C# dynamically intercepts and overwrites functions of third-party processes to implement function tampering (plug-ins)

Today I was reading a pdf document that I had collected before (introducing the relevant knowledge of C# plug-ins), and combined with the things on the Internet and personal understanding, I came up with this article. Reference article: [Selected] An article with an explanation of C# dynamic interception covering functions in third-party processes (essential for […]

yml configuration file syntax-interceptor-request parameter verification

1.ymlConfiguration file syntax 1. Configure custom data 1.1 Configure common data Syntax: key: value name: kaifamiao 1.2 Configuration object data Grammar 1: key: ? key1: value1; ? key2: value2; person: name: zhangsan age: 19 Grammar 2: key: {key1: value1,key: value2} person1: {<!– –>name: lisi,age: 21} 1.3 Configure Mapdata Same configuration object data 1.4 Configuration array […]

iOS in-app packet capture, NSURLProtocol intercepts network requests within APP

Foreword When developing, you need to obtain data in the SDK. Since you cannot see the code, you can only monitor all network request data and intercept the corresponding return data. This can be achieved through NSURLProtocol, and can also be used to interact with H5. 1. NSURLProtocol intercepts requests 1. Introduction to NSURLProtoco Official […]

How does Mybatis-plus use interceptors to get SQL and parse it?

1. Custom interceptor package com.tigeriot.mqtt.config.mybatis; import cn.hutool.json.JSONUtil; import com.tigeriot.mqtt.common.CacheDev; import com.tigeriot.mqtt.common.CacheMQ; import com.tigeriot.mqtt.entity.log.DevLog; import com.tigeriot.mqtt.service.DevLogService; import com.tigeriot.mqtt.util.JsonUtils; import com.tigeriot.mqtt.util.SQLParseUtils; import org.apache.ibatis.binding.MapperMethod; import org.apache.ibatis.executor.Executor; import org.apache.ibatis.mapping.BoundSql; import org.apache.ibatis.mapping.MappedStatement; import org.apache.ibatis.plugin.*; import org.apache.ibatis.session.Configuration; import org.apache.ibatis.session.defaults.DefaultSqlSession; import org.springframework.beans.BeansException; import org.springframework.beans.factory.annotation.Autowired; import org.springframework.context.ApplicationContext; import org.springframework.context.ApplicationContextAware; import org.springframework.stereotype.Component; import java.lang.reflect.Method; import java.lang.reflect.Parameter; import java.util.Arrays; import java.util.Date; import java.util.Map; import java.util.Properties; […]

[Practical] EasyExcel uses interceptors to set cell drop-downs (using excel formulas)

1. Brief introduction During the system development process, we will encounter various export and import requirements. EasyExcel is currently a popular export and import framework in addition to POI. The advantages and disadvantages of EasyExcel and POI will not be introduced here. The main introduction is The following is a demand scenario: the attribute value […]

Customize SpringMVC interceptor to implement internal and external network access control functions

This article briefly introduces how to customize a SpringMVC interceptor and implement specific functions through the interceptor. First, you need to create a custom interceptor class that implements the HandlerInterceptor interface. package cn.edu.sgu.www.mhxysy.interceptor; import cn.edu.sgu.www.mhxysy.feign.FeignService; import cn.edu.sgu.www.mhxysy.property.NetworkProperties; import cn.edu.sgu.www.mhxysy.restful.JsonResult; import cn.edu.sgu.www.mhxysy.restful.ResponseCode; import cn.edu.sgu.www.mhxysy.util.IpUtils; import com.alibaba.fastjson.JSON; import lombok.extern.slf4j.Slf4j; import org.springframework.beans.factory.annotation.Autowired; import org.springframework.beans.factory.annotation.Value; import org.springframework.stereotype.Component; import org.springframework.web.servlet.HandlerInterceptor; […]

Inherit the Jwt token verification interceptor and generate interface documents through knife4j

sky: jwt: #Set the secret key used when encrypting jwt signatures admin-secret-key: itcast # Set jwt expiration time to 2 hours admin-ttl: 7200000 #Set the token name passed by the front end admin-token-name: token Get configuration class related attributes package com.sky.properties; import lombok.Data; import org.springframework.boot.context.properties.ConfigurationProperties; import org.springframework.stereotype.Component; @Component @ConfigurationProperties(prefix = “sky.jwt”) @Data public class JwtProperties […]

Practical Exercise – Intercepting Stitch’s Broadcast

Table of Contents Table of Contents 1.MainActivity 2.MainActivity2 3.MyHelper 4.OutCallReceiver 5.activity_main.xml 6.activity_main2.xml 7.item.xml 8.themes.xml 9. Project code layout 10. Operation status display 11. Common errors reported in this project and their solutions Complete an app that intercepts dialing, including the following functions: Main functions: Save the number set by the user and intercept dialing to […]

Hook–intercept IP address access

Hook – Block IP address access: 1. Demand No process (real process) is allowed to access the websites in the blacklist; Use logs (in the form of process name + time + access object + result) to record intercepted access records and other successful access records; Check the blacklist regularly for changes. 2. Demand analysis […]