cat tools/autoUpdateEs.sh
#!/bin/bash
# http://127.0.0.1:9200/_cat/indices
curPath=`pwd`
wkPath="${HOME}/MyWork/cvelist"
cd $wkPath
git pull
${curPath}/tools/Json2Es -dir="${wkPath}" -resUrl="http://127.0.0.1:9200/cve_index/_doc/" -IdQuery=".CVE_data_meta.ID" -MdfQuery=".CVE_data_meta.DATE_PUBLIC"
cd $HOME/MyWork/advisory-database/advisories/github-reviewed
git pull
${curPath}/tools/Json2Es -dir="${PWD}" -resUrl="http://127.0.0.1:9200/intelligence_index/_doc/"
- getCurNetConn.sh 获取当前系统网络链接(pid ip cmd&args) ./tools/getCurNetConn.sh f
- whereami echo $PPSSWWDD | sudo -S ./tools/whereami
go install -v github.com/OWASP/Amass/v3/...@master
mkdir ~/MyWork/
git clone https://github.com/hktalent/goSqlite_gorm.git ~/MyWork/
cd ~/MyWork/goSqlite_gorm
go install github.com/swaggo/swag/cmd/swag@latest
swag init .
MyPwd=`pwd`
go get
go build main.go
git clone https://github.com/hktalent/hackerToolsApp.git ~/MyWork/
cd ~/MyWork/hackerToolsApp/app
yarn install
yarn build
mv dist $MyPwd/
git clone https://github.com/hktalent/Hack-Tools.git ~/MyWork/
cd ~/MyWork/Hack-Tools
yarn install
yarn build
mv dist $MyPwd/hktdist
docker run -d hktalent/webssh2
./main
open http://127.0.0.1:8081/
more see file: build.sh