistics - NFS server and client activity - Sockets statistics - Run queue and system load statistics - Kernel internal tables utilization statistics - Swapping statistics - TTY devices activity - Power management statistics (instantaneous and average CPU clock frequency, fans speed, devices temperature, voltage inputs) - USB devices plugged into the system - Filesystems utilization (inodes and blocks) - Pressure-Stall Information statistics #### Sysstat key features: - Display average statistics values at the end of the reports. - On-the-fly detection of new devices (disks, network interfaces, etc.) that are created or registered dynamically. - Support for UP and SMP machines, including machines with hyperthreaded or multi-core processors. - Support for hotplug CPUs (it detects automagically processors that are disabled or enabled on the fly) and tickless CPUs. - Works on many different architectures, whether 32- or 64-bit. - Needs very little CPU time to run (written in C). - System statistics collected by sar/sadc can be saved in a file for future inspection. You can configure the length of data history to keep. There is no limit for this history length but the available space on your storage device. - System statistics collected by sar/sadc can be exported in various different formats (CSV, XML, JSON, SVG, etc.). DTD and XML Schema documents are included in sysstat package. JSON output format is also available for mpstat and iostat commands. - iostat can display statistics for devices managed by drivers in userspace like spdk. - Smart color output for easier statistics reading. ![Smart color output](images/color_output.png) - Internationalization support (sysstat has been translated into numerous different languages). Sysstat is now part of the [Translation Project](http://translationproject.org/). - Sysstat commands can automatically select the unit used to display sizes for easier reading (see option `--human`): ![Sample iostat output](images/iostat.png) - Graphs can be generated (SVG format - Scalable Vector Graphics) and displayed in your favorite web browser. See some sample screenshots below: ![Fancy sysstat graph](images/cpugraph.jpg) ![Fancy sysstat graph](images/tcgraph.png) ![Fancy sysstat graph](images/loadavg-svg.png) Sysstat is Open Source / Free Software, and is freely available under the GNU General Public License, version 2. The latest version of sysstat can always be found on my web site at: [http://pagesperso-orange.fr/sebastien.godard/](http://pagesperso-orange.fr/sebastien.godard/) See the CHANGES file to know the new features/improvements/bug fixes added in this release of sysstat. Sysstat development can be tracked on [GitHub](https://github.com/sysstat/sysstat). ### Installation #### Install from RHEL/Fedora/CentOS Enter: ``` $ sudo yum install sysstat ``` CentOS and Fedora systems call the collector process using a cron job in /etc/cron.d and it's enabled by default. On recent versions, systemd is used instead of cron. You may need to enable and start the sysstat service: ``` $ sudo systemctl enable --now sysstat ``` (or enter: ``` $ sudo systemctl enable sysstat $ sudo systemctl start sysstat ``` if option `--now` is not supported by your systemd version.) #### Install from Ubuntu Enter: ``` $ sudo apt-get install sysstat ``` Then enable data collecting: ``` $ sudo vi /etc/default/sysstat change ENABLED="false" to ENABLED="true" save the file ``` Last, restart the sysstat service: ``` $ sudo service sysstat restart ``` #### Install from sources Clone sysstat public repository with: ``` $ git clone git://github.com/sysstat/sysstat ``` Then configure sysstat for your system: ``` $ cd sysstat $ ./configure ``` You can set several variables and parameters on the command line. For example you can enter the following option to activate data collecting (either using cron or systemd): ``` $ ./configure --enable-install-cron ``` Enter `./configure --help` to display all possible options. Note: There is another way to configure sysstat instead of entering `./configure`: This is the **Interactive Configuration script** (_iconfig_) which will ask you for the value of the main sysstat variables and parameters. Enter `./iconfig` then answer the questions or enter Return to accept the (sane) default values. For yes/no questions, answer 'y' or 'n' (without the quotes): It is case sensitive! You can also enter '?' to get a help message that will explain the meaning of each variable or parameter. Compile and install: ``` $ make $ sudo make install ``` ### Feedback welcome! Please use the BUG_REPORT template file to report a bug: It contains important data that should be provided for this. Please also remember to read the FAQ that comes with sysstat or is available from the Wiki page on GitHub. Opening an issue or a pull request on GitHub is the preferred way to report a bug or submit a patch. Patches and suggestions for improvements are always welcome! ### Support sysstat! If you are reading this README file then you are probably about to use the sysstat tools to help you monitor your system and maybe troubleshoot some performance issues. Good choice. Sysstat is made for you. Moreover sysstat is free software and always will be. Yet have you ever considered making a donation to sysstat, regardless of how much your contribution is? This in turn would encourage me to keep up the work as good as it can be... Oh, and it would certainly also help me explain to my wife why I spend so much time in front of my computer instead of taking care of the household ;-) Click on the "Donate PayPal" button above at the beginning of this file. You can also make a donation [from my web page](http://pagesperso-orange.fr/sebastien.godard/). Enjoy! -- Sebastien GODARD - sysstat (at) orange (dot) fr
596
build-once run-anywhere c library
![Cosmopolitan Honeybadger](usr/share/img/honeybadger.png) [![build](https://github.com/jart/cosmopolitan/actions/workflows/build.yml/badge.svg)](https://github.com/jart/cosmopolitan/actions/workflows/build.yml) # Cosmopolitan [Cosmopolitan Libc](https://justine.lol/cosmopolitan/index.html) makes C a build-once run-anywhere language, like Java, except it doesn't need an interpreter or virtual machine. Instead, it reconfigures stock GCC and Clang to output a POSIX-approved polyglot format that runs natively on Linux + Mac + Windows + FreeBSD + OpenBSD + NetBSD + BIOS with the best possible performance and the tiniest footprint imaginable. ## Background For an introduction to this project, please read the [αcτµαlly pδrταblε εxεcµταblε](https://justine.lol/ape.html) blog post and [cosmopolitan libc](https://justine.lol/cosmopolitan/index.html) website. We also have [API documentation](https://justine.lol/cosmopolitan/documentation.html). ## Getting Started If you're doing your development work on Linux or BSD then you need just five files to get started. Here's what you do on Linux: ```sh wget https://justine.lol/cosmopolitan/cosmopolitan-amalgamation-2.2.zip unzip cosmopolitan-amalgamation-2.2.zip printf 'main() { printf("hello world\\n"); }\n' >hello.c gcc -g -Os -static -nostdlib -nostdinc -fno-pie -no-pie -mno-red-zone \ -fno-omit-frame-pointer -pg -mnop-mcount -mno-tls-direct-seg-refs -gdwarf-4 \ -o hello.com.dbg hello.c -fuse-ld=bfd -Wl,-T,ape.lds -Wl,--gc-sections \ -include cosmopolitan.h crt.o ape-no-modify-self.o cosmopolitan.a objcopy -S -O binary hello.com.dbg hello.com ``` You now have a portable program. ```sh ./hello.com bash -c './hello.com' # zsh/fish workaround (we patched them in 2021) ``` If `./hello.com` executed on Linux throws an error about not finding an interpreter, it should be fixed by running the following command (although note that it may not survive a system restart): ```sh sudo sh -c "echo ':APE:M::MZqFpD::/bin/sh:' >/proc/sys/fs/binfmt_misc/register" ``` If the same command produces puzzling errors on WSL or WINE when using Redbean 2.x, they may be fixed by disabling binfmt_misc: ```sh sudo sh -c 'echo -1 >/proc/sys/fs/binfmt_misc/status' ``` Since we used the `ape-no-modify-self.o` bootloader (rather than `ape.o`) your executable will not modify itself when it's run. What it'll instead do, is extract a 4kb program (the [APE loader](https://justine.lol/apeloader/)) to `${TMPDIR:-${HOME:-.}}` that maps your program into memory without needing to copy it. The APE loader must be in an executable location (e.g. not stored on a `noexec` mount) for it to run. See below for alternatives: It's possible to install the APE loader systemwide as follows. ```sh # System-Wide APE Install # for Linux, Darwin, and BSDs # 1. Copies APE Loader to /usr/bin/ape # 2. Registers w/ binfmt_misc too if Linux ape/apeinstall.sh # System-Wide APE Uninstall # for Linux, Darwin, and BSDs ape/apeuninstall.sh ``` It's also possible to convert APE binaries into the system-local format by using the `--assimilate` flag. Please note that if binfmt_misc is in play, you'll need to unregister it temporarily before doing this, since the assimilate feature is part of the shell script header. ```sh $ file hello.com hello.com: DOS/MBR boot sector ./hello.com --assimilate $ file hello.com hello.com: ELF 64-bit LSB executable ``` Now that you're up and running with Cosmopolitan Libc and APE, here's some of the most important troubleshooting tools APE offers that you should know, in case you encounter any issues: ```sh ./hello.com --strace # log system calls to stderr ./hello.com --ftrace # log function calls to stderr ``` Do you love tiny binaries? If so, you may not be happy with Cosmo adding heavyweight features like tracing to your binaries by default. In that case, you may want to consider using our build system: ```sh make m=tiny ``` Which will cause programs such as `hello.com` and `life.com` to shrink from 60kb in size to about 16kb. There's also a prebuilt amalgamation online <https://justine.lol/cosmopolitan/cosmopolitan-tiny.zip> hosted on our download page <https://justine.lol/cosmopolitan/download.html>. ### MacOS If you're developing on MacOS you can install the GNU compiler collection for x86_64-elf via homebrew: ```sh brew install x86_64-elf-gcc ``` Then in the above scripts just replace `gcc` and `objcopy` with `x86_64-elf-gcc` and `x86_64-elf-objcopy` to compile your APE binary. ### Windows If you're developing on Windows then you need to download an x86_64-pc-linux-gnu toolchain beforehand. See the [Compiling on Windows](https://justine.lol/cosmopolitan/windows-compiling.html) tutorial. It's needed because the ELF object format is what makes universal binaries possible. Cosmopolitan officially only builds on Linux. However, one highly experimental (and currently broken) thing you could try, is building the entire cosmo repository from source using the cross9 toolchain. ``` mkdir -p o/third_party rm -rf o/third_party/gcc wget https://justine.lol/linux-compiler-on-windows/cross9.zip unzip cross9.zip mv cross9 o/third_party/gcc build/bootstrap/make.com ``` ## Source Builds Cosmopolitan can be compiled from source on any Linux distro. First, you need to download or clone the repository. ```sh wget https://justine.lol/cosmopolitan/cosmopolitan.tar.gz tar xf cosmopolitan.tar.gz # see releases page cd cosmopolitan ``` This will build the entire repository and run all the tests: ```sh build/bootstrap/make.com o//examples/hello.com find o -name \*.com | xargs ls -rShal | less ``` If you get an error running make.com then it's probably because you have WINE installed to `binfmt_misc`. You can fix that by installing the the APE loader as an interpreter. It'll improve build performance too! ```sh ape/apeinstall.sh ``` Since the Cosmopolitan repository is very large, you might only want to build a particular thing. Cosmopolitan's build config does a good job at having minimal deterministic builds. For example, if you wanted to build only hello.com then you could do that as follows: ```sh build/bootstrap/make.com o//examples/hello.com ``` Sometimes it's desirable to build a subset of targets, without having to list out each individual one. You can do that by asking make to build a directory name. For example, if you wanted to build only the targets and subtargets of the chibicc package including its tests, you would say: ```sh build/bootstrap/make.com o//third_party/chibicc o//third_party/chibicc/chibicc.com --help ``` Cosmopolitan provides a variety of build modes. For example, if you want really tiny binaries (as small as 12kb in size) then you'd say: ```sh build/bootstrap/make.com m=tiny ``` Here's some other build modes you can try: ```sh build/bootstrap/make.com m=dbg # asan + ubsan + debug build/bootstrap/make.com m=asan # production memory safety build/bootstrap/make.com m=opt # -march=native optimizations build/bootstrap/make.com m=rel # traditional release binaries build/bootstrap/make.com m=optlinux # optimal linux-only performance build/bootstrap/make.com m=fastbuild # build 28% faster w/o debugging build/bootstrap/make.com m=tinylinux # tiniest linux-only 4kb binaries ``` For further details, see [//build/config.mk](build/config.mk). ## GDB Here's the recommended `~/.gdbinit` config: ```gdb set host-charset UTF-8 set target-charset UTF-8 set target-wide-charset UTF-8 set osabi none set complaints 0 set confirm off set history save on set history filename ~/.gdb_history define asm layout asm layout reg end define src layout src layout reg end src ``` You normally run the `.com.dbg` file under gdb. If you need to debug the `.com` file itself, then you can load the debug symbols independently as ``` gdb foo.com -ex 'add-symbol-file foo.com.dbg 0x401000' ``` ## Support Vector | Platform | Min Version | Circa | | :--- | ---: | ---: | | AMD | K8 Venus | 2005 | | Intel | Core | 2006 | | Linux | 2.6.18 | 2007 | | Windows | 8 [1] | 2012 | | Mac OS X | 15.6 | 2018 | | OpenBSD | 6.4 | 2018 | | FreeBSD | 13 | 2020 | | NetBSD | 9.2 | 2021 | [1] See our [vista branch](https://github.com/jart/cosmopolitan/tree/vista) for a community supported version of Cosmopolitan that works on Windows Vista and Windows 7. ## Special Thanks Funding for this project is crowdsourced using [GitHub Sponsors](https://github.com/sponsors/jart) and [Patreon](https://www.patreon.com/jart). Your support is what makes this project possible. Thank you! We'd also like to give special thanks to the following groups and individuals: - [Joe Drumgoole](https://github.com/jdrumgoole) - [Rob Figueiredo](https://github.com/robfig) - [Wasmer](https://wasmer.io/) For publicly sponsoring our work at the highest tier.
597
OpenPrinting CUPS Sources
OpenPrinting CUPS v2.4.2 ======================== ![Version](https://img.shields.io/github/v/release/openprinting/cups?include_prereleases) ![Apache 2.0](https://img.shields.io/github/license/openprinting/cups) [![Build and Test](https://github.com/OpenPrinting/cups/workflows/Build%20and%20Test/badge.svg)](https://github.com/OpenPrinting/cups/actions/workflows/build.yml) [![Coverity Scan](https://img.shields.io/coverity/scan/23806)](https://scan.coverity.com/projects/openprinting-cups) Introduction ------------ OpenPrinting CUPS is the most current version of CUPS, a standards-based, open source printing system for Linux® and other Unix®-like operating systems. CUPS supports printing to: - [AirPrint™][1] and [IPP Everywhere™][2] printers, - Network and local (USB) printers with Printer Applications, and - Network and local (USB) printers with (legacy) PPD-based printer drivers. CUPS provides the System V ("lp") and Berkeley ("lpr") command-line interfaces, a configurable web interface, a C API, and common print filters, drivers, and backends for printing. The [cups-filters][3] project provides additional filters and drivers. CUPS is licensed under the Apache License Version 2.0 with an exception to allow linking against GNU GPL2-only software. See the files `LICENSE` and `NOTICE` for more information. > Note: Apple maintains a separate repository for the CUPS that ships with macOS > and iOS at <https://github.com/apple/cups>. [1]: https://support.apple.com/en-us/HT201311 [2]: https://www.pwg.org/ipp/everywhere.html [3]: https://github.com/openprinting/cups-filters Reading the Documentation ------------------------- Initial documentation to get you started is provided in the root directory of the CUPS sources: - `CHANGES.md`: A list of changes in the current major release of CUPS. - `CONTRIBUTING.md`: Guidelines for contributing to the CUPS project. - `CREDITS.md`: A list of past contributors to the CUPS project. - `DEVELOPING.md`: Guidelines for developing code for the CUPS project. - `INSTALL.md`: Instructions for building and installing CUPS. - `LICENSE`: The CUPS license agreement (Apache 2.0). - `NOTICE`: Copyright notices and exceptions to the CUPS license agreement. - `README.md`: This file. - `REPORTING_ISSUES.md`: Instructions what information to provide when reporting an issue. Once you have installed the software you can access the documentation (and a bunch of other stuff) online at <http://localhost:631/> and using the `man` command, for example `man cups`. If you're having trouble getting that far, the documentation is located under the `doc/help` and `man` directories. *Please read the documentation before asking questions.* Setting Up Printers ------------------- CUPS includes a web-based administration tool that allows you to manage printers, classes, and jobs on your server. Open <http://localhost:631/admin/> in your browser to access the printer administration tools. You will be asked for the administration password (root or any other user in the "sys", "system", "root", "admin", or "lpadmin" group on your system) when performing any administrative function. The `lpadmin` command is used to manage printers from the command-line. For example, the following command creates a print queue called "myprinter" for an IPP Everywhere printer at address "11.22.33.44": lpadmin -p myprinter -E -v "ipp://11.22.33.44/ipp/print" -m everywhere The `-p` option specifies the printer name. The `-E` option enables the printer and accepts new print jobs immediately. The `-v` option specifies the *device URI* for the printer, which tells CUPS how to communicate with the printer. And the `-m` option specifies the model (driver) to use, in this case the IPP Everywhere ("everywhere") driver that is used for AirPrint and IPP Everywhere printers as well as shared printers and printers supported through Printer Applications. Legacy printers are supported using PPD (PostScript Printer Description) files that describe printer capabilities and driver programs needed for each printer. CUPS includes several sample PPD files for common legacy printers: Driver | PPD Name -----------------------------|------------------------------ Dymo Label Printers | drv:///sample.drv/dymo.ppd Intellitech Intellibar | drv:///sample.drv/intelbar.ppd EPSON 9-pin Series | drv:///sample.drv/epson9.ppd EPSON 24-pin Series | drv:///sample.drv/epson24.ppd Generic PCL Laser Printer | drv:///sample.drv/generpcl.ppd Generic PostScript Printer | drv:///sample.drv/generic.ppd HP DeskJet Series | drv:///sample.drv/deskjet.ppd HP LaserJet Series | drv:///sample.drv/laserjet.ppd OKIDATA 9-Pin Series | drv:///sample.drv/okidata9.ppd OKIDATA 24-Pin Series | drv:///sample.drv/okidat24.ppd Zebra CPCL Label Printer | drv:///sample.drv/zebracpl.ppd Zebra EPL1 Label Printer | drv:///sample.drv/zebraep1.ppd Zebra EPL2 Label Printer | drv:///sample.drv/zebraep2.ppd Zebra ZPL Label Printer | drv:///sample.drv/zebra.ppd The sample drivers provide basic printing capabilities, but generally do not exercise the full potential of the printers or CUPS. Other drivers provide greater printing capabilities. You can run the `lpinfo -m` command to list all of the available drivers: lpinfo -m Similarly, the `lpinfo -v` command lists the available printers and their device URIs: lpinfo -v Once you know the device URI and driver name, add the printer using the `lpadmin` command: lpadmin -p PRINTER-NAME -E -v "DEVICE-URI" -m DRIVER-NAME Printing Files -------------- CUPS provides both the System V `lp` and Berkeley `lpr` commands for printing: lp FILENAME lpr FILENAME Both the `lp` and `lpr` commands support printing options: lp -o media=A4 -o resolution=600dpi FILENAME lpr -o media=A4 -o resolution=600dpi FILENAME CUPS recognizes many types of images files as well as PDF, PostScript, and text files, so you can print those files directly rather than through an application. If you have an application that generates output specifically for your printer then you need to use the `-oraw` or `-l` options: lp -o raw FILENAME lpr -l FILENAME This will prevent the filters from misinterpreting your print file. Legal Stuff ----------- Copyright © 2020-2023 by OpenPrinting Copyright © 2007-2020 by Apple Inc. Copyright © 1997-2007 by Easy Software Products. CUPS is provided under the terms of the Apache License, Version 2.0 with exceptions for GPL2/LGPL2 software. A copy of this license can be found in the file `LICENSE`. Additional legal information is provided in the file `NOTICE`. Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.
598
Euro Truck Simulator 2 autonomous driving solution
# <img src="https://github.com/bethesirius/ChosunTruck/blob/master/README/Logo.png" width="64">ChosunTruck ## Introduction ChosunTruck is an autonomous driving solution for [Euro Truck Simulator 2](https://eurotrucksimulator2.com/). Recently, autonomous driving technology has become a big issue and as a result we have been studying technology that incorporates this. It is being developed in a simulated environment called Euro Truck Simulator 2 to allow us to study it using vehicles. We chose Euro Truck Simulator 2 because this simulator provides a good test environment that is similar to the real road. ## Features * You can drive a vehicle without handling it yourself. * You can understand the principles of autonomous driving. * (Experimental/Linux only) You can detect where other vehicles are. ## How To Run It ### Windows #### Dependencies - OS: Windows 7, 10 (64bit) - IDE: Visual Studio 2013, 2015 - OpenCV version: >= 3.1 - [Cuda Toolkit 7.5](https://developer.nvidia.com/cuda-75-downloads-archive) (Note: Do an ADVANCED INSTALLATION. ONLY install the Toolkit + Integration to Visual Studio. Do NOT install the drivers + other stuff it would normally give you. Once installed, your project properties should look like this: https://i.imgur.com/e7IRtjy.png) - If you have a problem during installation, look at our [Windows Installation wiki page](https://github.com/bethesirius/ChosunTruck/wiki/Windows-Installation) #### Required to allow input to work in Windows: - **Go to C:\Users\YOURUSERNAME\Documents\Euro Truck Simulator 2\profiles and edit controls.sii from** ``` config_lines[0]: "device keyboard `di8.keyboard`" config_lines[1]: "device mouse `fusion.mouse`" ``` to ``` config_lines[0]: "device keyboard `sys.keyboard`" config_lines[1]: "device mouse `sys.mouse`" ``` (thanks Komat!) - **While you are in controls.sii, make sure your sensitivity is set to:** ``` config_lines[33]: "constant c_rsteersens 0.775000" config_lines[34]: "constant c_asteersens 4.650000" ``` #### Then: - Set controls.sii to read-only - Open the visual studio project and build it. - Run ETS2 in windowed mode and set resolution to 1024 * 768.(It will work properly with 1920 * 1080 screen resolution and 1024 * 768 window mode ETS2.) ### Linux #### Dependencies - OS: Ubuntu 16.04 LTS - [OpenCV version: >= 3.1](http://embedonix.com/articles/image-processing/installing-opencv-3-1-0-on-ubuntu/) - (Optional) Tensorflow version: >= 0.12.1 ### Build the source code with the following command (inside the linux directory). ``` make ``` ### If you want the car detection function then: ```` make Drive ```` #### Then: - Run ETS2 in windowed mode and set its resolution to 1024 * 768. (It will work properly with 1920 * 1080 screen resolution and 1024 * 768 windowed mode ETS2) - It cannot find the ETS2 window automatically. Move the ETS2 window to the right-down corner to fix this. - In ETS2 Options, set controls to 'Keyboard + Mouse Steering', 'left click' to acclerate, and 'right click' to brake. - Go to a highway and set the truck's speed to 40~60km/h. (I recommend you turn on cruise mode to set the speed easily) - Run this program! #### To enable car detection mode, add -D or --Car_Detection. ``` ./ChosunTruck [-D|--Car_Detection] ``` ## Troubleshooting See [Our wiki page](https://github.com/bethesirius/ChosunTruck/wiki/Troubleshooting). If you have some problems running this project, reference the demo video below. Or, [open a issue to contact our team](https://github.com/bethesirius/ChosunTruck/issues). ## Demo Video Lane Detection (Youtube link) [![youtube link](http://img.youtube.com/vi/vF7J_uC045Q/0.jpg)](http://www.youtube.com/watch?v=vF7J_uC045Q) [![youtube link](http://img.youtube.com/vi/qb99czlIklA/0.jpg)](http://www.youtube.com/watch?v=qb99czlIklA) Lane Detection + Vehicle Detection (Youtube link) [![youtube link](http://img.youtube.com/vi/w6H2eGEvzvw/0.jpg)](http://www.youtube.com/watch?v=w6H2eGEvzvw) ## Todo * For better detection performance, Change the Tensorbox to YOLO2. * The information from in-game screen have Restrictions. Read ETS2 process memory to collect more driving environment data. ## Founders - Chiwan Song, [email protected] - JaeCheol Sim, [email protected] - Seongjoon Chu, [email protected] ## Contributors - [zappybiby](https://github.com/zappybiby) ## How To Contribute Anyone who is interested in this project is welcome! Just fork it and pull requests! ## License ChosunTruck, Euro Truck Simulator 2 auto driving solution Copyright (C) 2017 chi3236, bethesirius, uoyssim This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see <http://www.gnu.org/licenses/>.
599
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
# PENTESTING-BIBLE # Explore more than 2000 hacking articles saved over time as PDF. BROWSE HISTORY. # Created By Ammar Amer (Twitter @cry__pto) ## Support. *Paypal:* [![Donate via Paypal](https://www.paypalobjects.com/en_GB/i/btn/btn_donateCC_LG.gif)](https://paypal.me/AmmarAmerHacker) -1- 3 Ways Extract Password Hashes from NTDS.dit: https://www.hackingarticles.in/3-ways-extract-password-hashes-from-ntds-dit -2- 3 ways to Capture HTTP Password in Network PC: https://www.hackingarticles.in/3-ways-to-capture-http-password-in-network-pc/ -3- 3 Ways to Crack Wifi using Pyrit,oclHashcat and Cowpatty: www.hackingarticles.in/3-ways-crack-wifi-using-pyrit-oclhashcat-cowpatty/ -4-BugBounty @ Linkedln-How I was able to bypass Open Redirection Protection: https://medium.com/p/2e143eb36941 -5-BugBounty — “Let me reset your password and login into your account “-How I was able to Compromise any User Account via Reset Password Functionality: https://medium.com/p/a11bb5f863b3/share/twitter -6-“Journey from LFI to RCE!!!”-How I was able to get the same in one of the India’s popular property buy/sell company: https://medium.com/p/a69afe5a0899 -7-BugBounty — “I don’t need your current password to login into your account” - How could I completely takeover any user’s account in an online classi ed ads company: https://medium.com/p/e51a945b083d -8-BugBounty — “How I was able to shop for free!”- Payment Price Manipulation: https://medium.com/p/b29355a8e68e -9-Recon — my way: https://medium.com/p/82b7e5f62e21 -10-Reconnaissance: a eulogy in three acts: https://medium.com/p/7840824b9ef2 -11-Red-Teaming-Toolkit: https://github.com/infosecn1nja/Red-Teaming-Toolkit -12-Red Team Tips: https://vincentyiu.co.uk/ -13-Shellcode: A reverse shell for Linux in C with support for TLS/SSL: https://modexp.wordpress.com/2019/04/24/glibc-shellcode/ -14-Shellcode: Encrypting traffic: https://modexp.wordpress.com/2018/08/17/shellcode-encrypting-traffic/ -15-Penetration Testing of an FTP Server: https://medium.com/p/19afe538be4b -16-Reverse Engineering of the Anubis Malware — Part 1: https://medium.com/p/741e12f5a6bd -17-Privilege Escalation on Linux with Live examples: https://resources.infosecinstitute.com/privilege-escalation-linux-live-examples/ -18-Pentesting Cheatsheets: https://ired.team/offensive-security-experiments/offensive-security-cheetsheets -19-Powershell Payload Delivery via DNS using Invoke-PowerCloud: https://ired.team/offensive-security-experiments/payload-delivery-via-dns-using-invoke-powercloud -20-SMART GOOGLE SEARCH QUERIES TO FIND VULNERABLE SITES – LIST OF 4500+ GOOGLE DORKS: https://sguru.org/ghdb-download-list-4500-google-dorks-free/ -21-SQL Injection Cheat Sheet: https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/ -22-SQLmap’s os-shell + Backdooring website with Weevely: https://medium.com/p/8cb6dcf17fa4 -23-SQLMap Tamper Scripts (SQL Injection and WAF bypass) Tips: https://medium.com/p/c5a3f5764cb3 -24-Top 10 Essential NMAP Scripts for Web App Hacking: https://medium.com/p/c7829ff5ab7 -25-BugBounty — How I was able to download the Source Code of India’s Largest Telecom Service Provider including dozens of more popular websites!: https://medium.com/p/52cf5c5640a1 -26-Re ected XSS Bypass Filter: https://medium.com/p/de41d35239a3 -27-XSS Payloads, getting past alert(1): https://medium.com/p/217ab6c6ead7 -28-XS-Searching Google’s bug tracker to find out vulnerable source code Or how side-channel timing attacks aren’t that impractical: https://medium.com/p/50d8135b7549 -29-Web Application Firewall (WAF) Evasion Techniques: https://medium.com/@themiddleblue/web-application-firewall-waf-evasion-techniques -30-OSINT Resources for 2019: https://medium.com/p/b15d55187c3f -31-The OSINT Toolkit: https://medium.com/p/3b9233d1cdf9 -32-OSINT : Chasing Malware + C&C Servers: https://medium.com/p/3c893dc1e8cb -33-OSINT tool for visualizing relationships between domains, IPs and email addresses: https://medium.com/p/94377aa1f20a -34-From OSINT to Internal – Gaining Access from outside the perimeter: https://www.n00py.io/.../from-osint-to-internal-gaining-access-from-the-outside-the-perimeter -35-Week in OSINT #2018–35: https://medium.com/p/b2ab1765157b -36-Week in OSINT #2019–14: https://medium.com/p/df83f5b334b4 -37-Instagram OSINT | What A Nice Picture: https://medium.com/p/8f4c7edfbcc6 -38-awesome-osint: https://github.com/jivoi/awesome-osint -39-OSINT_Team_Links: https://github.com/IVMachiavelli/OSINT_Team_Links -40-Open-Source Intelligence (OSINT) Reconnaissance: https://medium.com/p/75edd7f7dada -41-Hacking Cryptocurrency Miners with OSINT Techniques: https://medium.com/p/677bbb3e0157 -42-A penetration tester’s guide to sub- domain enumeration: https://blog.appsecco.com/a-penetration-testers-guide-to-sub-domain-enumeration-7d842d5570f6?gi=f44ec9d8f4b5 -43-Packages that actively seeks vulnerable exploits in the wild. More of an umbrella group for similar packages: https://blackarch.org/recon.html -44-What tools I use for my recon during BugBounty: https://medium.com/p/ec25f7f12e6d -45-Command and Control – DNS: https://pentestlab.blog/2017/09/06/command-and-control-dns/ -46-Command and Control – WebDAV: https://pentestlab.blog/2017/09/12/command-and-control-webdav/ -47-Command and Control – Twitter: https://pentestlab.blog/2017/09/26/command-and-control-twitter/ -48-Command and Control – Kernel: https://pentestlab.blog/2017/10/02/command-and-control-kernel/ -49-Source code disclosure via exposed .git folder: https://pentester.land/tutorials/.../source-code-disclosure-via-exposed-git-folder.html -50-Pentesting Cheatsheet: https://hausec.com/pentesting-cheatsheet/ -51-Windows Userland Persistence Fundamentals: https://www.fuzzysecurity.com/tutorials/19.html -52-A technique that a lot of SQL injection beginners don’t know | Atmanand Nagpure write-up: https://medium.com/p/abdc7c269dd5 -53-awesome-bug-bounty: https://github.com/djadmin/awesome-bug-bounty -54-dostoevsky-pentest-notes: https://github.com/dostoevskylabs/dostoevsky-pentest-notes -55-awesome-pentest: https://github.com/enaqx/awesome-pentest -56-awesome-windows-exploitation: https://github.com/enddo/awesome-windows-exploitation -57-awesome-exploit-development: https://github.com/FabioBaroni/awesome-exploit-development -58-BurpSuit + SqlMap = One Love: https://medium.com/p/64451eb7b1e8 -59-Crack WPA/WPA2 Wi-Fi Routers with Aircrack-ng and Hashcat: https://medium.com/p/a5a5d3ffea46 -60-DLL Injection: https://pentestlab.blog/2017/04/04/dll-injection -61-DLL Hijacking: https://pentestlab.blog/2017/03/27/dll-hijacking -62-My Recon Process — DNS Enumeration: https://medium.com/p/d0e288f81a8a -63-Google Dorks for nding Emails, Admin users etc: https://d4msec.wordpress.com/2015/09/03/google-dorks-for-finding-emails-admin-users-etc -64-Google Dorks List 2018: https://medium.com/p/fb70d0cbc94 -65-Hack your own NMAP with a BASH one-liner: https://medium.com/p/758352f9aece -66-UNIX / LINUX CHEAT SHEET: cheatsheetworld.com/programming/unix-linux-cheat-sheet/ -67-Linux Capabilities Privilege Escalation via OpenSSL with SELinux Enabled and Enforced: https://medium.com/p/74d2bec02099 -68- information gathering: https://pentestlab.blog/category/information-gathering/ -69-post exploitation: https://pentestlab.blog/category/post-exploitation/ -70-privilege escalation: https://pentestlab.blog/category/privilege-escalation/ -71-red team: https://pentestlab.blog/category/red-team/ -72-The Ultimate Penetration Testing Command Cheat Sheet for Linux: https://www.hackingloops.com/command-cheat-sheet-for-linux/ -73-Web Application Penetration Testing Cheat Sheet: https://jdow.io/blog/2018/03/18/web-application-penetration-testing-methodology/ -74-Windows Kernel Exploits: https://pentestlab.blog/2017/04/24/windows-kernel-exploits -75-Windows oneliners to download remote payload and execute arbitrary code: https://arno0x0x.wordpress.com/2017/11/20/windows-oneliners-to-download-remote-payload-and-execute-arbitrary-code/ -76-Windows-Post-Exploitation: https://github.com/emilyanncr/Windows-Post-Exploitation -77-Windows Post Exploitation Shells and File Transfer with Netcat for Windows: https://medium.com/p/a2ddc3557403 -78-Windows Privilege Escalation Fundamentals: https://www.fuzzysecurity.com/tutorials/16.html -79-Windows Privilege Escalation Guide: www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/ -80-Windows Active Directory Post Exploitation Cheatsheet: https://medium.com/p/48c2bd70388 -81-Windows Exploitation Tricks: Abusing the User-Mode Debugger: https://googleprojectzero.blogspot.com/2019/04/windows-exploitation-tricks-abusing.html -82-VNC Penetration Testing (Port 5901): http://www.hackingarticles.in/vnc-penetration-testing -83- Big List Of Google Dorks Hacking: https://xspiyr.wordpress.com/2012/09/05/big-list-of-google-dorks-hacking -84-List of google dorks for sql injection: https://deadlyhacker.wordpress.com/2013/05/09/list-of-google-dorks-for-sql-injection/ -85-Download Google Dorks List 2019: https://medium.com/p/323c8067502c -86-Comprehensive Guide to Sqlmap (Target Options): http://www.hackingarticles.in/comprehensive-guide-to-sqlmap-target-options15249-2 -87-EMAIL RECONNAISSANCE AND PHISHING TEMPLATE GENERATION MADE SIMPLE: www.cybersyndicates.com/.../email-reconnaissance-phishing-template-generation-made-simple -88-Comprehensive Guide on Gobuster Tool: https://www.hackingarticles.in/comprehensive-guide-on-gobuster-tool/ -89-My Top 5 Web Hacking Tools: https://medium.com/p/e15b3c1f21e8 -90-[technical] Pen-testing resources: https://medium.com/p/cd01de9036ad -91-File System Access on Webserver using Sqlmap: http://www.hackingarticles.in/file-system-access-on-webserver-using-sqlmap -92-kali-linux-cheatsheet: https://github.com/NoorQureshi/kali-linux-cheatsheet -93-Pentesting Cheatsheet: https://anhtai.me/pentesting-cheatsheet/ -94-Command Injection Exploitation through Sqlmap in DVWA (OS-cmd): http://www.hackingarticles.in/command-injection-exploitation-through-sqlmap-in-dvwa -95-XSS Payload List - Cross Site Scripting Vulnerability Payload List: https://www.kitploit.com/2018/05/xss-payload-list-cross-site-scripting.html -96-Analyzing CVE-2018-6376 – Joomla!, Second Order SQL Injection: https://www.notsosecure.com/analyzing-cve-2018-6376/ -97-Exploiting Sql Injection with Nmap and Sqlmap: http://www.hackingarticles.in/exploiting-sql-injection-nmap-sqlmap -98-awesome-malware-analysis: https://github.com/rshipp/awesome-malware-analysis -99-Anatomy of UAC Attacks: https://www.fuzzysecurity.com/tutorials/27.html -100-awesome-cyber-skills: https://github.com/joe-shenouda/awesome-cyber-skills -101-5 ways to Banner Grabbing: http://www.hackingarticles.in/5-ways-banner-grabbing -102-6 Ways to Hack PostgresSQL Login: http://www.hackingarticles.in/6-ways-to-hack-postgressql-login -103-6 Ways to Hack SSH Login Password: http://www.hackingarticles.in/6-ways-to-hack-ssh-login-password -104-10 Free Ways to Find Someone’s Email Address: https://medium.com/p/e6f37f5fe10a -105-USING A SCF FILE TO GATHER HASHES: https://1337red.wordpress.com/using-a-scf-file-to-gather-hashes -106-Hack Remote Windows PC using DLL Files (SMB Delivery Exploit): http://www.hackingarticles.in/hack-remote-windows-pc-using-dll-files-smb-delivery-exploit 107-Hack Remote Windows PC using Office OLE Multiple DLL Hijack Vulnerabilities: http://www.hackingarticles.in/hack-remote-windows-pc-using-office-ole-multiple-dll-hijack-vulnerabilities -108-BUG BOUNTY HUNTING (METHODOLOGY , TOOLKIT , TIPS & TRICKS , Blogs): https://medium.com/p/ef6542301c65 -109-How To Perform External Black-box Penetration Testing in Organization with “ZERO” Information: https://gbhackers.com/external-black-box-penetration-testing -110-A Complete Penetration Testing & Hacking Tools List for Hackers & Security Professionals: https://gbhackers.com/hacking-tools-list -111-Most Important Considerations with Malware Analysis Cheats And Tools list: https://gbhackers.com/malware-analysis-cheat-sheet-and-tools-list -112-Awesome-Hacking: https://github.com/Hack-with-Github/Awesome-Hacking -113-awesome-threat-intelligence: https://github.com/hslatman/awesome-threat-intelligence -114-awesome-yara: https://github.com/InQuest/awesome-yara -115-Red-Team-Infrastructure-Wiki: https://github.com/bluscreenofjeff/Red-Team-Infrastructure-Wiki -116-awesome-pentest: https://github.com/enaqx/awesome-pentest -117-awesome-cyber-skills: https://github.com/joe-shenouda/awesome-cyber-skills -118-pentest-wiki: https://github.com/nixawk/pentest-wiki -119-awesome-web-security: https://github.com/qazbnm456/awesome-web-security -120-Infosec_Reference: https://github.com/rmusser01/Infosec_Reference -121-awesome-iocs: https://github.com/sroberts/awesome-iocs -122-blackhat-arsenal-tools: https://github.com/toolswatch/blackhat-arsenal-tools -123-awesome-social-engineering: https://github.com/v2-dev/awesome-social-engineering -124-Penetration Testing Framework 0.59: www.vulnerabilityassessment.co.uk/Penetration%20Test.html -125-Penetration Testing Tools Cheat Sheet : https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/ -126-SN1PER – A Detailed Explanation of Most Advanced Automated Information Gathering & Penetration Testing Tool: https://gbhackers.com/sn1per-a-detailed-explanation-of-most-advanced-automated-information-gathering-penetration-testing-tool -127-Spear Phishing 101: https://blog.inspired-sec.com/archive/2017/05/07/Phishing.html -128-100 ways to discover (part 1): https://sylarsec.com/2019/01/11/100-ways-to-discover-part-1/ -129-Comprehensive Guide to SSH Tunnelling: http://www.hackingarticles.in/comprehensive-guide-to-ssh-tunnelling/ -130-Capture VNC Session of Remote PC using SetToolkit: http://www.hackingarticles.in/capture-vnc-session-remote-pc-using-settoolkit/ -131-Hack Remote PC using PSEXEC Injection in SET Toolkit: http://www.hackingarticles.in/hack-remote-pc-using-psexec-injection-set-toolkit/ -132-Denial of Service Attack on Network PC using SET Toolkit: http://www.hackingarticles.in/denial-of-service-attack-on-network-pc-using-set-toolkit/ -133-Hack Gmail and Facebook of Remote PC using DNS Spoofing and SET Toolkit: http://www.hackingarticles.in/hack-gmail-and-facebook-of-remote-pc-using-dns-spoofing-and-set-toolkit/ -134-Hack Any Android Phone with DroidJack (Beginner’s Guide): http://www.hackingarticles.in/hack-android-phone-droidjack-beginners-guide/ -135-HTTP RAT Tutorial for Beginners: http://www.hackingarticles.in/http-rat-tutorial-beginners/ -136-5 ways to Create Permanent Backdoor in Remote PC: http://www.hackingarticles.in/5-ways-create-permanent-backdoor-remote-pc/ -137-How to Enable and Monitor Firewall Log in Windows PC: http://www.hackingarticles.in/enable-monitor-firewall-log-windows-pc/ -138-EMPIRE TIPS AND TRICKS: https://enigma0x3.net/2015/08/26/empire-tips-and-tricks/ -139-CSRF account takeover Explained Automated/Manual: https://medium.com/p/447e4b96485b -140-CSRF Exploitation using XSS: http://www.hackingarticles.in/csrf-exploitation-using-xss -141-Dumping Domain Password Hashes: https://pentestlab.blog/2018/07/04/dumping-domain-password-hashes/ -142-Empire Post Exploitation – Unprivileged Agent to DA Walkthrough: https://bneg.io/2017/05/24/empire-post-exploitation/ -143-Dropbox for the Empire: https://bneg.io/2017/05/13/dropbox-for-the-empire/ -144-Empire without PowerShell.exe: https://bneg.io/2017/07/26/empire-without-powershell-exe/ -145-REVIVING DDE: USING ONENOTE AND EXCEL FOR CODE EXECUTION: https://enigma0x3.net/2018/01/29/reviving-dde-using-onenote-and-excel-for-code-execution/ -146-PHISHING WITH EMPIRE: https://enigma0x3.net/2016/03/15/phishing-with-empire/ -146-BYPASSING UAC ON WINDOWS 10 USING DISK CLEANUP: https://enigma0x3.net/2016/07/22/bypassing-uac-on-windows-10-using-disk-cleanup/ -147-“FILELESS” UAC BYPASS USING EVENTVWR.EXE AND REGISTRY HIJACKING: https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking/ -148-“FILELESS” UAC BYPASS USING SDCLT.EXE: https://enigma0x3.net/2017/03/17/fileless-uac-bypass-using-sdclt-exe/ -149-PHISHING AGAINST PROTECTED VIEW: https://enigma0x3.net/2017/07/13/phishing-against-protected-view/ -150-LATERAL MOVEMENT USING EXCEL.APPLICATION AND DCOM: https://enigma0x3.net/2017/09/11/lateral-movement-using-excel-application-and-dcom/ -151-enum4linux Cheat Sheet: https://highon.coffee/blog/enum4linux-cheat-sheet/ -152-enumeration: https://technologyredefine.blogspot.com/2017/11/enumeration.html -153-Command and Control – WebSocket: https://pentestlab.blog/2017/12/06/command-and-control-websocket -154-Command and Control – WMI: https://pentestlab.blog/2017/11/20/command-and-control-wmi -155-Dangerous Virus For Windows Crashes Everything Hack window Using Virus: http://thelearninghacking.com/create-virus-hack-windows/ -156-Comprehensive Guide to Nmap Port Status: http://www.hackingarticles.in/comprehensive-guide-nmap-port-status -157-Commix – Automated All-in-One OS Command Injection and Exploitation Tool: https://gbhackers.com/commix-automated-all-in-one-os-command-injection-and-exploitation-tool -158-Compromising Jenkins and extracting credentials: https://www.n00py.io/2017/01/compromising-jenkins-and-extracting-credentials/ -159-footprinting: https://technologyredefine.blogspot.com/2017/09/footprinting_17.html -160-awesome-industrial-control-system-security: https://github.com/hslatman/awesome-industrial-control-system-security -161-xss-payload-list: https://github.com/ismailtasdelen/xss-payload-list -162-awesome-vehicle-security: https://github.com/jaredthecoder/awesome-vehicle-security -163-awesome-osint: https://github.com/jivoi/awesome-osint -164-awesome-python: https://github.com/vinta/awesome-python -165-Microsoft Windows - UAC Protection Bypass (Via Slui File Handler Hijack) (Metasploit): https://www.exploit-db.com/download/44830.rb -166-nbtscan Cheat Sheet: https://highon.coffee/blog/nbtscan-cheat-sheet/ -167-neat-tricks-to-bypass-csrfprotection: www.slideshare.net/0ang3el/neat-tricks-to-bypass-csrfprotection -168-ACCESSING CLIPBOAR D FROM THE LOC K SC REEN IN WI NDOWS 10 #2: https://oddvar.moe/2017/01/27/access-clipboard-from-lock-screen-in-windows-10-2/ -169-NMAP CHEAT-SHEET (Nmap Scanning Types, Scanning Commands , NSE Scripts): https://medium.com/p/868a7bd7f692 -170-Nmap Cheat Sheet: https://highon.coffee/blog/nmap-cheat-sheet/ -171-Powershell Without Powershell – How To Bypass Application Whitelisting, Environment Restrictions & AV: https://www.blackhillsinfosec.com/powershell-without-powershell-how-to-bypass-application-whitelisting-environment-restrictions-av/ -172-Phishing with PowerPoint: https://www.blackhillsinfosec.com/phishing-with-powerpoint/ -173-hide-payload-ms-office-document-properties: https://www.blackhillsinfosec.com/hide-payload-ms-office-document-properties/ -174-How to Evade Application Whitelisting Using REGSVR32: https://www.blackhillsinfosec.com/evade-application-whitelisting-using-regsvr32/ -175-How to Build a C2 Infrastructure with Digital Ocean – Part 1: https://www.blackhillsinfosec.com/build-c2-infrastructure-digital-ocean-part-1/ -176-WordPress Penetration Testing using Symposium Plugin SQL Injection: http://www.hackingarticles.in/wordpress-penetration-testing-using-symposium-plugin-sql-injection -177-Manual SQL Injection Exploitation Step by Step: http://www.hackingarticles.in/manual-sql-injection-exploitation-step-step -178-MSSQL Penetration Testing with Metasploit: http://www.hackingarticles.in/mssql-penetration-testing-metasploit -179-Multiple Ways to Get root through Writable File: http://www.hackingarticles.in/multiple-ways-to-get-root-through-writable-file -180-MySQL Penetration Testing with Nmap: http://www.hackingarticles.in/mysql-penetration-testing-nmap -181-NetBIOS and SMB Penetration Testing on Windows: http://www.hackingarticles.in/netbios-and-smb-penetration-testing-on-windows -182-Network Packet Forensic using Wireshark: http://www.hackingarticles.in/network-packet-forensic-using-wireshark -183-Escape and Evasion Egressing Restricted Networks: https://www.optiv.com/blog/escape-and-evasion-egressing-restricted-networks/ -183-Awesome-Hacking-Resources: https://github.com/vitalysim/Awesome-Hacking-Resources -184-Hidden directories and les as a source of sensitive information about web application: https://medium.com/p/84e5c534e5ad -185-Hiding Registry keys with PSRe ect: https://posts.specterops.io/hiding-registry-keys-with-psreflect-b18ec5ac8353 -186-awesome-cve-poc: https://github.com/qazbnm456/awesome-cve-poc -187-Linux Capabilities Privilege Escalation via OpenSSL with SELinux Enabled and Enforced: https://medium.com/p/74d2bec02099 -188-Post Exploitation in Windows using dir Command: http://www.hackingarticles.in/post-exploitation-windows-using-dir-command 189-Web Application Firewall (WAF) Evasion Techniques #2: https://medium.com/secjuice/web-application-firewall-waf-evasion-techniques-2-125995f3e7b0 -190-Forensics Investigation of Remote PC (Part 1): http://www.hackingarticles.in/forensics-investigation-of-remote-pc-part-1 -191-CloudFront Hijacking: https://www.mindpointgroup.com/blog/pen-test/cloudfront-hijacking/ -192-PowerPoint and Custom Actions: https://cofense.com/powerpoint-and-custom-actions/ -193-Privilege Escalation on Windows 7,8,10, Server 2008, Server 2012 using Potato: http://www.hackingarticles.in/privilege-escalation-on-windows-7810-server-2008-server-2012-using-potato -194-How to intercept TOR hidden service requests with Burp: https://medium.com/p/6214035963a0 -195-How to Make a Captive Portal of Death: https://medium.com/p/48e82a1d81a/share/twitter -196-How to find any CEO’s email address in minutes: https://medium.com/p/70dcb96e02b0 197-Microsoft Windows 10 - Child Process Restriction Mitigation Bypass: https://www.exploit-db.com/download/44888.txt -198-Microsoft Windows - Token Process Trust SID Access Check Bypass Privilege Escalation: https://www.exploit-db.com/download/44630.txt -199-Microsoft Word upload to Stored XSS: https://www.n00py.io/2018/03/microsoft-word-upload-to-stored-xss/ -200-MobileApp-Pentest-Cheatsheet: https://github.com/tanprathan/MobileApp-Pentest-Cheatsheet -201-awesome: https://github.com/sindresorhus/awesome -201-writing arm shellcode: https://azeria-labs.com/writing-arm-shellcode/ -202-debugging with gdb introduction: https://azeria-labs.com/debugging-with-gdb-introduction/ -203-emulate raspberrypi with qemu: https://azeria-labs.com/emulate-raspberry-pi-with-qemu/ -204-Bash One-Liner to Check Your Password(s) via pwnedpasswords.com’s API Using the k-Anonymity Method: https://medium.com/p/a5807a9a8056 -205-A Red Teamer's guide to pivoting: https://artkond.com/2017/03/23/pivoting-guide/ -206-Using WebDAV features as a covert channel: https://arno0x0x.wordpress.com/2017/09/07/using-webdav-features-as-a-covert-channel/ -207-A View of Persistence: https://rastamouse.me/2018/03/a-view-of-persistence/ -208- pupy websocket transport: https://bitrot.sh/post/28-11-2017-pupy-websocket-transport/ -209-Subdomains Enumeration Cheat Sheet: https://pentester.land/cheatsheets/2018/11/.../subdomains-enumeration-cheatsheet.html -210-DNS Reconnaissance – DNSRecon: https://pentestlab.blog/2012/11/13/dns-reconnaissance-dnsrecon/ -211-Cheatsheets: https://bitrot.sh/cheatsheet -212-Understanding Guide to Nmap Firewall Scan (Part 2): http://www.hackingarticles.in/understanding-guide-nmap-firewall-scan-part-2 -213-Exploit Office 2016 using CVE-2018-0802: https://technologyredefine.blogspot.com/2018/01/exploit-office-2016-using-cve-2018-0802.html -214-windows-exploit-suggester: https://technologyredefine.blogspot.com/2018/01/windows-exploit-suggester.html -215-INSTALLING PRESISTENCE BACKDOOR IN WINDOWS: https://technologyredefine.blogspot.com/2018/01/installing-presistence-backdoor-in.html -216-IDS, IPS AND FIREWALL EVASION USING NMAP: https://technologyredefine.blogspot.com/2017/09/ids-ips-and-firewall-evasion-using-nmap.html -217-Wireless Penetration Testing Checklist – A Detailed Cheat Sheet: https://gbhackers.com/wireless-penetration-testing-checklist-a-detailed-cheat-sheet 218-Most Important Web Application Security Tools & Resources for Hackers and Security Professionals: https://gbhackers.com/web-application-security-tools-resources -219-Web Application Penetration Testing Checklist – A Detailed Cheat Sheet: https://gbhackers.com/web-application-penetration-testing-checklist-a-detailed-cheat-sheet -220-Top 500 Most Important XSS Script Cheat Sheet for Web Application Penetration Testing: https://gbhackers.com/top-500-important-xss-cheat-sheet -221-USBStealer – Password Hacking Tool For Windows Machine Applications: https://gbhackers.com/pasword-hacking -222-Most Important Mobile Application Penetration Testing Cheat sheet with Tools & Resources for Security Professionals: https://gbhackers.com/mobile-application-penetration-testing -223-Metasploit Can Be Directly Used For Hardware Penetration Testing Now: https://gbhackers.com/metasploit-can-be-directly-used-for-hardware-vulnerability-testing-now -224-How to Perform Manual SQL Injection While Pentesting With Single quote Error Based Parenthesis Method: https://gbhackers.com/manual-sql-injection-2 -225-Email Spoo ng – Exploiting Open Relay configured Public Mailservers: https://gbhackers.com/email-spoofing-exploiting-open-relay -226-Email Header Analysis – Received Email is Genuine or Spoofed: https://gbhackers.com/email-header-analysis -227-Most Important Cyber Threat Intelligence Tools List For Hackers and Security Professionals: https://gbhackers.com/cyber-threat-intelligence-tools -228-Creating and Analyzing a Malicious PDF File with PDF-Parser Tool: https://gbhackers.com/creating-and-analyzing-a-malicious-pdf-file-with-pdf-parser-tool -229-Commix – Automated All-in-One OS Command Injection and Exploitation Tool: https://gbhackers.com/commix-automated-all-in-one-os-command-injection-and-exploitation-tool -230-Advanced ATM Penetration Testing Methods: https://gbhackers.com/advanced-atm-penetration-testing-methods -231-A8-Cross-Site Request Forgery (CSRF): https://gbhackers.com/a8-cross-site-request-forgery-csrf -232-Fully undetectable backdooring PE File: https://haiderm.com/fully-undetectable-backdooring-pe-file/ -233-backdooring exe files: https://haiderm.com/tag/backdooring-exe-files/ -234-From PHP (s)HELL to Powershell Heaven: https://medium.com/p/da40ce840da8 -235-Forensic Investigation of Nmap Scan using Wireshark: http://www.hackingarticles.in/forensic-investigation-of-nmap-scan-using-wireshark -236-Unleashing an Ultimate XSS Polyglot: https://github.com/0xsobky/HackVault/wiki -237-wifi-arsenal: https://github.com/0x90/wifi-arsenal -238-XXE_payloads: https://gist.github.com/staaldraad/01415b990939494879b4 -239-xss_payloads_2016: https://github.com/7ioSecurity/XSS-Payloads/raw/master/xss_payloads_2016 -240-A curated list of awesome command-line frameworks, toolkits, guides and gizmos. Inspired by awesome-php.: https://github.com/alebcay/awesome-shell -241-The goal of this repository is to document the most common techniques to bypass AppLocker.: https://github.com/api0cradle/UltimateAppLockerByPassList -242-A curated list of CTF frameworks, libraries, resources and softwares: https://github.com/apsdehal/awesome-ctf -243-A collection of android security related resources: https://github.com/ashishb/android-security-awesome -244-OSX and iOS related security tools: https://github.com/ashishb/osx-and-ios-security-awesome -245-regexp-security-cheatsheet: https://github.com/attackercan/regexp-security-cheatsheet -246-PowerView-2.0 tips and tricks: https://gist.github.com/HarmJ0y/3328d954607d71362e3c -247-A curated list of awesome awesomeness: https://github.com/bayandin/awesome-awesomeness -248-Android App Security Checklist: https://github.com/b-mueller/android_app_security_checklist -249-Crack WPA/WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng/Hashcat: https://github.com/brannondorsey/wifi-cracking -250-My-Gray-Hacker-Resources: https://github.com/bt3gl/My-Gray-Hacker-Resources -251-A collection of tools developed by other researchers in the Computer Science area to process network traces: https://github.com/caesar0301/awesome-pcaptools -252-A curated list of awesome Hacking tutorials, tools and resources: https://github.com/carpedm20/awesome-hacking -253-RFSec-ToolKit is a collection of Radio Frequency Communication Protocol Hacktools.: https://github.com/cn0xroot/RFSec-ToolKit -254-Collection of the cheat sheets useful for pentesting: https://github.com/coreb1t/awesome-pentest-cheat-sheets -255-Collection of the cheat sheets useful for pentesting: https://github.com/coreb1t/awesome-pentest-cheat-sheets -256-Collection of the cheat sheets useful for pentesting: https://github.com/coreb1t/awesome-pentest-cheat-sheets -257-A curated list of awesome forensic analysis tools and resources: https://github.com/cugu/awesome-forensics -258-Open-Redirect-Payloads: https://github.com/cujanovic/Open-Redirect-Payloads -259-A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.: https://github.com/Cyb3rWard0g/ThreatHunter-Playbook -260-Windows memory hacking library: https://github.com/DarthTon/Blackbone -261-A collective list of public JSON APIs for use in security.: https://github.com/deralexxx/security-apis -262-An authoritative list of awesome devsecops tools with the help from community experiments and contributions.: https://github.com/devsecops/awesome-devsecops -263-List of Awesome Hacking places, organised by Country and City, listing if it features power and wifi: https://github.com/diasdavid/awesome-hacking-spots -264-A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups: https://github.com/djadmin/awesome-bug-bounty -265-Notes for taking the OSCP in 2097: https://github.com/dostoevskylabs/dostoevsky-pentest-notes -266-A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom: https://github.com/enddo/awesome-windows-exploitation -267-A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development: https://github.com/FabioBaroni/awesome-exploit-development -268-A curated list of awesome reversing resources: https://github.com/fdivrp/awesome-reversing -269-Git All the Payloads! A collection of web attack payloads: https://github.com/foospidy/payloads -270-GitHub Project Resource List: https://github.com/FuzzySecurity/Resource-List -271-Use your macOS terminal shell to do awesome things.: https://github.com/herrbischoff/awesome-macos-command-line -272-Defeating Windows User Account Control: https://github.com/hfiref0x/UACME -273-Free Security and Hacking eBooks: https://github.com/Hack-with-Github/Free-Security-eBooks -274-Universal Radio Hacker: investigate wireless protocols like a boss: https://github.com/jopohl/urh -275-A curated list of movies every hacker & cyberpunk must watch: https://github.com/k4m4/movies-for-hackers -276-Various public documents, whitepapers and articles about APT campaigns: https://github.com/kbandla/APTnotes -277-A database of common, interesting or useful commands, in one handy referable form: https://github.com/leostat/rtfm -278-A curated list of tools for incident response: https://github.com/meirwah/awesome-incident-response -279-A curated list of awesome guides, tools, and other resources related to the security and compromise of locks, safes, and keys: https://github.com/meitar/awesome-lockpicking -280-A curated list of static analysis tools, linters and code quality checkers for various programming languages: https://github.com/mre/awesome-static-analysis -281-A Collection of Hacks in IoT Space so that we can address them (hopefully): https://github.com/nebgnahz/awesome-iot-hacks -281-A Course on Intermediate Level Linux Exploitation: https://github.com/nnamon/linux-exploitation-course -282-Kali Linux Cheat Sheet for Penetration Testers: https://github.com/NoorQureshi/kali-linux-cheatsheet -283-A curated list of awesome infosec courses and training resources.: https://github.com/onlurking/awesome-infosec -284-A curated list of resources for learning about application security: https://github.com/paragonie/awesome-appsec -285-an awesome list of honeypot resources: https://github.com/paralax/awesome-honeypots 286-GitHub Enterprise SQL Injection: https://www.blogger.com/share-post.g?blogID=2987759532072489303&postID=6980097238231152493 -287-A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis: https://github.com/secfigo/Awesome-Fuzzing -288-PHP htaccess injection cheat sheet: https://github.com/sektioneins/pcc/wiki -289-A curated list of the awesome resources about the Vulnerability Research: https://github.com/sergey-pronin/Awesome-Vulnerability-Research -290-A list of useful payloads and bypass for Web Application Security and Pentest/CTF: https://github.com/swisskyrepo/PayloadsAllTheThings -291-A collection of Red Team focused tools, scripts, and notes: https://github.com/threatexpress/red-team-scripts -292-Awesome XSS stuff: https://github.com/UltimateHackers/AwesomeXSS -293-A collection of hacking / penetration testing resources to make you better!: https://github.com/vitalysim/Awesome-Hacking-Resources -294-Docker Cheat Sheet: https://github.com/wsargent/docker-cheat-sheet -295-Decrypted content of eqgrp-auction-file.tar.xz: https://github.com/x0rz/EQGRP -296-A bunch of links related to Linux kernel exploitation: https://github.com/xairy/linux-kernel-exploitation -297-Penetration Testing 102 - Windows Privilege Escalation Cheatsheet: www.exumbraops.com/penetration-testing-102-windows-privilege-escalation-cheatsheet -298-Pentesting Cheatsheet: https://anhtai.me/pentesting-cheatsheet/ -299-Windows Privilege Escalation Methods for Pentesters: https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/ -300-Penetration Testing Cheat Sheet For Windows Machine – Intrusion Detection: -301-Reading Your Way Around UAC (Part 1): https://tyranidslair.blogspot.co.uk/2017/05/reading-your-way-around-uac-part-1.html -302--Reading Your Way Around UAC (Part 2): https://tyranidslair.blogspot.co.uk/2017/05/reading-your-way-around-uac-part-2.html -303-Executing Metasploit & Empire Payloads from MS Office Document Properties (part 2 of 2): https://stealingthe.network/executing-metasploit-empire-payloads-from-ms-office-document-properties-part-2-of-2/ -304-SSRF - Server Side Request Forgery (Types and ways to exploit it) Part-1: https://medium.com/p/29d034c27978 -304-Automating Cobalt Strike,Aggressor Collection Scripts: https://github.com/bluscreenofjeff/AggressorScripts https://github.com/harleyQu1nn/AggressorScripts -305-Vi Cheat Sheet: https://highon.coffee/blog/vi-cheat-sheet/ -306-Network Recon Cheat Sheet: https://www.cheatography.com/coffeefueled/cheat-sheets/network-recon/ -307-LFI Cheat Sheet: https://highon.coffee/blog/lfi-cheat-sheet/ -308-Systemd Cheat Sheet: https://highon.coffee/blog/systemd-cheat-sheet/ -309-Aircrack-ng Cheatsheet: https://securityonline.info/aircrack-ng-cheatsheet/ -310-Kali Linux Cheat Sheet for Penetration Testers: https://www.blackmoreops.com/?p=7212 -311-Wifi Pentesting Command Cheatsheet: https://randomkeystrokes.com/2016/07/01/wifi-pentesting-cheatsheet/ -312-Android Testing Environment Cheatsheet (Part 1): https://randomkeystrokes.com/2016/10/17/android-testing-environment-cheatsheet/ -313-cheatsheet: https://randomkeystrokes.com/category/cheatsheet/ -314-Reverse Shell Cheat Sheet: https://highon.coffee/blog/reverse-shell-cheat-sheet/ -315-Linux Commands Cheat Sheet: https://highon.coffee/blog/linux-commands-cheat-sheet/ -316-Linux Privilege Escalation using Sudo Rights: http://www.hackingarticles.in/linux-privilege-escalation-using-exploiting-sudo-rights -317-Linux Privilege Escalation using Misconfigured NFS: http://www.hackingarticles.in/linux-privilege-escalation-using-misconfigured-nfs/ -318-Linux Privilege Escalation by Exploiting Cronjobs: http://www.hackingarticles.in/linux-privilege-escalation-by-exploiting-cron-jobs/ -319-Web Penetration Testing: http://www.hackingarticles.in/web-penetration-testing/ -320-Webshell to Meterpreter: http://www.hackingarticles.in/webshell-to-meterpreter -321-WordPress Penetration Testing using WPScan & Metasploit: http://www.hackingarticles.in/wordpress-penetration-testing-using-wpscan-metasploit -322-XSS Exploitation in DVWA (Bypass All Security): http://www.hackingarticles.in/xss-exploitation-dvwa-bypass-security -323-Linux Privilege Escalation Using PATH Variable: http://www.hackingarticles.in/linux-privilege-escalation-using-path-variable/ -324-VNC tunneling over SSH: http://www.hackingarticles.in/vnc-tunneling-ssh -325-VNC Pivoting through Meterpreter: http://www.hackingarticles.in/vnc-pivoting-meterpreter -326-Week of Evading Microsoft ATA - Announcement and Day 1: https://www.labofapenetrationtester.com/2017/08/week-of-evading-microsoft-ata-day1.html -327-Abusing DNSAdmins privilege for escalation in Active Directory: https://www.labofapenetrationtester.com/2017/05/abusing-dnsadmins-privilege-for-escalation-in-active-directory.html -328-Using SQL Server for attacking a Forest Trust: https://www.labofapenetrationtester.com/2017/03/using-sql-server-for-attacking-forest-trust.html -329-Empire : http://www.harmj0y.net/blog/category/empire/ -330-8 Deadly Commands You Should Never Run on Linux: https://www.howtogeek.com/125157/8-deadly-commands-you-should-never-run-on-linux/ -331-External C2 framework for Cobalt Strike: https://www.insomniacsecurity.com/2018/01/11/externalc2.html -332-How to use Public IP on Kali Linux: http://www.hackingarticles.in/use-public-ip-kali-linux -333-Bypass Admin access through guest Account in windows 10: http://www.hackingarticles.in/bypass-admin-access-guest-account-windows-10 -334-Bypass Firewall Restrictions with Metasploit (reverse_tcp_allports): http://www.hackingarticles.in/bypass-firewall-restrictions-metasploit-reverse_tcp_allports -335-Bypass SSH Restriction by Port Relay: http://www.hackingarticles.in/bypass-ssh-restriction-by-port-relay -336-Bypass UAC Protection of Remote Windows 10 PC (Via FodHelper Registry Key): http://www.hackingarticles.in/bypass-uac-protection-remote-windows-10-pc-via-fodhelper-registry-key -337-Bypass UAC in Windows 10 using bypass_comhijack Exploit: http://www.hackingarticles.in/bypass-uac-windows-10-using-bypass_comhijack-exploit -338-Bind Payload using SFX archive with Trojanizer: http://www.hackingarticles.in/bind-payload-using-sfx-archive-trojanizer -339-Capture NTLM Hashes using PDF (Bad-Pdf): http://www.hackingarticles.in/capture-ntlm-hashes-using-pdf-bad-pdf -340-Best of Post Exploitation Exploits & Tricks: http://www.hackingarticles.in/best-of-post-exploitation-exploits-tricks/ -341-Detect SQL Injection Attack using Snort IDS: http://www.hackingarticles.in/detect-sql-injection-attack-using-snort-ids/ -342-Beginner Guide to Website Footprinting: http://www.hackingarticles.in/beginner-guide-website-footprinting/ -343-How to Enable and Monitor Firewall Log in Windows PC: http://www.hackingarticles.in/enable-monitor-firewall-log-windows-pc/ -344-Wifi Post Exploitation on Remote PC: http://www.hackingarticles.in/wifi-post-exploitation-remote-pc/ -335-Check Meltdown Vulnerability in CPU: http://www.hackingarticles.in/check-meltdown-vulnerability-cpu -336-XXE: https://phonexicum.github.io/infosec/xxe.html -337-[XSS] Re ected XSS Bypass Filter: https://medium.com/p/de41d35239a3 -338-Engagement Tools Tutorial in Burp suite: http://www.hackingarticles.in/engagement-tools-tutorial-burp-suite -339-Wiping Out CSRF: https://medium.com/@jrozner/wiping-out-csrf-ded97ae7e83f -340-First entry: Welcome and fileless UAC bypass: https://winscripting.blog/2017/05/12/first-entry-welcome-and-uac-bypass/ -341-Writing a Custom Shellcode Encoder: https://medium.com/p/31816e767611 -342-Security Harden CentOS 7 : https://highon.coffee/blog/security-harden-centos-7/ -343-THE BIG BAD WOLF - XSS AND MAINTAINING ACCESS: https://www.paulosyibelo.com/2018/06/the-big-bad-wolf-xss-and-maintaining.html -344-MySQL: https://websec.ca/kb/CHANGELOG.txt -345-Deobfuscation of VM based software protection: http://shell-storm.org/talks/SSTIC2017_Deobfuscation_of_VM_based_software_protection.pdf -346-Online Assembler and Disassembler: http://shell-storm.org/online/Online-Assembler-and-Disassembler/ -347-Shellcodes database for study cases: http://shell-storm.org/shellcode/ -348-Dynamic Binary Analysis and Obfuscated Codes: http://shell-storm.org/talks/sthack2016-rthomas-jsalwan.pdf -349-How Triton may help to analyse obfuscated binaries: http://triton.quarkslab.com/files/misc82-triton.pdf -350-Triton: A Concolic Execution Framework: http://shell-storm.org/talks/SSTIC2015_English_slide_detailed_version_Triton_Concolic_Execution_FrameWork_FSaudel_JSalwan.pdf -351-Automatic deobfuscation of the Tigress binary protection using symbolic execution and LLVM: https://github.com/JonathanSalwan/Tigress_protection -352-What kind of semantics information Triton can provide?: http://triton.quarkslab.com/blog/What-kind-of-semantics-information-Triton-can-provide/ -353-Code coverage using a dynamic symbolic execution: http://triton.quarkslab.com/blog/Code-coverage-using-dynamic-symbolic-execution/ -354-Triton (concolic execution framework) under the hood: http://triton.quarkslab.com/blog/first-approach-with-the-framework/ -355-- Stack and heap overflow detection at runtime via behavior analysis and Pin: http://shell-storm.org/blog/Stack-and-heap-overflow-detection-at-runtime-via-behavior-analysis-and-PIN/ -356-Binary analysis: Concolic execution with Pin and z3: http://shell-storm.org/blog/Binary-analysis-Concolic-execution-with-Pin-and-z3/ -357-In-Memory fuzzing with Pin: http://shell-storm.org/blog/In-Memory-fuzzing-with-Pin/ -358-Hackover 2015 r150 (outdated solving for Triton use cases): https://github.com/JonathanSalwan/Triton/blob/master/src/examples/python/ctf-writeups/hackover-ctf-2015-r150/solve.py -359-Skip sh – Web Application Security Scanner for XSS, SQL Injection, Shell injection: https://gbhackers.com/skipfish-web-application-security-scanner -360-Sublist3r – Tool for Penetration testers to Enumerate Sub-domains: https://gbhackers.com/sublist3r-penetration-testers -361-bypassing application whitelisting with bginfo: https://oddvar.moe/2017/05/18/bypassing-application-whitelisting-with-bginfo/ -362-accessing-clipboard-from-the-lock-screen-in-windows-10: https://oddvar.moe/2017/01/24/accessing-clipboard-from-the-lock-screen-in-windows-10/ -363-bypassing-device-guard-umci-using-chm-cve-2017-8625: https://oddvar.moe/2017/08/13/bypassing-device-guard-umci-using-chm-cve-2017-8625/ -364-defense-in-depth-writeup: https://oddvar.moe/2017/09/13/defense-in-depth-writeup/ -365-applocker-case-study-how-insecure-is-it-really-part-1: https://oddvar.moe/2017/12/13/applocker-case-study-how-insecure-is-it-really-part-1/ -366-empires-cross-platform-office-macro: https://www.blackhillsinfosec.com/empires-cross-platform-office-macro/ -367-recon tools: https://blackarch.org/recon.html -368-Black Hat 2018 tools list: https://medium.com/p/991fa38901da -369-Application Introspection & Hooking With Frida: https://www.fuzzysecurity.com/tutorials/29.html -370-And I did OSCP!: https://medium.com/p/589babbfea19 -371-CoffeeMiner: Hacking WiFi to inject cryptocurrency miner to HTML requests: https://arnaucube.com/blog/coffeeminer-hacking-wifi-cryptocurrency-miner.html -372-Most Important Endpoint Security & Threat Intelligence Tools List for Hackers and Security Professionals: https://gbhackers.com/threat-intelligence-tools -373-Penetration Testing Cheat Sheet For Windows Machine – Intrusion Detection: https://techincidents.com/penetration-testing-cheat-sheet/ -374-privilege escalation: https://toshellandback.com/category/privilege-escalation/ -375-The Complete List of Windows Post-Exploitation Commands (No Powershell): https://medium.com/p/999b5433b61e -376-The Art of Subdomain Enumeration: https://blog.sweepatic.com/tag/subdomain-enumeration/ -377-The Principles of a Subdomain Takeover: https://blog.sweepatic.com/subdomain-takeover-principles/ -378-The journey of Web Cache + Firewall Bypass to SSRF to AWS credentials compromise!: https://medium.com/p/b250fb40af82 -379-The Solution for Web for Pentester-I: https://medium.com/p/4c21b3ae9673 -380-The Ultimate Penetration Testing Command Cheat Sheet for Linux: https://www.hackingloops.com/command-cheat-sheet-for-linux/ -381-: Ethical Hacking, Hack Tools, Hacking Tricks, Information Gathering, Penetration Testing, Recommended: https://www.hackingloops.com/hacking-tricks/ -383-Introduction to Exploitation, Part 1: Introducing Concepts and Terminology: https://www.hackingloops.com/exploitation-terminology/ -384-How Hackers Kick Victims Off of Wireless Networks: https://www.hackingloops.com/kick-victims-off-of-wireless-networks/ -385-Maintaining Access Part 1: Introduction and Metasploit Example: https://www.hackingloops.com/maintaining-access-metasploit/ -386-How to Steal Windows Credentials with Mimikatz and Metasploit: https://www.hackingloops.com/mimikatz/ -387-Evading Anti-virus Part 2: Obfuscating Payloads with Msfvenom: https://www.hackingloops.com/msfvenom/ -388-Evading Anti-virus Part 1: Infecting EXEs with Shellter: https://www.hackingloops.com/evading-anti-virus-shellter/ -389-Mobile Hacking Part 4: Fetching Payloads via USB Rubber Ducky: https://www.hackingloops.com/payloads-via-usb-rubber-ducky/ -390-Ethical Hacking Practice Test 6 – Footprinting Fundamentals Level1: https://www.hackingloops.com/ethical-hacking-practice-test-6-footprinting-fundamentals-level1/ -391-Skip Cracking Responder Hashes and Relay Them: https://threat.tevora.com/quick-tip-skip-cracking-responder-hashes-and-replay-them/ -392-Cracking NTLMv1 Handshakes with Crack.sh: http://threat.tevora.com/quick-tip-crack-ntlmv1-handshakes-with-crack-sh/ -393-Top 3 Anti-Forensic OpSec Tips for Linux & A New Dead Man’s Switch: https://medium.com/p/d5e92843e64a -394-VNC Penetration Testing (Port 5901): http://www.hackingarticles.in/vnc-penetration-testing -395-Windows Privilege Escalation: http://www.bhafsec.com/wiki/index.php/Windows_Privilege_Escalation -396-Removing Sender’s IP Address From Email’s Received: From Header: https://www.devside.net/wamp-server/removing-senders-ip-address-from-emails-received-from-header -397-Dump Cleartext Password in Linux PC using MimiPenguin: http://www.hackingarticles.in/dump-cleartext-password-linux-pc-using-mimipenguin -398-Embedded Backdoor with Image using FakeImageExploiter: http://www.hackingarticles.in/embedded-backdoor-image-using-fakeimageexploiter -399-Exploit Command Injection Vulnearbility with Commix and Netcat: http://www.hackingarticles.in/exploit-command-injection-vulnearbility-commix-netcat -400-Exploiting Form Based Sql Injection using Sqlmap: http://www.hackingarticles.in/exploiting-form-based-sql-injection-using-sqlmap -401-Beginner Guide to impacket Tool kit: http://www.hackingarticles.in/beginner-guide-to-impacket-tool-kit -402-Best of Post Exploitation Exploits & Tricks: http://www.hackingarticles.in/best-of-post-exploitation-exploits-tricks -403-Command Injection to Meterpreter using Commix: http://www.hackingarticles.in/command-injection-meterpreter-using-commix -404-Comprehensive Guide to Crunch Tool: http://www.hackingarticles.in/comprehensive-guide-to-crunch-tool -405-Compressive Guide to File Transfer (Post Exploitation): http://www.hackingarticles.in/compressive-guide-to-file-transfer-post-exploitation -406-Crack Wifi Password using Aircrack-Ng (Beginner’s Guide): http://www.hackingarticles.in/crack-wifi-password-using-aircrack-ng -407-How to Detect Meterpreter in Your PC: http://www.hackingarticles.in/detect-meterpreter-pc -408-Easy way to Hack Database using Wizard switch in Sqlmap: http://www.hackingarticles.in/easy-way-hack-database-using-wizard-switch-sqlmap -409-Exploiting the Webserver using Sqlmap and Metasploit (OS-Pwn): http://www.hackingarticles.in/exploiting-webserver-using-sqlmap-metasploit-os-pwn -410-Create SSL Certified Meterpreter Payload using MPM: http://www.hackingarticles.in/exploit-remote-pc-ssl-certified-meterpreter-payload-using-mpm -411-Port forwarding: A practical hands-on guide: https://www.abatchy.com/2017/01/port-forwarding-practical-hands-on-guide -412-Exploit Dev 101: Jumping to Shellcode: https://www.abatchy.com/2017/05/jumping-to-shellcode.html -413-Introduction to Manual Backdooring: https://www.abatchy.com/2017/05/introduction-to-manual-backdooring_24.html -414-Kernel Exploitation: https://www.abatchy.com/2018/01/kernel-exploitation-1 -415-Exploit Dev 101: Bypassing ASLR on Windows: https://www.abatchy.com/2017/06/exploit-dev-101-bypassing-aslr-on.html -416-Shellcode reduction tips (x86): https://www.abatchy.com/2017/04/shellcode-reduction-tips-x86 -417-OSCE Study Plan: https://www.abatchy.com/2017/03/osce-study-plan -418-[DefCamp CTF Qualification 2017] Don't net, kids! (Revexp 400): https://www.abatchy.com/2017/10/defcamp-dotnot -419-DRUPAL 7.X SERVICES MODULE UNSERIALIZE() TO RCE: https://www.ambionics.io/ -420-SQL VULNERABLE WEBSITES LIST 2017 [APPROX 2500 FRESH SQL VULNERABLE SITES]: https://www.cityofhackerz.com/sql-vulnerable-websites-list-2017 -421-Windows IR Live Forensics Cheat Sheet: https://www.cheatography.com/tag/forensics/ -422-windows-kernel-logic-bug-class-access: https://googleprojectzero.blogspot.com/2019/03/windows-kernel-logic-bug-class-access.html -423-injecting-code-into-windows-protected: https://googleprojectzero.blogspot.com/2018/11/injecting-code-into-windows-protected.html -424-USING THE DDE ATTACK WITH POWERSHELL EMPIRE: https://1337red.wordpress.com/using-the-dde-attack-with-powershell-empire -425-Automated Derivative Administrator Search: https://wald0.com/?p=14 -426-A Red Teamer’s Guide to GPOs and OUs: https://wald0.com/?p=179 -427-Pen Testing and Active Directory, Part VI: The Final Case: https://blog.varonis.com/pen-testing-active-directory-part-vi-final-case/ -428-Offensive Tools and Techniques: https://www.sec.uno/2017/03/01/offensive-tools-and-techniques/ -429-Three penetration testing tips to out-hack hackers: http://infosechotspot.com/three-penetration-testing-tips-to-out-hack-hackers-betanews/ -430-Introducing BloodHound: https://wald0.com/?p=68 -431-Red + Blue = Purple: http://www.blackhillsinfosec.com/?p=5368 -432-Active Directory Access Control List – Attacks and Defense – Enterprise Mobility and Security Blog: https://blogs.technet.microsoft.com/enterprisemobility/2017/09/18/active-directory-access-control-list-attacks-and-defense/ -433-PrivEsc: Unquoted Service Path: https://www.gracefulsecurity.com/privesc-unquoted-service-path/ -434-PrivEsc: Insecure Service Permissions: https://www.gracefulsecurity.com/privesc-insecure-service-permissions/ -435-PrivEsc: DLL Hijacking: https://www.gracefulsecurity.com/privesc-dll-hijacking/ -436-Android Reverse Engineering 101 – Part 1: http://www.fasteque.com/android-reverse-engineering-101-part-1/ -437-Luckystrike: An Evil Office Document Generator: https://www.shellntel.com/blog/2016/9/13/luckystrike-a-database-backed-evil-macro-generator -438-the-number-one-pentesting-tool-youre-not-using: https://www.shellntel.com/blog/2016/8/3/the-number-one-pentesting-tool-youre-not-using -439-uac-bypass: http://www.securitynewspaper.com/tag/uac-bypass/ -440-XSSer – Automated Framework Tool to Detect and Exploit XSS vulnerabilities: https://gbhackers.com/xsser-automated-framework-detectexploit-report-xss-vulnerabilities -441-Penetration Testing on X11 Server: http://www.hackingarticles.in/penetration-testing-on-x11-server -442-Always Install Elevated: https://pentestlab.blog/2017/02/28/always-install-elevated -443-Scanning for Active Directory Privileges & Privileged Accounts: https://adsecurity.org/?p=3658 -444-Windows Server 2016 Active Directory Features: https://adsecurity.org/?p=3646 -445-powershell: https://adsecurity.org/?tag=powershell -446-PowerShell Security: PowerShell Attack Tools, Mitigation, & Detection: https://adsecurity.org/?p=2921 -447-DerbyCon 6 (2016) Talk – Attacking EvilCorp: Anatomy of a Corporate Hack: https://adsecurity.org/?p=3214 -448-Real-World Example of How Active Directory Can Be Compromised (RSA Conference Presentation): https://adsecurity.org/?p=2085 -449-Advanced ATM Penetration Testing Methods: https://gbhackers.com/advanced-atm-penetration-testing-methods -450-Background: Microsoft Ofice Exploitation: https://rhinosecuritylabs.com/research/abusing-microsoft-word-features-phishing-subdoc/ -451-Automated XSS Finder: https://medium.com/p/4236ed1c6457 -452-Application whitelist bypass using XLL and embedded shellcode: https://rileykidd.com/.../application-whitelist-bypass-using-XLL-and-embedded-shellc -453-AppLocker Bypass – Regsvr32: https://pentestlab.blog/2017/05/11/applocker-bypass-regsvr32 -454-Nmap Scans using Hex Value of Flags: http://www.hackingarticles.in/nmap-scans-using-hex-value-flags -455-Nmap Scan with Timing Parameters: http://www.hackingarticles.in/nmap-scan-with-timing-parameters -456-OpenSSH User Enumeration Time- Based Attack with Osueta: http://www.hackingarticles.in/openssh-user-enumeration-time-based-attack-osueta -457-Penetration Testing: http://www.hackingarticles.in/web-penetration-testing/ -458-Penetration Testing on Remote Desktop (Port 3389): http://www.hackingarticles.in/penetration-testing-remote-desktop-port-3389 -459-Penetration Testing on Telnet (Port 23): http://www.hackingarticles.in/penetration-testing-telnet-port-23 -460-Penetration Testing in Windows/Active Directory with Crackmapexec: http://www.hackingarticles.in/penetration-testing-windowsactive-directory-crackmapexec -461-Penetration Testing in WordPress Website using WordPress Exploit Framework: http://www.hackingarticles.in/penetration-testing-wordpress-website-using-wordpress-exploit-framework -462-Port Scanning using Metasploit with IPTables: http://www.hackingarticles.in/port-scanning-using-metasploit-iptables -463-Post Exploitation Using WMIC (System Command): http://www.hackingarticles.in/post-exploitation-using-wmic-system-command -464-Privilege Escalation in Linux using etc/passwd file: http://www.hackingarticles.in/privilege-escalation-in-linux-using-etc-passwd-file -465-RDP Pivoting with Metasploit: http://www.hackingarticles.in/rdp-pivoting-metasploit -466-A New Way to Hack Remote PC using Xerosploit and Metasploit: http://www.hackingarticles.in/new-way-hack-remote-pc-using-xerosploit-metasploit -467-Shell to Meterpreter using Session Command: http://www.hackingarticles.in/shell-meterpreter-using-session-command -468-SMTP Pentest Lab Setup in Ubuntu (Port 25): http://www.hackingarticles.in/smtp-pentest-lab-setup-ubuntu -469-SNMP Lab Setup and Penetration Testing: http://www.hackingarticles.in/snmp-lab-setup-and-penetration-testing -470-SQL Injection Exploitation in Multiple Targets using Sqlmap: http://www.hackingarticles.in/sql-injection-exploitation-multiple-targets-using-sqlmap -471-Sql Injection Exploitation with Sqlmap and Burp Suite (Burp CO2 Plugin): http://www.hackingarticles.in/sql-injection-exploitation-sqlmap-burp-suite-burp-co2-plugin -472-SSH Penetration Testing (Port 22): http://www.hackingarticles.in/ssh-penetration-testing-port-22 -473-Manual Post Exploitation on Windows PC (System Command): http://www.hackingarticles.in/manual-post-exploitation-windows-pc-system-command -474-SSH Pivoting using Meterpreter: http://www.hackingarticles.in/ssh-pivoting-using-meterpreter -475-Stealing Windows Credentials of Remote PC with MS Office Document: http://www.hackingarticles.in/stealing-windows-credentials-remote-pc-ms-office-document -476-Telnet Pivoting through Meterpreter: http://www.hackingarticles.in/telnet-pivoting-meterpreter -477-Hack Password using Rogue Wi-Fi Access Point Attack (WiFi-Pumpkin): http://www.hackingarticles.in/hack-password-using-rogue-wi-fi-access-point-attack-wifi-pumpkin -478-Hack Remote PC using Fake Updates Scam with Ettercap and Metasploit: http://www.hackingarticles.in/hack-remote-pc-using-fake-updates-scam-with-ettercap-and-metasploit -479-Hack Remote Windows 10 Password in Plain Text using Wdigest Credential Caching Exploit: http://www.hackingarticles.in/hack-remote-windows-10-password-plain-text-using-wdigest-credential-caching-exploit -480-Hack Remote Windows 10 PC using TheFatRat: http://www.hackingarticles.in/hack-remote-windows-10-pc-using-thefatrat -481-2 Ways to Hack Windows 10 Password Easy Way: http://www.hackingarticles.in/hack-windows-10-password-easy-way -482-How to Change ALL Files Extension in Remote PC (Confuse File Extensions Attack): http://www.hackingarticles.in/how-to-change-all-files-extension-in-remote-pc-confuse-file-extensions-attack -483-How to Delete ALL Files in Remote Windows PC: http://www.hackingarticles.in/how-to-delete-all-files-in-remote-windows-pc-2 -484-How to Encrypt Drive of Remote Victim PC: http://www.hackingarticles.in/how-to-encrypt-drive-of-remote-victim-pc -485-Post Exploitation in Linux With Metasploit: https://pentestlab.blog/2013/01/04/post-exploitation-in-linux-with-metasploit -486-Red Team: https://posts.specterops.io/tagged/red-team?source=post -487-Code Signing Certi cate Cloning Attacks and Defenses: https://posts.specterops.io/tagged/code-signing?source=post -488-Phishing: https://posts.specterops.io/tagged/phishing?source=post -489-PowerPick – A ClickOnce Adjunct: http://www.sixdub.net/?p=555 -490-sql-injection-xss-playground: https://ired.team/offensive-security-experiments/offensive-security-cheetsheets/sql-injection-xss-playground -491-Privilege Escalation & Post-Exploitation: https://github.com/rmusser01/Infosec_Reference/raw/master/Draft/Privilege%20Escalation%20%26%20Post-Exploitation.md -492-https-payload-and-c2-redirectors: https://posts.specterops.io/https-payload-and-c2-redirectors-ff8eb6f87742?source=placement_card_footer_grid---------2-41 -493-a-push-toward-transparency: https://posts.specterops.io/a-push-toward-transparency-c385a0dd1e34?source=placement_card_footer_grid---------0-41 -494-bloodhound: https://posts.specterops.io/tagged/bloodhound?source=post -495-active directory: https://posts.specterops.io/tagged/active-directory?source=post -496-Load & Execute Bundles with migrationTool: https://posts.specterops.io/load-execute-bundles-with-migrationtool-f952e276e1a6?source=placement_card_footer_grid---------1-41 -497-Outlook Forms and Shells: https://sensepost.com/blog/2017/outlook-forms-and-shells/ -498-Tools: https://sensepost.com/blog/tools/ -499-2018 pentesting resources: https://sensepost.com/blog/2018/ -500-network pentest: https://securityonline.info/category/penetration-testing/network-pentest/ -501-[technical] Pen-testing resources: https://medium.com/p/cd01de9036ad -502-Stored XSS on Facebook: https://opnsec.com/2018/03/stored-xss-on-facebook/ -503-vulnerabilities: https://www.brokenbrowser.com/category/vulnerabilities/ -504-Extending BloodHound: Track and Visualize Your Compromise: https://porterhau5.com/.../extending-bloodhound-track-and-visualize-your-compromise -505-so-you-want-to-be-a-web-security-researcher: https://portswigger.net/blog/so-you-want-to-be-a-web-security-researcher -506-BugBounty — AWS S3 added to my “Bucket” list!: https://medium.com/p/f68dd7d0d1ce -507-BugBounty — API keys leakage, Source code disclosure in India’s largest e-commerce health care company: https://medium.com/p/c75967392c7e -508-BugBounty — Exploiting CRLF Injection can lands into a nice bounty: https://medium.com/p/159525a9cb62 -509-BugBounty — How I was able to bypass rewall to get RCE and then went from server shell to get root user account: https://medium.com/p/783f71131b94 -510-BugBounty — “I don’t need your current password to login into youraccount” - How could I completely takeover any user’s account in an online classi ed ads company: https://medium.com/p/e51a945b083d -511-Ping Power — ICMP Tunnel: https://medium.com/bugbountywriteup/ping-power-icmp-tunnel-31e2abb2aaea?source=placement_card_footer_grid---------1-41 -512-hacking: https://www.nextleveltricks.com/hacking/ -513-Top 8 Best YouTube Channels To Learn Ethical Hacking Online !: https://www.nextleveltricks.com/youtube-channels-to-learn-hacking/ -514-Google Dorks List 2018 | Fresh Google Dorks 2018 for SQLi: https://www.nextleveltricks.com/latest-google-dorks-list/ -515-Art of Shellcoding: Basic AES Shellcode Crypter: http://www.nipunjaswal.com/2018/02/shellcode-crypter.html -516-Big List Of Google Dorks Hacking: https://xspiyr.wordpress.com/2012/09/05/big-list-of-google-dorks-hacking/ -517-nmap-cheatsheet: https://bitrot.sh/cheatsheet/09-12-2017-nmap-cheatsheet/ -518-Aws Recon: https://enciphers.com/tag/aws-recon/ -519-Recon: https://enciphers.com/tag/recon/ -520-Subdomain Enumeration: https://enciphers.com/tag/subdomain-enumeration/ -521-Shodan: https://enciphers.com/tag/shodan/ -522-Dump LAPS passwords with ldapsearch: https://malicious.link/post/2017/dump-laps-passwords-with-ldapsearch/ -523-peepdf - PDF Analysis Tool: http://eternal-todo.com/tools/peepdf-pdf-analysis-tool -524-Evilginx 2 - Next Generation of Phishing 2FA Tokens: breakdev.org/evilginx-2-next-generation-of-phishing-2fa-tokens/ -526-Evil XML with two encodings: https://mohemiv.com/all/evil-xml/ -527-create-word-macros-with-powershell: https://4sysops.com/archives/create-word-macros-with-powershell/ -528-Excess XSS A comprehensive tutorial on cross-site scripting: https://excess-xss.com/ -529-Executing Commands and Bypassing AppLocker with PowerShell Diagnostic Scripts: https://bohops.com/2018/01/07/executing-commands-and-bypassing-applocker-with-powershell-diagnostic-scripts/ -530-Abusing DCOM For Yet Another Lateral Movement Technique: https://bohops.com/2018/04/28/abusing-dcom-for-yet-another-lateral-movement-technique/ -531-Trust Direction: An Enabler for Active Directory Enumeration and Trust Exploitation: https://bohops.com/2017/12/02/trust-direction-an-enabler-for-active-directory-enumeration-and-trust-exploitation/ -532-Abusing DCOM For Yet Another Lateral Movement Technique: https://bohops.com/2018/04/28/abusing-dcom-for-yet-another-lateral-movement-technique/ -533-“Practical recon techniques for bug hunters & pen testers”: https://blog.appsecco.com/practical-recon-techniques-for-bug-hunters-pen-testers-at-levelup-0x02-b72c15641972?source=placement_card_footer_grid---------2-41 -534-Exploiting Node.js deserialization bug for Remote Code Execution: https://opsecx.com/index.php/2017/02/08/exploiting-node-js-deserialization-bug-for-remote-code-execution/ -535-Exploiting System Shield AntiVirus Arbitrary Write Vulnerability using SeTakeOwnershipPrivilege: http://www.greyhathacker.net/?p=1006 -536-Running Macros via ActiveX Controls: http://www.greyhathacker.net/?p=948 -537-all=BUG+MALWARE+EXPLOITS http://www.greyhathacker.net/?cat=18 -538-“FILELESS” UAC BYPASS USING EVENTVWR.EXE AND: https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking -539-BYPASSING UAC ON WINDOWS 10 USING DISK CLEANUP: https://enigma0x3.net/2016/07/22/bypassing-uac-on-windows-10-using-disk-cleanup/ -540-A Look at CVE-2017-8715: Bypassing CVE-2017-0218 using PowerShell Module Manifests: https://enigma0x3.net/2017/11/06/a-look-at-cve-2017-8715-bypassing-cve-2017-0218-using-powershell-module-manifests/ -541-“FILELESS” UAC BYPASS USING SDCLT.EXE: https://enigma0x3.net/2017/03/17/fileless-uac-bypass-using-sdclt-exe -542-File Upload XSS: https://medium.com/p/83ea55bb9a55 -543-Firebase Databases: https://medium.com/p/f651a7d49045 -544-Safe Red Team Infrastructure: https://medium.com/@malcomvetter/safe-red-team-infrastructure-c5d6a0f13fac -545-RED-TEAM: https://cybersyndicates.com/tags/red-team/ -546-Egressing Bluecoat with Cobaltstike & Let's Encrypt: https://www.youtube.com/watch?v=cgwfjCmKQwM -547-Veil-Evasion: https://cybersyndicates.com/tags/veil-evasion/ -548-Dangerous Virus For Windows Crashes Everything Hack window Using Virus: http://thelearninghacking.com/create-virus-hack-windows/ -549-Download Google Dorks List 2019: https://medium.com/p/323c8067502c -550-Don’t leak sensitive data via security scanning tools: https://medium.com/p/7d1f715f0486 -551-CRLF Injection Into PHP’s cURL Options: https://medium.com/@tomnomnom/crlf-injection-into-phps-curl-options-e2e0d7cfe545?source=placement_card_footer_grid---------0-60 -552-Open Redirects & Security Done Right!: https://medium.com/@AkshaySharmaUS/open-redirects-security-done-right-e524a3185496?source=placement_card_footer_grid---------2-60 -553-DOM XSS – auth.uber.com: https://stamone-bug-bounty.blogspot.com/2017/10/dom-xss-auth_14.html -554-PowerPoint and Custom Actions: https://cofense.com/powerpoint-and-custom-actions/ -555-exploiting-adobe-coldfusion: https://codewhitesec.blogspot.com/2018/03/exploiting-adobe-coldfusion.html -556-Command and Control – HTTPS: https://pentestlab.blog/2017/10/04/command-and-control-https -557-Command and Control – Images: https://pentestlab.blog/2018/01/02/command-and-control-images -558-Command and Control – JavaScript: https://pentestlab.blog/2018/01/08/command-and-control-javascript -559-XSS-Payloads: https://github.com/Pgaijin66/XSS-Payloads -560-Command and Control – Web Interface: https://pentestlab.blog/2018/01/03/command-and-control-web-interface -561-Command and Control – Website: https://pentestlab.blog/2017/11/14/command-and-control-website -562-Command and Control – WebSocket: https://pentestlab.blog/2017/12/06/command-and-control-websocket -563-atomic-red-team: https://github.com/redcanaryco/atomic-red-team -564-PowerView-3.0-tricks.ps1: https://gist.github.com/HarmJ0y/184f9822b195c52dd50c379ed3117993 -565-awesome-sec-talks: https://github.com/PaulSec/awesome-sec-talks -566-Awesome-Red-Teaming: https://github.com/yeyintminthuhtut/Awesome-Red-Teaming -567-awesome-php: https://github.com/ziadoz/awesome-php -568-latest-hacks: https://hackercool.com/latest-hacks/ -569-GraphQL NoSQL Injection Through JSON Types: http://www.east5th.co/blog/2017/06/12/graphql-nosql-injection-through-json-types/ -570-Writing .NET Executables for Pentesters: https://www.peew.pw/blog/2017/12/4/writing-net-executables-for-penteters-part-2 -571-A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis. https://github.com/secfigo/Awesome-Fuzzing -572-How to Shutdown, Restart, Logoff, and Hibernate Remote Windows PC: http://www.hackingarticles.in/how-to-shutdown-restart-logoff-and-hibernate-remote-windows-pc -572-Injecting Metasploit Payloads into Android Applications – Manually: https://pentestlab.blog/2017/06/26/injecting-metasploit-payloads-into-android-applications-manually -573-Google Dorks For Carding [Huge List] - Part 1: https://hacker-arena.blogspot.com/2014/03/google-dorks-for-carding-huge-list-part.html -574-Google dorks for growth hackers: https://medium.com/p/7f83c8107057 -575-Google Dorks For Carding (HUGE LIST): https://leetpedia.blogspot.com/2013/01/google-dorks-for-carding-huge-list.html -576-BIGGEST SQL Injection Dorks List ~ 20K+ Dorks: https://leetpedia.blogspot.com/2013/05/biggest-sql-injection-dorks-list-20k.html -577-Pastebin Accounts Hacking (Facebook/Paypal/LR/Gmail/Yahoo, etc): https://leetpedia.blogspot.com/2013/01/pastebin-accounts-hacking.html -578-How I Chained 4 vulnerabilities on GitHub Enterprise, From SSRF Execution Chain to RCE!: http://blog.orange.tw/2017/07/how-i-chained-4-vulnerabilities-on.html -579-Hijacking VNC (Enum, Brute, Access and Crack): https://medium.com/p/d3d18a4601cc -580-Linux Post Exploitation Command List: https://github.com/mubix/post-exploitation/wiki -581-List of google dorks for sql injection: https://deadlyhacker.wordpress.com/2013/05/09/list-of-google-dorks-for-sql-injection/ -582-Microsoft Office – NTLM Hashes via Frameset: https://pentestlab.blog/2017/12/18/microsoft-office-ntlm-hashes-via-frameset -583-Microsoft Windows 10 - Child Process Restriction Mitigation Bypass: https://www.exploit-db.com/download/44888.txt -584-Microsoft Windows CVE-2018-8210 Remote Code Execution Vulnerability: https://www.securityfocus.com/bid/104407 -585-Microsoft Windows Kernel CVE-2018-0982 Local Privilege Escalation Vulnerability: https://www.securityfocus.com/bid/104382 -586-miSafes Mi-Cam Device Hijacking: https://packetstormsecurity.com/files/146504/SA-20180221-0.txt -587-Low-Level Windows API Access From PowerShell: https://www.fuzzysecurity.com/tutorials/24.html -588-Linux Kernel 'mm/hugetlb.c' Local Denial of Service Vulnerability: https://www.securityfocus.com/bid/103316 -589-Lateral Movement – RDP: https://pentestlab.blog/2018/04/24/lateral-movement-rdp/ -590-Snagging creds from locked machines: https://malicious.link/post/2016/snagging-creds-from-locked-machines/ -591-Making a Blind SQL Injection a Little Less Blind: https://medium.com/p/428dcb614ba8 -592-VulnHub — Kioptrix: Level 5: https://medium.com/@bondo.mike/vulnhub-kioptrix-level-5-88ab65146d48?source=placement_card_footer_grid---------1-60 -593-Unauthenticated Account Takeover Through HTTP Leak: https://medium.com/p/33386bb0ba0b -594-Hakluke’s Ultimate OSCP Guide: Part 1 — Is OSCP for you?: https://medium.com/@hakluke/haklukes-ultimate-oscp-guide-part-1-is-oscp-for-you-b57cbcce7440?source=placement_card_footer_grid---------2-43 -595-Finding Target-relevant Domain Fronts: https://medium.com/@vysec.private/finding-target-relevant-domain-fronts-7f4ad216c223?source=placement_card_footer_grid---------0-44 -596-Safe Red Team Infrastructure: https://medium.com/@malcomvetter/safe-red-team-infrastructure-c5d6a0f13fac?source=placement_card_footer_grid---------1-60 -597-Cobalt Strike Visualizations: https://medium.com/@001SPARTaN/cobalt-strike-visualizations-e6a6e841e16b?source=placement_card_footer_grid---------2-60 -598-OWASP Top 10 2017 — Web Application Security Risks: https://medium.com/p/31f356491712 -599-XSS-Auditor — the protector of unprotected: https://medium.com/bugbountywriteup/xss-auditor-the-protector-of-unprotected-f900a5e15b7b?source=placement_card_footer_grid---------0-60 -600-Netcat vs Cryptcat – Remote Shell to Control Kali Linux from Windows machine: https://gbhackers.com/netcat-vs-cryptcat -601-Jenkins Servers Infected With Miner.: https://medium.com/p/e370a900ab2e -602-cheat-sheet: http://pentestmonkey.net/category/cheat-sheet -603-Command and Control – Website Keyword: https://pentestlab.blog/2017/09/14/command-and-control-website-keyword/ -604-Command and Control – Twitter: https://pentestlab.blog/2017/09/26/command-and-control-twitter/ -605-Command and Control – Windows COM: https://pentestlab.blog/2017/09/01/command-and-control-windows-com/ -606-Microsoft Office – NTLM Hashes via Frameset: https://pentestlab.blog/2017/12/18/microsoft-office-ntlm-hashes-via-frameset/ -607-PHISHING AGAINST PROTECTED VIEW: https://enigma0x3.net/2017/07/13/phishing-against-protected-view/ -608-PHISHING WITH EMPIRE: https://enigma0x3.net/2016/03/15/phishing-with-empire/ -609-Reverse Engineering Android Applications: https://pentestlab.blog/2017/02/06/reverse-engineering-android-applications/ -610-HTML Injection: https://pentestlab.blog/2013/06/26/html-injection/ -611-Meterpreter stage AV/IDS evasion with powershell: https://arno0x0x.wordpress.com/2016/04/13/meterpreter-av-ids-evasion-powershell/ -612-Windows Atomic Tests by ATT&CK Tactic & Technique: https://github.com/redcanaryco/atomic-red-team/raw/master/atomics/windows-index.md -613-Windows Active Directory Post Exploitation Cheatsheet: https://medium.com/p/48c2bd70388 -614-Windows 10 UAC Loophole Can Be Used to Infect Systems with Malware: http://news.softpedia.com/news/windows-10-uac-loophole-can-be-used-to-infect-systems-with-malware-513996.shtml -615-How to Bypass Anti-Virus to Run Mimikatz: https://www.blackhillsinfosec.com/bypass-anti-virus-run-mimikatz/ -616-Userland API Monitoring and Code Injection Detection: https://0x00sec.org/t/userland-api-monitoring-and-code-injection-detection/5565 -617-USE TOR. USE EMPIRE.: http://secureallthethings.blogspot.com/2016/11/use-tor-use-empire.html -617-ADVANCED CROSS SITE SCRIPTING (XSS) CHEAT SHEET: https://www.muhaddis.info/advanced-cross-site-scripting-xss-cheat-sheet/ -618-Empire without PowerShell.exe: https://bneg.io/2017/07/26/empire-without-powershell-exe/ -619-RED TEAM: https://bneg.io/category/red-team/ -620-PDF Tools: https://blog.didierstevens.com/programs/pdf-tools/ -621-DNS Data ex ltration — What is this and How to use? https://blog.fosec.vn/dns-data-exfiltration-what-is-this-and-how-to-use-2f6c69998822 -621-Google Dorks: https://medium.com/p/7cfd432e0cf3 -622-Hacking with JSP Shells: https://blog.netspi.com/hacking-with-jsp-shells/ -623-Malware Analysis: https://github.com/RPISEC/Malware/raw/master/README.md -624-A curated list of Capture The Flag (CTF) frameworks, libraries, resources and softwares.: https://github.com/SandySekharan/CTF-tool -625-Group Policy Preferences: https://pentestlab.blog/2017/03/20/group-policy-preferences -627-CHECKING FOR MALICIOUSNESS IN AC OFORM OBJECTS ON PDF FILES: https://furoner.wordpress.com/2017/11/15/checking-for-maliciousness-in-acroform-objects-on-pdf-files -628-deobfuscation: https://furoner.wordpress.com/tag/deobfuscation/ -629-POWERSHELL EMPIRE STAGERS 1: PHISHING WITH AN OFFICE MACRO AND EVADING AVS: https://fzuckerman.wordpress.com/2016/10/06/powershell-empire-stagers-1-phishing-with-an-office-macro-and-evading-avs/ -630-A COMPREHENSIVE TUTORIAL ON CROSS-SITE SCRIPTING: https://fzuckerman.wordpress.com/2016/10/06/a-comprehensive-tutorial-on-cross-site-scripting/ -631-GCAT – BACKDOOR EM PYTHON: https://fzuckerman.wordpress.com/2016/10/06/gcat-backdoor-em-python/ -632-Latest Carding Dorks List for Sql njection 2019: https://latestechnews.com/carding-dorks/ -633-google docs for credit card: https://latestechnews.com/tag/google-docs-for-credit-card/ -634-How To Scan Multiple Organizations With Shodan and Golang (OSINT): https://medium.com/p/d994ba6a9587 -635-How to Evade Application Whitelisting Using REGSVR32: https://www.blackhillsinfosec.com/evade-application-whitelisting-using-regsvr32/ -636-phishing: https://www.blackhillsinfosec.com/tag/phishing/ -637-Merlin in action: Intro to Merlin: https://asciinema.org/a/ryljo8qNjHz1JFcFDK7wP6e9I -638-IP Cams from around the world: https://medium.com/p/a6f269f56805 -639-Advanced Cross Site Scripting(XSS) Cheat Sheet by Jaydeep Dabhi: https://jaydeepdabhi.wordpress.com/2016/01/12/advanced-cross-site-scriptingxss-cheat-sheet-by-jaydeep-dabhi/ -640-Just how easy it is to do a domain or subdomain take over!?: https://medium.com/p/265d635b43d8 -641-How to Create hidden user in Remote PC: http://www.hackingarticles.in/create-hidden-remote-metaspolit -642-Process Doppelgänging – a new way to impersonate a process: https://hshrzd.wordpress.com/2017/12/18/process-doppelganging-a-new-way-to-impersonate-a-process/ -643-How to turn a DLL into astandalone EXE: https://hshrzd.wordpress.com/2016/07/21/how-to-turn-a-dll-into-a-standalone-exe/ -644-Hijacking extensions handlers as a malware persistence method: https://hshrzd.wordpress.com/2017/05/25/hijacking-extensions-handlers-as-a-malware-persistence-method/ -645-I'll Get Your Credentials ... Later!: https://www.fuzzysecurity.com/tutorials/18.html -646-Game Over: CanYouPwnMe > Kevgir-1: https://www.fuzzysecurity.com/tutorials/26.html -647-IKARUS anti.virus and its 9 exploitable kernel vulnerabilities: http://www.greyhathacker.net/?p=995 -648-Getting started in Bug Bounty: https://medium.com/p/7052da28445a -649-Union SQLi Challenges (Zixem Write-up): https://medium.com/ctf-writeups/union-sqli-challenges-zixem-write-up-4e74ad4e88b4?source=placement_card_footer_grid---------2-60 -650-scanless – A Tool for Perform Anonymous Port Scan on Target Websites: https://gbhackers.com/scanless-port-scans-websites-behalf -651-WEBAPP PENTEST: https://securityonline.info/category/penetration-testing/webapp-pentest/ -652-Cross-Site Scripting (XSS) Payloads: https://securityonline.info/tag/cross-site-scripting-xss-payloads/ -653-sg1: swiss army knife for data encryption, exfiltration & covert communication: https://securityonline.info/tag/sg1/ -654-NETWORK PENTEST: https://securityonline.info/category/penetration-testing/network-pentest/ -655-SQL injection in an UPDATE query - a bug bounty story!: https://zombiehelp54.blogspot.com/2017/02/sql-injection-in-update-query-bug.html -656-Cross-site Scripting: https://www.netsparker.com/blog/web-security/cross-site-scripting-xss/ -657-Local File Inclusion: https://www.netsparker.com/blog/web-security/local-file-inclusion-vulnerability/ -658-Command Injection: https://www.netsparker.com/blog/web-security/command-injection-vulnerability/ -659-a categorized list of Windows CMD commands: https://ss64.com/nt/commands.html -660-Understanding Guide for Nmap Timing Scan (Firewall Bypass): http://www.hackingarticles.in/understanding-guide-nmap-timing-scan-firewall-bypass -661-RFID Hacking with The Proxmark 3: https://blog.kchung.co/tag/rfid/ -662-A practical guide to RFID badge copying: https://blog.nviso.be/2017/01/11/a-practical-guide-to-rfid-badge-copying -663-Denial of Service using Cookie Bombing: https://medium.com/p/55c2d0ef808c -664-Vultr Domain Hijacking: https://vincentyiu.co.uk/red-team/cloud-security/vultr-domain-hijacking -665-Command and Control: https://vincentyiu.co.uk/red-team/domain-fronting -666-Cisco Auditing Tool & Cisco Global Exploiter to Exploit 14 Vulnerabilities in Cisco Switches and Routers: https://gbhackers.com/cisco-global-exploiter-cge -667-CHECKING FOR MALICIOUSNESS IN ACROFORM OBJECTS ON PDF FILES: https://furoner.wordpress.com/2017/11/15/checking-for-maliciousness-in-acroform-objects-on-pdf-files -668-Situational Awareness: https://pentestlab.blog/2018/05/28/situational-awareness/ -669-Unquoted Service Path: https://pentestlab.blog/2017/03/09/unquoted-service-path -670-NFS: https://pentestacademy.wordpress.com/2017/09/20/nfs/ -671-List of Tools for Pentest Rookies: https://pentestacademy.wordpress.com/2016/09/20/list-of-tools-for-pentest-rookies/ -672-Common Windows Commands for Pentesters: https://pentestacademy.wordpress.com/2016/06/21/common-windows-commands-for-pentesters/ -673-Open-Source Intelligence (OSINT) Reconnaissance: https://medium.com/p/75edd7f7dada -674-OSINT x UCCU Workshop on Open Source Intelligence: https://www.slideshare.net/miaoski/osint-x-uccu-workshop-on-open-source-intelligence -675-Advanced Attack Techniques: https://www.cyberark.com/threat-research-category/advanced-attack-techniques/ -676-Credential Theft: https://www.cyberark.com/threat-research-category/credential-theft/ -678-The Cloud Shadow Admin Threat: 10 Permissions to Protect: https://www.cyberark.com/threat-research-blog/cloud-shadow-admin-threat-10-permissions-protect/ -679-Online Credit Card Theft: Today’s Browsers Store Sensitive Information Deficiently, Putting User Data at Risk: https://www.cyberark.com/threat-research-blog/online-credit-card-theft-todays-browsers-store-sensitive-information-deficiently-putting-user-data-risk/ -680-Weakness Within: Kerberos Delegation: https://www.cyberark.com/threat-research-blog/weakness-within-kerberos-delegation/ -681-Simple Domain Fronting PoC with GAE C2 server: https://www.securityartwork.es/2017/01/31/simple-domain-fronting-poc-with-gae-c2-server/ -682-Find Critical Information about a Host using DMitry: https://www.thehackr.com/find-critical-information-host-using-dmitry/ -683-How To Do OS Fingerprinting In Kali Using Xprobe2: http://disq.us/?url=http%3A%2F%2Fwww.thehackr.com%2Fos-fingerprinting-kali%2F&key=scqgRVMQacpzzrnGSOPySA -684-Crack SSH, FTP, Telnet Logins Using Hydra: https://www.thehackr.com/crack-ssh-ftp-telnet-logins-using-hydra/ -685-Reveal Saved Passwords in Browser using JavaScript Injection: https://www.thehackr.com/reveal-saved-passwords-browser-using-javascript-injection/ -686-Nmap Cheat Sheet: https://s3-us-west-2.amazonaws.com/stationx-public-download/nmap_cheet_sheet_0.6.pdf -687-Manual Post Exploitation on Windows PC (Network Command): http://www.hackingarticles.in/manual-post-exploitation-windows-pc-network-command -688-Hack Gmail or Facebook Password of Remote PC using NetRipper Exploitation Tool: http://www.hackingarticles.in/hack-gmail-or-facebook-password-of-remote-pc-using-netripper-exploitation-tool -689-Hack Locked Workstation Password in Clear Text: http://www.hackingarticles.in/hack-locked-workstation-password-clear-text -690-How to Find ALL Excel, Office, PDF, and Images in Remote PC: http://www.hackingarticles.in/how-to-find-all-excel-office-pdf-images-files-in-remote-pc -691-red-teaming: https://www.redteamsecure.com/category/red-teaming/ -692-Create a Fake AP and Sniff Data mitmAP: http://www.uaeinfosec.com/create-fake-ap-sniff-data-mitmap/ -693-Bruteforcing From Nmap Output BruteSpray: http://www.uaeinfosec.com/bruteforcing-nmap-output-brutespray/ -694-Reverse Engineering Framework radare2: http://www.uaeinfosec.com/reverse-engineering-framework-radare2/ -695-Automated ettercap TCP/IP Hijacking Tool Morpheus: http://www.uaeinfosec.com/automated-ettercap-tcpip-hijacking-tool-morpheus/ -696-List Of Vulnerable SQL Injection Sites: https://www.blogger.com/share-post.g?blogID=1175829128367570667&postID=4652029420701251199 -697-Command and Control – Gmail: https://pentestlab.blog/2017/08/03/command-and-control-gmail/ -698-Command and Control – DropBox: https://pentestlab.blog/2017/08/29/command-and-control-dropbox/ -699-Skeleton Key: https://pentestlab.blog/2018/04/10/skeleton-key/ -700-Secondary Logon Handle: https://pentestlab.blog/2017/04/07/secondary-logon-handle -701-Hot Potato: https://pentestlab.blog/2017/04/13/hot-potato -702-Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence (Part 2): https://bohops.com/2018/03/10/leveraging-inf-sct-fetch-execute-techniques-for-bypass-evasion-persistence-part-2/ -703-Linux-Kernel-exploits: http://tacxingxing.com/category/exploit/kernel-exploit/ -704-Linux-Kernel-Exploit Stack Smashing: http://tacxingxing.com/2018/02/26/linuxkernelexploit-stack-smashing/ -705-Linux Kernel Exploit Environment: http://tacxingxing.com/2018/02/15/linuxkernelexploit-huan-jing-da-jian/ -706-Linux-Kernel-Exploit NULL dereference: http://tacxingxing.com/2018/02/22/linuxkernelexploit-null-dereference/ -707-Apache mod_python for red teams: https://labs.nettitude.com/blog/apache-mod_python-for-red-teams/ -708-Bounty Write-up (HTB): https://medium.com/p/9b01c934dfd2/ 709-CTF Writeups: https://medium.com/ctf-writeups -710-Detecting Malicious Microsoft Office Macro Documents: http://www.greyhathacker.net/?p=872 -711-SQL injection in Drupal: https://hackerone.com/reports/31756 -712-XSS and open redirect on Twitter: https://hackerone.com/reports/260744 -713-Shopify login open redirect: https://hackerone.com/reports/55546 -714-HackerOne interstitial redirect: https://hackerone.com/reports/111968 -715-Ubiquiti sub-domain takeovers: https://hackerone.com/reports/181665 -716-Scan.me pointing to Zendesk: https://hackerone.com/reports/114134 -717-Starbucks' sub-domain takeover: https://hackerone.com/reports/325336 -718-Vine's sub-domain takeover: https://hackerone.com/reports/32825 -719-Uber's sub-domain takeover: https://hackerone.com/reports/175070 -720-Read access to Google: https://blog.detectify.com/2014/04/11/how-we-got-read-access-on-googles-production-servers/ -721-A Facebook XXE with Word: https://www.bram.us/2014/12/29/how-i-hacked-facebook-with-a-word-document/ -722-The Wikiloc XXE: https://www.davidsopas.com/wikiloc-xxe-vulnerability/ -723-Uber Jinja2 TTSI: https://hackerone.com/reports/125980 -724-Uber Angular template injection: https://hackerone.com/reports/125027 -725-Yahoo Mail stored XSS: https://klikki.fi/adv/yahoo2.html -726-Google image search XSS: https://mahmoudsec.blogspot.com/2015/09/how-i-found-xss-vulnerability-in-google.html -727-Shopify Giftcard Cart XSS : https://hackerone.com/reports/95089 -728-Shopify wholesale XSS : https://hackerone.com/reports/106293 -729-Bypassing the Shopify admin authentication: https://hackerone.com/reports/270981 -730-Starbucks race conditions: https://sakurity.com/blog/2015/05/21/starbucks.html -731-Binary.com vulnerability – stealing a user's money: https://hackerone.com/reports/98247 -732-HackerOne signal manipulation: https://hackerone.com/reports/106305 -733-Shopify S buckets open: https://hackerone.com/reports/98819 -734-HackerOne S buckets open: https://hackerone.com/reports/209223 -735-Bypassing the GitLab 2F authentication: https://gitlab.com/gitlab-org/gitlab-ce/issues/14900 -736-Yahoo PHP info disclosure: https://blog.it-securityguard.com/bugbounty-yahoo-phpinfo-php-disclosure-2/ -737-Shopify for exporting installed users: https://hackerone.com/reports/96470 -738-Shopify Twitter disconnect: https://hackerone.com/reports/111216 -739-Badoo full account takeover: https://hackerone.com/reports/127703 -740-Disabling PS Logging: https://github.com/leechristensen/Random/blob/master/CSharp/DisablePSLogging.cs -741-macro-less-code-exec-in-msword: https://sensepost.com/blog/2017/macro-less-code-exec-in-msword/ -742-5 ways to Exploiting PUT Vulnerability: http://www.hackingarticles.in/5-ways-to-exploiting-put-vulnerabilit -743-5 Ways to Exploit Verb Tempering Vulnerability: http://www.hackingarticles.in/5-ways-to-exploit-verb-tempering-vulnerability -744-5 Ways to Hack MySQL Login Password: http://www.hackingarticles.in/5-ways-to-hack-mysql-login-password -745-5 Ways to Hack SMB Login Password: http://www.hackingarticles.in/5-ways-to-hack-smb-login-password -746-6 Ways to Hack FTP Login Password: http://www.hackingarticles.in/6-ways-to-hack-ftp-login-password -746-6 Ways to Hack SNMP Password: http://www.hackingarticles.in/6-ways-to-hack-snmp-password -747-6 Ways to Hack VNC Login Password: http://www.hackingarticles.in/6-ways-to-hack-vnc-login-password -748-Access Sticky keys Backdoor on Remote PC with Sticky Keys Hunter: http://www.hackingarticles.in/access-sticky-keys-backdoor-remote-pc-sticky-keys-hunter -749-Beginner Guide to IPtables: http://www.hackingarticles.in/beginner-guide-iptables -750-Beginner Guide to impacket Tool kit: http://www.hackingarticles.in/beginner-guide-to-impacket-tool-kit -751-Exploit Remote Windows 10 PC using Discover Tool: http://www.hackingarticles.in/exploit-remote-windows-10-pc-using-discover-tool -752-Forensics Investigation of Remote PC (Part 2): http://www.hackingarticles.in/forensics-investigation-of-remote-pc-part-2 -753-5 ways to File upload vulnerability Exploitation: http://www.hackingarticles.in/5-ways-file-upload-vulnerability-exploitation -754-FTP Penetration Testing in Ubuntu (Port 21): http://www.hackingarticles.in/ftp-penetration-testing-in-ubuntu-port-21 -755-FTP Penetration Testing on Windows (Port 21): http://www.hackingarticles.in/ftp-penetration-testing-windows -756-FTP Pivoting through RDP: http://www.hackingarticles.in/ftp-pivoting-rdp -757-Fun with Metasploit Payloads: http://www.hackingarticles.in/fun-metasploit-payloads -758-Gather Cookies and History of Mozilla Firefox in Remote Windows, Linux or MAC PC: http://www.hackingarticles.in/gather-cookies-and-history-of-mozilla-firefox-in-remote-windows-linux-or-mac-pc -759-Generating Reverse Shell using Msfvenom (One Liner Payload): http://www.hackingarticles.in/generating-reverse-shell-using-msfvenom-one-liner-payload -760-Generating Scan Reports Using Nmap (Output Scan): http://www.hackingarticles.in/generating-scan-reports-using-nmap-output-scan -761-Get Meterpreter Session of Locked PC Remotely (Remote Desktop Enabled): http://www.hackingarticles.in/get-meterpreter-session-locked-pc-remotely-remote-desktop-enabled -762-Hack ALL Security Features in Remote Windows 7 PC: http://www.hackingarticles.in/hack-all-security-features-in-remote-windows-7-pc -763-5 ways to Exploit LFi Vulnerability: http://www.hackingarticles.in/5-ways-exploit-lfi-vulnerability -764-5 Ways to Directory Bruteforcing on Web Server: http://www.hackingarticles.in/5-ways-directory-bruteforcing-web-server -765-Hack Call Logs, SMS, Camera of Remote Android Phone using Metasploit: http://www.hackingarticles.in/hack-call-logs-sms-camera-remote-android-phone-using-metasploit -766-Hack Gmail and Facebook Password in Network using Bettercap: http://www.hackingarticles.in/hack-gmail-facebook-password-network-using-bettercap -767-ICMP Penetration Testing: http://www.hackingarticles.in/icmp-penetration-testing -768-Understanding Guide to Mimikatz: http://www.hackingarticles.in/understanding-guide-mimikatz -769-5 Ways to Create Dictionary for Bruteforcing: http://www.hackingarticles.in/5-ways-create-dictionary-bruteforcing -770-Linux Privilege Escalation using LD_Preload: http://www.hackingarticles.in/linux-privilege-escalation-using-ld_preload/ -771-2 Ways to Hack Remote Desktop Password using kali Linux: http://www.hackingarticles.in/2-ways-to-hack-remote-desktop-password-using-kali-linux -772-2 ways to use Msfvenom Payload with Netcat: http://www.hackingarticles.in/2-ways-use-msfvenom-payload-netcat -773-4 ways to Connect Remote PC using SMB Port: http://www.hackingarticles.in/4-ways-connect-remote-pc-using-smb-port -774-4 Ways to DNS Enumeration: http://www.hackingarticles.in/4-ways-dns-enumeration -775-4 Ways to get Linux Privilege Escalation: http://www.hackingarticles.in/4-ways-get-linux-privilege-escalation -776-101+ OSINT Resources for Investigators [2019]: https://i-sight.com/resources/101-osint-resources-for-investigators/ -777-Week in OSINT #2019–02: https://medium.com/week-in-osint/week-in-osint-2019-02-d4009c27e85f -778-OSINT Cheat Sheet: https://hack2interesting.com/osint-cheat-sheet/ -779-OSINT Cheat Sheet: https://infoskirmish.com/osint-cheat-sheet/ -780-OSINT Links for Investigators: https://i-sight.com/resources/osint-links-for-investigators/ -781- Metasploit Cheat Sheet : https://www.kitploit.com/2019/02/metasploit-cheat-sheet.html -782- Exploit Development Cheat Sheet: https://github.com/coreb1t/awesome-pentest-cheat-sheets/commit/5b83fa9cfb05f4774eb5e1be2cde8dbb04d011f4 -783-Building Profiles for a Social Engineering Attack: https://pentestlab.blog/2012/04/19/building-profiles-for-a-social-engineering-attack/ -784-Practical guide to NTLM Relaying in 2017 (A.K.A getting a foothold in under 5 minutes): https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html -785-Getting the goods with CrackMapExec: Part 2: https://byt3bl33d3r.github.io/tag/crackmapexec.html -786-Bug Hunting Methodology (part-1): https://medium.com/p/91295b2d2066 -787-Exploring Cobalt Strike's ExternalC2 framework: https://blog.xpnsec.com/exploring-cobalt-strikes-externalc2-framework/ -788-Airbnb – When Bypassing JSON Encoding, XSS Filter, WAF, CSP, and Auditor turns into Eight Vulnerabilities: https://buer.haus/2017/03/08/airbnb-when-bypassing-json-encoding-xss-filter-waf-csp-and-auditor-turns-into-eight-vulnerabilities/ -789-Adversarial Tactics, Techniques & Common Knowledge: https://attack.mitre.org/wiki/Main_Page -790-Bug Bounty — Tips / Tricks / JS (JavaScript Files): https://medium.com/p/bdde412ea49d -791-Bug Bounty Hunting Tips #2 —Target their mobile apps (Android Edition): https://medium.com/p/f88a9f383fcc -792-DiskShadow: The Return of VSS Evasion, Persistence, and Active Directory Database Extraction: https://bohops.com/2018/03/26/diskshadow-the-return-of-vss-evasion-persistence-and-active-directory-database-extraction/ -793-Executing Commands and Bypassing AppLocker with PowerShell Diagnostic Scripts: https://bohops.com/2018/01/07/executing-commands-and-bypassing-applocker-with-powershell-diagnostic-scripts/ -794-ClickOnce (Twice or Thrice): A Technique for Social Engineering and (Un)trusted Command Execution: https://bohops.com/2017/12/02/clickonce-twice-or-thrice-a-technique-for-social-engineering-and-untrusted-command-execution/ -795-Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence (Part 2): https://bohops.com/2018/03/10/leveraging-inf-sct-fetch-execute-techniques-for-bypass-evasion-persistence-part-2/ -796-DiskShadow: The Return of VSS Evasion, Persistence, and Active Directory Database Extraction: https://bohops.com/2018/03/26/diskshadow-the-return-of-vss-evasion-persistence-and-active-directory-database-extraction/ -797-Trust Direction: An Enabler for Active Directory Enumeration and Trust Exploitation: https://bohops.com/2017/12/02/trust-direction-an-enabler-for-active-directory-enumeration-and-trust-exploitation/ -798-DiskShadow: The Return of VSS Evasion, Persistence, and Active Directory Database Extraction: https://bohops.com/2018/03/26/diskshadow-the-return-of-vss-evasion-persistence-and-active-directory-database-extraction/ -799-Abusing Exported Functions and Exposed DCOM Interfaces for Pass-Thru Command Execution and Lateral Movement: https://bohops.com/2018/03/17/abusing-exported-functions-and-exposed-dcom-interfaces-for-pass-thru-command-execution-and-lateral-movement/ -800-Capcom Rootkit Proof-Of-Concept: https://www.fuzzysecurity.com/tutorials/28.html -801-Linux Privilege Escalation using Misconfigured NFS: http://www.hackingarticles.in/linux-privilege-escalation-using-misconfigured-nfs/ -802-Beginners Guide for John the Ripper (Part 1): http://www.hackingarticles.in/beginner-guide-john-the-ripper-part-1/ -803-Working of Traceroute using Wireshark: http://www.hackingarticles.in/working-of-traceroute-using-wireshark/ -804-Multiple Ways to Get root through Writable File: http://www.hackingarticles.in/multiple-ways-to-get-root-through-writable-file/ -805-4 ways to SMTP Enumeration: http://www.hackingarticles.in/4-ways-smtp-enumeration -806-4 ways to Hack MS SQL Login Password: http://www.hackingarticles.in/4-ways-to-hack-ms-sql-login-password -807-4 Ways to Hack Telnet Passsword: http://www.hackingarticles.in/4-ways-to-hack-telnet-passsword -808-5 ways to Brute Force Attack on WordPress Website: http://www.hackingarticles.in/5-ways-brute-force-attack-wordpress-website -809-5 Ways to Crawl a Website: http://www.hackingarticles.in/5-ways-crawl-website -810-Local Linux Enumeration & Privilege Escalation Cheatsheet: https://www.rebootuser.com/?p=1623 -811-The Drebin Dataset: https://www.sec.cs.tu-bs.de/~danarp/drebin/download.html -812-ECMAScript 6 from an Attacker's Perspective - Breaking Frameworks, Sandboxes, and everything else: https://www.slideshare.net/x00mario/es6-en -813-IT and Information Security Cheat Sheets: https://zeltser.com/cheat-sheets/ -814-Cheat Sheets - DFIR Training: https://www.dfir.training/cheat-sheets -815-WinDbg Malware Analysis Cheat Sheet: https://oalabs.openanalysis.net/2019/02/18/windbg-for-malware-analysis/ -819-Cheat Sheet for Analyzing Malicious Software: https://www.prodefence.org/cheat-sheet-for-analyzing-malicious-software/ -820-Analyzing Malicious Documents Cheat Sheet - Prodefence: https://www.prodefence.org/analyzing-malicious-documents-cheat-sheet-2/ -821-Cheat Sheets - SANS Digital Forensics: https://digital-forensics.sans.org/community/cheat-sheets -822-Linux Command Line Forensics and Intrusion Detection Cheat Sheet: https://www.sandflysecurity.com/blog/compromised-linux-cheat-sheet/ -823-Windows Registry Auditing Cheat Sheet: https://www.slideshare.net/Hackerhurricane/windows-registry-auditing-cheat-sheet-ver-jan-2016-malwarearchaeology -824-Cheat Sheet of Useful Commands Every Kali Linux User Needs To Know: https://kennyvn.com/cheatsheet-useful-bash-commands-linux/ -825-kali-linux-cheatsheet: https://github.com/NoorQureshi/kali-linux-cheatsheet -826-8 Best Kali Linux Terminal Commands used by Hackers (2019 Edition): https://securedyou.com/best-kali-linux-commands-terminal-hacking/ -827-Kali Linux Commands Cheat Sheet: https://www.pinterest.com/pin/393431717429496576/ -827-Kali Linux Commands Cheat Sheet A To Z: https://officialhacker.com/linux-commands-cheat-sheet/ -828-Linux commands CHEATSHEET for HACKERS: https://www.reddit.com/r/Kalilinux/.../linux_commands_cheatsheet_for_hackers/ -829-100 Linux Commands – A Brief Outline With Cheatsheet: https://fosslovers.com/100-linux-commands-cheatsheet/ -830-Kali Linux – Penetration Testing Cheat Sheet: https://uwnthesis.wordpress.com/2016/06/.../kali-linux-penetration-testing-cheat-sheet/ -831-Basic Linux Terminal Shortcuts Cheat Sheet : https://computingforgeeks.com/basic-linux-terminal-shortcuts-cheat-sheet/ -832-List Of 220+ Kali Linux and Linux Commands Line {Free PDF} : https://itechhacks.com/kali-linux-and-linux-commands/ -833-Transferring files from Kali to Windows (post exploitation): https://blog.ropnop.com/transferring-files-from-kali-to-windows/ -834-The Ultimate Penetration Testing Command Cheat Sheet for Kali Linux: https://www.hostingland.com/.../the-ultimate-penetration-testing-command-cheat-sheet -835-What is penetration testing? 10 hacking tools the pros use: https://www.csoonline.com/article/.../17-penetration-testing-tools-the-pros-use.html -836-Best Hacking Tools List for Hackers & Security Professionals in 2019: https://gbhackers.com/hacking-tools-list/ -837-ExploitedBunker PenTest Cheatsheet: https://exploitedbunker.com/articles/pentest-cheatsheet/ -838-How to use Zarp for penetration testing: https://www.techrepublic.com/article/how-to-use-zarp-for-penetration-testing/ -839-Wireless Penetration Testing Cheat Sheet; https://uceka.com/2014/05/12/wireless-penetration-testing-cheat-sheet/ -840-Pentest Cheat Sheets: https://www.cheatography.com/tag/pentest/ -841-40 Best Penetration Testing (Pen Testing) Tools in 2019: https://www.guru99.com/top-5-penetration-testing-tools.html -842-Metasploit Cheat Sheet: https://www.hacking.land/2019/02/metasploit-cheat-sheet.html -843-OSCP useful resources and tools; https://acknak.fr/en/articles/oscp-tools/ -844-Pentest + Exploit dev Cheatsheet: https://ehackings.com/all-posts/pentest-exploit-dev-cheatsheet/ -845-What is Penetration Testing? A Quick Guide for 2019: https://www.cloudwards.net/penetration-testing/ -846-Recon resource: https://pentester.land/cheatsheets/2019/04/15/recon-resources.html -847-Network Recon Cheat Sheet: https://www.cheatography.com/coffeefueled/cheat-sheets/network-recon/ -848-Recon Cheat Sheets: https://www.cheatography.com/tag/recon/ -849-Penetration Testing Active Directory, Part II: https://hausec.com/2019/03/12/penetration-testing-active-directory-part-ii/ -850-Reverse-engineering Cheat Sheets: https://www.cheatography.com/tag/reverse-engineering/ -851-Reverse Engineering Cheat Sheet: https://www.scribd.com/doc/38163906/Reverse-Engineering-Cheat-Sheet -852-ATOMBOMBING: BRAND NEW CODE INJECTION FOR WINDOWS: https://blog.ensilo.com/atombombing-brand-new-code-injection-for-windows -853-PROPagate: http://www.hexacorn.com/blog/2017/10/26/propagate-a-new-code-injection-trick/ -854-Process Doppelgänging, by Tal Liberman and Eugene Kogan:: https://www.blackhat.com/docs/eu-17/materials/eu-17-Liberman-Lost-In-Transaction-Process-Doppelganging.pdf -855-Gargoyle: https://jlospinoso.github.io/security/assembly/c/cpp/developing/software/2017/03/04/gargoyle-memory-analysis-evasion.html -856-GHOSTHOOK: https://www.cyberark.com/threat-research-blog/ghosthook-bypassing-patchguard-processor-trace-based-hooking/ -857-Learn C: https://www.programiz.com/c-programming -858-x86 Assembly Programming Tutorial: https://www.tutorialspoint.com/assembly_programming/ -859-Dr. Paul Carter's PC Assembly Language: http://pacman128.github.io/pcasm/ -860-Introductory Intel x86 - Architecture, Assembly, Applications, and Alliteration: http://opensecuritytraining.info/IntroX86.html -861-x86 Disassembly: https://en.wikibooks.org/wiki/X86_Disassembly -862-use-of-dns-tunneling-for-cc-communications-malware: https://securelist.com/use-of-dns-tunneling-for-cc-communications/78203/ -863-Using IDAPython to Make Your Life Easier (Series):: https://researchcenter.paloaltonetworks.com/2015/12/using-idapython-to-make-your-life-easier-part-1/ -864-NET binary analysis: https://cysinfo.com/cyber-attack-targeting-cbi-and-possibly-indian-army-officials/ -865-detailed analysis of the BlackEnergy3 big dropper: https://cysinfo.com/blackout-memory-analysis-of-blackenergy-big-dropper/ -866-detailed analysis of Uroburos rootkit: https://www.gdatasoftware.com/blog/2014/06/23953-analysis-of-uroburos-using-windbg -867-TCP/IP and tcpdump Pocket Reference Guide: https://www.sans.org/security-resources/tcpip.pdf -868-TCPDUMP Cheatsheet: http://packetlife.net/media/library/12/tcpdump.pdf -869-Scapy Cheatsheet: http://packetlife.net/media/library/36/scapy.pdf -870-WIRESHARK DISPLAY FILTERS: http://packetlife.net/media/library/13/Wireshark_Display_Filters.pdf -871-Windows command line sheet: https://www.sans.org/security-resources/sec560/windows_command_line_sheet_v1.pdf -872-Metasploit cheat sheet: https://www.sans.org/security-resources/sec560/misc_tools_sheet_v1.pdf -873-IPv6 Cheatsheet: http://packetlife.net/media/library/8/IPv6.pdf -874-IPv4 Subnetting: http://packetlife.net/media/library/15/IPv4_Subnetting.pdf -875-IOS IPV4 ACCESS LISTS: http://packetlife.net/media/library/14/IOS_IPv4_Access_Lists.pdf -876-Common Ports List: http://packetlife.net/media/library/23/common_ports.pdf -877-WLAN: http://packetlife.net/media/library/4/IEEE_802.11_WLAN.pdf -878-VLANs Cheatsheet: http://packetlife.net/media/library/20/VLANs.pdf -879-VoIP Basics CheatSheet: http://packetlife.net/media/library/34/VOIP_Basics.pdf -880-Google hacking and defense cheat sheet: https://www.sans.org/security-resources/GoogleCheatSheet.pdf -881-Nmap CheatSheet: https://pen-testing.sans.org/blog/2013/10/08/nmap-cheat-sheet-1-0 -882-Netcat cheat sheet: https://www.sans.org/security-resources/sec560/netcat_cheat_sheet_v1.pdf -883-PowerShell cheat sheet: https://blogs.sans.org/pen-testing/files/2016/05/PowerShellCheatSheet_v41.pdf -884-Scapy cheat sheet POCKET REFERENCE: https://blogs.sans.org/pen-testing/files/2016/04/ScapyCheatSheet_v0.2.pdf -885-SQL injection cheat sheet.: https://information.rapid7.com/sql-injection-cheat-sheet-download.html -886-Injection cheat sheet: https://information.rapid7.com/injection-non-sql-cheat-sheet-download.html -887-Symmetric Encryption Algorithms cheat sheet: https://www.cheatography.com/rubberdragonfarts/cheat-sheets/symmetric-encryption-algorithms/ -888-Intrusion Discovery Cheat Sheet v2.0 for Linux: https://pen-testing.sans.org/retrieve/linux-cheat-sheet.pdf -889-Intrusion Discovery Cheat Sheet v2.0 for Window: https://pen-testing.sans.org/retrieve/windows-cheat-sheet.pdf -890-Memory Forensics Cheat Sheet v1.2: https://digital-forensics.sans.org/media/memory-forensics-cheat-sheet.pdf -891-CRITICAL LOG REVIEW CHECKLIST FOR SECURITY INCIDENTS G E N E R AL APPROACH: https://www.sans.org/brochure/course/log-management-in-depth/6 -892-Evidence collection cheat sheet: https://digital-forensics.sans.org/media/evidence_collection_cheat_sheet.pdf -893-Hex file and regex cheat sheet v1.0: https://digital-forensics.sans.org/media/hex_file_and_regex_cheat_sheet.pdf -894-Rekall Memory Forensic Framework Cheat Sheet v1.2.: https://digital-forensics.sans.org/media/rekall-memory-forensics-cheatsheet.pdf -895-SIFT WORKSTATION Cheat Sheet v3.0.: https://digital-forensics.sans.org/media/sift_cheat_sheet.pdf -896-Volatility Memory Forensic Framework Cheat Sheet: https://digital-forensics.sans.org/media/volatility-memory-forensics-cheat-sheet.pdf -897-Hands - on Network Forensics.: https://www.first.org/resources/papers/conf2015/first_2015_-_hjelmvik-_erik_-_hands-on_network_forensics_20150604.pdf -898-VoIP Security Vulnerabilities.: https://www.sans.org/reading-room/whitepapers/voip/voip-security-vulnerabilities-2036 -899-Incident Response: How to Fight Back: https://www.sans.org/reading-room/whitepapers/analyst/incident-response-fight-35342 -900-BI-7_VoIP_Analysis_Fundamentals: https://sharkfest.wireshark.org/sharkfest.12/presentations/BI-7_VoIP_Analysis_Fundamentals.pdf -901-Bug Hunting Guide: cybertheta.blogspot.com/2018/08/bug-hunting-guide.html -902-Guide 001 |Getting Started in Bug Bounty Hunting: https://whoami.securitybreached.org/2019/.../guide-getting-started-in-bug-bounty-hun... -903-SQL injection cheat sheet : https://portswigger.net › Web Security Academy › SQL injection › Cheat sheet -904-RSnake's XSS Cheat Sheet: https://www.in-secure.org/2018/08/22/rsnakes-xss-cheat-sheet/ -905-Bug Bounty Tips (2): https://ctrsec.io/index.php/2019/03/20/bug-bounty-tips-2/ -906-A Review of my Bug Hunting Journey: https://kongwenbin.com/a-review-of-my-bug-hunting-journey/ -907-Meet the First Hacker Millionaire on HackerOne: https://itblogr.com/meet-the-first-hacker-millionaire-on-hackerone/ -908-XSS Cheat Sheet: https://www.reddit.com/r/programming/comments/4sn54s/xss_cheat_sheet/ -909-Bug Bounty Hunter Methodology: https://www.slideshare.net/bugcrowd/bug-bounty-hunter-methodology-nullcon-2016 -910-#10 Rules of Bug Bounty: https://hackernoon.com/10-rules-of-bug-bounty-65082473ab8c -911-Bugbounty Checklist: https://www.excis3.be/bugbounty-checklist/21/ -912-FireBounty | The Ultimate Bug Bounty List!: https://firebounty.com/ -913-Brutelogic xss cheat sheet 2019: https://brutelogic.com.br/blog/ebook/xss-cheat-sheet/ -914-XSS Cheat Sheet by Rodolfo Assis: https://leanpub.com/xss -915-Cross-Site-Scripting (XSS) – Cheat Sheet: https://ironhackers.es/en/cheatsheet/cross-site-scripting-xss-cheat-sheet/ -916-XSS Cheat Sheet V. 2018 : https://hackerconnected.wordpress.com/2018/03/15/xss-cheat-sheet-v-2018/ -917-Cross-site Scripting Payloads Cheat Sheet : https://exploit.linuxsec.org/xss-payloads-list -918-Xss Cheat Sheet : https://www.in-secure.org/tag/xss-cheat-sheet/ -919-Open Redirect Cheat Sheet : https://pentester.land/cheatsheets/2018/11/02/open-redirect-cheatsheet.html -920-XSS, SQL Injection and Fuzzing Bar Code Cheat Sheet: https://www.irongeek.com/xss-sql-injection-fuzzing-barcode-generator.php -921-XSS Cheat Sheet: https://tools.paco.bg/13/ -922-XSS for ASP.net developers: https://www.gosecure.net/blog/2016/03/22/xss-for-asp-net-developers -923-Cross-Site Request Forgery Cheat Sheet: https://trustfoundry.net/cross-site-request-forgery-cheat-sheet/ -924-CSRF Attacks: Anatomy, Prevention, and XSRF Tokens: https://www.acunetix.com/websitesecurity/csrf-attacks/ -925-Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet : https://mamchenkov.net/.../05/.../cross-site-request-forgery-csrf-prevention-cheat-shee... -926-Guide to CSRF (Cross-Site Request Forgery): https://www.veracode.com/security/csrf -927-Cross-site Request Forgery - Exploitation & Prevention: https://www.netsparker.com/blog/web-security/csrf-cross-site-request-forgery/ -928-SQL Injection Cheat Sheet : https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/ -929-MySQL SQL Injection Practical Cheat Sheet: https://www.perspectiverisk.com/mysql-sql-injection-practical-cheat-sheet/ -930-SQL Injection (SQLi) - Cheat Sheet, Attack Examples & Protection: https://www.checkmarx.com/knowledge/knowledgebase/SQLi -931-SQL injection attacks: A cheat sheet for business pros: https://www.techrepublic.com/.../sql-injection-attacks-a-cheat-sheet-for-business-pros/ -932-The SQL Injection Cheat Sheet: https://biztechmagazine.com/article/.../guide-combatting-sql-injection-attacks-perfcon -933-SQL Injection Cheat Sheet: https://resources.infosecinstitute.com/sql-injection-cheat-sheet/ -934-Comprehensive SQL Injection Cheat Sheet: https://www.darknet.org.uk/2007/05/comprehensive-sql-injection-cheat-sheet/ -935-MySQL SQL Injection Cheat Sheet: pentestmonkey.net/cheat-sheet/sql-injection/mysql-sql-injection-cheat-sheet -936-SQL Injection Cheat Sheet: MySQL: https://www.gracefulsecurity.com/sql-injection-cheat-sheet-mysql/ -937- MySQL Injection Cheat Sheet: https://www.asafety.fr/mysql-injection-cheat-sheet/ -938-SQL Injection Cheat Sheet: https://www.reddit.com/r/netsec/comments/7l449h/sql_injection_cheat_sheet/ -939-Google dorks cheat sheet 2019: https://sanfrantokyo.com/pph5/yxo7.php?xxx=5&lf338=google...cheat-sheet-2019 -940-Command Injection Cheatsheet : https://hackersonlineclub.com/command-injection-cheatsheet/ -941-OS Command Injection Vulnerability: https://www.immuniweb.com/vulnerability/os-command-injection.html -942-OS Command Injection: https://www.checkmarx.com/knowledge/knowledgebase/OS-Command_Injection -943-Command Injection: The Good, the Bad and the Blind: https://www.gracefulsecurity.com/command-injection-the-good-the-bad-and-the-blind/ -944-OS command injection: https://portswigger.net › Web Security Academy › OS command injection -945-How to Test for Command Injection: https://blog.securityinnovation.com/blog/.../how-to-test-for-command-injection.html -946-Data Exfiltration via Blind OS Command Injection: https://www.contextis.com/en/blog/data-exfiltration-via-blind-os-command-injection -947-XXE Cheatsheet: https://www.gracefulsecurity.com/xxe-cheatsheet/ -948-bugbounty-cheatsheet/xxe.: https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/xxe.md -949-XXE - Information Security: https://phonexicum.github.io/infosec/xxe.html -950-XXE Cheat Sheet: https://www.hahwul.com/p/xxe-cheat-sheet.html -951-Advice From A Researcher: Hunting XXE For Fun and Profit: https://www.bugcrowd.com/blog/advice-from-a-bug-hunter-xxe/ -952-Out of Band Exploitation (OOB) CheatSheet : https://www.notsosecure.com/oob-exploitation-cheatsheet/ -953-Web app penentration testing checklist and cheatsheet: www.malwrforensics.com/.../web-app-penentration-testing-checklist-and-cheatsheet-with-example -954-Useful Resources: https://lsdsecurity.com/useful-resources/ -955-Exploiting XXE Vulnerabilities in IIS/.NET: https://pen-testing.sans.org/.../entity-inception-exploiting-iis-net-with-xxe-vulnerabiliti... -956-Top 65 OWASP Cheat Sheet Collections - ALL IN ONE: https://www.yeahhub.com/top-65-owasp-cheat-sheet-collections-all-in-one/ -957-Hacking Resources: https://www.torontowebsitedeveloper.com/hacking-resources -958-Out of Band XML External Entity Injection: https://www.netsparker.com/web...scanner/.../out-of-band-xml-external-entity-injectio... -959-XXE - ZeroSec - Adventures In Information Security: https://blog.zsec.uk/out-of-band-xxe-2/ -960-Blog - Automated Data Exfiltration with XXE: https://blog.gdssecurity.com/labs/2015/4/.../automated-data-exfiltration-with-xxe.html -961-My Experience during Infosec Interviews: https://medium.com/.../my-experience-during-infosec-interviews-ed1f74ce41b8 -962-Top 10 Security Risks on the Web (OWASP): https://sensedia.com/.../top-10-security-risks-on-the-web-owasp-and-how-to-mitigate-t... -963-Antivirus Evasion Tools [Updated 2019] : https://resources.infosecinstitute.com/antivirus-evasion-tools/ -964-Adventures in Anti-Virus Evasion: https://www.gracefulsecurity.com/anti-virus-evasion/ -965-Antivirus Bypass Phantom Evasion - 2019 : https://www.reddit.com/r/Kalilinux/.../antivirus_bypass_phantom_evasion_2019/ -966-Antivirus Evasion with Python: https://medium.com/bugbountywriteup/antivirus-evasion-with-python-49185295caf1 -967-Windows oneliners to get shell: https://ironhackers.es/en/cheatsheet/comandos-en-windows-para-obtener-shell/ -968-Does Veil Evasion Still Work Against Modern AntiVirus?: https://www.hackingloops.com/veil-evasion-virustotal/ -969-Google dorks cheat sheet 2019 : https://sanfrantokyo.com/pph5/yxo7.php?xxx=5&lf338=google...cheat-sheet-2019 -970-Malware Evasion Techniques : https://www.slideshare.net/ThomasRoccia/malware-evasion-techniques -971-How to become a cybersecurity pro: A cheat sheet: https://www.techrepublic.com/article/cheat-sheet-how-to-become-a-cybersecurity-pro/ -972-Bypassing Antivirus With Ten Lines of Code: https://hackingandsecurity.blogspot.com/.../bypassing-antivirus-with-ten-lines-of.html -973-Bypassing antivirus detection on a PDF exploit: https://www.digital.security/en/blog/bypassing-antivirus-detection-pdf-exploit -974-Generating Payloads & Anti-Virus Bypass Methods: https://uceka.com/2014/02/19/generating-payloads-anti-virus-bypass-methods/ -975-Apkwash Android Antivirus Evasion For Msfvemon: https://hackingarise.com/apkwash-android-antivirus-evasion-for-msfvemon/ -976-Penetration Testing with Windows Computer & Bypassing an Antivirus: https://www.prodefence.org/penetration-testing-with-windows-computer-bypassing-antivirus -978-Penetration Testing: The Quest For Fully UnDetectable Malware: https://www.foregenix.com/.../penetration-testing-the-quest-for-fully-undetectable-malware -979-AVET: An AntiVirus Bypassing tool working with Metasploit Framework : https://githacktools.blogspot.com -980-Creating an undetectable payload using Veil-Evasion Toolkit: https://www.yeahhub.com/creating-undetectable-payload-using-veil-evasion-toolkit/ -981-Evading Antivirus : https://sathisharthars.com/tag/evading-antivirus/ -982-AVPASS – All things in moderation: https://hydrasky.com/mobile-security/avpass/ -983-Complete Penetration Testing & Hacking Tools List: https://cybarrior.com/blog/2019/03/31/hacking-tools-list/ -984-Modern red teaming: 21 resources for your security team: https://techbeacon.com/security/modern-red-teaming-21-resources-your-security-team -985-BloodHound and CypherDog Cheatsheet : https://hausec.com/2019/04/15/bloodhound-and-cypherdog-cheatsheet/ -986-Redteam Archives: https://ethicalhackingguru.com/category/redteam/ -987-NMAP Commands Cheat Sheet: https://www.networkstraining.com/nmap-commands-cheat-sheet/ -988-Nmap Cheat Sheet: https://dhound.io/blog/nmap-cheatsheet -989-Nmap Cheat Sheet: From Discovery to Exploits: https://resources.infosecinstitute.com/nmap-cheat-sheet/ -990-Nmap Cheat Sheet and Pro Tips: https://hackertarget.com/nmap-cheatsheet-a-quick-reference-guide/ -991-Nmap Tutorial: from the Basics to Advanced Tips: https://hackertarget.com/nmap-tutorial/ -992-How to run a complete network scan with OpenVAS; https://www.techrepublic.com/.../how-to-run-a-complete-network-scan-with-openvas/ -993-Nmap: my own cheatsheet: https://www.andreafortuna.org/2018/03/12/nmap-my-own-cheatsheet/ -994-Top 32 Nmap Command Examples For Linux Sys/Network Admins: https://www.cyberciti.biz/security/nmap-command-examples-tutorials/ -995-35+ Best Free NMap Tutorials and Courses to Become Pro Hacker: https://www.fromdev.com/2019/01/best-free-nmap-tutorials-courses.html -996-Scanning Tools: https://widesecurity.net/kali-linux/kali-linux-tools-scanning/ -997-Nmap - Cheatsheet: https://www.ivoidwarranties.tech/posts/pentesting-tuts/nmap/cheatsheet/ -998-Linux for Network Engineers: https://netbeez.net/blog/linux-how-to-use-nmap/ -999-Nmap Cheat Sheet: https://www.hackingloops.com/nmap-cheat-sheet-port-scanning-basics-ethical-hackers/ -1000-Tactical Nmap for Beginner Network Reconnaissance: https://null-byte.wonderhowto.com/.../tactical-nmap-for-beginner-network-reconnaiss... -1001-A Guide For Google Hacking Database: https://www.hackgentips.com/google-hacking-database/ -1002-2019 Data Breaches - The Worst Breaches, So Far: https://www.identityforce.com/blog/2019-data-breaches -1003-15 Vulnerable Sites To (Legally) Practice Your Hacking Skills: https://www.checkmarx.com/.../15-vulnerable-sites-to-legally-practice-your-hacking-skills -1004-Google Hacking Master List : https://it.toolbox.com/blogs/rmorril/google-hacking-master-list-111408 -1005-Smart searching with googleDorking | Exposing the Invisible: https://exposingtheinvisible.org/guides/google-dorking/ -1006-Google Dorks 2019: https://korben.info/google-dorks-2019-liste.html -1007-Google Dorks List and how to use it for Good; https://edgy.app/google-dorks-list -1008-How to Use Google to Hack(Googledorks): https://null-byte.wonderhowto.com/how-to/use-google-hack-googledorks-0163566/ -1009-Using google as hacking tool: https://cybertechies007.blogspot.com/.../using-google-as-hacking-tool-googledorks.ht... -1010-#googledorks hashtag on Twitter: https://twitter.com/hashtag/googledorks -1011-Top Five Open Source Intelligence (OSINT) Tools: https://resources.infosecinstitute.com/top-five-open-source-intelligence-osint-tools/ -1012-What is open-source intelligence (OSINT)?: https://www.microfocus.com/en-us/what-is/open-source-intelligence-osint -1013-A Guide to Open Source Intelligence Gathering (OSINT): https://medium.com/bugbountywriteup/a-guide-to-open-source-intelligence-gathering-osint-ca831e13f29c -1014-OSINT: How to find information on anyone: https://medium.com/@Peter_UXer/osint-how-to-find-information-on-anyone-5029a3c7fd56 -1015-What is OSINT? How can I make use of it?: https://securitytrails.com/blog/what-is-osint-how-can-i-make-use-of-it -1016-OSINT Tools for the Dark Web: https://jakecreps.com/2019/05/16/osint-tools-for-the-dark-web/ -1017-A Guide to Open Source Intelligence (OSINT): https://www.cjr.org/tow_center_reports/guide-to-osint-and-hostile-communities.php -1018-An Introduction To Open Source Intelligence (OSINT): https://www.secjuice.com/introduction-to-open-source-intelligence-osint/ -1019-SSL & TLS HTTPS Testing [Definitive Guide] - Aptive: https://www.aptive.co.uk/blog/tls-ssl-security-testing/ -1020-Exploit Title: [Files Containing E-mail and Associated Password Lists]: https://www.exploit-db.com/ghdb/4262/?source=ghdbid -1021-cheat_sheets: http://zachgrace.com/cheat_sheets/ -1022-Intel SYSRET: https://pentestlab.blog/2017/06/14/intel-sysret -1023-Windows Preventive Maintenance Best Practices: http://www.professormesser.com/free-a-plus-training/220-902/windows-preventive-maintenance-best-practices/ -1024-An Overview of Storage Devices: http://www.professormesser.com/?p=19367 -1025-An Overview of RAID: http://www.professormesser.com/?p=19373 -1026-How to Troubleshoot: http://www.professormesser.com/free-a-plus-training/220-902/how-to-troubleshoot/ -1027-Mobile Device Security Troubleshooting: http://www.professormesser.com/free-a-plus-training/220-902/mobile-device-security-troubleshooting/ -1028-Using Wireshark: Identifying Hosts and Users: https://unit42.paloaltonetworks.com/using-wireshark-identifying-hosts-and-users/ -1029-Using Wireshark - Display Filter Expressions: https://unit42.paloaltonetworks.com/using-wireshark-display-filter-expressions/ -1030-Decrypting SSL/TLS traffic with Wireshark: https://resources.infosecinstitute.com/decrypting-ssl-tls-traffic-with-wireshark/ -1031-A collection of handy Bash One-Liners and terminal tricks for data processing and Linux system maintenance.: https://onceupon.github.io/Bash-Oneliner/ -1032- Bash One-Liners Explained, Part I: Working with files : https://catonmat.net/bash-one-liners-explained-part-one -1033-Bash One-Liners Explained, Part IV: Working with history: https://catonmat.net/bash-one-liners-explained-part-four -1034-Useful bash one-liners : https://github.com/stephenturner/oneliners -1035-Some Random One-liner Linux Commands [Part 1]: https://www.ostechnix.com/random-one-liner-linux-commands-part-1/ -1036-The best terminal one-liners from and for smart admins + devs.: https://www.ssdnodes.com/tools/one-line-wise/ -1037-Shell one-liner: https://rosettacode.org/wiki/Shell_one-liner#Racket -1038-SSH Cheat Sheet: http://pentestmonkey.net/tag/ssh -1039-7000 Google Dork List: https://pastebin.com/raw/Tdvi8vgK -1040-GOOGLE HACKİNG DATABASE – GHDB: https://pastebin.com/raw/1ndqG7aq -1041-STEALING PASSWORD WITH GOOGLE HACK: https://pastebin.com/raw/x6BNZ7NN -1042-Hack Remote PC with PHP File using PhpSploit Stealth Post-Exploitation Framework: http://www.hackingarticles.in/hack-remote-pc-with-php-file-using-phpsploit-stealth-post-exploitation-framework -1043-Open Source database of android malware: www.code.google.com/archive/p/androguard/wikis/DatabaseAndroidMalwares.wiki -1044-big-list-of-naughty-strings: https://github.com/minimaxir/big-list-of-naughty-strings/blob/master/blns.txt -1045-publicly available cap files: http://www.netresec.com/?page=PcapFiles -1046-“Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection”: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.119.399&rep=rep1&type=pdf -1047-Building a malware analysis toolkit: https://zeltser.com/build-malware-analysis-toolkit/ -1048-Netcat Reverse Shell Cheat Sheet: http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet -1049-Packers and crypters: http://securityblog.gr/2950/detect-packers-cryptors-and-compilers/ -1050-Evading antivirus: http://www.blackhillsinfosec.com/?p=5094 -1051-cheat sheets and information,The Art of Hacking: https://github.com/The-Art-of-Hacking -1052-Error-based SQL injection: https://www.exploit-db.com/docs/37953.pdf -1053-XSS cheat sheet: https://www.veracode.com/security/xss -1054-Active Directory Enumeration with PowerShell: https://www.exploit-db.com/docs/46990 -1055-Buffer Overflows, C Programming, NSA GHIDRA and More: https://www.exploit-db.com/docs/47032 -1056-Analysis of CVE-2019-0708 (BlueKeep): https://www.exploit-db.com/docs/46947 -1057-Windows Privilege Escalations: https://www.exploit-db.com/docs/46131 -1058-The Ultimate Guide For Subdomain Takeover with Practical: https://www.exploit-db.com/docs/46415 -1059-File transfer skills in the red team post penetration test: https://www.exploit-db.com/docs/46515 -1060-How To Exploit PHP Remotely To Bypass Filters & WAF Rules: https://www.exploit-db.com/docs/46049 -1061-Flying under the radar: https://www.exploit-db.com/docs/45898 -1062-what is google hacking? and why it is useful ?and how you can learn how to use it: https://twitter.com/cry__pto/status/1142497470825545729?s=20 -1063-useful blogs for penetration testers: https://twitter.com/cry__pto/status/1142497470825545729?s=20 -1064-useful #BugBounty resources & links & tutorials & explanations & writeups :: https://twitter.com/cry__pto/status/1143965322233483265?s=20 -1065-Union- based SQL injection: http://securityidiots.com/Web-Pentest/SQL-Injection/Basic-Union-Based-SQL-Injection.html -1066-Broken access control: https://www.happybearsoftware.com/quick-check-for-access-control-vulnerabilities-in-rails -1067-Understanding firewall types and configurations: http://searchsecurity.techtarget.com/feature/The-five-different-types-of-firewalls -1068-5 Kali Linux tricks that you may not know: https://pentester.land/tips-n-tricks/2018/11/09/5-kali-linux-tricks-that-you-may-not-know.html -1069-5 tips to make the most of Twitter as a pentester or bug bounty hunter: https://pentester.land/tips-n-tricks/2018/10/23/5-tips-to-make-the-most-of-twitter-as-a-pentester-or-bug-bounty-hunter.html -1060-A Guide To Subdomain Takeovers: https://www.hackerone.com/blog/Guide-Subdomain-Takeovers -1061-Advanced Recon Automation (Subdomains) case 1: https://medium.com/p/9ffc4baebf70 -1062-Security testing for REST API with w3af: https://medium.com/quick-code/security-testing-for-rest-api-with-w3af-2c43b452e457?source=post_recirc---------0------------------ -1062-The Lazy Hacker: https://securit.ie/blog/?p=86 -1063-Practical recon techniques for bug hunters & pen testers: https://github.com/appsecco/practical-recon-levelup0x02/raw/200c43b58e9bf528a33c9dfa826fda89b229606c/practical_recon.md -1064-A More Advanced Recon Automation #1 (Subdomains): https://poc-server.com/blog/2019/01/18/advanced-recon-subdomains/ -1065-Expanding your scope (Recon automation #2): https://poc-server.com/blog/2019/01/31/expanding-your-scope-recon-automation/ -1066-RCE by uploading a web.config: https://poc-server.com/blog/2018/05/22/rce-by-uploading-a-web-config/ -1067-Finding and exploiting Blind XSS: https://enciphers.com/finding-and-exploiting-blind-xss/ -1068-Google dorks list 2018: http://conzu.de/en/google-dork-liste-2018-conzu -1096-Out of Band Exploitation (OOB) CheatSheet: https://www.notsosecure.com/oob-exploitation-cheatsheet/ -1070-Metasploit Cheat Sheet: https://nitesculucian.github.io/2018/12/01/metasploit-cheat-sheet/ -1071-Linux Post Exploitation Cheat Sheet : red-orbita.com/?p=8455 -1072-OSCP/Pen Testing Resources : https://medium.com/@sdgeek/oscp-pen-testing-resources-271e9e570d45 -1073-Out Of Band Exploitation (OOB) CheatSheet : https://packetstormsecurity.com/files/149290/Out-Of-Band-Exploitation-OOB-CheatSheet.html -1074-HTML5 Security Cheatsheet: https://html5sec.org/ -1075-Kali Linux Cheat Sheet for Penetration Testers: https://www.blackmoreops.com/2016/12/20/kali-linux-cheat-sheet-for-penetration-testers/ -1076-Responder - CheatSheet: https://www.ivoidwarranties.tech/posts/pentesting-tuts/responder/cheatsheet/ -1076-Windows Post-Exploitation Command List: pentest.tonyng.net/windows-post-exploitation-command-list/ -1077-Transfer files (Post explotation) - CheatSheet https://ironhackers.es/en/cheatsheet/transferir-archivos-post-explotacion-cheatsheet/ -1078-SQL Injection Cheat Sheet: MSSQL — GracefulSecurity: https://www.gracefulsecurity.com/sql-injection-cheat-sheet-mssql/ -1079-OSCP useful resources and tools: https://acknak.fr/en/articles/oscp-tools/ -1080-Penetration Testing 102 - Windows Privilege Escalation - Cheatsheet: www.exumbraops.com/penetration-testing-102-windows-privilege-escalation-cheatsheet -1081-Transferring files from Kali to Windows (post exploitation) : https://blog.ropnop.com/transferring-files-from-kali-to-windows/ -1082-Hack Like a Pro: The Ultimate Command Cheat Sheet for Metasploit: https://null-byte.wonderhowto.com/.../hack-like-pro-ultimate-command-cheat-sheet-f... -1083-OSCP Goldmine (not clickbait): 0xc0ffee.io/blog/OSCP-Goldmine -1084-Privilege escalation: Linux : https://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linux -1085-Exploitation Tools Archives : https://pentesttools.net/category/exploitationtools/ -1086-From Local File Inclusion to Remote Code Execution - Part 1: https://outpost24.com/blog/from-local-file-inclusion-to-remote-code-execution-part-1 -1087-Basic Linux Privilege Escalation: https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/ -1088-Title: Ultimate Directory Traversal & Path Traversal Cheat Sheet: www.vulnerability-lab.com/resources/documents/587.txt -1089-Binary Exploitation: https://pwndevils.com/hacking/howtwohack.html 1090-A guide to Linux Privilege Escalation: https://payatu.com/guide-linux-privilege-escalation/ -1091-Penetration Testing Tools Cheat Sheet : https://news.ycombinator.com/item?id=11977304 -1092-List of Metasploit Commands - Cheatsheet: https://thehacktoday.com/metasploit-commands/ -1093-A journey into Radare 2 – Part 2: Exploitation: https://www.megabeets.net/a-journey-into-radare-2-part-2/ -1094-Remote Code Evaluation (Execution) Vulnerability: https://www.netsparker.com/blog/web-security/remote-code-evaluation-execution/ -1095-Exploiting Python Code Injection in Web Applications: https://www.securitynewspaper.com/.../exploiting-python-code-injection-web-applicat... -1096-Shells · Total OSCP Guide: https://sushant747.gitbooks.io/total-oscp-guide/reverse-shell.html -1097-MongoDB Injection cheat sheet Archives: https://blog.securelayer7.net/tag/mongodb-injection-cheat-sheet/ -1098-Basic Shellshock Exploitation: https://blog.knapsy.com/blog/2014/10/07/basic-shellshock-exploitation/ -1099-Wireshark Tutorial and Tactical Cheat Sheet : https://hackertarget.com/wireshark-tutorial-and-cheat-sheet/ -1100-Windows Command Line cheatsheet (part 2): https://www.andreafortuna.org/2017/.../windows-command-line-cheatsheet-part-2-wm... -1101-Detecting WMI exploitation: www.irongeek.com/i.php?page=videos/derbycon8/track-3-03...exploitation... 1102-Metasploit Cheat Sheet - Hacking Land : https://www.hacking.land/2019/02/metasploit-cheat-sheet.html -1103-5 Practical Scenarios for XSS Attacks: https://pentest-tools.com/blog/xss-attacks-practical-scenarios/ -1104-Ultimate gdb cheat sheet: http://nadavclaudecohen.com/2017/10/10/ultimate-gdb-cheat-sheet/ -1105-Reverse Engineering Cheat Sheet: https://www.scribd.com/doc/38163906/Reverse-Engineering-Cheat-Sheet -1106-Reverse Engineering Cheat Sheet: https://www.scribd.com/document/94575179/Reverse-Engineering-Cheat-Sheet -1107-Reverse Engineering For Malware Analysis: https://eforensicsmag.com/reverse_engi_cheatsheet/ -1108-Reverse-engineering Cheat Sheets : https://www.cheatography.com/tag/reverse-engineering/ -1109-Shortcuts for Understanding Malicious Scripts: https://www.linkedin.com/pulse/shortcuts-understanding-malicious-scripts-viviana-ross -1110-WinDbg Malware Analysis Cheat Sheet : https://oalabs.openanalysis.net/2019/02/18/windbg-for-malware-analysis/ -1111-Cheat Sheet for Malware Analysis: https://www.andreafortuna.org/2016/08/16/cheat-sheet-for-malware-analysis/ -1112-Tips for Reverse-Engineering Malicious Code : https://www.digitalmunition.me/tips-reverse-engineering-malicious-code-new-cheat-sheet -1113-Cheatsheet for radare2 : https://leungs.xyz/reversing/2018/04/16/radare2-cheatsheet.html -1114-Reverse Engineering Cheat Sheets: https://www.pinterest.com/pin/576390452300827323/ -1115-Reverse Engineering Resources-Beginners to intermediate Guide/Links: https://medium.com/@vignesh4303/reverse-engineering-resources-beginners-to-intermediate-guide-links-f64c207505ed -1116-Malware Resources : https://www.professor.bike/malware-resources -1117-Zero-day exploits: A cheat sheet for professionals: https://www.techrepublic.com/article/zero-day-exploits-the-smart-persons-guide/ -1118-Getting cozy with exploit development: https://0x00sec.org/t/getting-cozy-with-exploit-development/5311 -1119-appsec - Web Security Cheatsheet : https://security.stackexchange.com/questions/2985/web-security-cheatsheet-todo-list -1120-PEDA - Python Exploit Development Assistance For GDB: https://www.pinterest.ru/pin/789044797190775841/ -1121-Exploit Development Introduction (part 1) : https://www.cybrary.it/video/exploit-development-introduction-part-1/ -1122-Windows Exploit Development: A simple buffer overflow example: https://medium.com/bugbountywriteup/windows-expliot-dev-101-e5311ac284a -1123-Exploit Development-Everything You Need to Know: https://null-byte.wonderhowto.com/how-to/exploit-development-everything-you-need-know-0167801/ -1124-Exploit Development : https://0x00sec.org/c/exploit-development -1125-Exploit Development - Infosec Resources: https://resources.infosecinstitute.com/category/exploit-development/ -1126-Exploit Development : https://www.reddit.com/r/ExploitDev/ -1127-A Study in Exploit Development - Part 1: Setup and Proof of Concept : https://www.anitian.com/a-study-in-exploit-development-part-1-setup-and-proof-of-concept -1128-Exploit Development for Beginners: https://www.youtube.com/watch?v=tVDuuz60KKc -1129-Introduction to Exploit Development: https://www.fuzzysecurity.com/tutorials/expDev/1.html -1130-Exploit Development And Reverse Engineering: https://www.immunitysec.com/services/exploit-dev-reverse-engineering.html -1131-wireless forensics: https://www.sans.org/reading-room/whitepapers/wireless/80211-network-forensic-analysis-33023 -1132-fake AP Detection: https://www.sans.org/reading-room/whitepapers/detection/detecting-preventing-rogue-devices-network-1866 -1133-In-Depth analysis of SamSam Ransomware: https://www.crowdstrike.com/blog/an-in-depth-analysis-of-samsam-ransomware-and-boss-spider/ -1134-WannaCry ransomware: https://www.endgame.com/blog/technical-blog/wcrywanacry-ransomware-technical-analysis -1135-malware analysis: https://www.sans.org/reading-room/whitepapers/malicious/paper/2103 -1136-Metasploit's detailed communication and protocol writeup: https://www.exploit-db.com/docs/english/27935-metasploit---the-exploit-learning-tree.pdf -1137-Metasploit's SSL-generation module:: https://github.com/rapid7/metasploit-framework/blob/76954957c740525cff2db5a60bcf936b4ee06c42/lib/rex/post/meterpreter/client.rb -1139-Empire IOCs:: https://www.sans.org/reading-room/whitepapers/detection/disrupting-empire-identifying-powershell-empire-command-control-activity-38315 -1140-excellent free training on glow analysis: http://opensecuritytraining.info/Flow.html -1141-NetFlow using Silk: https://tools.netsa.cert.org/silk/analysis-handbook.pdf -1142-Deep Packet Inspection: https://is.muni.cz/th/ql57c/dp-svoboda.pdf -1143-Detecting Behavioral Personas with OSINT and Datasploit: https://www.exploit-db.com/docs/45543 -1144-WordPress Penetration Testing using WPScan and MetaSploit: https://www.exploit-db.com/docs/45556 -1145-Bulk SQL Injection using Burp-to-SQLMap: https://www.exploit-db.com/docs/45428 -1146-XML External Entity Injection - Explanation and Exploitation: https://www.exploit-db.com/docs/45374 -1147- Web Application Firewall (WAF) Evasion Techniques #3 (CloudFlare and ModSecurity OWASP CRS3): https://www.exploit-db.com/docs/45368 -1148-File Upload Restrictions Bypass: https://www.exploit-db.com/docs/45074 -1149-VLAN Hopping Attack: https://www.exploit-db.com/docs/45050 -1150-Jigsaw Ransomware Analysis using Volatility: https://medium.com/@0xINT3/jigsaw-ransomware-analysis-using-volatility-2047fc3d9be9 -1151-Ransomware early detection by the analysis of file sharing traffic: https://www.sciencedirect.com/science/article/pii/S108480451830300X -1152-Do You Think You Can Analyse Ransomware?: https://medium.com/asecuritysite-when-bob-met-alice/do-you-think-you-can-analyse-ransomware-bbc813b95529 -1153-Analysis of LockerGoga Ransomware : https://labsblog.f-secure.com/2019/03/27/analysis-of-lockergoga-ransomware/ -1154-Detection and Forensic Analysis of Ransomware Attacks : https://www.netfort.com/assets/NetFort-Ransomware-White-Paper.pdf -1155-Bad Rabbit Ransomware Technical Analysis: https://logrhythm.com/blog/bad-rabbit-ransomware-technical-analysis/ -1156-NotPetya Ransomware analysis : https://safe-cyberdefense.com/notpetya-ransomware-analysis/ -1157-Identifying WannaCry on Your Server Using Logs: https://www.loggly.com/blog/identifying-wannacry-server-using-logs/ -1158-The past, present, and future of ransomware: https://www.itproportal.com/features/the-past-present-and-future-of-ransomware/ -1159-The dynamic analysis of WannaCry ransomware : https://ieeexplore.ieee.org/iel7/8318543/8323471/08323682.pdf -1160-Malware Analysis: Ransomware - SlideShare: https://www.slideshare.net/davidepiccardi/malware-analysis-ransomware -1161-Article: Anatomy of ransomware malware: detection, analysis : https://www.inderscience.com/info/inarticle.php?artid=84399 -1162-Tracking desktop ransomware payments : https://www.blackhat.com/docs/us-17/wednesday/us-17-Invernizzi-Tracking-Ransomware-End-To-End.pdf -1163-What is Ransomware? Defined, Explained, and Explored: https://www.forcepoint.com/cyber-edu/ransomware -1164-Detect and Recover from Ransomware Attacks: https://www.indexengines.com/ransomware -1165-Wingbird rootkit analysis: https://artemonsecurity.blogspot.com/2017/01/wingbird-rootkit-analysis.html -1166-Windows Kernel Rootkits: Techniques and Analysis: https://www.offensivecon.org/trainings/2019/windows-kernel-rootkits-techniques-and-analysis.html -1167-Rootkit: What is a Rootkit and How to Detect It : https://www.veracode.com/security/rootkit -1168-Dissecting Turla Rootkit Malware Using Dynamic Analysis: https://www.lastline.com/.../dissecting-turla-rootkit-malware-using-dynamic-analysis/ -1169-Rootkits and Rootkit Detection (Windows Forensic Analysis) Part 2: https://what-when-how.com/windows-forensic-analysis/rootkits-and-rootkit-detection-windows-forensic-analysis-part-2/ -1170-ZeroAccess – an advanced kernel mode rootkit : https://www.botnetlegalnotice.com/ZeroAccess/files/Ex_12_Decl_Anselmi.pdf -1171-Rootkit Analysis Identification Elimination: https://acronyms.thefreedictionary.com/Rootkit+Analysis+Identification+Elimination -1172-TDL3: The Rootkit of All Evil?: static1.esetstatic.com/us/resources/white-papers/TDL3-Analysis.pdf -1173-Avatar Rootkit: Dropper Analysis: https://resources.infosecinstitute.com/avatar-rootkit-dropper-analysis-part-1/ -1174-Sality rootkit analysis: https://www.prodefence.org/sality-rootkit-analysis/ -1175-RootKit Hook Analyzer: https://www.resplendence.com/hookanalyzer/ -1176-Behavioral Analysis of Rootkit Malware: https://isc.sans.edu/forums/diary/Behavioral+Analysis+of+Rootkit+Malware/1487/ -1177-Malware Memory Analysis of the IVYL Linux Rootkit: https://apps.dtic.mil/docs/citations/AD1004349 -1178-Analysis of the KNARK rootkit : https://linuxsecurity.com/news/intrusion-detection/analysis-of-the-knark-rootkit -1179-32 Bit Windows Kernel Mode Rootkit Lab Setup with INetSim : https://medium.com/@eaugusto/32-bit-windows-kernel-mode-rootkit-lab-setup-with-inetsim-e49c22e9fcd1 -1180-Ten Process Injection Techniques: A Technical Survey of Common and Trending Process Injection Techniques: https://www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process -1181-Code & Process Injection - Red Teaming Experiments: https://ired.team/offensive-security/code-injection-process-injection -1182-What Malware Authors Don't want you to know: https://www.blackhat.com/.../asia-17-KA-What-Malware-Authors-Don't-Want-You-To-Know -1183-.NET Process Injection: https://medium.com/@malcomvetter/net-process-injection-1a1af00359bc -1184-Memory Injection like a Boss : https://www.countercept.com/blog/memory-injection-like-a-boss/ -1185-Process injection - Malware style: https://www.slideshare.net/demeester1/process-injection -1186-Userland API Monitoring and Code Injection Detection: https://0x00sec.org/t/userland-api-monitoring-and-code-injection-detection/5565 -1187-Unpacking Redaman Malware & Basics of Self-Injection Packers: https://liveoverflow.com/unpacking-buhtrap-malware-basics-of-self-injection-packers-ft-oalabs-2/ -1188-Code injection on macOS: https://knight.sc/malware/2019/03/15/code-injection-on-macos.html -1189-(Shell)Code Injection In Linux Userland : https://blog.sektor7.net/#!res/2018/pure-in-memory-linux.md -1190-Code injection on Windows using Python: https://www.andreafortuna.org/2018/08/06/code-injection-on-windows-using-python-a-simple-example/ -1191-What is Reflective DLL Injection and how can be detected?: https://www.andreafortuna.org/cybersecurity/what-is-reflective-dll-injection-and-how-can-be-detected/ -1192-Windows Process Injection: https://modexp.wordpress.com/2018/08/23/process-injection-propagate/ -1193-A+ cheat sheet: https://www.slideshare.net/abnmi/a-cheat-sheet -1194-A Bettercap Tutorial — From Installation to Mischief: https://danielmiessler.com/study/bettercap/ -1195-Debugging Malware with WinDbg: https://www.ixiacom.com/company/blog/debugging-malware-windbg -1195-Malware analysis, my own list of tools and resources: https://www.andreafortuna.org/2016/08/05/malware-analysis-my-own-list-of-tools-and-resources/ -1196-Getting Started with Reverse Engineering: https://lospi.net/developing/software/.../assembly/2015/03/.../reversing-with-ida.html -1197-Debugging malicious windows scriptlets with Google chrome: https://medium.com/@0xamit/debugging-malicious-windows-scriptlets-with-google-chrome-c31ba409975c -1198-Intro to Radare2 for Malware Analysis: https://malwology.com/2018/11/30/intro-to-radare2-for-malware-analysis/ -1199-Intro to Malware Analysis and Reverse Engineering: https://www.cybrary.it/course/malware-analysis/ -1200-Common Malware Persistence Mechanisms: https://resources.infosecinstitute.com/common-malware-persistence-mechanisms/ -1201-Finding Registry Malware Persistence with RECmd: https://digital-forensics.sans.org/blog/2019/05/07/malware-persistence-recmd -1202-Windows Malware Persistence Mechanisms : https://www.swordshield.com/blog/windows-malware-persistence-mechanisms/ -1203- persistence techniques: https://www.andreafortuna.org/2017/07/06/malware-persistence-techniques/ -1204- Persistence Mechanism - an overview | ScienceDirect Topics: https://www.sciencedirect.com/topics/computer-science/persistence-mechanism -1205-Malware analysis for Linux: https://www.sothis.tech/en/malware-analysis-for-linux-wirenet/ -1206-Linux Malware Persistence with Cron: https://www.sandflysecurity.com/blog/linux-malware-persistence-with-cron/ -1207-What is advanced persistent threat (APT)? : https://searchsecurity.techtarget.com/definition/advanced-persistent-threat-APT -1208-Malware Analysis, Part 1: Understanding Code Obfuscation : https://www.vadesecure.com/en/malware-analysis-understanding-code-obfuscation-techniques/ -1209-Top 6 Advanced Obfuscation Techniques: https://sensorstechforum.com/advanced-obfuscation-techniques-malware/ -1210-Malware Obfuscation Techniques: https://dl.acm.org/citation.cfm?id=1908903 -1211-How Hackers Hide Their Malware: Advanced Obfuscation: https://www.darkreading.com/attacks-breaches/how-hackers-hide-their-malware-advanced-obfuscation/a/d-id/1329723 -1212-Malware obfuscation techniques: four simple examples: https://www.andreafortuna.org/2016/10/13/malware-obfuscation-techniques-four-simple-examples/ -1213-Malware Monday: Obfuscation: https://medium.com/@bromiley/malware-monday-obfuscation-f65239146db0 -1213-Challenge of Malware Analysis: Malware obfuscation Techniques: https://www.ijiss.org/ijiss/index.php/ijiss/article/view/327 -1214-Static Malware Analysis - Infosec Resources: https://resources.infosecinstitute.com/malware-analysis-basics-static-analysis/ -1215-Malware Basic Static Analysis: https://medium.com/@jain.sm/malware-basic-static-analysis-cf19b4600725 -1216-Difference Between Static Malware Analysis and Dynamic Malware Analysis: http://www.differencebetween.net/technology/difference-between-static-malware-analysis-and-dynamic-malware-analysis/ -1217-What is Malware Analysis | Different Tools for Malware Analysis: https://blog.comodo.com/different-techniques-for-malware-analysis/ -1218-Detecting Malware Pre-execution with Static Analysis and Machine Learning: https://www.sentinelone.com/blog/detecting-malware-pre-execution-static-analysis-machine-learning/ -1219-Limits of Static Analysis for Malware Detection: https://ieeexplore.ieee.org/document/4413008 -1220-Kernel mode versus user mode: https://blog.codinghorror.com/understanding-user-and-kernel-mode/ -1221-Understanding the ELF: https://medium.com/@MrJamesFisher/understanding-the-elf-4bd60daac571 -1222-Windows Privilege Abuse: Auditing, Detection, and Defense: https://medium.com/palantir/windows-privilege-abuse-auditing-detection-and-defense-3078a403d74e -1223-First steps to volatile memory analysis: https://medium.com/@zemelusa/first-steps-to-volatile-memory-analysis-dcbd4d2d56a1 -1224-Maliciously Mobile: A Brief History of Mobile Malware: https://medium.com/threat-intel/mobile-malware-infosec-history-70f3fcaa61c8 -1225-Modern Binary Exploitation Writeups 0x01: https://medium.com/bugbountywriteup/binary-exploitation-5fe810db3ed4 -1226-Exploit Development 01 — Terminology: https://medium.com/@MKahsari/exploit-development-01-terminology-db8c19db80d5 -1227-Zero-day exploits: A cheat sheet for professionals: https://www.techrepublic.com/article/zero-day-exploits-the-smart-persons-guide/ -1228-Best google hacking list on the net: https://pastebin.com/x5LVJu9T -1229-Google Hacking: https://pastebin.com/6nsVK5Xi -1230-OSCP links: https://pastebin.com/AiYV80uQ -1231-Pentesting 1 Information gathering: https://pastebin.com/qLitw9eT -1232-OSCP-Survival-Guide: https://pastebin.com/kdc6th08 -1233-Googledork: https://pastebin.com/qKwU37BK -1234-Exploit DB: https://pastebin.com/De4DNNKK -1235-Dorks: https://pastebin.com/cfVcqknA -1236-GOOGLE HACKİNG DATABASE: https://pastebin.com/1ndqG7aq -1237-Carding Dorks 2019: https://pastebin.com/Hqsxu6Nn -1238-17k Carding Dorks 2019: https://pastebin.com/fgdZxy74 -1239-CARDING DORKS 2019: https://pastebin.com/Y7KvzZqg -1240-sqli dork 2019: https://pastebin.com/8gdeLYvU -1241-Private Carding Dorks 2018: https://pastebin.com/F0KxkMMD -1242-20K dorks list fresh full carding 2018: https://pastebin.com/LgCh0NRJ -1243-8k Carding Dorks :): https://pastebin.com/2bjBPiEm -1244-8500 SQL DORKS: https://pastebin.com/yeREBFzp -1245-REAL CARDING DORKS: https://pastebin.com/0kMhA0Gb -1246-15k btc dorks: https://pastebin.com/zbbBXSfG -1247-Sqli dorks 2016-2017: https://pastebin.com/7TQiMj3A -1248-Here is kind of a tutorial on how to write google dorks.: https://pastebin.com/hZCXrAFK -1249-10k Private Fortnite Dorks: https://pastebin.com/SF9UmG1Y -1250-find login panel dorks: https://pastebin.com/9FGUPqZc -1251-Shell dorks: https://pastebin.com/iZBFQ5yp -1252-HQ PAID GAMING DORKS: https://pastebin.com/vNYnyW09 -1253-10K HQ Shopping DORKS: https://pastebin.com/HTP6rAt4 -1254-Exploit Dorks for Joomla,FCK and others 2015 Old but gold: https://pastebin.com/ttxAJbdW -1255-Gain access to unsecured IP cameras with these Google dorks: https://pastebin.com/93aPbwwE -1256-new fresh dorks: https://pastebin.com/ZjdxBbNB -1257-SQL DORKS FOR CC: https://pastebin.com/ZQTHwk2S -1258-Wordpress uploadify Dorks Priv8: https://pastebin.com/XAGmHVUr -1259-650 DORKS CC: https://pastebin.com/xZHARTyz -1260-3k Dorks Shopping: https://pastebin.com/e1XiNa8M -1261-DORKS 2018 : https://pastebin.com/YAZkPJ0j -1262-HQ FORTNITE DORKS LIST: https://pastebin.com/rzhiNad8 -1263-HQ PAID DORKS MIXED GAMING LOL STEAM ..MUSIC SHOPING: https://pastebin.com/VwVpAvj2 -1264-Camera dorks: https://pastebin.com/fsARft2j -1265-Admin Login Dorks: https://pastebin.com/HWWNZCph -1266-sql gov dorks: https://pastebin.com/C8wqyNW8 -1267-10k hq gaming dorks: https://pastebin.com/cDLN8edi -1268-HQ SQLI Google Dorks For Shops/Amazon! Enjoy! : https://pastebin.com/y59kK2h0 -1269-Dorks: https://pastebin.com/PKvZYMAa -1270-10k btc dorks: https://pastebin.com/vRnxvbCu -1271-7,000 Dorks for hacking into various sites: https://pastebin.com/n8JVQv3X -1272-List of information gathering search engines/tools etc: https://pastebin.com/GTX9X5tF -1273-FBOSINT: https://pastebin.com/5KqnFS0B -1274-Ultimate Penetration Testing: https://pastebin.com/4EEeEnXe -1275-massive list of information gathering search engines/tools : https://pastebin.com/GZ9TVxzh -1276-CEH Class: https://pastebin.com/JZdCHrN4 -1277-CEH/CHFI Bundle Study Group Sessions: https://pastebin.com/XTwksPK7 -1278-OSINT - Financial: https://pastebin.com/LtxkUi0Y -1279-Most Important Security Tools and Resources: https://pastebin.com/cGE8rG04 -1280-OSINT resources from inteltechniques.com: https://pastebin.com/Zbdz7wit -1281-Red Team Tips: https://pastebin.com/AZDBAr1m -1282-OSCP Notes by Ash: https://pastebin.com/wFWx3a7U -1283-OSCP Prep: https://pastebin.com/98JG5f2v -1284-OSCP Review/Cheat Sheet: https://pastebin.com/JMMM7t4f -1285-OSCP Prep class: https://pastebin.com/s59GPJrr -1286-Complete Anti-Forensics Guide: https://pastebin.com/6V6wZK0i -1287-The Linux Command Line Cheat Sheet: https://pastebin.com/PUtWDKX5 -1288-Command-Line Log Analysis: https://pastebin.com/WEDwpcz9 -1289-An A-Z Index of the Apple macOS command line (OS X): https://pastebin.com/RmPLQA5f -1290-San Diego Exploit Development 2018: https://pastebin.com/VfwhT8Yd -1291-Windows Exploit Development Megaprimer: https://pastebin.com/DvdEW4Az -1292-Some Free Reverse engineering resources: https://pastebin.com/si2ThQPP -1293-Sans: https://pastebin.com/MKiSnjLm -1294-Metasploit Next Level: https://pastebin.com/0jC1BUiv -1295-Just playing around....: https://pastebin.com/gHXPzf6B -1296-Red Team Course: https://pastebin.com/YUYSXNpG -1297-New Exploit Development 2018: https://pastebin.com/xaRxgYqQ -1298-Good reviews of CTP/OSCE (in no particular order):: https://pastebin.com/RSPbatip -1299-Vulnerability Research Engineering Bookmarks Collection v1.0: https://pastebin.com/8mUhjGSU -1300-Professional-hacker's Pastebin : https://pastebin.com/u/Professional-hacker -1301-Google Cheat Sheet: http://www.googleguide.com/print/adv_op_ref.pdf -1302-Shodan for penetration testers: https://www.defcon.org/images/defcon-18/dc-18-presentations/Schearer/DEFCON-18-Schearer-SHODAN.pdf -1303-Linux networking tools: https://gist.github.com/miglen/70765e663c48ae0544da08c07006791f -1304-DNS spoofing with NetHunter: https://cyberarms.wordpress.com/category/nethunter-tutorial/ -1305-Tips on writing a penetration testing report: https://www.sans.org/reading-room/whitepapers/bestprac/writing-penetration-testing-report-33343 -1306-Technical penetration report sample: https://tbgsecurity.com/wordpress/wp-content/uploads/2016/11/Sample-Penetration-Test-Report.pdf -1307-Nessus sample reports: https://www.tenable.com/products/nessus/sample-reports -1308-Sample penetration testing report: https://www.offensive-security.com/reports/sample-penetration-testing-report.pdf -1309-jonh-the-ripper-cheat-sheet: https://countuponsecurity.com/2015/06/14/jonh-the-ripper-cheat-sheet/ -1310-ultimate guide to cracking foreign character passwords using hashcat: http://www.netmux.com/blog/ultimate-guide-to-cracking-foreign-character-passwords-using-has -1311-Building_a_Password_Cracking_Rig_for_Hashcat_-_Part_III: https://www.unix-ninja.com/p/Building_a_Password_Cracking_Rig_for_Hashcat_-_Part_III -1312-cracking story how i cracked over 122 million sha1 and md5 hashed passwords: http://blog.thireus.com/cracking-story-how-i-cracked-over-122-million-sha1-and-md5-hashed-passwords/ -1313-CSA (Cloud Security Alliance) Security White Papers: https://cloudsecurityalliance.org/download/ -1314-NIST Security Considerations in the System Development Life Cycle: https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-64r2.pdf -1315-ISO 29100 information technology security techniques privacy framework: https://www.iso.org/standard/45123.html -1316-NIST National Checklist Program: https://nvd.nist.gov/ncp/repository -1317-OWASP Guide to Cryptography: https://www.owasp.org/index.php/Guide_to_Cryptography -1318-NVD (National Vulnerability Database): https://nvd.nist.gov/ -1319-CVE details: https://cvedetails.com/ -1320-CIS Cybersecurity Tools: https://www.cisecurity.org/cybersecurity-tools/ -1321-Security aspects of virtualization by ENISA: https://www.enisa.europa.eu/publications/security-aspects-of-virtualization/ -1322-CIS Benchmarks also provides a security guide for VMware, Docker, and Kubernetes: https://www.cisecurity.org/cis-benchmarks/ -1323-OpenStack's hardening of the virtualization layer provides a secure guide to building the virtualization layer: https://docs.openstack.org/security-guide/compute/hardening-the-virtualization-layers.html -1324-Docker security: https://docs.docker.com/engine/security/security/ -1325-Microsoft Security Development Lifecycle: http://www.microsoft.com/en-us/SDL/ -1326-OWASP SAMM Project: https://www.owasp.org/index.php/OWASP_SAMM_Project -1327-CWE/SANS Top 25 Most Dangerous Software Errors: https://cwe.mitre.org/top25/ -1329-OWASP Vulnerable Web Applications Directory Project: https://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Directory_Project -1330-CERT Secure Coding Standards: https://wiki.sei.cmu.edu/confluence/display/seccode/SEI+CERT+Coding+Standards -1331-NIST Special Publication 800-53: https://nvd.nist.gov/800-53 -1332-SAFECode Security White Papers: https://safecode.org/publications/ -1333-Microsoft Threat Modeling tool 2016: https://aka.ms/tmt2016/ -1334-Apache Metron for real-time big data security: http://metron.apache.org/documentation/ -1335-Introducing OCTAVE Allegro: Improving the Information Security Risk Assessment Process: https://resources.sei.cmu.edu/asset_files/TechnicalReport/2007_005_001_14885.pdf -1336-NIST 800-18 Guide for Developing Security Plans for Federal Information Systems: http://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-18r1.pdf -1337-ITU-T X.805 (10/2003) Security architecture for systems providing end- to-end communications: https://www.itu.int/rec/dologin_pub.asp?lang=e&id=T-REC-X.805-200310-I!!PDF-E&type=items -1338-ETSI TS 102 165-1 V4.2.1 (2006-12) : Method and proforma for Threat, Risk, Vulnerability Analysis: http://www.etsi.org/deliver/etsi_ts/102100_102199/10216501/04.02.01_60/ts_10216501v040201p.pdf -1339-SAFECode Fundamental Practices for Secure Software Development: https://safecode.org/wp-content/uploads/2018/03/SAFECode_Fundamental_Practices_for_Secure_Software_Development_March_2018.pdf -1340-NIST 800-64 Security Considerations in the System Development Life Cycle: https://csrc.nist.gov/publications/detail/sp/800-64/rev-2/final -1341-SANS A Security Checklist for Web Application Design: https://www.sans.org/reading-room/whitepapers/securecode/security-checklist-web-application-design-1389 -1342-Best Practices for implementing a Security Awareness Program: https://www.pcisecuritystandards.org/documents/PCI_DSS_V1.0_Best_Practices_for_Implementing_Security_Awareness_Program.pdf -1343-ETSI TS 102 165-1 V4.2.1 (2006-12): Method and proforma for Threat, Risk, Vulnerability Analysis: http://www.etsi.org/deliver/etsi_ts/102100_102199/10216501/04.02.03_60/ts_10216501v040203p.pdf -1344-NIST 800-18 Guide for Developing Security Plans for Federal Information Systems: https://csrc.nist.gov/publications/detail/sp/800-18/rev-1/final -1345-SafeCode Tactical Threat Modeling: https://safecode.org/safecodepublications/tactical-threat-modeling/ -1346-SANS Web Application Security Design Checklist: https://www.sans.org/reading-room/whitepapers/securecode/security-checklist-web-application-design-1389 -1347-Data Anonymization for production data dumps: https://github.com/sunitparekh/data-anonymization -1348-SANS Continuous Monitoring—What It Is, Why It Is Needed, and How to Use It: https://www.sans.org/reading-room/whitepapers/analyst/continuous-monitoring-is-needed-35030 -1349-Guide to Computer Security Log Management: https://ws680.nist.gov/publication/get_pdf.cfm?pub_id=50881 -1350-Malware Indicators: https://github.com/citizenlab/malware-indicators -1351-OSINT Threat Feeds: https://www.circl.lu/doc/misp/feed-osint/ -1352-SANS How to Use Threat Intelligence effectively: https://www.sans.org/reading-room/whitepapers/analyst/threat-intelligence-is-effectively-37282 -1353-NIST 800-150 Guide to Cyber Threat Information Sharing: https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-150.pdf -1354-Securing Web Application Technologies Checklist: https://software-security.sans.org/resources/swat -1355-Firmware Security Training: https://github.com/advanced-threat-research/firmware-security-training -1356-Burp Suite Bootcamp: https://pastebin.com/5sG7Rpg5 -1357-Web app hacking: https://pastebin.com/ANsw7WRx -1358-XSS Payload: https://pastebin.com/EdxzE4P1 -1359-XSS Filter Evasion Cheat Sheet: https://pastebin.com/bUutGfSy -1360-Persistence using RunOnceEx – Hidden from Autoruns.exe: https://oddvar.moe/2018/03/21/persistence-using-runonceex-hidden-from-autoruns-exe/ -1361-Windows Operating System Archaeology: https://www.slideshare.net/enigma0x3/windows-operating-system-archaeology -1362-How to Backdoor Windows 10 Using an Android Phone & USB Rubber Ducky: https://www.prodefence.org/how-to-backdoor-windows-10-using-an-android-phone-usb-rubber-ducky/ -1363-Malware Analysis using Osquery : https://hackernoon.com/malware-analysis-using-osquery-part-2-69f08ec2ecec -1364-Tales of a Blue Teamer: Detecting Powershell Empire shenanigans with Sysinternals : https://holdmybeersecurity.com/2019/02/27/sysinternals-for-windows-incident-response/ -1365-Userland registry hijacking: https://3gstudent.github.io/Userland-registry-hijacking/ -1366-Malware Hiding Techniques to Watch for: AlienVault Labs: https://www.alienvault.com/blogs/labs-research/malware-hiding-techniques-to-watch-for-alienvault-labs -1367- Full text of "Google hacking for penetration testers" : https://archive.org/stream/pdfy-TPtNL6_ERVnbod0r/Google+Hacking+-+For+Penetration+Tester_djvu.txt -1368- Full text of "Long, Johnny Google Hacking For Penetration Testers" : https://archive.org/stream/LongJohnnyGoogleHackingForPenetrationTesters/Long%2C%20Johnny%20-%20Google%20Hacking%20for%20Penetration%20Testers_djvu.txt -1369- Full text of "Coding For Penetration Testers" : https://archive.org/stream/CodingForPenetrationTesters/Coding%20for%20Penetration%20Testers_djvu.txt -1370- Full text of "Hacking For Dummies" : https://archive.org/stream/HackingForDummies/Hacking%20For%20Dummies_djvu.txt -1371-Full text of "Wiley. Hacking. 5th. Edition. Jan. 2016. ISBN. 1119154685. Profescience.blogspot.com" : https://archive.org/stream/Wiley.Hacking.5th.Edition.Jan.2016.ISBN.1119154685.Profescience.blogspot.com/Wiley.Hacking.5th.Edition.Jan.2016.ISBN.1119154685.Profescience.blogspot.com_djvu.txt -1372- Full text of "Social Engineering The Art Of Human Hacking" : https://archive.org/stream/SocialEngineeringTheArtOfHumanHacking/Social%20Engineering%20-%20The%20Art%20of%20Human%20Hacking_djvu.txt -1373- Full text of "CYBER WARFARE" : https://archive.org/stream/CYBERWARFARE/CYBER%20WARFARE_djvu.txt -1374-Full text of "NSA DOCID: 4046925 Untangling The Web: A Guide To Internet Research" : https://archive.org/stream/Untangling_the_Web/Untangling_the_Web_djvu.txt -1375- Full text of "sectools" : https://archive.org/stream/sectools/hack-the-stack-network-security_djvu.txt -1376- Full text of "Aggressive network self-defense" : https://archive.org/stream/pdfy-YNtvDJueGZb1DCDA/Aggressive%20Network%20Self-Defense_djvu.txt -1377-Community Texts: https://archive.org/details/opensource?and%5B%5D=%28language%3Aeng+OR+language%3A%22English%22%29+AND+subject%3A%22google%22 -1378- Full text of "Cyber Spying - Tracking (sometimes).PDF (PDFy mirror)" : https://archive.org/stream/pdfy-5-Ln_yPZ22ondBJ8/Cyber%20Spying%20-%20Tracking%20%28sometimes%29_djvu.txt -1379- Full text of "Enzyclopedia Of Cybercrime" : https://archive.org/stream/EnzyclopediaOfCybercrime/Enzyclopedia%20Of%20Cybercrime_djvu.txt -1380- Full text of "Information Security Management Handbook" : https://archive.org/stream/InformationSecurityManagementHandbook/Information%20Security%20Management%20Handbook_djvu.txt -1381- Full text of "ARMArchitecture Reference Manual" : https://archive.org/stream/ARMArchitectureReferenceManual/DetectionOfIntrusionsAndMalwareAndVulnerabilityAssessment2016_djvu.txt -1382- Full text of "Metasploit The Penetration Tester S Guide" : https://archive.org/stream/MetasploitThePenetrationTesterSGuide/Metasploit-The+Penetration+Tester+s+Guide_djvu.txt -1383-Tips & tricks to master Google’s search engine: https://medium.com/infosec-adventures/google-hacking-39599373be7d -1384-Ethical Google Hacking - Sensitive Doc Dork (Part 2) : https://securing-the-stack.teachable.com/courses/ethical-google-hacking-1/lectures/3877866 -1385- Google Hacking Secrets:the Hidden Codes of Google : https://www.ma-no.org/en/security/google-hacking-secrets-the-hidden-codes-of-google -1386-google hacking: https://www.slideshare.net/SamNizam/3-google-hacking -1387-How Penetration Testers Use Google Hacking: https://www.cqure.nl/kennisplatform/how-penetration-testers-use-google-hacking -1388-Free Automated Malware Analysis Sandboxes and Services: https://zeltser.com/automated-malware-analysis/ -1389-How to get started with Malware Analysis and Reverse Engineering: https://0ffset.net/miscellaneous/how-to-get-started-with-malware-analysis/ -1390-Handy Tools And Websites For Malware Analysis: https://www.informationsecuritybuzz.com/articles/handy-tools-and-websites/ -1391-Dynamic Malware Analysis: https://prasannamundas.com/share/dynamic-malware-analysis/ -1392-Intro to Radare2 for Malware Analysis: https://malwology.com/2018/11/30/intro-to-radare2-for-malware-analysis/ -1393-Detecting malware through static and dynamic techniques: https://technical.nttsecurity.com/.../detecting-malware-through-static-and-dynamic-tec... -1394-Malware Analysis Tutorial : Tricks for Confusing Static Analysis Tools: https://www.prodefence.org/malware-analysis-tutorial-tricks-confusing-static-analysis-tools -1395-Malware Analysis Lab At Home In 5 Steps: https://ethicalhackingguru.com/malware-analysis-lab-at-home-in-5-steps/ -1396-Malware Forensics Guide - Static and Dynamic Approach: https://www.yeahhub.com/malware-forensics-guide-static-dynamic-approach/ -1397-Top 30 Bug Bounty Programs in 2019: https://www.guru99.com/bug-bounty-programs.html -1398-Introduction - Book of BugBounty Tips: https://gowsundar.gitbook.io/book-of-bugbounty-tips/ -1399-List of bug bounty writeups: https://pentester.land/list-of-bug-bounty-writeups.html -1400-Tips From A Bugbounty Hunter: https://www.secjuice.com/bugbounty-hunter/ -1401-Cross Site Scripting (XSS) - Book of BugBounty Tips: https://gowsundar.gitbook.io/book-of-bugbounty-tips/cross-site-scripting-xss -1402-BugBountyTips: https://null0xp.wordpress.com/tag/bugbountytips/ -1403-Xss Filter Bypass Payloads: www.oroazteca.net/mq67/xss-filter-bypass-payloads.html -1404-Bug Bounty Methodology: https://eforensicsmag.com/bug-bounty-methodology-ttp-tacticstechniques-and-procedures-v-2-0 -1405-GDB cheat-sheet for exploit development: www.mannulinux.org/2017/01/gdb-cheat-sheet-for-exploit-development.html -1406-A Study in Exploit Development - Part 1: Setup and Proof of Concept : https://www.anitian.com/a-study-in-exploit-development-part-1-setup-and-proof-of-concept -1407-Exploit development tutorial : https://www.computerweekly.com/tutorial/Exploit-development-tutorial-Part-Deux -1408-exploit code development: http://www.phreedom.org/presentations/exploit-code-development/exploit-code-development.pdf -1409-“Help Defeat Denial of Service Attacks: Step-by-Step”: http://www.sans.org/dosstep/ -1410-Internet Firewalls: Frequently Asked Questions: http://www.interhack.net/pubs/fwfaq/ -1411-Service Name and Transport Protocol Port Number: http://www.iana.org/assignments/port-numbers -1412-10 Useful Open Source Security Firewalls for Linux Systems: https://www.tecmint.com/open-source-security-firewalls-for-linux-systems/ -1413-40 Linux Server Hardening Security Tips: https://www.cyberciti.biz/tips/linux-security.html -1414-Linux hardening: A 15-step checklist for a secure Linux server : https://www.computerworld.com/.../linux-hardening-a-15-step-checklist-for-a-secure-linux-server -1415-25 Hardening Security Tips for Linux Servers: https://www.tecmint.com/linux-server-hardening-security-tips/ -1416-How to Harden Unix/Linux Systems & Close Security Gaps: https://www.beyondtrust.com/blog/entry/harden-unix-linux-systems-close-security-gaps -1417-34 Linux Server Security Tips & Checklists for Sysadmins: https://www.process.st/server-security/ -1418-Linux Hardening: https://www.slideshare.net/MichaelBoelen/linux-hardening -1419-23 Hardening Tips to Secure your Linux Server: https://www.rootusers.com/23-hardening-tips-to-secure-your-linux-server/ -1420-What is the Windows Registry? : https://www.computerhope.com/jargon/r/registry.htm -1421-Windows Registry, Everything You Need To Know: https://www.gammadyne.com/registry.htm -1422-Windows Registry Tutorial: https://www.akadia.com/services/windows_registry_tutorial.html -1423-5 Tools to Scan a Linux Server for Malware and Rootkits: https://www.tecmint.com/scan-linux-for-malware-and-rootkits/ -1424-Subdomain takeover dew to missconfigured project settings for Custom domain .: https://medium.com/bugbountywriteup/subdomain-takeover-dew-to-missconfigured-project-settings-for-custom-domain-46e90e702969 -1425-Massive Subdomains p0wned: https://medium.com/bugbountywriteup/massive-subdomains-p0wned-80374648336e -1426-Subdomain Takeover: Basics: https://0xpatrik.com/subdomain-takeover-basics/ -1427-Subdomain Takeover: Finding Candidates: https://0xpatrik.com/subdomain-takeover-candidates/ -1428-Bugcrowd's Domain & Subdomain Takeover!: https://bugbountypoc.com/bugcrowds-domain-takeover/ -1429-What Are Subdomain Takeovers, How to Test and Avoid Them?: https://dzone.com/articles/what-are-subdomain-takeovers-how-to-test-and-avoid -1430-Finding Candidates for Subdomain Takeovers: https://jarv.is/notes/finding-candidates-subdomain-takeovers/ -1431-Subdomain takeover of blog.snapchat.com: https://hackernoon.com/subdomain-takeover-of-blog-snapchat-com-60860de02fe7 -1432-Hostile Subdomain takeove: https://labs.detectify.com/tag/hostile-subdomain-takeover/ -1433-Microsoft Account Takeover Vulnerability Affecting 400 Million Users: https://www.safetydetective.com/blog/microsoft-outlook/ -1434-What is Subdomain Hijack/Takeover Vulnerability? How to Identify? & Exploit It?: https://blog.securitybreached.org/2017/10/11/what-is-subdomain-takeover-vulnerability/ -1435-Subdomain takeover detection with AQUATONE: https://michenriksen.com/blog/subdomain-takeover-detection-with-aquatone/ -1436-A hostile subdomain takeover! – Breaking application security: https://evilenigma.blog/2019/03/12/a-hostile-subdomain-takeover/ -1437-Web Development Reading List: https://www.smashingmagazine.com/2017/03/web-development-reading-list-172/ -1438-CSRF Attack can lead to Stored XSS: https://medium.com/bugbountywriteup/csrf-attack-can-lead-to-stored-xss-f40ba91f1e4f -1439-What is Mimikatz: The Beginner's Guide | Varonis: https://www.varonis.com/bog/what-is-mimikatz -1440-Preventing Mimikatz Attacks : https://medium.com/blue-team/preventing-mimikatz-attacks-ed283e7ebdd5 -1441-Mimikatz tutorial: How it hacks Windows passwords, credentials: https://searchsecurity.techtarget.com/.../Mimikatz-tutorial-How-it-hacks-Windows-passwords-credentials -1442-Mimikatz: Walkthrough [Updated 2019]: https://resources.infosecinstitute.com/mimikatz-walkthrough/ -1443-Mimikatz -Windows Tutorial for Beginner: https://hacknpentest.com/mimikatz-windows-tutorial-beginners-guide-part-1/ -1444-Mitigations against Mimikatz Style Attacks: https://isc.sans.edu/forums/diary/Mitigations+against+Mimikatz+Style+Attacks -1445-Exploring Mimikatz - Part 1 : https://blog.xpnsec.com/exploring-mimikatz-part-1/ -1446-Powershell AV Evasion. Running Mimikatz with PowerLine: https://jlajara.gitlab.io/posts/2019/01/27/Mimikatz-AV-Evasion.html -1447-How to Steal Windows Credentials with Mimikatz and Metasploit: https://www.hackingloops.com/mimikatz/ -1448-Retrieving NTLM Hashes without touching LSASS: https://www.andreafortuna.org/2018/03/26/retrieving-ntlm-hashes-without-touching-lsass-the-internal-monologue-attack/ -1449-From Responder to NT Authority\SYSTEM: https://medium.com/bugbountywriteup/from-responder-to-nt-authority-system-39abd3593319 -1450-Getting Creds via NTLMv2: https://0xdf.gitlab.io/2019/01/13/getting-net-ntlm-hases-from-windows.html -1451-Living off the land: stealing NetNTLM hashes: https://www.securify.nl/blog/SFY20180501/living-off-the-land_-stealing-netntlm-hashes.html -1452-(How To) Using Responder to capture passwords on a Windows: www.securityflux.com/?p=303 -1453-Pwning with Responder - A Pentester's Guide: https://www.notsosecure.com/pwning-with-responder-a-pentesters-guide/ -1454-LLMNR and NBT-NS Poisoning Using Responder: https://www.4armed.com/blog/llmnr-nbtns-poisoning-using-responder/ -1455-Responder - Ultimate Guide : https://www.ivoidwarranties.tech/posts/pentesting-tuts/responder/guide/ -1456-Responder - CheatSheet: https://www.ivoidwarranties.tech/posts/pentesting-tuts/responder/cheatsheet/ -1457-LM, NTLM, Net-NTLMv2, oh my! : https://medium.com/@petergombos/lm-ntlm-net-ntlmv2-oh-my-a9b235c58ed4 -1458-SMB Relay Attack Tutorial: https://intrinium.com/smb-relay-attack-tutorial -1459-Cracking NTLMv2 responses captured using responder: https://zone13.io/post/cracking-ntlmv2-responses-captured-using-responder/ -1460-Skip Cracking Responder Hashes and Relay Them: https://threat.tevora.com/quick-tip-skip-cracking-responder-hashes-and-replay-them/ -1461-Metasploit's First Antivirus Evasion Modules: https://blog.rapid7.com/2018/10/09/introducing-metasploits-first-evasion-module/ -1462-Evading Anti-virus Part 1: Infecting EXEs with Shellter: https://www.hackingloops.com/evading-anti-virus-shellter/ -1463-Evading AV with Shellter: https://www.securityartwork.es/2018/11/02/evading-av-with-shellter-i-also-have-sysmon-and-wazuh-i/ -1464-Shellter-A Shellcode Injecting Tool : https://www.hackingarticles.in/shellter-a-shellcode-injecting-tool/ -1465-Bypassing antivirus programs using SHELLTER: https://myhackstuff.com/shellter-bypassing-antivirus-programs/ -1466-John the Ripper step-by-step tutorials for end-users : openwall.info/wiki/john/tutorials -1467-Beginners Guide for John the Ripper (Part 1): https://www.hackingarticles.in/beginner-guide-john-the-ripper-part-1/ -1468-John the Ripper Basics Tutorial: https://ultimatepeter.com/john-the-ripper-basics-tutorial/ -1469-Crack Windows password with john the ripper: https://www.securitynewspaper.com/2018/11/27/crack-windows-password-with-john-the-ripper/ -1470-Getting Started Cracking Password Hashes with John the Ripper : https://www.tunnelsup.com/getting-started-cracking-password-hashes/ -1471-Shell code exploit with Buffer overflow: https://medium.com/@jain.sm/shell-code-exploit-with-buffer-overflow-8d78cc11f89b -1472-Shellcoding for Linux and Windows Tutorial : www.vividmachines.com/shellcode/shellcode.html -1473-Buffer Overflow Practical Examples : https://0xrick.github.io/binary-exploitation/bof5/ -1474-Msfvenom shellcode analysis: https://snowscan.io/msfvenom-shellcode-analysis/ -1475-Process Continuation Shellcode: https://azeria-labs.com/process-continuation-shellcode/ -1476-Dynamic Shellcode Execution: https://www.countercept.com/blog/dynamic-shellcode-execution/ -1477-Tutorials: Writing shellcode to binary files: https://www.fuzzysecurity.com/tutorials/7.html -1478-Creating Shellcode for an Egg Hunter : https://securitychops.com/2018/05/26/slae-assignment-3-egghunter-shellcode.html -1479-How to: Shellcode to reverse bind a shell with netcat : www.hackerfall.com/story/shellcode-to-reverse-bind-a-shell-with-netcat -1480-Bashing the Bash — Replacing Shell Scripts with Python: https://medium.com/capital-one-tech/bashing-the-bash-replacing-shell-scripts-with-python-d8d201bc0989 -1481-How to See All Devices on Your Network With nmap on Linux: https://www.howtogeek.com/.../how-to-see-all-devices-on-your-network-with-nmap-on-linux -1482-A Complete Guide to Nmap: https://www.edureka.co/blog/nmap-tutorial/ -1483-Nmap from Beginner to Advanced : https://resources.infosecinstitute.com/nmap/ -1484-Using Wireshark: Identifying Hosts and Users: https://unit42.paloaltonetworks.com/using-wireshark-identifying-hosts-and-users/ -1485-tshark tutorial and filter examples: https://hackertarget.com/tshark-tutorial-and-filter-examples/ -1486-Fuzz Testing(Fuzzing) Tutorial: What is, Types, Tools & Example: https://www.guru99.com/fuzz-testing.html -1487-Tutorial: Dumb Fuzzing - Peach Community Edition: community.peachfuzzer.com/v3/TutorialDumbFuzzing.html -1488-HowTo: ExploitDev Fuzzing: https://hansesecure.de/2018/03/howto-exploitdev-fuzzing/ -1489-Fuzzing with Metasploit: https://www.corelan.be/?s=fuzzing -1490-Fuzzing – how to find bugs automagically using AFL: 9livesdata.com/fuzzing-how-to-find-bugs-automagically-using-afl/ -1491-Introduction to File Format Fuzzing & Exploitation: https://medium.com/@DanielC7/introduction-to-file-format-fuzzing-exploitation-922143ab2ab3 -1492-0x3 Python Tutorial: Fuzzer: https://www.primalsecurity.net/0x3-python-tutorial-fuzzer/ -1493-Hunting For Bugs With AFL: https://research.aurainfosec.io/hunting-for-bugs-101/ -1494-Fuzzing: The New Unit Testing: https://www.slideshare.net/DmitryVyukov/fuzzing-the-new-unit-testing -1495-Fuzzing With Peach Framework: https://www.terminatio.org/fuzzing-peach-framework-full-tutorial-download/ -1496-How we found a tcpdump vulnerability using cloud fuzzing: https://www.softscheck.com/en/identifying-security-vulnerabilities-with-cloud-fuzzing/ -1497-Finding a Fuzzer: Peach Fuzzer vs. Sulley: https://medium.com/@jtpereyda/finding-a-fuzzer-peach-fuzzer-vs-sulley-1fcd6baebfd4 -1498-Android malware analysis: https://www.slideshare.net/rossja/android-malware-analysis-71109948 -1499-15+ Malware Analysis Tools & Techniques : https://www.template.net/business/tools/malware-analysis/ -1500-30 Online Malware Analysis Sandboxes / Static Analyzers: https://medium.com/@su13ym4n/15-online-sandboxes-for-malware-analysis-f8885ecb8a35 -1501-Linux Command Line Forensics and Intrusion Detection Cheat Sheet: https://www.sandflysecurity.com/blog/compromised-linux-cheat-sheet/ -1502-Cheat Sheets - SANS Digital Forensics: https://digital-forensics.sans.org/community/cheat-sheets -1503-Breach detection with Linux filesystem forensics: https://opensource.com/article/18/4/linux-filesystem-forensics -1504-Digital Forensics Cheat Sheets Collection : https://neverendingsecurity.wordpress.com/digital-forensics-cheat-sheets-collection/ -1505-Security Incident Survey Cheat Sheet for Server Administrators: https://zeltser.com/security-incident-survey-cheat-sheet/ -1506-Digital forensics: A cheat sheet : https://www.techrepublic.com/article/digital-forensics-the-smart-persons-guide/ -1507-Windows Registry Forensics using 'RegRipper' Command-Line on Linux: https://www.pinterest.cl/pin/794815034207804059/ -1508-Windows IR Live Forensics Cheat Sheet: https://www.cheatography.com/koriley/cheat-sheets/windows-ir-live-forensics/ -1509-10 Best Known Forensics Tools That Works on Linux: https://linoxide.com/linux-how-to/forensics-tools-linux/ -1510-Top 20 Free Digital Forensic Investigation Tools for SysAdmins: https://techtalk.gfi.com/top-20-free-digital-forensic-investigation-tools-for-sysadmins/ -1511-Windows Volatile Memory Acquisition & Forensics 2018: https://medium.com/@lucideus/windows-volatile-memory-acquisition-forensics-2018-lucideus-forensics-3f297d0e5bfd -1512-PowerShell Cheat Sheet : https://www.digitalforensics.com/blog/powershell-cheat-sheet-2/ -1513-Forensic Artifacts: evidences of program execution on Windows systems: https://www.andreafortuna.org/forensic-artifacts-evidences-of-program-execution-on-windows-systems -1514-How to install a CPU?: https://www.computer-hardware-explained.com/how-to-install-a-cpu.html -1515-How To Upgrade and Install a New CPU or Motherboard: https://www.howtogeek.com/.../how-to-upgrade-and-install-a-new-cpu-or-motherboard-or-both -1516-Installing and Troubleshooting CPUs: www.pearsonitcertification.com/articles/article.aspx?p=1681054&seqNum=2 -1517-15 FREE Pastebin Alternatives You Can Use Right Away: https://www.rootreport.com/pastebin-alternatives/ -1518-Basic computer troubleshooting steps: https://www.computerhope.com/basic.htm -1519-18 Best Websites to Learn Computer Troubleshooting and Tech support: http://transcosmos.co.uk/best-websites-to-learn-computer-troubleshooting-and-tech-support -1520-Post Exploitation with PowerShell Empire 2.3.0 : https://www.yeahhub.com/post-exploitation-powershell-empire-2-3-0-detailed-tutorial/ -1521-Windows Persistence with PowerShell Empire : https://www.hackingarticles.in/windows-persistence-with-powershell-empire/ -1522-powershell-empire-tutorials-empire-to-meterpreter-shellcode-injection-ssl-tutorial: https://www.dudeworks.com/powershell-empire-tutorials-empire-to-meterpreter-shellcode-injection-ssl-tutorial -1523-Bypassing Anti-Virtus & Hacking Windows 10 Using Empire : https://zsecurity.org/bypassing-anti-virtus-hacking-windows-10-using-empire/ -1524-Hacking with Empire – PowerShell Post-Exploitation Agent : https://www.prodefence.org/hacking-with-empire-powershell-post-exploitation-agent/ -1525-Hacking Windows Active Directory Full guide: www.kalitut.com/hacking-windows-active-directory-full.html -1526-PowerShell Empire for Post-Exploitation: https://www.hackingloops.com/powershell-empire/ -1527-Generate A One-Liner – Welcome To LinuxPhilosophy!: linuxphilosophy.com/rtfm/more/empire/generate-a-one-liner/ -1528-CrackMapExec - Ultimate Guide: https://www.ivoidwarranties.tech/posts/pentesting-tuts/cme/crackmapexec/ -1529-PowerShell Logging and Security: https://www.secjuice.com/enterprise-powershell-protection-logging/ -1530-Create your own FUD Backdoors with Empire: http://blog.extremehacking.org/blog/2016/08/25/create-fud-backdoors-empire/ -1531-PowerShell Empire Complete Tutorial For Beginners: https://video.hacking.reviews/2019/06/powershell-empire-complete-tutorial-for.html -1532-Bash Bunny: Windows Remote Shell using Metasploit & PowerShell: https://cyberarms.wordpress.com/.../bash-bunny-windows-remote-shell-using-metasploit-powershell -1533-Kerberoasting - Stealing Service Account Credentials: https://www.scip.ch/en/?labs.20181011 -1534-Automating Mimikatz with Empire and DeathStar : https://blog.stealthbits.com/automating-mimikatz-with-empire-and-deathstar/ -1535-Windows oneliners to get shell : https://ironhackers.es/en/cheatsheet/comandos-en-windows-para-obtener-shell/ -1536-ObfuscatedEmpire : https://cobbr.io/ObfuscatedEmpire.html -1537-Pentesting with PowerShell in six steps: https://periciacomputacional.com/pentesting-with-powershell-in-six-steps/ -1538-Using Credentials to Own Windows Boxes - Part 3 (WMI and WinRM): https://blog.ropnop.com/using-credentials-to-own-windows-boxes-part-3-wmi-and-winrm -1539-PowerShell Security Best Practices: https://www.digitalshadows.com/blog-and-research/powershell-security-best-practices/ -1540-You can detect PowerShell attacks: https://www.slideshare.net/Hackerhurricane/you-can-detect-powershell-attacks -1541-Detecting and Preventing PowerShell Attacks: https://www.eventsentry.com/.../powershell-pw3rh311-detecting-preventing-powershell-attacks -1542-Detecting Offensive PowerShell Attack Tools – Active Directory Security: https://adsecurity.org/?p=2604 -1543-An Internal Pentest Audit Against Active Directory: https://www.exploit-db.com/docs/46019 -1544-A complete Active Directory Penetration Testing Checklist : https://gbhackers.com/active-directory-penetration-testing-checklist/ -1545-Active Directory | Penetration Testing Lab: https://pentestlab.blog/tag/active-directory/ -1546-Building and Attacking an Active Directory lab with PowerShell : https://1337red.wordpress.com/building-and-attacking-an-active-directory-lab-with-powershell -1547-Penetration Testing in Windows Server Active Directory using Metasploit: https://www.hackingarticles.in/penetration-testing-windows-server-active-directory-using-metasploit-part-1 -1548-Red Team Penetration Testing – Going All the Way (Part 2 of 3) : https://www.anitian.com/red-team-testing-going-all-the-way-part2/ -1549-Penetration Testing Active Directory, Part II: https://www.jishuwen.com/d/2Mtq -1550-Gaining Domain Admin from Outside Active Directory: https://markitzeroday.com/pass-the-hash/crack-map-exec/2018/03/04/da-from-outside-the-domain.html -1551-Post Exploitation Cheat Sheet: https://0xsecurity.com/blog/some-hacking-techniques/post-exploitation-cheat-sheet -1552-Windows post-exploitation : https://github.com/emilyanncr/Windows-Post-Exploitation -1553-OSCP - Windows Post Exploitation : https://hackingandsecurity.blogspot.com/2017/9/oscp-windows-post-exploitation.html -1554-Windows Post-Exploitation Command List: http://pentest.tonyng.net/windows-post-exploitation-command-list/ -1555-Windows Post-Exploitation Command List: http://tim3warri0r.blogspot.com/2012/09/windows-post-exploitation-command-list.html -1556-Linux Post-Exploitation · OSCP - Useful Resources: https://backdoorshell.gitbooks.io/oscp-useful-links/content/linux-post-exploitation.html -1557-Pentesting Cheatsheet: https://anhtai.me/pentesting-cheatsheet/ -1558-Pentesting Cheatsheets - Red Teaming Experiments: https://ired.team/offensive-security-experiments/offensive-security-cheetsheets -1559-OSCP Goldmine: http://0xc0ffee.io/blog/OSCP-Goldmine -1560-Linux Post Exploitation Cheat Sheet: http://red-orbita.com/?p=8455 -1562-OSCP useful resources and tools: https://acknak.fr/en/articles/oscp-tools/ -1563-Windows Post-Exploitation Command List : https://es.scribd.com/document/100182787/Windows-Post-Exploitation-Command-List -1564-Metasploit Cheat Sheet: https://pentesttools.net/metasploit-cheat-sheet/ -1565-Windows Privilege Escalation: https://awansec.com/windows-priv-esc.html -1566-Linux Unix Bsd Post Exploitation: https://attackerkb.com/Unix/LinuxUnixBSD_Post_Exploitation -1567-Privilege Escalation & Post-Exploitation: https://movaxbx.ru/2018/09/16/privilege-escalation-post-exploitation/ -1568-Metasploit Cheat Sheet: https://vk-intel.org/2016/12/28/metasploit-cheat-sheet/ -1569-Metasploit Cheat Sheet : https://nitesculucian.github.io/2018/12/01/metasploit-cheat-sheet/ -1570-Privilege escalation: Linux: https://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linux -1571-Cheat Sheets — Amethyst Security: https://www.ssddcyber.com/cheatsheets -1572-Responder - CheatSheet: https://www.ivoidwarranties.tech/posts/pentesting-tuts/responder/cheatsheet/ -1573-Cheatsheets: https://h4ck.co/wp-content/uploads/2018/06/cheatsheet.txt -1574-Are you ready for OSCP?: https://www.hacktoday.io/t/are-you-ready-for-oscp/59 -1575-Windows Privilege Escalation: https://labs.p64cyber.com/windows-privilege-escalation/ -1576-A guide to Linux Privilege Escalation: https://payatu.com/guide-linux-privilege-escalation/ -1577-Windows Post-Exploitation-Cheat-Sheet: http://pentestpanther.com/2019/07/01/windows-post-exploitation-cheat-sheet/ -1578-Windows Privilege Escalation (privesc) Resources: https://www.willchatham.com/security/windows-privilege-escalation-privesc-resources/ -1579-Dissecting Mobile Malware: https://slideplayer.com/slide/3434519/ -1580-Android malware analysis with Radare: Dissecting the Triada Trojan: www.nowsecure.com/blog/2016/11/21/android-malware-analysis-radare-triad/ -1581-Dissecting Mobile Native Code Packers: https://blog.zimperium.com/dissecting-mobile-native-code-packers-case-study/ -1582-What is Mobile Malware? Defined, Explained, and Explored: https://www.forcepoint.com/cyber-edu/mobile-malware -1583-Malware Development — Professionalization of an Ancient Art: https://medium.com/scip/malware-development-professionalization-of-an-ancient-art-4dfb3f10f34b -1584-Weaponizing Malware Code Sharing with Cythereal MAGIC: https://medium.com/@arun_73782/cythereal-magic-e68b0c943b1d -1585-Web App Pentest Cheat Sheet: https://medium.com/@muratkaraoz/web-app-pentest-cheat-sheet-c17394af773 -1586-The USB Threat is [Still] Real — Pentest Tools for Sysadmins, Continued: https://medium.com/@jeremy.trinka/the-usb-threat-is-still-real-pentest-tools-for-sysadmins-continued-88560af447bf -1587-How to Run An External Pentest: https://medium.com/@_jayhill/how-to-run-an-external-pentest-dd76ed14bb6a -1588-Advice for new pentesters: https://medium.com/@PentesterLab/advice-for-new-pentesters-a5f7d75a3aea -1589-NodeJS Application Pentest Tips: https://medium.com/bugbountywriteup/nodejs-application-pentest-tips-improper-uri-handling-in-express-390b3a07cb3e -1590-How to combine Pentesting with Automation to improve your security: https://medium.com/how-to-combine-pentest-with-automation-to-improve-your-security -1591-Day 79: FTP Pentest Guide: https://medium.com/@int0x33/day-79-ftp-pentest-guide-5106967bd50a -1592-SigintOS: A Wireless Pentest Distro Review: https://medium.com/@tomac/sigintos-a-wireless-pentest-distro-review-a7ea93ee8f8b -1593-Conducting an IoT Pentest : https://medium.com/p/6fa573ac6668?source=user_profile... -1594-Efficient way to pentest Android Chat Applications: https://medium.com/android-tamer/efficient-way-to-pentest-android-chat-applications-46221d8a040f -1595-APT2 - Automated PenTest Toolkit : https://medium.com/media/f1cf43d92a17d5c4c6e2e572133bfeed/href -1596-Pentest Tools and Distros: https://medium.com/hacker-toolbelt/pentest-tools-and-distros-9d738d83f82d -1597-Keeping notes during a pentest/security assessment/code review: https://blog.pentesterlab.com/keeping-notes-during-a-pentest-security-assessment-code-review-7e6db8091a66?gi=4c290731e24b -1598-An intro to pentesting an Android phone: https://medium.com/@tnvo/an-intro-to-pentesting-an-android-phone-464ec4860f39 -1599-The Penetration Testing Report: https://medium.com/@mtrdesign/the-penetration-testing-report-38a0a0b25cf2 -1600-VA vs Pentest: https://medium.com/@play.threepetsirikul/va-vs-pentest-cybersecurity-2a17250d5e03 -1601-Pentest: Hacking WPA2 WiFi using Aircrack on Kali Linux: https://medium.com/@digitalmunition/pentest-hacking-wpa2-wifi-using-aircrack-on-kali-linux-99519fee946f -1602-Pentesting Ethereum dApps: https://medium.com/@brandonarvanaghi/pentesting-ethereum-dapps-2a84c8dfee19 -1603-Android pentest lab in a nutshell : https://medium.com/@dortz/android-pentest-lab-in-a-nutshell-ee60be8638d3 -1604-Pentest Magazine: Web Scraping with Python : https://medium.com/@heavenraiza/web-scraping-with-python-170145fd90d3 -1605-Pentesting iOS apps without jailbreak: https://medium.com/securing/pentesting-ios-apps-without-jailbreak-91809d23f64e -1606-OSCP/Pen Testing Resources: https://medium.com/@sdgeek/oscp-pen-testing-resources-271e9e570d45 -1607-Web Application Security & Bug Bounty (Methodology, Reconnaissance, Vulnerabilities, Reporting): https://blog.usejournal.com/web-application-security-bug-bounty-methodology-reconnaissance-vulnerabilities-reporting-635073cddcf2?gi=4a578db171dc -1608-Local File Inclusion (LFI) — Web Application Penetration Testing: https://medium.com/@Aptive/local-file-inclusion-lfi-web-application-penetration-testing-cc9dc8dd3601 -1609-Local File Inclusion (Basic): https://medium.com/@kamransaifullah786/local-file-inclusion-basic-242669a7af3 -1610-PHP File Inclusion Vulnerability: https://www.immuniweb.com/vulnerability/php-file-inclusion.html -1611-Local File Inclusion: https://teambi0s.gitlab.io/bi0s-wiki/web/lfi/ -1612-Web Application Penetration Testing: Local File Inclusion: https://hakin9.org/web-application-penetration-testing-local-file-inclusion-lfi-testing/ -1613-From Local File Inclusion to Code Execution : https://resources.infosecinstitute.com/local-file-inclusion-code-execution/ -1614-RFI / LFI: https://security.radware.com/ddos-knowledge-center/DDoSPedia/rfi-lfi/ -1615-From Local File Inclusion to Remote Code Execution - Part 2: https://outpost24.com/blog/from-local-file-inclusion-to-remote-code-execution-part-2 -1616-Local File Inclusion: https://xapax.gitbooks.io/security/content/local_file_inclusion.html -1617-Beginner Guide to File Inclusion Attack (LFI/RFI) : https://www.hackingarticles.in/beginner-guide-file-inclusion-attack-lfirfi/ -1618-LFI / RFI: https://secf00tprint.github.io/blog/payload-tester/lfirfi/en -1619-LFI and RFI Attacks - All You Need to Know: https://www.getastra.com/blog/your-guide-to-defending-against-lfi-and-rfi-attacks/ -1620-Log Poisoning - LFI to RCE : http://liberty-shell.com/sec/2018/05/19/poisoning/ -1621-LFI: https://www.slideshare.net/cyber-punk/lfi-63050678 -1622-Hand Guide To Local File Inclusion(LFI): www.securityidiots.com/Web-Pentest/LFI/guide-to-lfi.html -1623-Local File Inclusion (LFI) - Cheat Sheet: https://ironhackers.es/herramientas/lfi-cheat-sheet/ -1624-Web Application Penetration Testing Local File Inclusion (LFI): https://www.cnblogs.com/Primzahl/p/6258149.html -1625-File Inclusion Vulnerability Prevention: https://www.pivotpointsecurity.com/blog/file-inclusion-vulnerabilities/ -1626-The Most In-depth Hacker's Guide: https://books.google.com/books?isbn=1329727681 -1627-Hacking Essentials: The Beginner's Guide To Ethical Hacking: https://books.google.com/books?id=e6CHDwAAQBAJ -1628-Web App Hacking, Part 11: Local File Inclusion: https://www.hackers-arise.com/.../Web-App-Hacking-Part-11-Local-File-Inclusion-LFI -1629-Local and remote file inclusion : https://vulp3cula.gitbook.io/hackers-grimoire/exploitation/web-application/lfi-rfi -1630-Upgrade from LFI to RCE via PHP Sessions : https://www.rcesecurity.com/2017/08/from-lfi-to-rce-via-php-sessions/ -1631-CVV #1: Local File Inclusion: https://medium.com/bugbountywriteup/cvv-1-local-file-inclusion-ebc48e0e479a -1632-(PDF) Cross Site Scripting (XSS) in Action: https://www.researchgate.net/publication/241757130_Cross_Site_Scripting_XSS_in_Action -1633-XSS exploitation part 1: www.securityidiots.com/Web-Pentest/XSS/xss-exploitation-series-part-1.html -1634-Weaponizing self-xss: https://silentbreaksecurity.com/weaponizing-self-xss/ -1635-Cookie Tracking and Stealing using Cross-Site Scripting: https://www.geeksforgeeks.org/cookie-tracking-stealing-using-cross-site-scripting/ -1636-Defense against the Black Arts: https://books.google.com/books?isbn=1439821224 -1637-CSRF Attacks: Anatomy, Prevention, and XSRF Tokens: https://www.acunetix.com/websitesecurity/csrf-attacks/ -1638-Bypassing CSRF protection: https://www.bugbountynotes.com/training/tutorial?id=5 -1639-Stealing CSRF tokens with XSS: https://digi.ninja/blog/xss_steal_csrf_token.php -1640-Same Origin Policy and ways to Bypass: https://medium.com/@minosagap/same-origin-policy-and-ways-to-bypass-250effdc4a12 -1641-Bypassing Same Origin Policy : https://resources.infosecinstitute.com/bypassing-same-origin-policy-sop/ -1642-Client-Side Attack - an overview : https://www.sciencedirect.com/topics/computer-science/client-side-attack -1643-Client-Side Injection Attacks: https://blog.alertlogic.com/blog/client-side-injection-attacks/ -1645-The Client-Side Battle Against JavaScript Attacks Is Already Here: https://medium.com/swlh/the-client-side-battle-against-javascript-attacks-is-already-here-656f3602c1f2 -1646-Why Let’s Encrypt is a really, really, really bad idea: https://medium.com/swlh/why-lets-encrypt-is-a-really-really-really-bad-idea-d69308887801 -1647-Huge Guide to Client-Side Attacks: https://www.notion.so/d382649cfebd4c5da202677b6cad1d40 -1648-OSCP Prep – Episode 11: Client Side Attacks: https://kentosec.com/2018/09/02/oscp-prep-episode-11-client-side-attacks/ -1649-Client side attack - AV Evasion: https://rafalharazinski.gitbook.io/security/oscp/untitled-1/client-side-attack -1650-Client-Side Attack With Metasploit (Part 4): https://thehiddenwiki.pw/blog/2018/07/23/client-side-attack-metasploit/ -1651-Ransomware: Latest Developments and How to Defend Against Them: https://www.recordedfuture.com/latest-ransomware-attacks/ -1652-Cookie Tracking and Stealing using Cross-Site Scripting: https://www.geeksforgeeks.org/cookie-tracking-stealing-using-cross-site-scripting/ -1653-How to Write an XSS Cookie Stealer in JavaScript to Steal Passwords: https://null-byte.wonderhowto.com/.../write-xss-cookie-stealer-javascript-steal-passwords-0180833 -1654-How I was able to steal cookies via stored XSS in one of the famous e-commerce site: https://medium.com/@bhavarth33/how-i-was-able-to-steal-cookies-via-stored-xss-in-one-of-the-famous-e-commerce-site-3de8ab94437d -1655-Steal victim's cookie using Cross Site Scripting (XSS) : https://securityonline.info/steal-victims-cookie-using-cross-site-scripting-xss/ -1656-Remote Code Execution — Damn Vulnerable Web Application(DVWA) - Medium level security: https://medium.com/@mikewaals/remote-code-execution-damn-vulnerable-web-application-dvwa-medium-level-security-ca283cda3e86 -1657-Remote Command Execution: https://hacksland.net/remote-command-execution/ -1658-DevOops — An XML External Entity (XXE) HackTheBox Walkthrough: https://medium.com/bugbountywriteup/devoops-an-xml-external-entity-xxe-hackthebox-walkthrough-fb5ba03aaaa2 -1659-XML External Entity - Beyond /etc/passwd (For Fun & Profit): https://www.blackhillsinfosec.com/xml-external-entity-beyond-etcpasswd-fun-profit/ -1660-XXE - ZeroSec - Adventures In Information Security: https://blog.zsec.uk/out-of-band-xxe-2/ -1661-Exploitation: XML External Entity (XXE) Injection: https://depthsecurity.com/blog/exploitation-xml-external-entity-xxe-injection -1662-Hack The Box: DevOops: https://redteamtutorials.com/2018/11/11/hack-the-box-devoops/ -1663-Web Application Penetration Testing Notes: https://techvomit.net/web-application-penetration-testing-notes/ -1664-WriteUp – Aragog (HackTheBox) : https://ironhackers.es/en/writeups/writeup-aragog-hackthebox/ -1665-Linux Privilege Escalation Using PATH Variable: https://www.hackingarticles.in/linux-privilege-escalation-using-path-variable/ -1666-Linux Privilege Escalation via Automated Script : https://www.hackingarticles.in/linux-privilege-escalation-via-automated-script/ -1667-Privilege Escalation - Linux : https://chryzsh.gitbooks.io/pentestbook/privilege_escalation_-_linux.html -1668-Linux Privilege Escalation: https://percussiveelbow.github.io/linux-privesc/ -1669-Perform Local Privilege Escalation Using a Linux Kernel Exploit : https://null-byte.wonderhowto.com/how-to/perform-local-privilege-escalation-using-linux-kernel-exploit-0186317/ -1670-Linux Privilege Escalation With Kernel Exploit: https://www.yeahhub.com/linux-privilege-escalation-with-kernel-exploit-8572-c/ -1671-Reach the root! How to gain privileges in Linux: https://hackmag.com/security/reach-the-root/ -1672-Enumeration for Linux Privilege Escalation: https://0x00sec.org/t/enumeration-for-linux-privilege-escalation/1959 -1673-Linux Privilege Escalation Scripts : https://netsec.ws/?p=309 -1674-Understanding Privilege Escalation: www.admin-magazine.com/Articles/Understanding-Privilege-Escalation -1675-Toppo:1 | Vulnhub Walkthrough: https://medium.com/egghunter/toppo-1-vulnhub-walkthrough-c5f05358cf7d -1676-Privilege Escalation resources: https://forum.hackthebox.eu/discussion/1243/privilege-escalation-resources -1678-OSCP Notes – Privilege Escalation (Linux): https://securism.wordpress.com/oscp-notes-privilege-escalation-linux/ -1679-Udev Exploit Allows Local Privilege Escalation : www.madirish.net/370 -1680-Understanding Linux Privilege Escalation and Defending Against It: https://linux-audit.com/understanding-linux-privilege-escalation-and-defending-againt-it -1681-Windows Privilege Escalation Using PowerShell: https://hacknpentest.com/windows-privilege-escalation-using-powershell/ -1682-Privilege Escalation | Azeria Labs: https://azeria-labs.com/privilege-escalation/ -1683-Abusing SUDO (Linux Privilege Escalation): https://touhidshaikh.com/blog/?p=790 -1684-Privilege Escalation - Linux: https://mysecurityjournal.blogspot.com/p/privilege-escalation-linux.html -1685-0day Linux Escalation Privilege Exploit Collection : https://blog.spentera.id/0day-linux-escalation-privilege-exploit-collection/ -1686-Linux for Pentester: cp Privilege Escalation : https://hackin.co/articles/linux-for-pentester-cp-privilege-escalation.html -1687-Practical Privilege Escalation Using Meterpreter: https://ethicalhackingblog.com/practical-privilege-escalation-using-meterpreter/ -1688-dirty_sock: Linux Privilege Escalation (via snapd): https://www.redpacketsecurity.com/dirty_sock-linux-privilege-escalation-via-snapd/ -1689-Linux privilege escalation: https://jok3rsecurity.com/linux-privilege-escalation/ -1690-The Complete Meterpreter Guide | Privilege Escalation & Clearing Tracks: https://hsploit.com/the-complete-meterpreter-guide-privilege-escalation-clearing-tracks/ -1691-How to prepare for PWK/OSCP, a noob-friendly guide: https://www.abatchy.com/2017/03/how-to-prepare-for-pwkoscp-noob -1692-Basic Linux privilege escalation by kernel exploits: https://greysec.net/showthread.php?tid=1355 -1693-Linux mount without root : epaymentamerica.com/tozkwje/xlvkawj2.php?trjsef=linux-mount-without-root -1694-Linux Privilege Escalation Oscp: www.condadorealty.com/2h442/linux-privilege-escalation-oscp.html -1695-Privilege Escalation Attack Tutorial: https://alhilalgroup.info/photography/privilege-escalation-attack-tutorial -1696-Oscp Bethany Privilege Escalation: https://ilustrado.com.br/i8v7/7ogf.php?veac=oscp-bethany-privilege-escalation -1697-Hacking a Website and Gaining Root Access using Dirty COW Exploit: https://ethicalhackers.club/hacking-website-gaining-root-access-using-dirtycow-exploit/ -1698-Privilege Escalation - Linux · Total OSCP Guide: https://sushant747.gitbooks.io/total-oscp-guide/privilege_escalation_-_linux.html -1699-Linux advanced privilege escalation: https://www.slideshare.net/JameelNabbo/linux-advanced-privilege-escalation -1700-Local Linux privilege escalation overview: https://myexperiments.io/linux-privilege-escalation.html -1701-Windows Privilege Escalation Scripts & Techniques : https://medium.com/@rahmatnurfauzi/windows-privilege-escalation-scripts-techniques-30fa37bd194 -1702-Penetration Testing: Maintaining Access: https://resources.infosecinstitute.com/penetration-testing-maintaining-access/ -1703-Kali Linux Maintaining Access : https://www.tutorialspoint.com/kali_linux/kali_linux_maintaining_access.htm -1704-Best Open Source Tools for Maintaining Access & Tunneling: https://n0where.net/maintaining-access -1705-Maintaining Access Part 1: Introduction and Metasploit Example: https://www.hackingloops.com/maintaining-access-metasploit/ -1706-Maintaining Access - Ethical hacking and penetration testing: https://miloserdov.org/?cat=143 -1707-Maintaining Access with Web Backdoors [Weevely]: https://www.yeahhub.com/maintaining-access-web-backdoors-weevely/ -1708-Best Open Source MITM Tools: Sniffing & Spoofing: https://n0where.net/mitm-tools -1709-Cain and Abel - Man in the Middle (MITM) Attack Tool Explained: https://cybersguards.com/cain-and-abel-man-in-the-middle-mitm-attack-tool-explained/ -1710-Man In The Middle Attack (MITM): https://medium.com/@nancyjohn.../man-in-the-middle-attack-mitm-114b53b2d987 -1711-Real-World Man-in-the-Middle (MITM) Attack : https://ieeexplore.ieee.org/document/8500082 -1712-The Ultimate Guide to Man in the Middle Attacks : https://doubleoctopus.com/blog/the-ultimate-guide-to-man-in-the-middle-mitm-attacks-and-how-to-prevent-them/ -1713-How to Conduct ARP Spoofing for MITM Attacks: https://tutorialedge.net/security/arp-spoofing-for-mitm-attack-tutorial/ -1714-How To Do A Man-in-the-Middle Attack Using ARP Spoofing & Poisoning: https://medium.com/secjuice/man-in-the-middle-attack-using-arp-spoofing-fa13af4f4633 -1715-Ettercap and middle-attacks tutorial : https://pentestmag.com/ettercap-tutorial-for-windows/ -1716-How To Setup A Man In The Middle Attack Using ARP Poisoning: https://online-it.nu/how-to-setup-a-man-in-the-middle-attack-using-arp-poisoning/ -1717-Intro to Wireshark and Man in the Middle Attacks: https://www.commonlounge.com/discussion/2627e25558924f3fbb6e03f8f912a12d -1718-MiTM Attack with Ettercap: https://www.hackers-arise.com/single-post/2017/08/28/MiTM-Attack-with-Ettercap -1719-Man in the Middle Attack with Websploit Framework: https://www.yeahhub.com/man-middle-attack-websploit-framework/ -1720-SSH MitM Downgrade : https://sites.google.com/site/clickdeathsquad/Home/cds-ssh-mitmdowngrade -1721-How to use Netcat for Listening, Banner Grabbing and Transferring Files: https://www.yeahhub.com/use-netcat-listening-banner-grabbing-transferring-files/ -1722-Powershell port scanner and banner grabber: https://www.linkedin.com/pulse/powershell-port-scanner-banner-grabber-jeremy-martin/ -1723-What is banner grabbing attack: https://rxkjftu.ga/sport/what-is-banner-grabbing-attack.php -1724-Network penetration testing: https://guif.re/networkpentest -1725-NMAP Cheatsheet: https://redteamtutorials.com/2018/10/14/nmap-cheatsheet/ -1726-How To Scan a Network With Nmap: https://online-it.nu/how-to-scan-a-network-with-nmap/ -1727-Hacking Metasploitable : Scanning and Banner grabbing: https://hackercool.com/2015/11/hacking-metasploitable-scanning-banner-grabbing/ -1728-Penetration Testing of an FTP Server: https://shahmeeramir.com/penetration-testing-of-an-ftp-server-19afe538be4b -1729-Nmap Usage & Cheet-Sheet: https://aerroweb.wordpress.com/2018/03/14/namp-cheat-sheet/ -1730-Discovering SSH Host Keys with NMAP: https://mwhubbard.blogspot.com/2015/03/discovering-ssh-host-keys-with-nmap.html -1731-Banner Grabbing using Nmap & NetCat - Detailed Explanation: https://techincidents.com/banner-grabbing-using-nmap-netcat -1732-Nmap – (Vulnerability Discovery): https://crazybulletctfwriteups.wordpress.com/2015/09/5/nmap-vulnerability-discovery/ -1733-Penetration Testing on MYSQL (Port 3306): https://www.hackingarticles.in/penetration-testing-on-mysql-port-3306/ -1774-Password Spraying - Infosec Resources : https://resources.infosecinstitute.com/password-spraying/ -1775-Password Spraying- Common mistakes and how to avoid them: https://medium.com/@adam.toscher/password-spraying-common-mistakes-and-how-to-avoid-them-3fd16b1a352b -1776-Password Spraying Tutorial: https://attack.stealthbits.com/password-spraying-tutorial-defense -1777-password spraying Archives: https://www.blackhillsinfosec.com/tag/password-spraying/ -1778-The 21 Best Email Finding Tools:: https://beamery.com/blog/find-email-addresses -1779-OSINT Primer: People (Part 2): https://0xpatrik.com/osint-people/ -1780-Discovering Hidden Email Gateways with OSINT Techniques: https://blog.ironbastion.com.au/discovering-hidden-email-servers-with-osint-part-2/ -1781-Top 20 Data Reconnaissance and Intel Gathering Tools : https://securitytrails.com/blog/top-20-intel-tools -1782-101+ OSINT Resources for Investigators [2019]: https://i-sight.com/resources/101-osint-resources-for-investigators/ -1783-Digging Through Someones Past Using OSINT: https://nullsweep.com/digging-through-someones-past-using-osint/ -1784-Gathering Open Source Intelligence: https://posts.specterops.io/gathering-open-source-intelligence-bee58de48e05 -1785-How to Locate the Person Behind an Email Address: https://www.sourcecon.com/how-to-locate-the-person-behind-an-email-address/ -1786-Find hacked email addresses and check breach mails: https://www.securitynewspaper.com/2019/01/16/find-hacked-email-addresses/ -1787-A Pentester's Guide - Part 3 (OSINT, Breach Dumps, & Password : https://delta.navisec.io/osint-for-pentesters-part-3-password-spraying-methodology/ -1788-Top 10 OSINT Tools/Sources for Security Folks: www.snoopysecurity.github.io/osint/2018/08/02/10_OSINT_for_security_folks.html -1789-Top 5 Open Source OSINT Tools for a Penetration Tester: https://www.breachlock.com/top-5-open-source-osint-tools/ -1790-Open Source Intelligence tools for social media: my own list: https://www.andreafortuna.org/2017/03/20/open-source-intelligence-tools-for-social-media-my-own-list/ -1791-Red Teaming: I can see you! Insights from an InfoSec expert : https://www.perspectiverisk.com/i-can-see-you-osint/ -1792-OSINT Playbook for Recruiters: https://amazinghiring.com/osint-playbook/ -1793- Links for Doxing, Personal OSInt, Profiling, Footprinting, Cyberstalking: https://www.irongeek.com/i.php?page=security/doxing-footprinting-cyberstalking -1794-Open Source Intelligence Gathering 201 (Covering 12 additional techniques): https://blog.appsecco.com/open-source-intelligence-gathering-201-covering-12-additional-techniques-b76417b5a544?gi=2afe435c630a -1795-Online Investigative Tools for Social Media Discovery and Locating People: https://4thetruth.info/colorado-private-investigator-online-detective-social-media-and-online-people-search-online-search-tools.html -1796-Expanding Skype Forensics with OSINT: Email Accounts: http://www.automatingosint.com/blog/2016/05/expanding-skype-forensics-with-osint-email-accounts/ -1798-2019 OSINT Guide: https://www.randhome.io/blog/2019/01/05/2019-osint-guide/ -1799-OSINT - Passive Recon and Discovery of Assets: https://0x00sec.org/t/osint-passive-recon-and-discovery-of-assets/6715 -1800-OSINT With Datasploit: https://dzone.com/articles/osint-with-datasploit -1801-Building an OSINT Reconnaissance Tool from Scratch: https://medium.com/@SundownDEV/phone-number-scanning-osint-recon-tool-6ad8f0cac27b -1802-Find Identifying Information from a Phone Number Using OSINT Tools: https://null-byte.wonderhowto.com/how-to/find-identifying-information-from-phone-number-using-osint-tools-0195472/ -1803-Find Details Of any Mobile Number, Email ID, IP Address in the world (Step By Step): https://www.securitynewspaper.com/2019/05/02/find-details-of-any-mobile-number-email-id-ip-address-in-the-world-step-by-step/ -1804-Investigative tools for finding people online and keeping yourself safe: https://ijnet.org/en/story/investigative-tools-finding-people-online-and-keeping-yourself-safe -1805- Full text of "The Hacker Playbook 2 Practical Guide To Penetration Testing By Peter Kim": https://archive.org/stream/TheHackerPlaybook2PracticalGuideToPenetrationTestingByPeterKim/The%20Hacker%20Playbook%202%20-%20Practical%20Guide%20To%20Penetration%20Testing%20By%20Peter%20Kim_djvu.txt -1806-The Internet Archive offers over 15,000,000 freely downloadable books and texts. There is also a collection of 550,000 modern eBooks that may be borrowed by anyone with a free archive.org account: https://archive.org/details/texts?and%5B%5D=hacking&sin= -1807-Exploiting SSRF like a Boss — Escalation of an SSRF to Local File Read!: https://medium.com/@zain.sabahat/exploiting-ssrf-like-a-boss-c090dc63d326 -1808-How to Pass OSCP Like Boss: https://medium.com/@parthdeshani/how-to-pass-oscp-like-boss-b269f2ea99d -1809-Deploy a private Burp Collaborator Server in Azure: https://medium.com/bugbountywriteup/deploy-a-private-burp-collaborator-server-in-azure-f0d932ae1d70 -1810-Using Shodan Better Way! :): https://medium.com/bugbountywriteup/using-shodan-better-way-b40f330e45f6 -1811-How To Do Your Reconnaissance Properly Before Chasing A Bug Bounty: https://medium.com/bugbountywriteup/guide-to-basic-recon-bug-bounties-recon-728c5242a115 -1812-How we got LFI in apache Drill (Recon like a boss):: https://medium.com/bugbountywriteup/how-we-got-lfi-in-apache-drill-recon-like-a-boss-6f739a79d87d -1813-Chaining Self XSS with UI Redressing is Leading to Session Hijacking: https://medium.com/bugbountywriteup/chaining-self-xss-with-ui-redressing-is-leading-to-session-hijacking-pwn-users-like-a-boss-efb46249cd14 -1814-Week in OSINT #2019–19: https://medium.com/week-in-osint/week-in-osint-2019-18-1975fb8ea43a4 -1814-Week in OSINT #2019–02: https://medium.com/week-in-osint/week-in-osint-2019-02-d4009c27e85f -1815-Week in OSINT #2019–24: https://medium.com/week-in-osint/week-in-osint-2019-24-4fcd17ca908f -1816-Page Admin Disclosure | Facebook Bug Bounty 2019: https://medium.com/bugbountywriteup/page-admin-disclosure-facebook-bug-bounty-2019-ee9920e768eb -1817-XSS in Edmodo within 5 Minute (My First Bug Bounty): https://medium.com/@valakeyur/xss-in-edmodo-within-5-minute-my-first-bug-bounty-889e3da6167d -1818-Collection Of Bug Bounty Tip-Will Be updated daily: https://medium.com/@vignesh4303/collection-of-bug-bounty-tip-will-be-updated-daily-605911cfa248 -1819-A Unique XSS Scenario in SmartSheet || $1000 bounty.: https://medium.com/@rohanchavan/a-unique-xss-scenario-1000-bounty-347f8f92fcc6 -1820-How I found a simple bug in Facebook without any Test: https://medium.com/bugbountywriteup/how-i-found-a-simple-bug-in-facebook-without-any-test-3bc8cf5e2ca2 -1821-Facebook BugBounty — Disclosing page members: https://medium.com/@tnirmalz/facebook-bugbounty-disclosing-page-members-1178595cc520 -1822-Don’t underestimates the Errors They can provide good $$$ Bounty!: https://medium.com/@noob.assassin/dont-underestimates-the-errors-they-can-provide-good-bounty-d437ecca6596 -1823-Django and Web Security Headers: https://medium.com/@ksarthak4ever/django-and-web-security-headers-d72a9e54155e -1824-Weaponising Staged Cross-Site Scripting (XSS) Payloads: https://medium.com/redteam/weaponising-staged-cross-site-scripting-xss-payloads-7b917f605800 -1825-How I was able to Bypass XSS Protection on HackerOne’s Private Program: https://medium.com/@vulnerabilitylabs/how-i-was-able-to-bypass-xss-protection-on-hackerones-private-program-8914a31339a9 -1826-XSS in Microsoft subdomain: https://blog.usejournal.com/xss-in-microsoft-subdomain-81c4e46d6631 -1827-How Angular Protects Us From XSS Attacks?: https://medium.com/hackernoon/how-angular-protects-us-from-xss-attacks-3cb7a7d49d95 -1828-[FUN] Bypass XSS Detection WAF: https://medium.com/soulsecteam/fun-bypass-xss-detection-waf-cabd431e030e -1829-Bug Hunting Methodology(Part-2): https://blog.usejournal.com/bug-hunting-methodology-part-2-5579dac06150 -1830-Learn Web Application Penetration Testing: https://blog.usejournal.com/web-application-penetration-testing-9fbf7533b361 -1831-“Exploiting a Single Parameter”: https://medium.com/securitywall/exploiting-a-single-parameter-6f4ba2acf523 -1832-CORS To CSRF Attack: https://blog.usejournal.com/cors-to-csrf-attack-c33a595d441 -1833-Account Takeover Using CSRF(json-based): https://medium.com/@shub66452/account-takeover-using-csrf-json-based-a0e6efd1bffc -1834-Bypassing Anti-CSRF with Burp Suite Session Handling: https://bestestredteam.com/tag/anti-csrf/ -1835-10 Methods to Bypass Cross Site Request Forgery (CSRF): https://haiderm.com/10-methods-to-bypass-cross-site-request-forgery-csrf/ -1836-Exploiting CSRF on JSON endpoints with Flash and redirects: https://medium.com/p/681d4ad6b31b -1837-Finding and exploiting Cross-site request forgery (CSRF): https://securityonline.info/finding-exploiting-cross-site-request-forgery/ -1838-Hacking Facebook accounts using CSRF in Oculus-Facebook integration: https://www.josipfranjkovic.com/blog/hacking-facebook-oculus-integration-csrf -1839-Synchronizer Token Pattern: No more tricks: https://medium.com/p/d2af836ccf71 -1840-The $12,000 Intersection between Clickjacking, XSS, and Denial of Service: https://medium.com/@imashishmathur/the-12-000-intersection-between-clickjacking-xss-and-denial-of-service-f8cdb3c5e6d1 -1841-XML External Entity(XXE): https://medium.com/@ghostlulzhacks/xml-external-entity-xxe-62bcd1555b7b -1842-XXE Attacks— Part 1: XML Basics: https://medium.com/@klose7/https-medium-com-klose7-xxe-attacks-part-1-xml-basics-6fa803da9f26 -1843-From XXE to RCE with PHP/expect — The Missing Link: https://medium.com/@airman604/from-xxe-to-rce-with-php-expect-the-missing-link-a18c265ea4c7 -1844-My first XML External Entity (XXE) attack with .gpx file: https://medium.com/@valeriyshevchenko/my-first-xml-external-entity-xxe-attack-with-gpx-file-5ca78da9ae98 -1845-Open Redirects & Security Done Right!: https://medium.com/@AkshaySharmaUS/open-redirects-security-done-right-e524a3185496 -1846-XXE on Windows system …then what ??: https://medium.com/@canavaroxum/xxe-on-windows-system-then-what-76d571d66745 -1847-Unauthenticated Blind SSRF in Oracle EBS CVE-2018-3167: https://medium.com/@x41x41x41/unauthenticated-ssrf-in-oracle-ebs-765bd789a145 -1848-SVG XLink SSRF fingerprinting libraries version: https://medium.com/@arbazhussain/svg-xlink-ssrf-fingerprinting-libraries-version-450ebecc2f3c -1849-What is XML Injection Attack: https://medium.com/@dahiya.aj12/what-is-xml-injection-attack-279691bd00b6 -1850-SSRF - Server Side Request Forgery (Types and ways to exploit it) Part-1: https://medium.com/@madrobot/ssrf-server-side-request-forgery-types-and-ways-to-exploit-it-part-1-29d034c27978 -1851-Penetration Testing Introduction: Scanning & Reconnaissance: https://medium.com/cyberdefenders/penetration-testing-introduction-scanning-reconnaissance-f865af0761f -1852-Beginner’s Guide to recon automation.: https://medium.com/bugbountywriteup/beginners-guide-to-recon-automation-f95b317c6dbb -1853-Red Teamer’s Guide to Pulse Secure SSL VPN: https://medium.com/bugbountywriteup/pulse-secure-ssl-vpn-post-auth-rce-to-ssh-shell-2b497d35c35b -1854-CVE-2019-15092 WordPress Plugin Import Export Users = 1.3.0 - CSV Injection: https://medium.com/bugbountywriteup/cve-2019-15092-wordpress-plugin-import-export-users-1-3-0-csv-injection-b5cc14535787 -1855-How I harvested Facebook credentials via free wifi?: https://medium.com/bugbountywriteup/how-i-harvested-facebook-credentials-via-free-wifi-5da6bdcae049 -1856-How to hack any Payment Gateway?: https://medium.com/bugbountywriteup/how-to-hack-any-payment-gateway-1ae2f0c6cbe5 -1857-How I hacked into my neighbour’s WiFi and harvested login credentials?: https://medium.com/bugbountywriteup/how-i-hacked-into-my-neighbours-wifi-and-harvested-credentials-487fab106bfc -1858-What do Netcat, SMTP and self XSS have in common? Stored XSS: https://medium.com/bugbountywriteup/what-do-netcat-smtp-and-self-xss-have-in-common-stored-xss-a05648b72002 -1859-1-Click Account Takeover in Virgool.io — a Nice Case Study: https://medium.com/bugbountywriteup/1-click-account-takeover-in-virgool-io-a-nice-case-study-6bfc3cb98ef2 -1860-Digging into Android Applications — Part 1 — Drozer + Burp: https://medium.com/bugbountywriteup/digging-android-applications-part-1-drozer-burp-4fd4730d1cf2 -1861-Linux for Pentester: APT Privilege Escalation: https://www.hackingarticles.in/linux-for-pentester-apt-privilege-escalation -1862-Linux for Pentester : ZIP Privilege Escalation: https://www.hackingarticles.in/linux-for-pentester-zip-privilege-escalation -1863-Koadic - COM Command & Control Framework: https://www.hackingarticles.in/koadic-com-command-control-framework -1864-Configure Sqlmap for WEB-GUI in Kali Linux : https://www.hackingarticles.in/configure-sqlmap-for-web-gui-in-kali-linux -1865-Penetration Testing: https://www.hackingarticles.in/Penetration-Testing -1866-Buffer Overflow Examples, Code execution by shellcode : https://0xrick.github.io/binary-exploitation/bof5 -1867-Dynamic Shellcode Execution: https://www.countercept.com/blog/dynamic-shellcode-execution -1868-JSC Exploits: -https://googleprojectzero.blogspot.com/2019/08/jsc-exploits.html -1869-Injecting Into The Hunt: https://jsecurity101.com/2019/Injecting-Into-The-Hunt -1870-Bypassing Antivirus with Golang: https://labs.jumpsec.com/2019/06/20/bypassing-antivirus-with-golang-gopher.it -1871-Windows Process Injection: Print Spooler: https://modexp.wordpress.com/2019/03/07/process-injection-print-spooler -1872-Inject Shellcode Into Memory Using Unicorn : https://ethicalhackingguru.com/inject-shellcode-memory-using-unicorn -1873-Macros and More with SharpShooter v2.0: https://www.mdsec.co.uk/2019/02/macros-and-more-with-sharpshooter-v2-0 -1874-Fuzz Testing(Fuzzing) Tutorial: What is, Types, Tools & Example: https://www.guru99.com/fuzz-testing -1875-Introduction to File Format Fuzzing & Exploitation: https://medium.com/@DanielC7/introduction-to-file-format-fuzzing-exploitation-922143ab2ab3 -1876-Hacking a social media account and safeguarding it: https://medium.com/@ujasdhami79/hacking-a-social-media-account-and-safeguarding-it-e5f69adf62d7 -1877-OTP Bypass on India’s Biggest Video Sharing Site: https://medium.com/bugbountywriteup/otp-bypass-on-indias-biggest-video-sharing-site-e94587c1aa89 -1879-Getting Root on macOS via 3rd Party Backup Software: https://medium.com/tenable-techblog/getting-root-on-macos-via-3rd-party-backup-software-b804085f0c9 -1880-How to Enumerate MYSQL Database using Metasploit: https://ehacking.net/2020/03/how-to-enumerate-mysql-database-using-metasploit-kali-linux-tutorial.html -1881-Exploiting Insecure Firebase Database! https://blog.securitybreached.org/2020/02/04/exploiting-insecure-firebase-database-bugbounty -1882-Penetration Testing - Complete Guide: https://softwaretestinghelp.com/penetration-testing-guide -1883-How To Upload A PHP Web Shell On WordPress Site: https://1337pwn.com/how-to-upload-php-web-shell-on-wordpress-site -1884-Mimikatz tutorial: How it hacks Windows passwords, credentials: https://searchsecurity.techtarget.com/tutorial/Mimikatz-tutorial-How-it-hacks-Windows-passwords-credentials -1885-Ethical hacking: Lateral movement techniques: https://securityboulevard.com/2019/09/ethical-hacking-lateral-movement-techniques -1886-A Pivot Cheatsheet for Pentesters: http://nullsweep.com/pivot-cheatsheet-for-pentesters -1887-What to Look for When Reverse Engineering Android Apps: http://nowsecure.com/blog/2020/02/26/what-to-look-for-when-reverse-engineering-android-apps -1888-Modlishka: Advance Phishing to Bypass 2 Factor Auth: http://crackitdown.com/2019/02/modlishka-kali-linux.html -1889-Bettercap Usage Examples (Overview, Custom setup, Caplets ): www.cyberpunk.rs/bettercap-usage-examples-overview-custom-setup-caplets -1890-The Complete Hashcat Tutorial: https://ethicalhackingguru.com/the-complete-hashcat-tutorial -1891-Wireless Wifi Penetration Testing Hacker Notes: https://executeatwill.com/2020/01/05/Wireless-Wifi-Penetration-Testing-Hacker-Notes -1892-#BugBounty writeups: https://pentester.land/list-of-bug-bounty-writeups.html -1893-Kerberoasting attack: https://en.hackndo.com/kerberoasting -1894-A Pentester's Guide - Part 2 (OSINT - LinkedIn is not just for jobs): https://delta.navisec.io/osint-for-pentesters-part-2-linkedin-is-not-just-for-jobs -1895-Radare2 cutter tutorial: http://cousbox.com/axflw/radare2-cutter-tutorial.html -1896-Cracking Password Hashes with Hashcat: http://hackingvision.com/2020/03/22/cracking-password-hashes-hashcat -1897-From CSRF to RCE and WordPress-site takeover CVE-2020-8417: http://blog.wpsec.com/csrf-to-rce-wordpress -1898-Best OSINT Tools: http://pcwdld.com/osint-tools-and-software -1899-Metasploit Exploitation Tool 2020: http://cybervie.com/blog/metasploit-exploitation-tool -1900-How to exploit CVE-2020-7961: https://synacktiv.com/posts/pentest/how-to-exploit-liferay-cve-2020-7961-quick-journey-to-poc.html -1901-PowerShell for Pentesters: https://varonis.com/blog/powershell-for-pentesters -1902-Android Pentest Tutorial: https://packetstormsecurity.com/files/156432/Android-Pentest-Tutorial-Step-By-Step.html -1903-Burp Suite Tutorial: https://pentestgeek.com/web-applications/burp-suite-tutorial-1 -1904-Company Email Enumeration + Breached Email Finder: https://metalkey.github.io/company-email-enumeration--breached-email-finder.html -1905-Kali Linux Cheat Sheet for Penetration Testers: https://github.com/NoorQureshi/kali-linux-cheatsheet -1906-Active Directory Exploitation Cheat Sheet: A cheat sheet that contains common enumeration and attack methods for Windows Active Directory. https://github.com/buftas/Active-Directory-Exploitation-Cheat-Sheet#using-bloodhound -1907-Advanced Hacking Tutorials Collection: https://yeahhub.com/advanced-hacking-tutorials-collection -1908-Persistence – DLL Hijacking: https://pentestlab.blog/2020/03/04/persistence-dll-hijacking -1909-Brute force and dictionary attacks: A cheat sheet: https://techrepublic.com/article/brute-force-and-dictionary-attacks-a-cheat-sheet -1910-How to use Facebook for Open Source Investigation: https://securitynewspaper.com/2020/03/11/how-to-use-facebook-for-open-source-investigation-osint -1911-tcpdump Cheat Sheet: https://comparitech.com/net-admin/tcpdump-cheat-sheet -1912-Windows Post exploitation recon with Metasploit: https://hackercool.com/2016/10/windows-post-exploitation-recon-with-metasploit -1913-Bug Hunting Methodology: https://blog.usejournal.com/bug-hunting-methodology-part-1-91295b2d2066 -1914-Malware traffic analysis tutorial: https://apuntpsicolegs.com/veke0/malware-traffic-analysis-tutorial.html -1915-Recon-ng v5 Tutorial: https://geekwire.eu/recon-ng-v5-tutorial -1916-Windows and Linux Privilege Escalation Tools: https://yeahhub.com/windows-linux-privilege-escalation-tools-2019 -1917-Total OSCP Guide: https://sushant747.gitbooks.io/total-oscp-guide -1918-Phishing Windows Credentials: https://pentestlab.blog/2020/03/02/phishing-windows-credentials -1919-Getting What You're Entitled To: A Journey Into MacOS Stored Credentials: https://mdsec.co.uk/2020/02/getting-what-youre-entitled-to-a-journey-in-to-macos-stored-credentials -1920-Recent Papers Related To Fuzzing: https://wcventure.github.io/FuzzingPaper -1921-Web Shells 101 Using PHP (Web Shells Part 2): https://acunetix.com/blog/articles/web-shells-101-using-php-introduction-web-shells-part-2/ -1922-Python3 reverse shell: https://polisediltrading.it/hai6jzbs/python3-reverse-shell.html -1923-Reverse Shell between two Linux machines: https://yeahhub.com/reverse-shell-linux-machines -1924-Tutorial - Writing Hardcoded Windows Shellcodes (32bit): https://dsolstad.com/shellcode/2020/02/02/Tutorial-Hardcoded-Writing-Hardcoded-Windows-Shellcodes-32bit.html -1925-How to Use Wireshark: Comprehensive Tutorial + Tips: https://varonis.com/blog/how-to-use-wireshark -1926-How To Use PowerShell for Privilege Escalation with Local Privilege Escalation? https://varonis.com/blog/how-to-use-powershell-for-privilege-escalation-with-local-computer-accounts -1927-Ethical hacking:Top privilege escalation techniques in Windows: https://securityboulevard.com/2020/03/ethical-hacking-top-privilege-escalation-techniques-in-windows -1928-How to Identify Company's Hacked Email Addresses: https://ehacking.net/2020/04/how-to-identify-companys-hacked-email-addresses-using-maltego-osint-haveibeenpawned.html -1929-Android APK Reverse Engineering: What's in an APK: https://secplicity.org/2019/09/11/android-apk-reverse-engineering-whats-in-an-apk -1930-Keep Calm and HackTheBox - Beep: https://freecodecamp.org/news/keep-calm-and-hack-the-box-beep/ -1931-Keep Calm and HackTheBox -Legacy: https://freecodecamp.org/news/keep-calm-and-hack-the-box-legacy/ -1932-Keep Calm and HackTheBox -Lame: https://freecodecamp.org/news/keep-calm-and-hack-the-box-lame/ -1933-HacktheBox:Writeup Walkthrough: https://hackingarticles.in/hack-the-box-writeup-walkthrough -1934-2020 OSCP Exam Preparation: https://cybersecurity.att.com/blogs/security-essentials/how-to-prepare-to-take-the-oscp -1935-My OSCP transformation: https://kevsec.fr/journey-to-oscp-2019-write-up -1936-A Detailed Guide on OSCP Preparation: https://niiconsulting.com/checkmate/2017/06/a-detail-guide-on-oscp-preparation-from-newbie-to-oscp/ -1937-Useful Commands and Tools - #OSCP: https://yeahhub.com/useful-commands-tools-oscp/ -1938-Comprehensive Guide on Password Spraying Attack https://hackingarticles.in/comprehensive-guide-on-password-spraying-attack -1939-Privilege Escalation: https://pentestlab.blog/category/privilege-escalation/ -1940-Red Team: https://pentestlab.blog/category/red-team/ -1941-Linux post-exploitation.Advancing from user to super-user in a few clicks https://hackmag.com/security/linux-killchain/ -1942--#BugBounty Cheatsheet https://m0chan.github.io/2019/12/17/Bug-Bounty-Cheetsheet.html -1943--#Windows Notes/Cheatsheet https://m0chan.github.io/2019/07/30/Windows-Notes-and-Cheatsheet.html -1944-#Linux Notes/Cheatsheet https://m0chan.github.io/2018/07/31/Linux-Notes-And-Cheatsheet.html -1945-Windows Notes https://mad-coding.cn/tags/Windows/ -1946-#BlueTeam CheatSheet https://gist.github.com/SwitHak/62fa7f8df378cae3a459670e3a18742d -1947-Linux Privilege Escalation Cheatsheet for OSCP: https://hackingdream.net/2020/03/linux-privilege-escalation-cheatsheet-for-oscp.html -1948-Shodan Pentesting Guide: https://community.turgensec.com/shodan-pentesting-guide -1949-Pentesters Guide to PostgreSQL Hacking: https://medium.com/@netscylla/pentesters-guide-to-postgresql-hacking-59895f4f007 -1950-Hacking-OSCP cheatsheet: https://ceso.github.io/posts/2020/04/hacking/oscp-cheatsheet/ -1951-A Comprehensive Guide to Breaking SSH: https://community.turgensec.com/ssh-hacking-guide -1952-Windows Privilege Escalation Methods for Pentesters: https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/ -1953-Best #firefox addons for #Hacking: https://twitter.com/cry__pto/status/1210836734331752449 -1954-S3 Bucket Enumeration Tools: https://twitter.com/cry__pto/status/1269862357645307904 -1955-Github Recon Tools: https://twitter.com/cry__pto/status/1269362041044832257 -1956-i created this group for more in depth sharing about hacking and penetration testing /daily posts: you can join: https://facebook.com/groups/AmmarAmerHacker -1957-Directory Bruteforcing Tools: && SCREENSHOTTING Tools: https://twitter.com/cry__pto/status/1270603017256124416 -1958-S3 Bucket Enumeration Tools: https://twitter.com/cry__pto/status/1269862357645307904 -1959-Github Recon Tools: https://twitter.com/cry__pto/status/1269362041044832257 -1960-Website Mirroring Tools: https://twitter.com/cry__pto/status/1248640849812078593 -1961-automated credential discovery tools: https://twitter.com/cry__pto/status/1253214720372465665 -1962-Antiforensics Techniques: https://twitter.com/cry__pto/status/1215001674760294400 -1963-#bugbounty tools part (1): https://twitter.com/cry__pto/status/1212096231301881857 1964-Binary Analysis Frameworks: https://twitter.com/cry__pto/status/1207966421575184384 -1965-#BugBounty tools part (5): https://twitter.com/cry__pto/status/1214850754055458819 -1966-#BugBounty tools part (3): https://twitter.com/cry__pto/status/1212290510922158080 -1967-Kali Linux Commands List (Cheat Sheet): https://twitter.com/cry__pto/status/1264530546933272576 -1968-#BugBounty tools part (4): https://twitter.com/cry__pto/status/1212296173412851712 -1969--Automated enumeration tools: https://twitter.com/cry__pto/status/1214919232389099521 -1970-DNS lookup information Tools: https://twitter.com/cry__pto/status/1248639962746105863 -1971-OSCP: https://twitter.com/cry__pto/status/1262089078339756032 -1972-Social Engineering Tools: https://twitter.com/cry__pto/status/1180731438796333056 -1973-Hydra : https://twitter.com/cry__pto/status/1247507926807449600 -1974-#OSINT Your Full Guide: https://twitter.com/cry__pto/status/1244433669936349184 -1975-#BugBounty tools part (2): https://twitter.com/cry__pto/status/1212289852059860992 -1976-my own ebook library: https://twitter.com/cry__pto/status/1239308541468516354 -1977-Practice part (2): https://twitter.com/cry__pto/status/1213165695556567040 -1978-Practice part (3): https://twitter.com/cry__pto/status/1214220715337097222 -1979-my blog: https://twitter.com/cry__pto/status/1263457516672954368 -1980-Practice: https://twitter.com/cry__pto/status/1212341774569504769 -1981-how to search for XSS without proxy tool: https://twitter.com/cry__pto/status/1252558806837604352 -1982-How to collect email addresses from search engines: https://twitter.com/cry__pto/status/1058864931792138240 -1983-Hacking Tools Cheat Sheet: https://twitter.com/cry__pto/status/1255159507891687426 -1984-#OSCP Your Full Guide: https://twitter.com/cry__pto/status/1240842587927445504 -1985-#HackTheBox Your Full Guide: https://twitter.com/cry__pto/status/1241481478539816961 -1986-Web Scanners: https://twitter.com/cry__pto/status/1271826773009928194 -1987-HACKING MAGAZINES: -1-2600 — The Hacker Quarterly magazine:www.2600.com -2-Hackin9:http://hakin9.org -3-(IN)SECURE magazine:https://lnkd.in/grNM2t8 -4-PHRACK:www.phrack.org/archives -5-Hacker’s Manual 2019 -1988-Web Exploitation Tools: https://twitter.com/cry__pto/status/1272778056952885249 -1989-Kali Linux Cheat Sheet for Hackers: https://twitter.com/cry__pto/status/1272792311236263937 -1990-Web Exploitation Tools: https://twitter.com/cry__pto/status/1272778056952885249 -1991-2020 OSCP Exam Preparation + My OSCP transformation +A Detailed Guide on OSCP Preparation + Useful Commands and Tools - #OSCP: https://twitter.com/cry__pto/status/1262089078339756032 -1992-100 Best Hacking Tools for Security Professionals in 2020: https://gbhackers.com/hacking-tools-list/ -1993-SNMP Enumeration: OpUtils:www.manageengine.com SNMP Informant:www.snmp-informant.com SNMP Scanner:www.secure-bytes.com SNMPUtil:www.wtcs.org SolarWinds:www.solarwinds.com -1994-INFO-SEC RELATED CHEAT SHEETS: https://twitter.com/cry__pto/status/1274768435361337346 -1995-METASPLOIT CHEAT SHEET: https://twitter.com/cry__pto/status/1274769179548278786 -1996-Nmap Cheat Sheet, plus bonus Nmap + Nessus: https://twitter.com/cry__pto/status/1275359087304286210 -1997-Wireshark Cheat Sheet - Commands, Captures, Filters, Shortcuts & More: https://twitter.com/cry__pto/status/1276391703906222080 -1998-learn penetration testing a great series as PDF: https://twitter.com/cry__pto/status/1277588369426526209 -1999-Detecting secrets in code committed to Gitlab (in real time): https://www.youtube.com/watch?v=eCDgUvXZ_YE -2000-Penetration Tester’s Guide to Evaluating OAuth 2.0 — Authorization Code Grants: https://maxfieldchen.com/posts/2020-05-17-penetration-testers-guide-oauth-2.html -2001-Building Virtual Machine Labs: https://github.com/da667/Building_Virtual_Machine_Labs-Live_Training -2002-Windows Kernel Exploit Cheat Sheet for [HackTheBox]: https://kakyouim.hatenablog.com/entry/2020/05/27/010807 -2003-19 Powerful Penetration Testing Tools In 2020 (Security Testing Tools): https://softwaretestinghelp.com/penetration-testing-tools/ -2004-Full Connect Scan (-sT): -complete the three-way handshake -slower than SYN scan -no need for superuser Privileges -when stealth is not required -to know for sure which port is open -when running port scan via proxies like TOR -it can be detected nmap -sT -p 80 192.168.1.110 -2005-today i learned that you can use strings command to extract email addresses from binary files: strings -n 8 /usr/bin/who | grep '@' -2005-pentest cheat sheet : https://gist.github.com/githubfoam/4d3c99383b5372ee019c8fbc7581637d -2006-Tcpdump cheat sheet : https://gist.github.com/jforge/27962c52223ea9b8003b22b8189d93fb -2007-tcpdump - reading tcp flags : https://gist.github.com/tuxfight3r/9ac030cb0d707bb446c7 -2008-CTF-Notes - Hackers Resources Galore: https://github.com/TheSecEng/CTF-notes -2009-Pentest-Cheat-Sheets: https://github.com/Kitsun3Sec/Pentest-Cheat-Sheets -2010--2-Web Application Cheatsheet (Vulnhub): https://github.com/Ignitetechnologies/Web-Application-Cheatsheet -2011-A cheatsheet with commands that can be used to perform kerberos attacks : https://gist.github.com/TarlogicSecurity/2f221924fef8c14a1d8e29f3cb5c5c4a -2012-Master Shodan Search Engine: https://rootkitpen.blogspot.com/2020/08/master-shodan-search-engine.html -2013-CTF Cheatsheet: https://github.com/uppusaikiran/awesome-ctf-cheatsheet -2014-Pentesting Cheatsheet: https://gist.github.com/jeremypruitt/c435aefa2c2abaec02985d77fb370ec5 -2015-Hacking Cheatsheet: https://github.com/kobs0N/Hacking-Cheatsheet -2016-Hashcat-Cheatsheet: https://github.com/frizb/Hashcat-Cheatsheet -2017-Wireshark Cheat Sheet: https://github.com/security-cheatsheet/wireshark-cheatsheet -2018-JustTryHarder: https://github.com/sinfulz/JustTryHarder -2019-PWK-CheatSheet: https://github.com/ibr2/pwk-cheatsheet -2020-kali linux cheatsheet: https://github.com/NoorQureshi/kali-linux-cheatsheet -2021-Hydra-Cheatsheet: https://github.com/frizb/Hydra-Cheatsheet -2022-Security Tools Cheatsheets: https://github.com/jayeshjodhawat -2023-popping-shells-instead-of-alert-boxes-weaponizing-xss-for-fun-and-profit: https://www.trustedsec.com/events/webinar-popping-shells-instead-of-alert-boxes-weaponizing-xss-for-fun-and-profit/ -2024-TRICKS FOR WEAPONIZING XSS: https://www.trustedsec.com/blog/tricks-for-weaponizing-xss/ -2025-OSCP Notes: https://github.com/tbowman01/OSCP-PWK-Notes-Public -2026-OSCP Notes: https://github.com/Technowlogy-Pushpender/oscp-notes -2027-list of useful commands, shells and notes related to OSCP: https://github.com/s0wr0b1ndef/OSCP-note -2028-Notes for taking the OSCP in 2097: https://github.com/dostoevskylabs/dostoevsky-pentest-notes -2029-My OSCP notes: https://github.com/tagnullde/OSCP -2030-Discover Blind Vulnerabilities with DNSObserver: an Out-of-Band DNS Monitor https://www.allysonomalley.com/2020/05/22/dnsobserver/ -2031-Red Team Notes: https://dmcxblue.gitbook.io/red-team-notes/ -2032-Evading Detection with Excel 4.0 Macros and the BIFF8 XLS Format: https://malware.pizza/2020/05/12/evading-av-with-excel-macros-and-biff8-xls -2033-ESCALATING SUBDOMAIN TAKEOVERS TO STEAL COOKIES BY ABUSING DOCUMENT.DOMAIN: https://blog.takemyhand.xyz/2019/05/escalating-subdomain-takeovers-to-steal.html -2034-[SSTI] BREAKING GO'S TEMPLATE ENGINE TO GET XSS: https://blog.takemyhand.xyz/2020/05/ssti-breaking-gos-template-engine-to.html -2035-Metasploitable 3: https://kakyouim.hatenablog.com/entry/2020/02/16/213616 -2036-Reverse engineering and modifying an Android game: https://medium.com/swlh/reverse-engineering-and-modifying-an-android-game-apk-ctf-c617151b874c -2037-Reverse Engineering The Medium App (and making all stories in it free): https://medium.com/hackernoon/dont-publish-yet-reverse-engineering-the-medium-app-and-making-all-stories-in-it-free-48c8f2695687 -2038-Android Apk Reverse Engineering: https://medium.com/@chris.yn.chen/apk-reverse-engineering-df7ed8cec191 -2039-DIY Web App Pentesting Guide: https://medium.com/@luke_83192/diy-web-app-pentesting-guide-be54b303c6eb -2040-Local Admin Access and Group Policy Don’t Mix: https://www.trustedsec.com/blog/local-admin-access-and-group-policy-dont-mix/ -2041-BREAKING TYPICAL WINDOWS HARDENING IMPLEMENTATIONS: https://www.trustedsec.com/blog/breaking-typical-windows-hardening-implementations/ -2042-Decrypting ADSync passwords - my journey into DPAPI: https://o365blog.com/post/adsync/ -2043-Ultimate Guide: PostgreSQL Pentesting: https://medium.com/@lordhorcrux_/ultimate-guide-postgresql-pentesting-989055d5551e -2044-SMB Enumeration for Penetration Testing: https://medium.com/@arnavtripathy98/smb-enumeration-for-penetration-testing-e782a328bf1b -2045-(Almost) All The Ways to File Transfer: https://medium.com/@PenTest_duck/almost-all-the-ways-to-file-transfer-1bd6bf710d65 -2046-HackTheBox TartarSauce Writeup: https://kakyouim.hatenablog.com/entry/2020/05/14/230445 -2047-Kerberos-Attacks-In-Depth: https://m0chan.github.io/Kerberos-Attacks-In-Depth -2048-From Recon to Bypassing MFA Implementation in OWA by Using EWS Misconfiguration: https://medium.com/bugbountywriteup/from-recon-to-bypassing-mfa-implementation-in-owa-by-using-ews-misconfiguration-b6a3518b0a63 -2049-Writeups for infosec Capture the Flag events by team Galaxians: https://github.com/shiltemann/CTF-writeups-public -2050-Angstrom CTF 2018 — web challenges [writeup]: https://medium.com/bugbountywriteup/angstrom-ctf-2018-web-challenges-writeup-8a69998b0123 -2051-How to get started in CTF | Complete Begineer Guide: https://medium.com/bugbountywriteup/how-to-get-started-in-ctf-complete-begineer-guide-15ab5a6856d -2052-Hacking 101: An Ethical Hackers Guide for Getting from Beginner to Professional: https://medium.com/@gavinloughridge/hacking-101-an-ethical-hackers-guide-for-getting-from-beginner-to-professional-cd1fac182ff1 -2053-Reconnaissance the key to Ethical Hacking!: https://medium.com/techloop/reconnaissance-the-key-to-ethical-hacking-3b853510d977 -2054-Day 18: Essential CTF Tools: https://medium.com/@int0x33/day-18-essential-ctf-tools-1f9af1552214 -2055-OSCP Cheatsheet: https://medium.com/oscp-cheatsheet/oscp-cheatsheet-6c80b9fa8d7e -2056-OSCP Cheat Sheet: https://medium.com/@cymtrick/oscp-cheat-sheet-5b8aeae085ad -2057-TryHackMe: vulnversity: https://medium.com/@ratiros01/tryhackme-vulnversity-42074b8644df -2058-Malware Analysis Tools And Resources: https://medium.com/@NasreddineBencherchali/malware-analysis-tools-and-resources-16eb17666886 -2059-Extracting Embedded Payloads From Malware: https://medium.com/@ryancor/extracting-embedded-payloads-from-malware-aaca8e9aa1a9 -2060-Attacks and Techniques Used Against WordPress Sites: https://www.trendmicro.com/en_us/research/19/l/looking-into-attacks-and-techniques-used-against-wordpress-sites.html -2061-Still Scanning IP Addresses? You’re Doing it Wrong: https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/still-scanning-ip-addresses-you-re-doing-it-wrong/ -2062-Source Code Disclosure via Exposed .git Folder: https://medium.com/dev-genius/source-code-disclosure-via-exposed-git-folder-24993c7561f1 -2063-GitHub Recon - It’s Really Deep: https://medium.com/@shahjerry33/github-recon-its-really-deep-6553d6dfbb1f -2064-From SSRF to Compromise: Case Study: https://trustwave.com/en-us/resources/blogs/spiderlabs-blog/from-ssrf-to-compromise-case-study/ -2065-Bug Hunting with Param Miner: Cache poisoning with XSS, a peculiar case: https://medium.com/bugbountywriteup/cache-poisoning-with-xss-a-peculiar-case-eb5973850814 -2066-Akamai Web Application Firewall Bypass Journey: Exploiting “Google BigQuery” SQL Injection Vulnerability: https://hackemall.live/index.php/2020/03/31/akamai-web-application-firewall-bypass-journey-exploiting-google-bigquery-sql-injection-vulnerability/ -2067-Avoiding detection via dhcp options: https://sensepost.com/blog/2020/avoiding-detection-via-dhcp-options/ -2068-Bug Bytes #86 - Stealing local files with Safari, Prototype pollution vs HTML sanitizers & A hacker’s mom learning bug bounty: https://blog.intigriti.com/2020/09/02/bug-bytes-86-stealing-local-files-with-safari-prototype-pollution-vs-html-sanitizers-a-hackers-mom-learning-bug-bounty/ -2069-Bug Bytes #78 - BIG-IP RCE, Azure account takeover & Hunt scanner is back: https://blog.intigriti.com/2020/07/08/bug-bytes-78-big-ip-rce-azure-account-takeover-hunt-scanner-is-back/ -2070-Hacking a Telecommunication company(MTN): https://medium.com/@afolicdaralee/hacking-a-telecommunication-company-mtn-c46696451fed -2071-$20000 Facebook DOM XSS: https://vinothkumar.me/20000-facebook-dom-xss/ -2072-Backdooring WordPress with Phpsploit: https://blog.wpsec.com/backdooring-wordpress-with-phpsploit/ -2073-Pro tips for bugbounty: https://medium.com/@chawdamrunal/pro-tips-for-bug-bounty-f9982a5fc5e9 -2074-Collection Of #bugbountytips: https://medium.com/@vignesh4303/collection-of-bug-bounty-tip-will-be-updated-daily-605911cfa248 -2075-Offensive Netcat/Ncat: From Port Scanning To Bind Shell IP Whitelisting: https://medium.com/@PenTest_duck/offensive-netcat-ncat-from-port-scanning-to-bind-shell-ip-whitelisting-834689b103da -2076-XSS for beginners: https://medium.com/swlh/xss-for-beginners-6752b1b1487d -2077-LET’S GO DEEP INTO OSINT: PART 1: medium.com/bugbountywriteup/lets-go-deep-into-osint-part-1-c2de4fe4f3bf -2087-Beginner’s Guide to recon automation: medium.com/bugbountywriteup/beginners-guide-to-recon-automation-f95b317c6dbb -2079-Automating Recon: https://medium.com/@amyrahm786/automating-recon-28b36dc2cf48 -2080-XSS WAF & Character limitation bypass like a boss: https://medium.com/bugbountywriteup/xss-waf-character-limitation-bypass-like-a-boss-2c788647c229 -2081-Chaining Improper Authorization To Race Condition To Harvest Credit Card Details : A Bug Bounty Story: https://medium.com/@ciph3r7r0ll/chaining-improper-authorization-to-race-condition-to-harvest-credit-card-details-a-bug-bounty-effe6e0f5076 -2082-TryHackMe Linux Challenges: https://secjuice.com/write-up-10-tryhackme-linux-challenges-part-1/ -2083-Persistence – COM Hijacking: https://pentestlab.blog/2020/05/20/persistence-com-hijacking/ -2084-DLL Proxy Loading Your Favourite C# Implant https://redteaming.co.uk/2020/07/12/dll-proxy-loading-your-favorite-c-implant/ -2085-how offensive actors use applescript for attacking macos: https://sentinelone.com/blog/how-offensive-actors-use-applescript-for-attacking-macos -2086-Windows Privilege Escalation without Metasploit https://medium.com/@sushantkamble/windows-privilege-escalation-without-metasploit-9bad5fbb5666 -2087-Privilege Escalation in Windows: https://medium.com/bugbountywriteup/privilege-escalation-in-windows-380bee3a2842 -2088-OSWE Prep — Hack The Box Magic: https://medium.com/@ranakhalil101/oswe-prep-hack-the-box-magic-f173e2d09125 -2089-Hackthebox | Bastion Writeup: https://medium.com/@_ncpd/hackthebox-bastion-writeup-9d6f6da3bcbb -2090-Hacking Android phone remotely using Metasploit: https://medium.com/@irfaanshakeel/hacking-android-phone-remotely-using-metasploit-43ccf0fbe9b8 -2091-“Hacking with Metasploit” Tutorial: https://medium.com/cybersoton/hacking-with-metasploit-tutorial-7635b9d19e5 -2092-Hack The Box — Tally Writeup w/o Metasploit: https://medium.com/@ranakhalil101/hack-the-box-tally-writeup-w-o-metasploit-b8bce0684ad3 -2093-Burp Suite: https://medium.com/cyberdefendersprogram/burp-suite-webpage-enumeration-and-vulnerability-testing-cfd0b140570d -2094-h1–702 CTF — Web Challenge Write Up: https://medium.com/@amalmurali47/h1-702-ctf-web-challenge-write-up-53de31b2ddce -2095-SQL Injection & Remote Code Execution: https://medium.com/@shahjerry33/sql-injection-remote-code-execution-double-p1-6038ca88a2ec -2096-Juicy Infos hidden in js scripts leads to RCE : https://medium.com/@simobalghaoui/juicy-infos-hidden-in-js-scripts-lead-to-rce-5d4abbf24d9c -2097-Escalating Privileges like a Pro: https://gauravnarwani.com/escalating-privileges-like-a-pro/ -2098-Top 16 Active Directory Vulnerabilities: https://www.infosecmatter.com/top-16-active-directory-vulnerabilities/ -2099-Windows Red Team Cheat Sheet: https://morph3sec.com/Cheat-Sheets/Windows-Red-Team-Cheat-Sheet/ -2100-OSCP: Developing a Methodology: https://medium.com/@falconspy/oscp-developing-a-methodology-32f4ab471fd6 -2101-Zero to OSCP: Concise Edition: https://medium.com/@1chidan/zero-to-oscp-concise-edition-b5ecd4a781c3 -2102-59 Hosts to Glory — Passing the OSCP: https://medium.com/@Tib3rius/59-hosts-to-glory-passing-the-oscp-acf0fd384371 -2103-Can We Automate Bug Bounties With Wfuzz? medium.com/better-programming/can-we-automate-earning-bug-bounties-with-wfuzz-c4e7a96810a5 -2104-Advanced boolean-based SQLi filter bypass techniques: https://www.secjuice.com/advanced-sqli-waf-bypass/ -2105-Beginners Guide On How You Can Use Javascript In BugBounty: https://medium.com/@patelkathan22/beginners-guide-on-how-you-can-use-javascript-in-bugbounty-492f6eb1f9ea -2106-OTP Bypass: medium.com/bugbountywriteup/otp-bypass-on-indias-biggest-video-sharing-site-e94587c1aa89 -2107-How we Hijacked 26+ Subdomains: https://medium.com/@aishwaryakendle/how-we-hijacked-26-subdomains-9c05c94c7049 -2018-How to spot and exploit postMessage vulnerablities: https://medium.com/bugbountywriteup/how-to-spot-and-exploit-postmessage-vulnerablities-329079d307cc -2119-IDA Pro Tips to Add to Your Bag of Tricks: https://swarm.ptsecurity.com/ida-pro-tips/ -2120-N1QL Injection: Kind of SQL Injection in a NoSQL Database: https://labs.f-secure.com/blog/n1ql-injection-kind-of-sql-injection-in-a-nosql-database/ -2121-CSRF Protection Bypass in Play Framework: https://blog.doyensec.com/2020/08/20/playframework-csrf-bypass.html -2122-$25K Instagram Almost XSS Filter Link — Facebook Bug Bounty: https://medium.com/@alonnsoandres/25k-instagram-almost-xss-filter-link-facebook-bug-bounty-798b10c13b83 -2123-techniques for learning passwords: https://rootkitpen.blogspot.com/2020/09/techniques-for-learning-passwords.html -2124-How a simple CSRF attack turned into a P1: https://ladysecspeare.wordpress.com/2020/04/05/how-a-simple-csrf-attack-turned-into-a-p1-level-bug/ -2125-How I exploited the json csrf with method override technique: https://medium.com/@secureITmania/how-i-exploit-the-json-csrf-with-method-override-technique-71c0a9a7f3b0 -2126-How I found CSRF(my first bounty): https://medium.com/@rajeshranjan457/how-i-csrfd-my-first-bounty-a62b593d3f4d -2127-Exploiting websocket application wide XSS and CSRF: https://medium.com/@osamaavvan/exploiting-websocket-application-wide-xss-csrf-66e9e2ac8dfa -2128-Touch ID authentication Bypass on evernote and dropbox iOS apps: https://medium.com/@pig.wig45/touch-id-authentication-bypass-on-evernote-and-dropbox-ios-apps-7985219767b2 -2129-Oauth authentication bypass on airbnb acquistion using wierd 1 char open redirect: https://xpoc.pro/oauth-authentication-bypass-on-airbnb-acquisition-using-weird-1-char-open-redirect/ -2130-Two factor authentication bypass: https://gauravnarwani.com/two-factor-authentication-bypass/ -2132-Tricky oracle SQLI situation: https://blog.yappare.com/2020/04/tricky-oracle-sql-injection-situation.html -2133-CORS bug on google’s 404 page (rewarded): https://medium.com/@jayateerthag/cors-bug-on-googles-404-page-rewarded-2163d58d3c8b -2134-Subdomain takeover via unsecured s3 bucket: https://blog.securitybreached.org/2018/09/24/subdomain-takeover-via-unsecured-s3-bucket/ -2135-Subdomain takeover via wufoo service: https://www.mohamedharon.com/2019/02/subdomain-takeover-via-wufoo-service-in.html -2136-How I found CSRF(my first bounty): https://medium.com/@rajeshranjan457/how-i-csrfd-my-first-bounty-a62b593d3f4d -2137-Race condition that could result to RCE a story with an app: https://medium.com/bugbountywriteup/race-condition-that-could-result-to-rce-a-story-with-an-app-that-temporary-stored-an-uploaded-9a4065368ba3 -2138-Creating thinking is our everything : Race condition and business logic: https://medium.com/@04sabsas/bugbounty-writeup-creative-thinking-is-our-everything-race-condition-business-logic-error-2f3e82b9aa17 -2139-Chaining improper authorization to Race condition to harvest credit card details: https://medium.com/@ciph3r7r0ll/chaining-improper-authorization-to-race-condition-to-harvest-credit-card-details-a-bug-bounty-effe6e0f5076 -2140-Google APIs Clickjacking worth 1337$: https://medium.com/@godofdarkness.msf/google-apis-clickjacking-1337-7a3a9f3eb8df -2141-Bypass CSRF with clickjacking on Google org: https://medium.com/@saadahmedx/bypass-csrf-with-clickjacking-worth-1250-6c70cc263f40 -2142-2FA Bypass via logical rate limiting Bypass: https://medium.com/@jeppe.b.weikop/2fa-bypass-via-logical-rate-limiting-bypass-25ae2a4e1835 -2143-OTP bruteforce account takeover: https://medium.com/@ranjitsinghnit/otp-bruteforce-account-takeover-faaac3d712a8 -2144-Microsoft RCE bugbounty: https://blog.securitybreached.org/2020/03/31/microsoft-rce-bugbounty/ -2145-Bug Bounty Tips #1: https://www.infosecmatter.com/bug-bounty-tips-1/ -2146-Bug Bounty Tips #2: https://www.infosecmatter.com/bug-bounty-tips-2-jun-30/ -2147-Bug Bounty Tips #3: https://www.infosecmatter.com/bug-bounty-tips-3-jul-21/ -2148-Bug Bounty Tips #4: https://www.infosecmatter.com/bug-bounty-tips-4-aug-03/ -2149-Bug Bounty Tips #5: https://www.infosecmatter.com/bug-bounty-tips-5-aug-17/ -2150-Bug Bounty Tips #6: https://www.infosecmatter.com/bug-bounty-tips-6-sep-07/ -2151-Finding Bugs in File Systems with an Extensible Fuzzing Framework ﴾TOS 2020﴿: https://wcventure.github.io/FuzzingPaper/Paper/TOS20_FileSys.pdf -2152-PeriScope: An Effective Probing and Fuzzing Framework for the Hardware‐OS Boundary ﴾NDSS2019﴿: https://wcventure.github.io/FuzzingPaper/Paper/NDSS19_PeriScope.pdf -2153-Bug Bounty Tips #7: https://www.infosecmatter.com/bug-bounty-tips-7-sep-27/ -2154-Fuzzing: Hack, Art, and Science ﴾CACM 2020﴿: https://wcventure.github.io/FuzzingPaper/Paper/CACM20_Fuzzing.pdf -2155-Azure File Shares for Pentesters: https://blog.netspi.com/azure-file-shares-for-pentesters/ -2156-XSS like a Pro: https://www.hackerinside.me/2019/12/xss-like-pro.html -2157-XSS on Cookie Pop-up Warning: https://vict0ni.me/bug-hunting-xss-on-cookie-popup-warning/ -2158-Effortlessly finding Cross Site Script Inclusion (XSSI) & JSONP for bug bounty: https://medium.com/bugbountywriteup/effortlessly-finding-cross-site-script-inclusion-xssi-jsonp-for-bug-bounty-38ae0b9e5c8a -2159-XSS in Zoho Mail: https://www.hackerinside.me/2019/09/xss-in-zoho-mail.html -2160-Overview Of Empire 3.4 Features: https://www.bc-security.org/post/overview-of-empire-3-4-features/ -2161-Android App Source code Extraction and Bypassing Root and SSL Pinning checks: https://vj0shii.info/android-app-testing-initial-steps/ -2162-The 3 Day Account Takeover: https://medium.com/@__mr_beast__/the-3-day-account-takeover-269b0075d526 -2163-A Review of Fuzzing Tools and Methods: https://wcventure.github.io/FuzzingPaper/Paper/2017_review.pdf -2164-PeriScope: An Effective Probing and Fuzzing Framework for the Hardware‐OS Boundary ﴾NDSS2019﴿: https://wcventure.github.io/FuzzingPaper/Paper/NDSS19_PeriScope.pdf -2165-Oneplus XSS vulnerability in customer support portal: https://medium.com/@tech96bot/oneplus-xss-vulnerability-in-customer-support-portal-d5887a7367f4 -2166-Windows-Privilege-Escalation-Resources: https://medium.com/@aswingovind/windows-privilege-escalation-resources-d35dca8444de -2167-Persistence – DLL Hijacking: https://pentestlab.blog/page/5/ -2168-Scanning JS Files for Endpoints and Secrets: https://securityjunky.com/scanning-js-files-for-endpoint-and-secrets/ -2169-Password Spraying Secure Logon for F5 Networks: https://www.n00py.io/2020/08/password-spraying-secure-logon-for-f5-networks/ -2170-Password Spraying Dell SonicWALL Virtual Office: https://www.n00py.io/2019/12/password-spraying-dell-sonicwall-virtual-office/ -2171-Attention to Details : Finding Hidden IDORs: https://medium.com/@aseem.shrey/attention-to-details-a-curious-case-of-multiple-idors-5a4417ba8848 -2172-Bypassing file upload filter by source code review in Bolt CMS: https://stazot.com/boltcms-file-upload-bypass/ -2173-HTB{ Giddy }: https://epi052.gitlab.io/notes-to-self/blog/2019-02-09-hack-the-box-giddy/ -2174-Analyzing WhatsApp Calls with Wireshark, radare2 and Frida: https://movaxbx.ru/2020/02/11/analyzing-whatsapp-calls-with-wireshark-radare2-and-frida/ -2175-2FA bypass via CSRF attack: https://medium.com/@vbharad/2-fa-bypass-via-csrf-attack-8f2f6a6e3871 -2176-CSRF token bypass [a tale of 2k bug]: https://medium.com/@sainttobs/csrf-token-bypasss-a-tale-of-my-2k-bug-ff7f51166ea1 -2177-Setting the ‘Referer’ Header Using JavaScript: https://www.trustedsec.com/blog/setting-the-referer-header-using-javascript/ -2178-Bug Bytes #91 - The shortest domain, Weird Facebook authentication bypass & GitHub Actions secrets: https://blog.intigriti.com/2020/10/07/bug-bytes-91-the-shortest-domain-weird-facebook-authentication-bypass-github-actions-secrets/ -2179-Stored XSS on Zendesk via Macro’s PART 2: https://medium.com/@hariharan21/stored-xss-on-zendesk-via-macros-part-2-676cefee4616 -2180-Azure Account Hijacking using mimikatz’s lsadump::setntlm: https://www.trustedsec.com/blog/azure-account-hijacking-using-mimikatzs-lsadumpsetntlm/ -2181-CORS misconfiguration account takeover out of scope to grab items in scope: https://medium.com/@mashoud1122/cors-misconfiguration-account-takeover-out-of-scope-to-grab-items-in-scope-66d9d18c7a46 -2182-Razzer: Finding Kernel Race Bugs through Fuzzing ﴾S&P 2019﴿: https://wcventure.github.io/FuzzingPaper/Paper/SP19_Razzer.pdf https://lifeasageek.github.io/papers/jeong-razzer-slides.pdf -2183-Facebook Bug bounty : How I was able to enumerate instagram accounts who had enabled 2FA: https://medium.com/@zk34911/facebook-bug-bounty-how-i-was-able-to-enumerate-instagram-accounts-who-had-enabled-2fa-two-step-fddba9e9741c -2184-Bypass hackerone 2FA: https://medium.com/japzdivino/bypass-hackerone-2fa-requirement-and-reporter-blacklist-46d7959f1ee5 -2185-How I abused 2FA to maintain persistence after password recovery change google microsoft instragram: https://medium.com/@lukeberner/how-i-abused-2fa-to-maintain-persistence-after-a-password-change-google-microsoft-instagram-7e3f455b71a1 -2186-How I hacked 40k user accounts of microsoft using 2FA bypass outlook: https://medium.com/@goyalvartul/how-i-hacked-40-000-user-accounts-of-microsoft-using-2fa-bypass-outlook-live-com-13258785ec2f -2187-How to bypass 2FA with a HTTP header: https://medium.com/@YumiSec/how-to-bypass-a-2fa-with-a-http-header-ce82f7927893 -2188-Building a custom Mimikatz binary: https://s3cur3th1ssh1t.github.io/Building-a-custom-Mimikatz-binary/ -2189-Self XSS to Good XSS: https://medium.com/@arbazhussain/self-xss-to-good-xss-clickjacking-6db43b44777e -2190-DOM based XSS or why you should not rely on cloudflare too much: https://medium.com/bugbountywriteup/dom-based-xss-or-why-you-should-not-rely-on-cloudflare-too-much-a1aa9f0ead7d -2191-Reading internal files using SSRF vulnerability: https://medium.com/@neerajedwards/reading-internal-files-using-ssrf-vulnerability-703c5706eefb -2192-Latest web hacking tools: https://portswigger.net/daily-swig/latest-web-hacking-tools-q3-2020 -2193-Cross-Site Scripting (XSS) Cheat Sheet - 2020 Edition: https://portswigger.net/web-security/cross-site-scripting/cheat-sheet -2194-Hijacking a Domain Controller with Netlogon RPC (aka Zerologon: CVE-2020-1472): https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/hijacking-a-domain-controller-with-netlogon-rpc-aka-zerologon-cve-2020-1472/ -2195-How I got 1200+ Open S3 buckets…!: https://medium.com/@mail4frnd.mohit/how-i-got-1200-open-s3-buckets-aec347ea2a1e -2196-Open Sesame: Escalating Open Redirect to RCE with Electron Code Review: https://spaceraccoon.dev/open-sesame-escalating-open-redirect-to-rce-with-electron-code-review -2197-When you browse Instagram and find former Australian Prime Minister Tony Abbott's passport number: https://mango.pdf.zone/finding-former-australian-prime-minister-tony-abbotts-passport-number-on-instagram -2198-HTB{ Vault }: https://epi052.gitlab.io/notes-to-self/blog/2018-11-04-hack-the-box-vault/ -2199-HTB{ ellingson }: https://epi052.gitlab.io/notes-to-self/blog/2019-09-29-hack-the-box-ellingson/ -2200-HTB{ Swagshop }: https://epi052.gitlab.io/notes-to-self/blog/2019-09-12-hack-the-box-swagshop/ -2201-Evading Firewalls with Tunnels: https://michiana-infosec.com/evading-firewalls-with-tunnels/ -2202-How to Geolocate Mobile Phones (or not): https://keyfindings.blog/2020/07/12/how-to-geolocate-mobile-phones-or-not/ -2203-Web application race conditions: It’s not just for binaries: https://blog.pucarasec.com/2020/07/06/web-application-race-conditions-its-not-just-for-binaries/ -2204-Two-Factor Authentication Bypass: https://gauravnarwani.com/two-factor-authentication-bypass/ -2205-Proxies, Pivots, and Tunnels – Oh My! : https://blog.secureideas.com/2020/10/proxies_pivots_tunnels.html -2206-Let's Debug Together: CVE-2020-9992: https://blog.zimperium.com/c0ntextomy-lets-debug-together-cve-2020-9992/ -2207-I Like to Move It: Windows Lateral Movement Part 3: DLL Hijacking: https://www.mdsec.co.uk/2020/10/i-live-to-move-it-windows-lateral-movement-part-3-dll-hijacking/ -2208-Abusing Chrome's XSS auditor to steal tokens: https://portswigger.net/research/abusing-chromes-xss-auditor-to-steal-tokens -2209-ModSecurity, Regular Expressions and Disputed CVE-2020-15598: https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/modsecurity-regular-expressions-and-disputed-cve-2020-15598/ -2210-Bug Bounty Tips #8: https://www.infosecmatter.com/bug-bounty-tips-8-oct-14/ -2211-IOS Pentesing Guide From A N00bs Perspective: https://payatu.com/blog/abhilashnigam/ios-pentesing-guide-from-a-n00bs-perspective.1 -2212-Bug Bytes #92 - Pwning Apple for three months, XSS in VueJS, Hacking Salesforce Lightning & Unicode byͥtes: https://blog.intigriti.com/2020/10/14/bug-bytes-92-pwning-apple-for-three-months-xss-in-vuejs-hacking-salesforce-lightning-unicode-by%cd%a5tes/ -2213-We Hacked Apple for 3 Months: Here’s What We Found: https://samcurry.net/hacking-apple/ -2214-Breaking JCaptcha using Tensorflow and AOCR: https://www.gremwell.com/breaking-jcaptcha-tensorflow-aocr -2215-Bug Bytes #82 - Timeless timing attacks, Grafana SSRF, Pizza & Youtube delicacie: https://blog.intigriti.com/2020/08/05/bug-bytes-82-timeless-timing-attacks-grafana-ssrf-pizza-youtube-delicacies/ -2216-Bug Bytes #71 – 20K Facebook XSS, LevelUp 0x06 &Naffy’s Notes: https://blog.intigriti.com/2020/05/20/bug-bytes-71-20k-facebook-xss-levelup-0x06-naffys-notes/ -2217-Bug Bytes #90 - The impossible XSS, Burp Pro tips & A millionaire on bug bounty and meditation: https://blog.intigriti.com/2020/09/30/bug-bytes-90-the-impossible-xss-burp-pro-tips-a-millionaire-on-bug-bounty-and-meditation/ -2218-How to Find Vulnerabilities in Code: Bad Words: https://btlr.dev/blog/how-to-find-vulnerabilities-in-code-bad-words -2219-Testing for WebSockets security vulnerabilities: https://portswigger.net/web-security/websockets -2220-Practical Web Cache Poisoning: https://portswigger.net/research/practical-web-cache-poisoning -2221-htb{ zipper }: https://epi052.gitlab.io/notes-to-self/blog/2018-10-22-hack-the-box-zipper/ -2222-What is HTTP request smuggling? Tutorial & Examples: https://portswigger.net/web-security/request-smuggling -2223-When alert fails: exploiting transient events: https://portswigger.net/research/when-alert-fails-exploiting-transient-events -2224-BugPoC LFI Challeng: https://hipotermia.pw/bb/bugpoc-lfi-challenge -2225-Misc CTF - Request Smuggling: https://hg8.sh/posts/misc-ctf/request-smuggling/ -2226-403 to RCE in XAMPP: https://www.securifera.com/blog/2020/10/13/403-to-rce-in-xampp/ -2227-Phone numbers investigation, the open source way: https://www.secjuice.com/phone-numbers-investigation-the-open-source-way/ -2228-Covert Web Shells in .NET with Read-Only Web Paths: https://www.mdsec.co.uk/2020/10/covert-web-shells-in-net-with-read-only-web-paths/ -2229-From Static Analysis to RCE: https://blog.dixitaditya.com/from-android-app-to-rce/ -2230-GitHub Pages - Multiple RCEs via insecure Kramdown configuration - $25,000 Bounty: https://devcraft.io/2020/10/20/github-pages-multiple-rces-via-kramdown-config.html -2231-Signed Binary Proxy Execution via PyCharm: https://www.archcloudlabs.com/projects/signed_binary_proxy_execution/ -2232-Bug Bytes #93 - Discord RCE, Vulnerable HTML to PDF converters & DOMPurify bypass demystified : https://blog.intigriti.com/2020/10/21/bug-bytes-93-discord-rce-vulnerable-html-to-pdf-converters-dompurify-bypass-demystified/ -2233-Bug Bytes #94 - Breaking Symfony apps, Why Cyber Security is so hard to learn & how best to approach it: https://blog.intigriti.com/2020/10/28/bug-bytes-94-breaking-symfony-apps-why-cyber-security-is-so-hard-to-learn-how-best-to-approach-it/ -2234-Advanced Level Resources For Web Application Penetration Testing: https://twelvesec.com/2020/10/19/advanced-level-resources-for-web-application-penetration-testing/ -2235-Pass-the-hash wifi: https://sensepost.com/blog/2020/pass-the-hash-wifi/ -2236-HTML to PDF converters, can I hack them?: https://sidechannel.tempestsi.com/html-to-pdf-converters-can-i-hack-them-a681cfee0903 -2237-Android adb reverse tethering mitm setup: https://www.securify.nl/blog/android-adb-reverse-tethering-mitm-setup/ -2238-Typical Wi-Fi attacks: https://splone.com/blog/2020/10/13/typical-wi-fi-attacks/ -2239-Burp suite “ninja moves”: https://owasp.org/www-chapter-norway/assets/files/Burp%20suite%20ninja%20moves.pdf -2240-Razzer: Finding Kernel Race Bugs through Fuzzing ﴾S&P 2019﴿: Paper:https://wcventure.github.io/FuzzingPaper/Paper/SP19_Razzer.pdf Code:https://github.com/compsec-snu/razzer Slides:https://lifeasageek.github.io/papers/jeong-razzer-slides.pdf -2241-MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation ﴾USENIX Security2018﴿: Paper:https://wcventure.github.io/FuzzingPaper/Paper/USENIX18_MoonShine.pdf -2242-Sequence directed hybrid fuzzing ﴾SANER 2020﴿: Paper:https://wcventure.github.io/FuzzingPaper/Paper/SANER20_Sequence.pdf -2243-Open Source Intelligence Tools And Resources Handbook 2020: https://i-intelligence.eu/uploads/public-documents/OSINT_Handbook_2020.pdf -2244-How to Find IP Addresses Owned by a Company: https://securitytrails.com/blog/identify-ip-ranges-company-owns -2245-What is Banner Grabbing? Best Tools and Techniques Explained: https://securitytrails.com/blog/banner-grabbing -2246-Recon Methods Part 4 – Automated OSINT: https://www.redsiege.com/blog/2020/04/recon-methods-part-4-automated-osint/ -2247-Forcing Firefox to Execute XSS Payloads during 302 Redirects: https://www.gremwell.com/firefox-xss-302 -2248-HTB{ Frolic }: https://epi052.gitlab.io/notes-to-self/blog/2018-10-22-hack-the-box-frolic/ -2249-Identifying Vulnerabilities in SSL/TLS and Attacking them: https://medium.com/bugbountywriteup/identifying-vulnerabilities-in-ssl-tls-and-attacking-them-e7487877619a -2250-My First Bug Bounty Reward: https://medium.com/bugbountywriteup/my-first-bug-bounty-reward-8fd133788407 -2251-2FA Bypass On Instagram Through A Vulnerable Endpoint: https://medium.com/bugbountywriteup/2fa-bypass-on-instagram-through-a-vulnerable-endpoint-b092498af178 -2252-Automating XSS using Dalfox, GF and Waybackurls: https://medium.com/bugbountywriteup/automating-xss-using-dalfox-gf-and-waybackurls-bc6de16a5c75 -2253-Think Outside the Scope: Advanced CORS Exploitation Techniques: https://medium.com/bugbountywriteup/think-outside-the-scope-advanced-cors-exploitation-techniques-dad019c68397 -2254-Intro to CTFs. Resources, advice and everything else: https://medium.com/bugbountywriteup/intro-to-ctfs-164a03fb9e60 -2255-PowerShell Commands for Pentesters: https://www.infosecmatter.com/powershell-commands-for-pentesters/ -2256-31k$ SSRF in Google Cloud Monitoring led to metadata exposure: https://nechudav.blogspot.com/2020/11/31k-ssrf-in-google-cloud-monitoring.html -2257-NAT Slipstreaming: https://samy.pl/slipstream/ -2258-How i got 7000$ in Bug-Bounty for my Critical Finding: https://medium.com/@noobieboy1337/how-i-got-7000-in-bug-bounty-for-my-critical-finding-99326d2cc1ce -2259-SQL Injection Payload List: https://medium.com/@ismailtasdelen/sql-injection-payload-list-b97656cfd66b -2260-Taking over multiple user accounts: https://medium.com/bugbountywriteup/chaining-password-reset-link-poisoning-idor-account-information-leakage-to-achieve-account-bb5e0e400745 -2261-Bug Bytes #98 - Imagemagick's comeback, Treasure trove of wordlists, Advent of Cyber & How to get more hours in your day: https://blog.intigriti.com/2020/11/25/bug-bytes-98-imagemagicks-comeback-treasure-trove-of-wordlists-advent-of-cyber-how-to-get-more-hours-in-your-day/ -2262-How to get root on Ubuntu 20.04 by pretending nobody’s /home: https://securitylab.github.com/research/Ubuntu-gdm3-accountsservice-LPE -2263-What is Shodan? Diving into the Google of IoT Devices: https://securitytrails.com/blog/what-is-shodan -2264-Purgalicious VBA: Macro Obfuscation With VBA Purging & OfficePurge: https://www.fireeye.com/blog/threat-research/2020/11/purgalicious-vba-macro-obfuscation-with-vba-purging.html https://github.com/fireeye/OfficePurge -2265-Dynamic Invocation in .NET to bypass hooks: https://blog.nviso.eu/2020/11/20/dynamic-invocation-in-net-to-bypass-hooks/ -2266-NepHack Online CTF June 2020 Write-up: https://www.askbuddie.com/blog/nephack-online-ctf-june-2020-write-up/ -2268-Attacking SCADA Part II:: https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/attacking-scada-part-ii-vulnerabilities-in-schneider-electric-ecostruxure-machine-expert-and-m221-plc/ -2269-PENTESTING CHEATSHEET: https://hausec.com/pentesting-cheatsheet -2270-CVE-2020-16898 – Exploiting “Bad Neighbor” vulnerability: http://blog.pi3.com.pl/?p=780 -2271-TShark Cheatsheet: https://snippets.bentasker.co.uk/page-1909131238-TShark-Cheatsheet-BASH.html -2272-Exploiting a “Simple” Vulnerability – In 35 Easy Steps or Less!: https://windows-internals.com/exploiting-a-simple-vulnerability-in-35-easy-steps-or-less/ -2273-Exploiting CVE-2020-0041 - Part 1: Escaping the Chrome Sandbox: https://labs.bluefrostsecurity.de/blog/2020/03/31/cve-2020-0041-part-1-sandbox-escape/ -2274-Exploiting CVE-2020-0041 - Part 2: Escalating to root: https://labs.bluefrostsecurity.de/blog/2020/04/08/cve-2020-0041-part-2-escalating-to-root/ -2275-Exploiting MS16-145: MS Edge TypedArray.sort Use-After-Free (CVE-2016-7288): https://blog.quarkslab.com/exploiting-ms16-145-ms-edge-typedarraysort-use-after-free-cve-2016-7288.html -2276-Bug Bytes #99 – Bypassing bots and WAFs,JQ in Burp & Smarter JSON fuzzing and subdomain takeovers: https://blog.intigriti.com/2020/12/02/bug-bytes-99-bypassing-bots-and-wafs-jq-in-burp-smarter-json-fuzzing-and-subdomain-takeovers/ -2277-Digging secrets from git repositories by using truffleHog: https://redblueteam.wordpress.com/2020/01/04/digging-secrets-from-git-repositories-by-using-trufflehog -2287-Apple Safari Pwn2Own 2018 Whitepaper: https://labs.f-secure.com/assets/BlogFiles/apple-safari-pwn2own-vuln-write-up-2018-10-29-final.pdf -2288-DISSECTING APT21 SAMPLES USING A STEP-BY-STEP APPROACH: https://cybergeeks.tech/dissecting-apt21-samples-using-a-step-by-step-approach/ -2289-MITRE ATT&CK T1082 System Information Discovery: https://www.picussecurity.com/resource/attck-t1082-system-information-discovery -2290-A simple and fast Wireshark tutorial: https://andregodinho1.medium.com/a-simple-and-fast-wireshark-tutorial-7d2b78a71820 -2291-Recon - My Way Or High Way: https://shahjerry33.medium.com/recon-my-way-or-high-way-58a18dab5c95 -2292-Finding bugs at limited scope programs (Single Domain Websites): https://dewcode.medium.com/finding-bugs-at-limited-scopes-programs-single-domain-websites-d3c2ff396edf -2293-Passive intelligence gathering techniques: https://medium.com/@agent_maximus/passive-intelligence-gathering-techniques-uncover-domains-subdomains-ip-addresses-a40f51ee0eb0 -2294-Android Pen-testing/Hunting 101: https://medium.com/@noobieboy1337/android-pen-testing-hunting-101-dc0fecf90682 -2295-All MITM attacks in one place: https://github.com/Sab0tag3d/MITM-cheatsheet -2296-From Recon to Optimizing RCE Results: https://medium.com/bugbountywriteup/from-recon-to-optimizing-rce-results-simple-story-with-one-of-the-biggest-ict-company-in-the-ea710bca487a -2297-RCE on https://beta-partners.tesla.com due to CVE-2020-0618: https://bugcrowd.com/disclosures/d23e05b1-c4cc-440a-a678-d8045468c902/rce-on-https-beta-partners-tesla-com-due-to-cve-2020-0618 -2298-Remote iPhone Exploitation Part 1: Poking Memory via iMessage and CVE-2019-8641: https://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-1.html -2299-Remote iPhone Exploitation Part 2: Bringing Light into the Darkness -- a Remote ASLR Bypass: https://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-2.html -2300-Remote iPhone Exploitation Part 3: From Memory Corruption to JavaScript and Back -- Gaining Code Execution: https://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-3.html -2301-1000$ for Open redirect via unknown technique [BugBounty writeup]: https://ruvlol.medium.com/1000-for-open-redirect-via-unknown-technique-675f5815e38a -2302-Facebook SSRF: https://medium.com/@amineaboud/10000-facebook-ssrf-bug-bounty-402bd21e58e5 -2303-Metasploit Tips and Tricks for HaXmas 2020: https://blog.rapid7.com/2020/12/23/metasploit-tips-and-tricks-for-haxmas-2020-2/ -2304-SubDomain TakeOver ~ Easy WIN WIN: https://amitp200.medium.com/subdomain-takeover-easy-win-win-6034bb4147f3 -2305-Recon Methodology : https://github.com/Quikko/Recon-Methodology -2306-h1-212 CTF Writeup: https://gist.github.com/Corb3nik/aeb7c762bd4fec36436a0b5686651e69 -2307-exploiting-second-order-blind-sql-injection: https://medium.com/bugbountywriteup/exploiting-second-order-blind-sql-injection-689e98f04daa -2308-hunting-on-the-go-install-nethunter-on-unsupported-devices: https://medium.com/bugbountywriteup/hunting-on-the-go-install-nethunter-on-unsupported-devices-dd01a4f30b6a -2309-$10,000 for a vulnerability that doesn’t exist: https://medium.com/@valeriyshevchenko/10-000-for-a-vulnerability-that-doesnt-exist-9dbc63684e94 -2310-Finding bugs on Chess.com: https://medium.com/bugbountywriteup/finding-bugs-on-chess-com-739a71fbdb31 -2311-Each and every request make sense: https://akshartank.medium.com/each-and-every-request-make-sense-4572b3205382 -2312-Exploiting Max. Character Limitation: https://orthonviper.medium.com/exploiting-max-character-limitation-cde982545019 -2313-API based IDOR to leaking Private IP address of 6000 businesses: https://rafi-ahamed.medium.com/api-based-idor-to-leaking-private-ip-address-of-6000-businesses-6bc085ac6a6f -2314-Facebook bug Bounty -Finding the hidden members of the Vivek ps private events: https://vivekps143.medium.com/facebook-bug-bounty-finding-the-hidden-members-of-the-private-events-977dc1784ff9 -2315-IoT Vulnerability Assessment of the Irish IP Address Space: https://f5.com/labs/articles/threat-intelligence/iot-vulnerability-assessment-of-the-irish-ip-address-space -2316-Facebook bug bounty (500 USD) :A blocked fundraiser organizer would be unable to view or remove themselves from the fundraiser https://medium.com/bugbountywriteup/facebook-bug-bounty-500-usd-a-blocked-fundraiser-organizer-would-be-unable-to-view-or-remove-5da9f86d2fa0 -2317-This is how I was able to view anyone’s private email and birthday on Instagram: https://saugatpokharel.medium.com/this-is-how-i-was-able-to-view-anyones-private-email-and-birthday-on-instagram-1469f44b842b -2138-My Bug Bounty Journey and My First Critical Bug — Time Based Blind SQL Injection: https://marxchryz.medium.com/my-bug-bounty-journey-and-my-first-critical-bug-time-based-blind-sql-injection-aa91d8276e41 -2139-JavaScript analysis leading to Admin portal access: https://rikeshbaniyaaa.medium.com/javascript-analysis-leading-to-admin-portal-access-ea30f8328c8e -2140-SCADA hacker's toolset: https://scadahacker.com/tools.html -2141-red team phishing: https://github.com/bluscreenofjeff/Red-Team-Infrastructure-Wiki#phishing-setup -2142-Dependency Confusion: How I Hacked Into Apple, Microsoft and Dozens of Other Companies: https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610 -2143-Stored XSS in icloud.com: https://vbharad.medium.com/stored-xss-in-icloud-com-5000-998b8c4b2075 -2144-20 Common Tools & Techniques Used by macOS Threat Actors & Malware: https://labs.sentinelone.com/20-common-tools-techniques-used-by-macos-threat-actors-malware/ -2145-Error-Based SQL Injection on a WordPress website and extract more than 150k user details: https://ynoof.medium.com/error-based-sql-injection-on-a-wordpress-website-and-extract-more-than-150k-user-details-f65f987c2cc0 -2146-Scope Based Recon Methodology: Exploring Tactics for Smart Recon: https://blog.cobalt.io/scope-based-recon-smart-recon-tactics-7e72d590eae5 -2147-Hail Frida!! The Universal SSL pinning bypass for Android applications: https://medium.com/@ved_wayal/hail-frida-the-universal-ssl-pinning-bypass-for-android-e9e1d733d29 -2148-Common Tools & Techniques Used By Threat Actors and Malware — Part I : https://infosecwriteups.com/common-tools-techniques-used-by-threat-actors-and-malware-part-i-deb05b664879 -2149-Common Tools & Techniques Used By Threat Actors and Malware — Part II: https://nasbench.medium.com/common-tools-techniques-used-by-threat-actors-and-malware-part-ii-c2e65cd6b084 -2150-Tools designed to automate phishing attacks that are intended to bypass 2FA: evilginx2: https://lnkd.in/emMu_mN Modlishka: https://lnkd.in/gvGc-kZ KoiPhish: https://lnkd.in/dwzavJr ReelPhish https://lnkd.in/gjs_aC8 CredSniper:https://lnkd.in/g-jzK4y Muraena:https://lnkd.in/d2M53cs -2151-Digital Forensic Tools https://github.com/ivbeg/awesome-forensicstools/ -2152-Netcat Cheat Sheet: https://www.linkedin.com/posts/ammaramer_netcat-cheat-sheet-1-banner-grabbing-activity-6780201567527165953-bEbb -2153-Web App Hacking Methodology: https://twitter.com/cry__pto/status/1374625813404999686 -2154-Penetration Testing MindMap: https://twitter.com/cry__pto/status/1375170618501562368 -2155-Hacking Concept and Fundamentals: https://twitter.com/cry__pto/status/1376615352466046976 -2156-Social Media Osint Tools: https://twitter.com/cry__pto/status/1382323944833875970