Documentation ¶
Index ¶
Constants ¶
This section is empty.
Variables ¶
View Source
var Checks map[string]Check = map[string]Check{ "generic/xtreamui": Check{regexp.MustCompile(`[XCtream]+[ -]+UI`)}, "generic/xtream2": Check{regexp.MustCompile(`^Access Denied`)}, "generic/xtreamcodes": Check{regexp.MustCompile(`Xtream Codes`)}, "linux/tulp": Check{regexp.MustCompile(`rtorrent-[ud][po]`)}, "linux/tulp/logstream.php": Check{regexp.MustCompile(`logstream\.php`)}, "DKron": Check{regexp.MustCompile(`DKRON`)}, "linux/misc/sabnzbd": Check{regexp.MustCompile(`SABnzbd`)}, "linux/misc/sonarr": Check{regexp.MustCompile(`Sonarr`)}, "linux/misc/radarr": Check{regexp.MustCompile(`Radarr`)}, "linux/misc/readar": Check{regexp.MustCompile(`readar`)}, "linux/misc/prowlarr": Check{regexp.MustCompile(`Prowlarr`)}, "linux/misc/lidarr": Check{regexp.MustCompile(`Lidarr`)}, "linux/misc/xteve": Check{regexp.MustCompile(`xTeVe`)}, "linux/http/medusa": Check{regexp.MustCompile(`Medusa`)}, "linux/http/xbvr": Check{regexp.MustCompile(`XBVR`)}, "linux/http/stash": Check{regexp.MustCompile(`<title>Stash`)}, "linux/http/zurg": Check{regexp.MustCompile(`>zurg<`)}, "linux/misc/quickbox": Check{regexp.MustCompile(`QuickBox`)}, "linux/misc/qbittorrent": Check{regexp.MustCompile(`qBittorrent`)}, "linux/misc/sickrage": Check{regexp.MustCompile(`SiCKRAGE`)}, "linux/misc/upnp-media": Check{regexp.MustCompile(`upnp.+MediaServer`)}, "linux/misc/deluge-etc": Check{regexp.MustCompile(`TwistedWeb\/[0-9]+`)}, "linux/misc/transmission": Check{regexp.MustCompile(`Transmission`)}, "linux/misc/couchpotato": Check{regexp.MustCompile(`CouchPotato`)}, "linux/iptv/stalker": Check{regexp.MustCompile(`\/stalker_portal\/c`)}, "multi/misc/plex": Check{regexp.MustCompile(`X-Plex-Protocol`)}, }
View Source
var PortMaps map[string]Check = map[string]Check{ "nzbget:tegbzn6789": Check{regexp.MustCompile(`6789`)}, }
var (
elements = map[string]Check{ "validUrl": *validURL, "validBla": *validCoyote } )
/////////////////////////////////////////////////////////////////////////////////////////////////////////
/usr/share/metasploit-framework/modules/exploits/multi 657e2dd789f7# cd ../windows 657e2dd789f7# find . -iname "*.rb" -print | xargs grep -H "HttpFingerprint"
Functions ¶
func CheckSonarr ¶
func CheckSonarrNew ¶
Types ¶
type DelugeLogin ¶
type DelugeReturn ¶
type Downloadclient ¶
type Downloadclient []struct { Enable bool `json:"enable"` Protocol string `json:"protocol"` Name string `json:"name"` Fields []struct { Order int `json:"order"` Name string `json:"name"` Label string `json:"label"` Value string `json:"value,omitempty"` Type string `json:"type"` } `json:"fields"` ImplementationName string `json:"implementationName"` Implementation string `json:"implementation"` ConfigContract string `json:"configContract"` InfoLink string `json:"infoLink"` ID int `json:"id"` }
type Ftp ¶
func (Ftp) CollectionName ¶
type Indexer ¶
func (Indexer) CollectionName ¶
Click to show internal directories.
Click to hide internal directories.