Aria2的Chrome插件
https://github.com/acgotaku/YAAW-for-Chrome
结合json-rpc接口,配置好就能用。挺方便。
https://github.com/acgotaku/YAAW-for-Chrome
结合json-rpc接口,配置好就能用。挺方便。
国外很多大盘鸡都装了这东西。下载文件用。
两种加密方式:
1, user password
2, token:设置的secret
如果没设置的话,就是匿名登录。
#coding:utf-8
#!/usr/bin/env python
import time
import requests
import re
import sys
file_list=sys.argv[1]
data = '{"jsonrpc":"2.0","method":"aria2.getGlobalOption","id":1,"params":[]}'
with open(file_list, "r") as f:
url_list= f.readlines()
for ip in url_list:
ip=ip.strip()
url="http://"+ip+":6800/jsonrpc?tm="+str(int(time.time()))
response = requests.post(url,data=data)
html = response.content.decode('utf-8')
headers = response.headers
if(re.findall("Unauthorized",html)):
pass
#print(ip+" Aria2 Unauthorized\n")
else:
print(ip+" Anonymous Login Vul\n")
在以前的基础上精简了一下
#!/bin/sh
name=`basename $0 .sh`
function killv2()
{
pid=`ps -ef | grep v2ray | grep -v grep | awk '{print $2}'`
kill -n 9 ${pid}
}
case $1 in
us1|us2|us3|jp1|jp2|jp3|ru1|hk1)
echo "start ${1}..."
killv2
nohup ./v2ray --config=v2ray_$1.json >/dev/null 2>&1 &
;;
*)
echo "Usage: sudo $name.sh [us1|us2|us3|jp1|jp2|jp3|ru1|hk1]"
exit 1
;;
esac
exit 0
import itertools
>>> l = [(k, len(list(g))) for k, g in itertools.groupby('0000000000000')]
>>> len(l)
1
>>> l = [(k, len(list(g))) for k, g in itertools.groupby('0000000000001')]
>>> len(l)
2
(d)1{位数,} 也可以
https://blog.csdn.net/whatday/article/details/103727717
禁用的话,
Firefox:
about:config
media.peerconnection.enabled -> false
Chrome:
扩展WebRTC Leak Prevent, WebRTC Control, or Easy WebRTC Block.