github资料

/ 网络技术 / 0 条评论 / 651浏览
项目官网: https://metersphere.io
代码仓库: https://github.com/metersphere/metersphere
mysql57-history.vpc.test.wyyt.cc:6612/plateform_test
apm https://apm.wyyt.cc/trace
dubbo-admin https://dubbo-admin.test.wyyt.cc  
    服务名:com.sijibao.middle.order.api.service.OrderQueryRpcService:0.0.1

https://mp.weixin.qq.com/s/rl1HsxdHEEZyblDBwz5FzQ

https://www.codenong.com/j5e8a9cd8f265da47b35/ probe
https://github.com/ssssssss-team/spider-flow  自动爬虫系统

https://github.com/fmeringdal/nettu-meet 在线会议
https://github.com/bee-san/pyWhat  搜索
https://github.com/facebookresearch/AugLy  数据增强
https://github.com/leeyoshinari/MyPlatform  分布式压测平台

https://jiangyitao.gitee.io/opendx/  opendx

https://www.shuzhiduo.com/A/Vx5MKjnYzN/  python cpu/memory/磁盘
import psutil
cpu  psutil.cpu_count()  psutil.cpu_percent(percpu=1)
print('磁盘信息:',psutil.disk_usage('/').percent)    
print('内存使用率:', psutil.virtual_memory().percent)   .buffers+.cached/(1024*1024) buffer  .free/(1024*1024) 可用 .total



scrcpy: Display and control your Android device  

https://github.com/alibaba/taobao-iphone-device  tidevice
https://github.com/DeviceFarmer/stf  stf
npm install -g @devicefarmer/stf
rethinkdb
stf local
https://github.com/zhangzhao4444/Maxim   AppetizerIO monkey
测试图谱:
https://camo.githubusercontent.com/d1064bfadc97d2a7f3491aa4c6e545a9aba8ea66/687474703a2f2f7777312e73696e61696d672e636e2f6c617267652f36396235373764346779316735726471636372366c6a32307a6b316561616c302e6a7067
https://blog.csdn.net/qq_45481709/article/details/125747408  jsonschema

https://dengkunnanmayun.gitee.io/conan-docs/#/operator/README 流量回放平台
问题:
1. kafka日志
2. 数据清洗 - 数据同步 读接口

https://github.com/arextest  arextest

jira-python
https://bitbucket.org/bspeakmon/jira-python

安卓渗透测试工具——Drozer(安装和使用)
https://github.com/FSecureLABS/drozer-agent  --agent  gradel4.1.1
https://github.com/kelvinBen/DrozerFuzz 测试

sonar:
su - sonarqube
postgres sjb123456    postgres-11
进入postgres命令行
su - postgres
psql

sonar
http://192.168.7.110:9000
https://github.com/mc1arke/sonarqube-community-branch-plugin  
扫描时,增加-Dsonar.branch.name=${GIT_BRANCH}
https://github.com/caowenliang/sonar-pmd-p3c
pmd:基于源代码分析,主要面向安全编码规则  - 阿里有个p3c-pmd
checkstyle:基于源代码,与pmd类似,但更侧重编码的语法风格
findbugs:基于字节码分析,大量使用数据流分析技术,侧重运行时错误检测(runtime)
sonar order:
1. 空指针
2. 装包/解包https://www.jianshu.com/p/d14dc6943d9e
3. 闭包Integer ==判断不安全 https://blog.csdn.net/lixin2151408/article/details/78611593
4. 不可访问的代码
5. equals类型不等 Call to Integer.equals(String)
6. 方法标签和内部实现不一致

jacoco接入
-javaagent:/wyyt/app/agent/jacocoagent.jar=output=tcpserver,append=true,address=*,port=19050
clean","test -Dmaven.test.skip=true
mvn clean test sonar:sonar -Dmaven.test.failure.ignore -Dsonar.branch.name=mr-xxx -Dsonar.branch.target=develop
sonar:sonar -Dsonar.coverage.jacoco.xmlReportPaths=%s  绝对路径
https://testerhome.com/topics/27115?order_by=created_at&   jacoco docker k8s

jacoco覆盖率改造
https://www.cnblogs.com/exmyth/archive/2004/01/13/13356617.html 增量覆盖率
https://testerhome.com/topics/27721

https://testerhome.com/topics/34781  jd forcebot

###################################
jenkins + sonar
https://blog.csdn.net/t3369/article/details/75664716
clean org.jacoco:jacoco-maven-plugin:prepare-agent install -Dmaven.test.failure.ignore=true

BUG,VULNERABILITY,CODE_SMELL

flask多数据库连接
https://blog.csdn.net/lht_521/article/details/106642972

sonar数据获取:
http://sonar.sijibao.co/api/project_branches/list?project=com.sijibao%3Asijibao-company
http://sonar.sijibao.co/api/measures/search?projectKeys=com.sijibao%3Asijibao-company&metricKeys=bugs,vulnerabilities,code_smells

java -jar jacococli.jar execinfo jacoco-client.exec  | grep CcbQuery
CcbQuery Id:-5720305525977187905    com/sijibao/pay/dubbo/CcbQueryApilmpl$$EnhancerBySpringCGLIB$$7c75260e
CcbQuery Id:7681143134771906345    com/sijibao/pay/service/CcbQueryService
CcbQuery Id:1204420149620280617    com/sijibao/pay/dubbo/CcbQueryApilmpl
CcbQuery Id:61031238422166898    com/sijibao/pay/dubbo/CcbQueryApilmpl$$EnhancerBySpringCGLIB$$7c75260e$$FastClassBySpringCGLIB$$cd4d0dc1
CcbQuery Id:8158516773673529778    com/sijibao/pay/dubbo/CcbQueryApilmpl$$FastClassBySpringCGLIB$$8991173b

覆盖率合并:
https://zhuanli.tianyancha.com/785fbbf3cea44d6ab3a282fa31ba4b10

jvm监控
https://github.com/TyCoding/jvm-monitor - 单机
https://github.com/qunarcorp/bistoury  - 注册中心 应用管理
https://github.com/xopencode/bistouryX - 添加k8s支持
https://github.com/xk4848123/monitor   -修改pom
https://github.com/zhyea/jspy
=========================================================================================================
移动端安全测试:    
https://blog.51cto.com/laoyinga/2155341
ZAP  https://github.com/zaproxy/zaproxy

MobSF  https://github.com/MobSF/Mobile-Security-Framework-MobSF (docker启动方式只支持静态代码分析)
https://mobsf.github.io/docs/#/zh-cn 文档

QARK https://github.com/linkedin/qark
https://www.osgeo.cn/sqlalchemy/orm/contextual.html scope_session

https://testerhome.com/topics/9410 firefox xpath plugin
https://github.com/uniquetruth/remote-debug-agent/issues/13 调用关系

https://github.com/Adrninistrator/java-all-call-graph
node4CalleeList
接口变动感知实现原理:
1. 项目对外方法(endpoint)调用全量分析得到tree结构数据入库[java-all-call-graph]
2. diff代码分析得到变动的方法 - [jgit diff]

3. 根据方法查找定位根部method即变动列表



https://viniciuschiele.github.io/flask-apscheduler/
https://www.codeleading.com/article/48735171910/ 多进程 数据共享

https://www.freesion.com/article/3310364420/ 跨页selection
https://blog.csdn.net/gao_xu_520/article/details/80049254

https://blog.csdn.net/qq_32945487/article/details/110929787 tree

https://blog.csdn.net/weixin_48726650/article/details/107126061 kudiffy
https://testerhome.com/topics/32419 接口测试白皮书
https://github.com/skyhack1212/repeater_console_qiankun 前端
https://www.jianshu.com/nb/48739530  sandbox改造
https://www.jianshu.com/p/8eb224ff8c5e token处理
对比逻辑Twitter 开源的 diffy 库进行重写的https://www.jianshu.com/p/063751213bb0?utm_campaign=haruki http://192.168.50.6:8888
https://www.icode9.com/content-4-1001514.html
https://testerhome.com/topics/20869
https://www.cnblogs.com/hong-fithing/p/16222644.html
sh start.sh
#attach P repeater启动端口,这个每个人定义的都可以不同,一定是一个未占用的端口
sh sandbox.sh -n namespace -p `ps -ef | grep "jacoco" | grep -v grep | awk '{print $2}'` -P 12580
#关闭
sh sandbox.sh -n namespace -p `ps -ef | grep "jacoco" | grep -v grep | awk '{print $2}'` -S

#console
http://192.168.12.46:8001/module/list.htm

jmx
https://www.cnblogs.com/liufei2/p/13799669.html

评论已关闭.