github 订阅
GitHub 是一个面向开源及私有软件项目的托管平台,因为只支持 Git 作为唯一的版本库格式进行托管,故名 GitHub。GitHub 于 2008 年 4 月 10 日正式上线,除了 Git 代码仓库托管及基本的 Web 管理界面以外,还提供了订阅、讨论组、文本渲染、在线文件编辑器、协作图谱(报表)、代码片段分享(Gist)等功能。目前,其注册用户已经超过 350 万,托管版本数量也是非常之多,其中不乏知名开源项目 Ruby on Rails、jQuery、python 等。2018 年 6 月 4 日,微软宣布,通过 75 亿美元的股票交易收购代码托管平台 GitHub。 展开全文
GitHub 是一个面向开源及私有软件项目的托管平台,因为只支持 Git 作为唯一的版本库格式进行托管,故名 GitHub。GitHub 于 2008 年 4 月 10 日正式上线,除了 Git 代码仓库托管及基本的 Web 管理界面以外,还提供了订阅、讨论组、文本渲染、在线文件编辑器、协作图谱(报表)、代码片段分享(Gist)等功能。目前,其注册用户已经超过 350 万,托管版本数量也是非常之多,其中不乏知名开源项目 Ruby on Rails、jQuery、python 等。2018 年 6 月 4 日,微软宣布,通过 75 亿美元的股票交易收购代码托管平台 GitHub。
信息
开发者数量
超过900万 (2015年统计数据) [1]
外文名
GitHub
类    别
开源代码库
上线时间
2008年4月10日
归属公司
微软公司
官    网
http://github.com/
Github发展历程
2008年4月10日,GitHub正式上线。2014年1月23日,联合创始人汤姆·普雷斯顿-维尔纳(Tom Preston-Werner)从另一位联合创始人克里斯·万斯特拉斯(Chris Wanstrath)手中接过总裁职位,后者也将接过普雷斯顿-维尔纳留下的CEO位置。2018年6月4日晚,微软宣布,通过75亿美元的股票交易收购GitHub。 [2]  10月26日,微软以75亿美元收购GitHub交易已完成。10月29日,微软开发者服务副总裁奈特·弗里德曼(Nat Friedman)将成为GitHub的新一任CEO。 [3]  2020年3月17日,Github宣布收购npm,GitHub现在已经保证npm将永远免费。 [4] 
收起全文
精华内容
参与话题
问答
  • github

    千次阅读 2017-03-22 21:25:14
    github 官网地址 https://github.com/ github的hello world https://guides.github.com/activities/hello-world/ 我的账号 lagelangri007

    github

    官网地址

    https://github.com/

    github的hello world

    https://guides.github.com/activities/hello-world/

    我的账号 lagelangri007

                     

    展开全文
  • github网络安全工具合集

    万次阅读 2020-08-19 17:56:55
    https://github.com/WebGoat/WebGoat webgoat-legacy漏洞练习平台: https://github.com/WebGoat/WebGoat-Legacy zvuldirll漏洞练习平台: https://github.com/710leo/ZVulDrill vulapps漏洞练习平台: ...

    漏洞练习平台

    WebGoat漏洞练习平台:
    https://github.com/WebGoat/WebGoat

    webgoat-legacy漏洞练习平台:
    https://github.com/WebGoat/WebGoat-Legacy

    zvuldirll漏洞练习平台:
    https://github.com/710leo/ZVulDrill

    vulapps漏洞练习平台:
    https://github.com/Medicean/VulApps

    dvwa漏洞练习平台:
    https://github.com/RandomStorm/DVWA

    数据库注入练习平台 :
    https://github.com/Audi-1/sqli-labs

    用node编写的漏洞练习平台,like OWASP Node Goat:
    https://github.com/cr0hn/vulnerable-node

    Ruby编写的一款工具,生成含漏洞的虚拟机:
    https://github.com/cliffe/secgen

    各种扫描器

    Nmap端口扫描器:
    https://github.com/nmap/nmap

    本地网络扫描器:
    https://github.com/SkyLined/LocalNetworkScanner

    子域名扫描器:
    https://github.com/lijiejie/subDomainsBrute
    https://github.com/aboul3la/Sublist3r
    https://github.com/TheRook/subbrute
    https://github.com/infosec-au/altdns

    linux漏洞扫描:
    https://github.com/future-architect/vuls

    基于端口扫描以及关联CVE:
    https://github.com/m0nad/HellRaiser

    漏洞路由扫描器:
    https://github.com/jh00nbr/Routerhunter-2.0

    迷你批量信息泄漏扫描脚本:
    https://github.com/lijiejie/BBScan

    Waf类型检测工具:
    https://github.com/EnableSecurity/wafw00f

    服务器端口弱口令扫描器:
    https://github.com/wilson9x1/fenghuangscanner_v3

    Fox-scan扫描器:
    https://github.com/fengxuangit/Fox-scan/

    信息收集

    社工收集器:
    https://github.com/n0tr00t/Sreg

    Github信息搜集:
    https://github.com/sea-god/gitscan

    github Repo信息搜集工具:
    https://github.com/metac0rtex/GitHarvester

    信息探测及扫描工具:
    https://github.com/darryllane/Bluto

    内部网络信息扫描器:
    https://github.com/sowish/LNScan

    远程桌面登录扫描器:
    https://github.com/linuz/Sticky-Keys-Slayer

    网络基础设施渗透工具
    https://github.com/SECFORCE/sparta

    SNMAP密码破解:
    https://github.com/SECFORCE/SNMP-Brute

    web相关

    webshell大合集:
    https://github.com/tennc/webshell

    渗透以及web攻击脚本:
    https://github.com/brianwrf/hackUtils

    web渗透小工具大合集:
    https://github.com/rootphantomer/hacktoolsfor_me

    XSS数据接收平台:
    https://github.com/firesunCN/BlueLotus_XSSReceiver

    XSS与CSRF工具:
    https://github.com/evilcos/xssor

    xss多功能扫描器:
    https://github.com/shawarkhanethicalhacker/BruteXSS

    web漏洞扫描器:
    https://github.com/andresriancho/w3af

    WEB漏洞扫描器:
    https://github.com/sullo/nikto

    渗透常用小工具包:
    https://github.com/leonteale/pentestpackage

    web目录扫描器:
    https://github.com/maurosoria/dirsearch

    web向命令注入检测工具:
    https://github.com/stasinopoulos/commix

    自动化SQL注入检查工具:
    https://github.com/epinna/tplmap

    SSL扫描器:
    https://github.com/rbsec/sslscan

    安全工具集合:
    https://github.com/codejanus/ToolSuite

    apache日志分析器:
    https://github.com/mthbernardes/ARTLAS

    php代码审计工具:
    https://github.com/pwnsdx/BadCode

    web指纹识别扫描:
    https://github.com/urbanadventurer/whatweb

    检查网站恶意攻击:
    https://github.com/ciscocsirt/malspider

    wordprees漏洞扫描器:
    https://github.com/wpscanteam/wpscan

    固件漏洞扫描器:
    https://github.com/misterch0c/firminator_backend

    数据库注入工具
    https://github.com/sqlmapproject/sqlmap

    Web代理:
    https://github.com/zt2/sqli-hunter

    新版中国菜刀:
    https://github.com/Chora10/Cknife

    git泄露利用EXP:
    https://github.com/lijiejie/GitHack

    浏览器攻击框架:
    https://github.com/beefproject/beef

    自动化绕过WAF脚本:
    https://github.com/khalilbijjou/WAFNinja
    https://github.com/owtf/wafbypasser

    一款开源WAF:
    https://github.com/SpiderLabs/ModSecurity

    http命令行客户端:
    https://github.com/jkbrzt/httpie

    浏览器调试利器:
    https://github.com/firebug/firebug

    DISCUZ漏洞扫描器:
    https://github.com/code-scan/dzscan

    自动化代码审计工具
    https://github.com/wufeifei/cobra

    浏览器攻击框架:
    https://github.com/julienbedard/browsersploit

    tomcat自动后门部署:
    https://github.com/mgeeky/tomcatWarDeployer

    网络空间指纹扫描器:
    https://github.com/nanshihui/Scan-T

    burpsuit之J2EE扫描插件:
    https://github.com/ilmila/J2EEScan

    内网渗透相关

    mimikatz明文注入:
    https://github.com/gentilkiwi/mimikatz

    Powershell渗透库合集:
    https://github.com/PowerShellMafia/PowerSploit

    Powershell tools合集:
    https://github.com/clymb3r/PowerShell

    powershell的mimikittenz:
    https://github.com/putterpanda/mimikittenz

    域渗透教程:
    https://github.com/l3m0n/pentest_study

    Fuzz相关

    Web向Fuzz工具
    https://github.com/xmendez/wfuzz

    HTTP暴力破解,撞库攻击脚本
    https://github.com/lijiejie/htpwdScan

    各种攻击框架

    msf框架:
    https://github.com/rapid7/metasploit-framework

    pocsscan攻击框架:
    https://github.com/erevus-cn/pocscan

    Pocsuite攻击框架:
    https://github.com/knownsec/Pocsuite

    Beebeeto攻击框架:
    https://github.com/n0tr00t/Beebeeto-framework

    漏洞POC&EXP:
    ExploitDB官方git版本:
    https://github.com/offensive-security/exploit-database

    php漏洞代码分析:
    https://github.com/80vul/phpcodz

    CVE-2016-2107:
    https://github.com/FiloSottile/CVE-2016-2107

    CVE-2015-7547 POC:
    https://github.com/fjserna/CVE-2015-7547

    JAVA反序列化POC生成工具:
    https://github.com/frohoff/ysoserial

    JAVA反序列化EXP:
    https://github.com/foxglovesec/JavaUnserializeExploits

    Jenkins CommonCollections EXP:
    https://github.com/CaledoniaProject/jenkins-cli-exploit

    CVE-2015-2426 EXP (windows内核提权):
    https://github.com/vlad902/hacking-team-windows-kernel-lpe

    use docker to show web attack(php本地文件包含结合phpinfo getshell 以及ssrf结合curl的利用演示):
    https://github.com/hxer/vulnapp

    php7缓存覆写漏洞Demo及相关工具:
    https://github.com/GoSecure/php7-opcache-override

    XcodeGhost木马样本:
    https://github.com/XcodeGhostSource/XcodeGhost

    中间人与钓鱼

    中间人攻击框架:
    https://github.com/secretsquirrel/the-backdoor-factory
    https://github.com/secretsquirrel/BDFProxy
    https://github.com/byt3bl33d3r/MITMf

    Inject code, jam wifi, and spy on wifi users:
    https://github.com/DanMcInerney/LANs.py

    中间人代理工具:
    https://github.com/intrepidusgroup/mallory

    wifi钓鱼:
    https://github.com/sophron/wifiphisher

    密码破解

    密码破解工具:
    https://github.com/shinnok/johnny

    本地存储的各类密码提取利器:
    https://github.com/AlessandroZ/LaZagne

    二进制以及代码分析

    二进制分析工具
    https://github.com/devttys0/binwalk

    系统扫描器
    https://github.com/quarkslab/binmap

    rp:
    https://github.com/0vercl0k/rp

    Windows Exploit Development工具
    https://github.com/lillypad/badger

    二进制静态分析工具(python):
    https://github.com/bdcht/amoco

    Python Exploit Development Assistance for GDB:
    https://github.com/longld/peda

    对BillGates Linux Botnet系木马活动的监控工具
    https://github.com/ValdikSS/billgates-botnet-tracker

    木马配置参数提取工具:
    https://github.com/kevthehermit/RATDecoders

    Shellphish编写的二进制分析工具(CTF向):
    https://github.com/angr/angr

    针对python的静态代码分析工具:
    https://github.com/yinwang0/pysonar2

    一个自动化的脚本(shell)分析工具,用来给出警告和建议:
    https://github.com/koalaman/shellcheck

    基于AST变换的简易Javascript反混淆辅助工具:
    https://github.com/ChiChou/etacsufbo

    exp编写框架与工具

    二进制EXP编写工具:
    https://github.com/t00sh/rop-tool

    CTF Pwn 类题目脚本编写框架:
    https://github.com/Gallopsled/pwntools

    an easy-to-use io library for pwning development:
    https://github.com/zTrix/zio

    跨平台注入工具:
    https://github.com/frida/frida

    哈希长度扩展攻击EXP:
    https://github.com/citronneur/rdpy

    隐写

    隐写检测工具
    https://github.com/abeluck/stegdetect

    安全资料

    data_hacking合集:
    https://github.com/ClickSecurity/data_hacking

    mobile-security-wiki:
    https://github.com/exploitprotocol/mobile-security-wiki

    书籍《reverse-engineering-for-beginners》:
    https://github.com/veficos/reverse-engineering-for-beginners

    一些信息安全标准及设备配置:
    https://github.com/luyg24/IT_security

    APT相关笔记:
    https://github.com/kbandla/APTnotes

    Kcon资料:
    https://github.com/knownsec/KCon

    《DO NOT FUCK WITH A HACKER》:
    https://github.com/citypw/DNFWAH

    各类安全脑洞图:
    https://github.com/phith0n/Mind-Map

    信息安全流程图:
    https://github.com/SecWiki/sec-chart/tree/294d7c1ff1eba297fa892dda08f3c05e90ed1428

    CTF相关

    近年ctf writeup大全:
    https://github.com/ctfs/write-ups-2016
    https://github.com/ctfs/write-ups-2015
    https://github.com/ctfs/write-ups-2014

    fbctf竞赛平台Demo:
    https://github.com/facebook/fbctf

    ctf Resources:
    https://github.com/ctfs/resources

    ctf及黑客资源合集:
    https://github.com/bt3gl/My-Gray-Hacker-Resources

    ctf和安全工具大合集:
    https://github.com/zardus/ctf-tools

    ctf向 python工具包
    https://github.com/P1kachu/v0lt

    编程相关

    大礼包(什么都有):
    https://github.com/bayandin/awesome-awesomeness

    bash-handbook:
    https://github.com/denysdovhan/bash-handbook

    python资源大全:
    https://github.com/jobbole/awesome-python-cn

    git学习资料:
    https://github.com/xirong/my-git

    安卓开源代码解析
    https://github.com/android-cn/android-open-project

    python框架,库,资源大合集:
    https://github.com/vinta/awesome-python

    JS 正则表达式库(用于简化构造复杂的JS正则表达式):
    https://github.com/VerbalExpressions/JSVerbalExpressions

    python合集

    python 正则表达式库(用于简化构造复杂的python正则表达式):
    https://github.com/VerbalExpressions/

    python任务管理以及命令执行库:
    https://github.com/pyinvoke/invoke

    python exe打包库:
    https://github.com/pyinstaller/pyinstaller

    Veil-Evasion免杀项目:
    https://github.com/Veil-Framework/Veil-Evasion

    py3 爬虫框架:
    https://github.com/orf/cyborg

    一个提供底层接口数据包编程和网络协议支持的python库:
    https://github.com/CoreSecurity/impacket

    python requests 库:
    https://github.com/kennethreitz/requests

    python 实用工具合集:
    https://github.com/mahmoud/boltons

    python爬虫系统:
    https://github.com/binux/pyspider

    运维相关

    web索引及日志搜索工具:
    https://github.com/thomaspatzke/WASE

    开源日志采集器:
    https://github.com/wgliang/logcool

    扫描CS结构的web debuger
    https://github.com/Kozea/wdb

    恢复sqlite数据库删除注册信息:
    https://github.com/aramosf/recoversqlite/

    gps欺骗检测工具:
    https://github.com/zxsecurity/gpsnitch

    应急处置响应框架:
    https://github.com/biggiesmallsAG/nightHawkResponse

    web安全开发指南:
    https://github.com/FallibleInc/security-guide-for-developers

    各个知名厂商漏洞测试报告模板:
    https://github.com/juliocesarfort/public-pentesting-reports

    linux下恶意代码检测包:
    https://github.com/rfxn/linux-malware-detect

    操作系统运行指标可视化框架:
    https://github.com/facebook/osquery

    恶意代码分析系统:
    https://github.com/cuckoosandbox/cuckoo

    定期搜索及存储web应用:
    https://github.com/Netflix/Scumblr

    事件响应框架:
    https://github.com/google/grr

    综合主机监控检测平台:
    https://github.com/ossec/ossec-hids

    分布式实时数字取证系统:
    https://github.com/mozilla/mig

    Microsoft & Unix 文件系统及硬盘取证工具:
    https://github.com/sleuthkit/sleuthkit

    蜜罐

    SSH蜜罐:
    https://github.com/desaster/kippo

    蜜罐集合资源:
    https://github.com/paralax/awesome-honeypots

    kippo进阶版蜜罐:
    https://github.com/micheloosterhof/cowrie

    SMTP 蜜罐:
    https://github.com/awhitehatter/mailoney

    web应用程序蜜罐:
    https://github.com/mushorg/glastopf

    数据库蜜罐:
    https://github.com/jordan-wright/elastichoney

    web蜜罐:
    https://github.com/atiger77/Dionaea

    远控

    用gmail充当C&C服务器的后门
    https://github.com/byt3bl33d3r/gcat

    开源的远控:
    https://github.com/UbbeLoL/uRAT

    c#远控:
    https://github.com/hussein-aitlahcen/BlackHole

    其他工具

    https://github.com/torque59/Nosql-Exploitation-Framework(NoSQL扫描/爆破工具)
    https://github.com/missDronio/blindy(MySQL盲注爆破工具)
    https://github.com/fengxuangit/Fox-scan(基于SQLMAP的主动和被动资源发现的漏洞扫描工具)
    https://github.com/NetSPI/PowerUpSQL(用于SQL Server审计的powershell脚本)
    https://github.com/JohnTroony/Blisqy(用于http header中的时间盲注爆破工具,仅针对MySQL / MariaDB)
    https://github.com/ron190/jsql-injection(Java编写的SQL注入工具)
    https://github.com/Hadesy2k/sqliv (基于搜索引擎的批量SQL注入漏洞扫描器)
    https://github.com/s0md3v/sqlmate(在sqlmap基础上增加了目录扫描,hash爆破等功能)
    https://github.com/m8r0wn/enumdb(Mysys以及MSSQL爆破脱裤工具)
    https://github.com/9tail123/wooscan (批量查询网站在乌云是否存在忽略的sql注入漏洞并自动调用sqlmap测试)
    https://github.com/lijiejie/htpwdScan(一个简单的HTTP暴力破解,撞库攻击脚本)
    https://github.com/ysrc/F-Scrack(对各类服务进行弱口令检测的脚本)
    https://github.com/Mebus/cupp(根据用户习惯生成弱口令探测字典脚本)
    https://github.com/netxfly/crack_ssh(Go写的协程版的ssh \ redis \ mongodb弱口令破解工具)
    https://github.com/LandGrey/pydictor (暴力破解字典建立工具)
    https://github.com/shengqi158/weak_password_detect(多线程探测弱口令)
    https://github.com/s0md3v/Blazy (支持测试CSRF,Clickjacking,Cloudflare和WAF的弱口令探测器)
    https://github.com/MooseDojo/myBFF (对CiscoVPN,Citrix Gateway等各类服务进行弱口令检测的脚本)
    https://github.com/rapid7/IoTSeeker (物联网设备默认密码扫描检测工具)
    https://github.com/shodan-labs/iotdb (使用nmap扫描IoT设备)
    https://github.com/googleinurl/RouterHunterBR(路由器设备漏洞扫描利用)
    https://github.com/scu-igroup/telnet-scanner(Telnet服务密码撞库)
    https://github.com/viraintel/OWASP-Nettacker(自动化信息搜集及渗透测试工具,比较适用于IoT扫描)
    https://github.com/threat9/routersploit(嵌入式设备漏洞扫描及利用工具)
    https://github.com/shawarkhanethicalhacker/BruteXSS(一款XSS扫描器,可暴力注入参数)
    https://github.com/1N3/XSSTracer (小型XSS扫描器,也可检测CRLF,XSS,点击劫持的)
    https://github.com/0x584A/fuzzXssPHP(PHP版本的反射型xss扫描)
    https://github.com/chuhades/xss_scan (批量扫描XSS的python脚本)
    https://github.com/BlackHole1/autoFindXssAndCsrf(自动化检测页面是否存在XSS和跨站请求伪造漏洞的浏览器插件)
    https://github.com/shogunlab/shuriken(使用命令行进行XSS批量检测)
    https://github.com/s0md3v/XSStrike (可识别和绕过WAF的XSS扫描工具)
    https://github.com/stamparm/DSXS (支持GET,POST方式的高效XSS扫描器)
    https://github.com/ysrc/xunfeng (网络资产识别引擎,漏洞检测引擎)
    https://github.com/laramies/theHarvester (企业被搜索引擎收录敏感资产信息监控脚本:员工邮箱,子域名,主持人)
    https://github.com/x0day/Multisearch-v2(Bing,google,360,zoomeye 等搜索引擎聚合搜索,可用于发现企业被搜索引擎收录的敏感资产信息)
    https://github.com/Ekultek/Zeus-Scanner(能成抓取搜索引擎隐藏的url,并交由sqlmap,nmap扫描)
    https://github.com/0xbug/Biu-framework(企业内网基础服务安全扫描框架)
    https://github.com/metac0rtex/GitHarvester(github Repo信息搜集工具)
    https://github.com/shengqi158/svnhack(.svn文件夹泄漏利用工具)
    https://github.com/repoog/GitPrey(GitHub敏感信息扫描工具)
    https://github.com/0xbug/Hawkeye(企业资产,敏感信息GitHub泄露监控系统)
    https://github.com/lianfeng30/githubscan(根据企业关键词进行项目检索以及相应敏感文件和文件内容扫描的工具)
    https://github.com/UnkL4b/GitMiner(github敏感信息搜索工具)
    https://github.com/lijiejie/GitHack ( .git文件夹泄漏利用工具)
    https://github.com/dxa4481/truffleHog(GitHub敏感信息扫描工具,包括检测提交等)
    https://github.com/1N3/Goohak(自动化对指定域名进行Google hacking搜索并收集信息)
    https://github.com/UKHomeOffice/repo-security-scanner(用于搜索git的承诺中的敏感信息,例如密码,私钥等的客户端工具)
    https://github.com/FeeiCN/GSIL(Github敏感信息泄露扫描)
    https://github.com/MiSecurity/x-patrol(Github泄露巡航工具)
    https://github.com/1N3/BlackWidow(Web站点信息搜集工具,包括邮箱,电话等信息)
    https://github.com/anshumanbh/git-all-secrets (集合多个开源GitHub敏感信息扫描的企业信息泄露巡航工具)
    https://github.com/s0md3v/Photon (可以提取网址,电子邮件,文件,网站帐户等的高速爬虫)
    https://github.com/he1m4n6a/findWebshell(一款简单的webshell检测工具)
    https://github.com/Tencent/HaboMalHunter(哈勃分析系统,LINUX系统病毒分析及安全检测)
    https://github.com/PlagueScanner/PlagueScanner(使用python实现的集成ClamAV,ESET,Bitdefender的反病毒引擎)
    https://github.com/nbs-system/php-malware-finder (一款高效率PHP-webshell扫描工具)
    https://github.com/emposha/PHP-Shell-Detector/(测试效率高达99%的webshell检测工具)
    https://github.com/erevus-cn/scan_webshell(一款简洁的的Webshell扫描工具)
    https://github.com/emposha/Shell-Detector(Webshell扫描工具,支持php / perl / asp / aspx webshell扫描)
    https://github.com/m4rco-/dorothy2 (一款木马,僵尸网络分析框架)
    https://github.com/droidefense/engine (高级安卓木马病毒分析框架)
    https://github.com/lcatro/network_backdoor_scanner (基于网络流量的内网探测框架)
    https://github.com/fdiskyou/hunter (调用Windows API枚举用户登录信息)
    https://github.com/BlackHole1/WebRtcXSS (自动化利用XSS入侵内网)
    https://github.com/ring04h/wyportmap (目标端口扫描+系统服务指纹识别)
    https://github.com/ring04h/weakfilescan(动态多线程敏感信息泄露检测工具)
    https://github.com/EnableSecurity/wafw00f(WAF产品指纹识别)
    https://github.com/rbsec/sslscan(SSL类型识别)
    https://github.com/urbanadventurer/whatweb(Web指纹识别)
    https://github.com/tanjiti/FingerPrint(Web应用指纹识别)
    https://github.com/nanshihui/Scan-T(网络爬虫式指纹识别)
    https://github.com/OffensivePython/Nscan (基于Masscan和Zmap的网络扫描器)
    https://github.com/ywolf/F-NAScan (网络资产信息扫描,ICMP存活探测,端口扫描,端口指纹服务识别)
    https://github.com/ywolf/F-MiddlewareScan(中间件扫描)
    https://github.com/maurosoria/dirsearch(web路径收集与扫描)
    https://github.com/x0day/bannerscan(C段横幅与路径扫描)
    https://github.com/RASSec/RASscan (端口服务扫描)
    https://github.com/3xp10it/bypass_waf(waf自动暴破)
    https://github.com/3xp10it/xcdn (尝试找出cdn背后的真实ip)
    https://github.com/Xyntax/BingC (基于Bing搜索引擎的C段/旁站查询,多线程,支持API)
    https://github.com/Xyntax/DirBrute (多线程WEB目录爆破工具)
    https://github.com/zer0h/httpscan(一个爬虫式的网段Web主机发现小工具)
    https://github.com/lietdai/doom(Thorn上实现的分布式任务分发的ip端口漏洞扫描器)
    https://github.com/chichou/grab.js (类似zgrab的快速TCP指纹抓取解析工具,支持更多协议)
    https://github.com/Nitr4x/whichCDN(CDN识别,检测)
    https://github.com/secfree/bcrpscan (基于爬虫的web路径扫描器)
    https://github.com/mozilla/ssh_scan (服务器ssh配置信息扫描)
    https://github.com/18F/domain-scan (针对域名及其子域名的资产数据检测/扫描,包括http / https检测等)
    https://github.com/ggusoft/inforfinder (域名资产收集及指纹识别工具)
    https://github.com/boy-hack/gwhatweb(CMS识别python gevent实现)
    https://github.com/Mosuan/FileScan (敏感文件扫描/二次判断降低误报率/扫描内容规则化/多目录扫描)
    https://github.com/Xyntax/FileSensor (基于爬虫的动态敏感文件探测工具)
    https://github.com/deibit/cansina(web路径扫描工具)
    https://github.com/0xbug/Howl (网络设备web服务指纹扫描与检索)
    https://github.com/mozilla/cipherscan (目标主机服务ssl类型识别)
    https://github.com/xmendez/wfuzz(Web应用fuzz工具,框架,同时可用于web路径/服务扫描)
    https://github.com/s0md3v/Breacher (多线程的后台路径扫描器,也可用于发现重定向漏洞后执行)
    https://github.com/ztgrace/changeme (弱口令扫描器,不仅支持普通登录页,也支持ssh,mongodb等组件)
    https://github.com/medbenali/CyberScan(渗透测试辅助工具,支持分析数据包,解码,端口扫描,IP地址分析等)
    https://github.com/m0nad/HellRaiser (基于nmap的扫描器,与cve漏洞关联)
    https://github.com/scipag/vulscan (基于nmap的高级漏洞扫描器,命令行环境使用)
    https://github.com/jekyc/wig(web应用信息搜集工具)
    https://github.com/eldraco/domain_analyzer (围绕web服务的域名进行信息收集和“域传送”等漏洞扫描,也支持针对背后的服务器端口扫描等)
    https://github.com/cloudtracer/paskto (基于Nikto扫描规则的被动式路径扫描以及信息爬虫)
    https://github.com/zerokeeper/WebEye(快速识别WEB服务器类型,CMS类型,WAF类型,WHOIS信息,以及语言框架)
    https://github.com/m3liot/shcheck(用于检查web服务的http header的安全性)
    https://github.com/aipengjie/sensitivefilescan(一款高效快捷的敏感文件扫描工具)
    https://github.com/fnk0c/cangibrina(通过字典穷举,google,robots.txt等途径的跨平台后台管理路径扫描器)
    https://github.com/n4xh4ck5/CMSsc4n(常规CMS指纹识别)
    https://github.com/Ekultek/WhatWaf(WAF指纹识别及自动化绕过工具)
    https://github.com/dzonerzy/goWAPT(网络应用模糊工具,框架,同时可用于网络路径/服务扫描)
    https://github.com/blackye/webdirdig(web敏感目录/信息泄漏扫描脚本)
    https://github.com/GitHackTools/BillCipher (用于网站或IP地址的信息收集工具)
    https://github.com/boy-hack/w8fuckcdn(通过扫描全网获得真实IP的自动化程序)
    https://github.com/boy-hack/w11scan (分布式WEB指纹识别平台)
    https://github.com/Nekmo/dirhunt (爬虫式web目录扫描工具)
    https://github.com/blackye/Jenkins(Jenkins漏洞探测,用户抓取爆破)
    https://github.com/code-scan/dzscan (首款集成化的Discuz扫描工具)
    https://github.com/chuhades/CMS-Exploit-Framework (一款简洁优雅的CMS扫描利用框架)
    https://github.com/lijiejie/IIS_shortname_Scanner(IIS短文件名暴力枚举漏洞利用工具)
    https://github.com/riusksk/FlashScanner(flashxss扫描)
    https://github.com/coffeehb/SSTIF(一个起毛服务器端模板注入漏洞的半自动化工具)
    https://github.com/epinna/tplmap (服务器端模板注入漏洞检测与利用工具)
    https://github.com/cr0hn/dockerscan(Docker扫描工具)
    https://github.com/m4ll0k/WPSeku (一款精简的wordpress扫描工具)
    https://github.com/rastating/wordpress-exploit-framework (集成化wordpress漏洞利用框架)
    https://github.com/ilmila/J2EEScan(用于扫描J2EE应用的一款burpsuite插件)
    https://github.com/riusksk/StrutScan (一款基于perl的strut2的历史漏洞扫描器)
    https://github.com/D35m0nd142/LFISuite(本地文件包含漏洞利用及扫描工具,支持反弹shell)
    https://github.com/0x4D31/salt-scanner (基于Salt Open以及Vulners Linux Audit API的linux漏洞扫描器,支持与JIRA,slack平台结合使用)
    https://github.com/tijme/angularjs-csti-scanner (自动化探测客户端AngularJS模板注入漏洞工具)
    https://github.com/irsdl/IIS-ShortName-Scanner(Java编写的IIS短文件名暴力枚举漏洞利用工具)
    https://github.com/swisskyrepo/Wordpresscan (基于WPScan以及WPSeku的优化版wordpress扫描器)
    https://github.com/CHYbeta/cmsPoc(CMS渗透测试框架)
    https://github.com/rudSarkar/crlf-injector(CRLF注入漏洞批量扫描)
    https://github.com/3gstudent/Smbtouch-Scanner (自动化扫描内网中存在的由影子经纪人泄露的ETERNAL系列漏洞)
    https://github.com/utiso/dorkbot (通过定制化的谷歌搜索引擎进行漏洞页面搜寻及扫描)
    https://github.com/OsandaMalith/LFiFreak (本地文件包含漏洞利用及扫描工具,支持反弹shell)
    https://github.com/mak-/parameth (用于枚举脚本的GET / POST未知参数字段)
    https://github.com/Lucifer1993/struts-scan(struts2的漏洞全版本检测和利用工具)
    https://github.com/hahwul/a2sv(SSL漏洞扫描,例如心脏滴血漏洞等)
    https://github.com/NullArray/DorkNet(基于搜索引擎的漏洞网页搜寻)
    https://github.com/NickstaDB/BaRMIe(用于攻击爆破Java Remote Method Invocation服务的工具)
    https://github.com/RetireJS/grunt-retire (扫描js扩展库的常见漏洞)
    https://github.com/kotobukki/BDA(针对的hadoop /火花等大数据平台的的漏洞探测工具)
    https://github.com/jagracey/Regex-DoS(RegEx拒绝服务扫描器)
    https://github.com/milesrichardson/docker-onion-nmap(使用NMAP扫描的Tor网络上隐藏的“洋葱”服务)
    https://github.com/Moham3dRiahi/XAttacker(Web CMS Exploit工具,包含针对主流CMS的66个不同的漏洞利用)
    https://github.com/lijiejie/BBScan(一个迷你的信息泄漏批量扫描脚本)
    https://github.com/almandin/fuxploider (文件上传漏洞扫描器及利用工具)
    https://github.com/Ice3man543/SubOver (子域名接管漏洞检测工具,支持30+云服务托管检测)
    https://github.com/Jamalc0m/wphunter(WordPress的漏洞扫描器,同时也支持敏感文件泄露扫描)
    https://github.com/retirejs/retire.js (检测网站依赖的JavaScript库中存在的已知通用漏洞)
    https://github.com/3xp10it/xupload (自动检测上传功能是否可上传webshell)
    https://github.com/mobrine-mob/M0B-tool(CMS指纹识别及自动化渗透测试框架)
    https://github.com/rezasp/vbscan (论坛框架vBulletin黑盒漏洞扫描器)
    https://github.com/MrSqar-Ye/BadMod(CMS指纹识别及自动化渗透测试框架)
    https://github.com/Tuhinshubhra/CMSeeK(CMS漏洞检测和利用套件)
    https://github.com/cloudsploit/scans(AWS安全审计工具)
    https://github.com/radenvodka/SVScanner (针对wp,magento,joomla等CMS的漏洞扫描器及自动利用工具)
    https://github.com/rezasp/joomscan(OWASP旗下joomla漏洞扫描项目)
    https://github.com/6IX7ine/djangohunter (用于检测因错误配置导致敏感信息暴露的Django应用程序)
    https://github.com/savio-code/fern-wifi-cracker/ (无线安全审计工具)
    https://github.com/m4n3dw0lf/PytheM(Python网络/渗透测试工具)
    https://github.com/P0cL4bs/WiFi-Pumpkin (无线安全渗透测试套件)
    https://github.com/MisterBianco/BoopSuite(无线网络审计工具,支持2-5GHZ频段)
    https://github.com/DanMcInerney/LANs.py(ARP欺骗,无线网络劫持)
    https://github.com/besimaltnok/PiFinger (检查wifi是否是“大菠萝”所开放的热点,并给予网络评分)
    https://github.com/derv82/wifite2 (自动化无线网络攻击工具wifite的重构版本)
    https://github.com/sowish/LNScan (基于BBScan via.lijiejie的本地网络扫描)
    https://github.com/SkyLined/LocalNetworkScanner(基于JavaScript的的本地网络扫描)
    https://github.com/wufeifei/cobra (白盒代码安全审计系统)
    https://github.com/OneSourceCat/phpvulhunter (静态PHP代码审计)
    https://github.com/Qihoo360/phptrace (跟踪,分析PHP运行情况的工具)
    https://github.com/ajinabraham/NodeJsScan(的NodeJS应用代码审计)
    https://github.com/shengqi158/pyvulhunter(Python应用审计)
    https://github.com/presidentbeef/brakeman(Ruby on Rails应用静态代码分析)
    https://github.com/python-security/pyt(Python应用静态代码审计)
    https://github.com/m4ll0k/WPSploit(WordPress插件代码安全审计)
    https://github.com/emanuil/php-reaper (用于扫描PHP应用程序中可能存在SQL漏洞的ADOdb代码)
    https://github.com/lowjoel/phortress (用于检测潜在安全漏洞的PHP静态代码分析工具)
    https://github.com/az0ne/AZScanner(自动漏洞扫描器,子域名爆破,端口扫描,目录爆破,常用框架漏洞检测)
    https://github.com/blackye/lalascan (集合owasp top10漏洞扫描和边界资产发现能力的分布式web漏洞扫描框架)
    https://github.com/blackye/BkScanner(BkScanner分布式,插件化web漏洞扫描器)
    https://github.com/ysrc/GourdScanV2(ysrc出品的被动式漏洞扫描工具)
    https://github.com/netxfly/passive_scan(基于http代理的web漏洞扫描器)
    https://github.com/1N3/Sn1per (自动化扫描器,包括中间件扫描以及设备指纹识别)
    https://github.com/RASSec/pentestEr_Fully-automatic-scanner(定向全自动化渗透测试工具)
    https://github.com/3xp10it/3xp10it(自动化渗透测试框架,支持cdn真实ip查找,指纹识别等)
    https://github.com/Lcys/lcyscan(蟒插件化漏洞扫描器,支持生成扫描报表)
    https://github.com/Xyntax/POC-T (渗透测试插件化并发框架)
    https://github.com/v3n0m-Scanner/V3n0M-Scanner(支持检测SQLI / XSS / LFI / RFI等漏洞的扫描器)
    https://github.com/Skycrab/leakScan(Web图形化的漏洞扫描框架)
    https://github.com/zhangzhenfeng/AnyScan(一款网络化的自动化渗透测试框架)
    https://github.com/Tuhinshubhra/RED_HAWK(一款集成信息收集,漏洞扫描,指纹识别等的多合一扫描工具)
    https://github.com/Arachni/arachni (高度集成化的Web应用漏洞扫描框架,支持REST,RPC等api调用)
    https://github.com/infobyte/faraday(集成化渗透测试辅助平台及漏洞管理平台)
    https://github.com/juansacco/exploitpack(渗透测试集成框架,包含超过38,000+攻击)
    https://github.com/swisskyrepo/DamnWebScanner(基于铬/歌剧插件的被动式漏洞扫描)
    https://github.com/anilbaranyelken/tulpar(支持多种网络漏洞扫描,命令行环境使用)
    https://github.com/m4ll0k/Spaghetti(web应用扫描器,支持指纹识别,文件目录爆破,SQL / XSS / RFI等漏洞扫描,也可直接用于struts,ShellShock等扫描)
    https://github.com/Yukinoshita47/Yuki-Chan-The-Auto-Pentest (集成子域名枚举,nmap,waf指纹识别等模块的web应用扫描器)
    https://github.com/0xsauby/yasuo (使用ruby开发的扫描网络中主机存在的第三方web应用服务漏洞)
    https://github.com/hatRiot/clusterd(Web应用自动化扫描框架,支持自动化上传webshell)
    https://github.com/erevus-cn/pocscan (一款开源Poc调用框架,可轻松调用Pocsuite,Tangscan,Beebeeto,Knowsec老版本POC,可使用docker部署)
    https://github.com/TophantTechnology/osprey (斗象能力中心出品并长期维护的开源漏洞检测框架)
    https://github.com/yangbh/Hammer(Web应用漏洞扫描框架)
    https://github.com/Lucifer1993/AngelSword(Web应用漏洞扫描框架,基于python3)
    https://github.com/secrary/EllaScanner (被动式漏洞扫描,支持历史cve编号漏洞识别)
    https://github.com/zaproxy/zaproxy(OWASP ZAP核心项目出品的综合性渗透测试工具)
    https://github.com/sullo/nikto(Web服务综合型扫描器,用于指定目标的资产收集,安全配置缺陷或者安全漏洞扫描)
    https://github.com/s0md3v/Striker (一款多方位信息收集,指纹识别及漏洞扫描工具)
    https://github.com/dermotblair/webvulscan (一款web应用漏洞扫描器,支持扫描反射型以及存储型xss,sql injection等漏洞,支持输出pdf报告)
    https://github.com/alienwithin/OWASP-mth3l3m3nt-framework(渗透测试辅助工具,综合利用框架)
    https://github.com/toyakula/luna (基于被动式扫描框架的自动化web漏洞扫描工具)
    https://github.com/Manisso/fsociety (渗透测试辅助框架,包含信息搜集,无线渗透,网络应用扫描等功能)
    https://github.com/boy-hack/w9scan(内置1200+插件的web漏洞扫描框架)
    https://github.com/YalcinYolalan/WSSAT(Web服务安全评估工具,提供基于windows操作系统的简单.exe应用)
    https://github.com/AmyangXYZ/AssassinGo(使用去开发的可扩展以及高并发渗透测试框架)
    https://github.com/jeffzh3ng/InsectsAwake (基于Flask应用框架的漏洞扫描系统)
    https://github.com/m4ll0k/Galileo (一个操作上类似metasploit的web应用安全审计框架)
    https://github.com/joker25000/Optiva-Framework (一款web应用漏洞扫描器,支持扫描反射型以及存储型xss,sql injection等漏洞)
    https://github.com/theInfectedDrake/TIDoS-Framework (集成104个模块的Web应用程序渗透测试框架)
    https://github.com/Neo23x0/Loki (一款APT入侵痕迹扫描器)
    https://github.com/w3h/icsmaster/tree/master/nse(ICS设备nmap扫描脚本)
    https://github.com/OpenNetworkingFoundation/DELTA(SDN安全评估框架)

    展开全文
  • GitHub

    千次阅读 2017-06-11 11:38:08
    github学习中看过的资源: 1.github中文网_github官网_github社区 2.从0开始学习 GitHub 系列之「初识 GitHub」 -github使用指南 - github账号注册

    GitHub is a development platform inspired by the way you work. From open source to business, you can host and review code, manage projects, and build software alongside millions of other developers.
    译文:GitHub是一个受你工作方式启发的开发平台。从开源到业务,您可以托管和评审代码,管理项目,并与数百万其他开发人员一起构建软件。
    By clicking “Sign up for GitHub”, you agree to our terms of service and privacy policy. We’ll occasionally send you account related emails.
    Use at least one letter, one numeral, and seven characters.
    Sign up for GitHub
    Features Business Explore Marketplace Pricing

    Search GitHub
    功能业务探索市场定价

    github学习中看过的资源:

    1.github中文网_github官网_github社区
    2.从0开始学习 GitHub 系列之「初识 GitHub」
    3http://www.cnblogs.com/zichi/p/4703999.html
    - github使用指南
    - github账号注册
    - The best way to design, build, and ship software.
    You’ll love GitHub

    Unlimited collaborators
    Unlimited public repositories
    Great communication
    Frictionless development
    Open source community
    Login can’t be blank
    There were problems creating your account.

    Email is invalid or already taken
    Something went wrong.
    By clicking on “Create an account” below, you are agreeing to the Terms of Service and the Privacy Policy.

    Create an account
    Welcome to GitHub
    You’ve taken your first step into a larger world, @sssaqw.
    Completed
    Set up a personal account
    Step 2:
    Choose your plan
    Step 3:
    Tailor your experience
    Choose your personal plan

    Unlimited public repositories for free.
    Unlimited private repositories for $7/month.
    Don’t worry, you can cancel or upgrade at any time.

    Help me set up an organization next
    Organizations are separate from personal accounts and are best suited for businesses who need to manage permissions for many employees.
    Learn more about organizations.
    Continue
    Both plans include:

    Collaborative code review
    Issue tracking
    Open source community
    Unlimited public repositories
    Join any organization
    Contact GitHub
    - 这里写![这里写图片描述图片描述]

    (https://img-blog.csdn.net/20170611194012678?watermark/2/text/aHR0cDovL2Jsb2cuY3Nkbi5uZXQvcXFfMjQzOTI2MzU=/font/5a6L5L2T/fontsize/400/fill/I0JBQkFCMA==/dissolve/70/gravity/SouthEast)这里写图片描述https://github.com/join/plan这里写图片描述Welcome to GitHub
    You’ll find endless opportunities to learn, code, and create, @sssaqw.
    Completed
    Set up a personal account
    Step 2:
    Choose your plan
    Step 3:
    Tailor your experience

    How would you describe your level of programming experience?

    Totally new to programming Somewhat experienced Very experienced
    What do you plan to use GitHub for? (check all that apply)

    Research Design School projects Project Management Development Other (please specify)
    Which is closest to how you would describe yourself?

    I’m a student I’m a hobbyist I’m a professional Other (please specify)
    What are you interested in?

    e.g. tutorials, android, ruby, web-development, machine-learning, open-source
    Submit skip this step
    Contact GitHub
    GitHub Help
    https://help.github.com/categories/about-github/

    Learn Git and GitHub without any code!
    Using the Hello World guide, you’ll create a repository, start a branch,
    write comments, and open a pull request.

    Read the guide Start a project
    Contact GitHub

    这里写图片描述么是GitHub

    GitHub指南
    Hello World · GitHub Guides
    https://guides.github.com/activities/hello-world/
    Please verify your email address
    Before you can contribute on GitHub, we need you to verify your email address.
    An email containing verification instructions was sent to 1171039933@qq.com.

    Didn’t get the email? Resend verification email or change your email settings.
    © 2017

    F
    1.是这里写图片描述一家公司
    Skip to content

    Search GitHub
    Pull requests
    Issues
    Marketplace
    Gist
    @sssaqw
    Sign out
    Personal settings
    Profile
    Account
    Emails
    Notifications
    Billing
    SSH and GPG keys
    Security
    Blocked users
    Repositories
    Organizations
    Saved replies
    Authorized OAuth Apps
    Authorized GitHub Apps
    Installed GitHub Apps
    Developer settings
    OAuth applications
    GitHub Apps
    Personal access tokens
    Email
    Please verify an email address to collaborate on GitHub, receive notifications, and help us protect your account.

    1171039933@qq.com Primary Public Unverified Verification email sent. Resend
    Add email address

    Add
    Primary email address
    1171039933@qq.com will be used for account-related notifications and for web-based GitHub operations (e.g. edits and merges).

    Save
    Backup email address
    Your backup GitHub email address can be used to reset your password if you no longer have access to your primary email address.

    Save
    Please add a verified email, in addition to your primary email, in order to choose a backup email address.
    Email preferences
    Receive all emails, except those I unsubscribe from.
    We’ll occasionally contact you with the latest news and happenings from the GitHub Universe. Learn more.
    Only receive account related emails, and those I subscribe to.
    We’ll only send you legal or administrative emails, and any emails you’ve specifically subscribed to.
    Save email preferences
    Looking for activity notification controls? Check the Notification center.

    Contact GitHub API Training Shop Blog About
    © 2017 GitHub, Inc. Terms Privacy Security Status Help
    We sent a verification email to 1171039933@qq.com. Please follow the instructions in it.
    We will immediately delete all of your repositories (0), along with all of your forks, wikis, issues, pull requests, and GitHub Pages sites.

    You will no longer be billed, and your username will be available to anyone on GitHub.

    For more help, read our article “Deleting your user account”.

    GitHub HelpVersion
    Contact Support
    Return to GitHub
    Setting up and managing your GitHub user account / Deleting your user account

    How can we help?

    Deleting your user account
    You can delete your GitHub user account at any time. Before you do so, you should hand over the reins of any organizations you might own.

    Deleting your user account removes all repositories, forks of private repositories, wikis, issues, pull requests, and pages owned by your account. Issues and pull requests you’ve created and comments you’ve made in repositories owned by other users will not be deleted - instead, they’ll be associated with our Ghost user.

    The account name also becomes available to anyone else to use on a new account, and we stop billing you. The email address associated with the account becomes available for use with a different GitHub account.

    If you’re an organization owner and you want to delete your user account, you must transfer ownership to another person or delete your organizations before you can delete your user account.

    Tip: If you no longer want to pay for private repositories, you can downgrade to free instead of deleting your user account and its content.
    Back up your account data

    Before you delete your user account, make a copy of all repositories, private forks, wikis, issues, and pull requests owned by your account.

    Warning: Once your user account has been deleted, GitHub cannot restore your content.
    Delete your user account

    Settings icon in the user barIn the upper-right corner of any page, click your profile photo, then click Settings.
    Account settings menu optionIn the left sidebar, click Account settings.

    Account deletion buttonAt the bottom of the Account Settings page, under “Delete account”, click Delete your account.

    Delete account confirmation dialogIn the “Make sure you want to do this” dialog box, complete the steps to confirm you understand what happens when your account is deleted:

    Recall that all repositories, forks of private repositories, wikis, issues, pull requests and pages owned by your account will be deleted, your billing will end, and your username will be available to anyone for use on GitHub.
    In the first field, type your GitHub username or email.
    In the second field, type the phrase from the prompt.
    Contact a human
    Article versions
    GitHub.com
    GitHub Enterprise 2.10
    GitHub Enterprise 2.9
    GitHub Enterprise 2.8
    GitHub Enterprise 2.7
    The GitHub Logo © 2017 GitHub Inc. All rights reserved. Terms of ServicePrivacySecuritySupport
    github官网删除账户指南:
    Deleting your user account - User Documentation
    https://help.github.com/articles/deleting-your-user-account/
    我正在看删除github账号的方法 - 学不死 - 博客园, http://t.cn/RSmTEyN (来自@手机百度)
    Hello World · GitHub Guides
    https://guides.github.com/activities/hello-world/

    shifeo
    2.是一个开源社区
    3.主要是提供基于Git的版本托管服务

    GitHub的功能

    1.多人协作
    2.搭建博客、个人网站或者公司官网 基于 GitHub Pages 来搭建
    3.写作 基于 MarkdownGitbook
    4.个人简历
    5.其他
    Hello World · GitHub Guides
    https://guides.github.com/activities/hello-world/

    GitHub功能
    一、创建自己的个人简历
    我正在看教你如何用github创建自己的简历, http://t.cn/RSmQuXX (来自@手机百度)
    这里写图片描述
    关于是否勾选Initialize this repository with a README的问题(百度上说可以勾选或者不勾选),可以参考廖雪峰的网站
    我自己是勾选了,因为跟着廖雪峰的教程来!
    这里写图片描述
    从远程库克隆 - 廖雪峰的官方网站
    http://www.liaoxuefeng.com/wiki/0013739516305929606dd18361248578c67b8067c8c017b000/001375233990231ac8cf32ef1b24887a5209f83e01cb94b000
    这里写图片描述

    这里写图片描述

    创建成功后

    这里写图片描述
    可以在客户端打开文件:
    这里写图片描述
    这里写图片描述
    这里写图片描述
    上面的存储库名称为resume
    但是上面的名称不方便,所以上面的存储库被我删除
    然后我新建一个存储库:MyResume.github.com
    试试以后可否通过存储库名.github.io来访问主页
    这里写图片描述

    另外创建的一个存储库:RomanceSky/resume.github.com
    https://github.com/RomanceSky/resume.github.com.git
    这里写图片描述
    创建成功后

    005341489

    点击设置按钮-将其转换为个人主页
    这里写图片描述

    ###6/16
    git:fatal the current branch master has no upstream branch - Mogin的专栏 - 博客频道 - CSDN.NET
    admin@admin-PC MINGW64 ~/learngit (master)
    $ git clone https://github.com/RomanceSky/Resume.github.io.git
    Cloning into ‘Resume.github.io’…
    warning: You appear to have cloned an empty repository.

    admin@admin-PC MINGW64 ~/learngit (master)
    $ git add .
    warning: LF will be replaced by CRLF in Resume.github.io/BlogWebsite/js/jquery.js~ver=1.3.2.
    The file will have its original line endings in your working directory.

    admin@admin-PC MINGW64 ~/learngit (master)
    $ git commit -m “上传网站源码到github”
    [master 616e853] 鈥滀笂浼犵綉绔欐簮鐮佸埌github鈥▒
    97 files changed, 0 insertions(+), 0 deletions(-)
    rename blog.html => Resume.github.io/BlogWebsite/blog.html (100%)
    rename {css => Resume.github.io/BlogWebsite/css}/style.css (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/1087502997_a3018e9e28_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/1174218861_1ea16445a7_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/1315374069_06d8b9a303_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/1315375391_17cab27793_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/1388232779_a1c208a9a5_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/1388233687_0119c6f057_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/1425138766_e197b85b12_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/1506025517_30e512c982_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/1673384836_e0b7875722_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/1673389262_496cc0c66e_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/1849444372_4ca3442116_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/2113240537_5e837116c9_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/2120957599_872f11bd80_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/2135771836_4318165b16_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/2146584780_8ea8940188_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/2173694656_36a89bd3e9_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/2239253367_5864642c4a_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/2321529332_d3fe2b9b1b_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/2349464137_b13e8b3af9_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/2386637344_2c4275f610_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/2410107605_33c7fdd518_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/2424125906_4cde527a20_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/2471554431_be796ef1b2_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/2538179217_d863650aac_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/2578528570_1be7ca758d_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/2598061506_195006c276_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/2618980061_72a0f67bbc_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/2728368820_eb7ece0d63_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/2789664840_4c9ef49bdb_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/281340746_279f025ee0_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/2815155513_e132af2689_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/2816007724_395e9b6daf_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/288003913_c7eba53317_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/290927086_e99158f1d1_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/295605621_e5bee6e14e_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/2977302259_7bb49c227b_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/305174703_d53cc80733_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/312083421_ffbb4c1b76_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/3133150861_9384a1f963_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/322260269_e63f95de2c_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/3229434759_31ac07ecb6_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/3286966751_0b59dfdb06_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/3372805778_5d517c09b1_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/348094903_b7a8179933_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/348094905_8d119b5d84_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/3648030549_15835964b2_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/3805999046_1690be21b3_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/386723781_c7f2c7940c_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/3960817116_7e8eb0cf5b_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/402300275_fed2071885_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/402300281_9d4bf3ae8d_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/402300283_ae25bf95ab_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/4226628850_041effff78_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/427324534_e5d3f157df_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/427324539_a464d32267_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/463217039_7aff40a0c6_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/475820877_0d012c3c50_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/519109867_2512dff9a9_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/560261448_7d1d142d94_s.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/Thumbs.db (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/archive_hdr.gif (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/art_bk.gif (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/artwork_nav.gif (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/avatar.gif (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/blog_nav.gif (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/body_bk.gif (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/buyart.gif (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/cat_hdr.gif (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/comment_link.gif (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/comments_hdr.gif (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/del_icon.gif (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/feed_icon.gif (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/flms.jpg (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/gblog.gif (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/home_nav.gif (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/info_nav.gif (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/leave_hdr.gif (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/line_bk.gif (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/logo.gif (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/mailing.gif (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/maillist_contact_hdr.gif (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/nav_bk.gif (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/recent_posts_hdr.gif (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/recent_tweet_hdr.gif (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/rt_bk.gif (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/search_hdr.gif (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/socialize_hdr.gif (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/store_nav.gif (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/tag.gif (100%)
    rename {images => Resume.github.io/BlogWebsite/images}/tweet_loader.gif (100%)
    rename index.html => Resume.github.io/BlogWebsite/index.html (100%)
    rename {js => Resume.github.io/BlogWebsite/js}/e-201015.js (100%)
    rename {js => Resume.github.io/BlogWebsite/js}/jquery-1.3.2.min.js (100%)
    rename {js => Resume.github.io/BlogWebsite/js}/jquery.js~ver=1.3.2 (100%)
    rename picshow.html => Resume.github.io/BlogWebsite/picshow.html (100%)

    admin@admin-PC MINGW64 ~/learngit (master)
    $ git push
    fatal: The current branch master has no upstream branch.
    To push the current branch and set the remote as upstream, use

    git push --set-upstream origin master
    

    admin@admin-PC MINGW64 ~/learngit (master)
    $ git push -u origin master
    ERROR: The key you are authenticating with has been marked as read only.
    fatal: Could not read from remote repository.

    Please make sure you have the correct access rights
    and the repository exists.

    admin@admin-PC MINGW64 ~/learngit (master)
    $
    如何利用github搭建一个个人网站 - 王亚军的博客 - 博客频道 - CSDN.NET
    http://blog.csdn.net/wangyj1108/article/details/51444419

    6/16

    git使用==学长分享
    git错误:error: failed to push some refs to - thisisvoa的专栏 - 博客频道 - CSDN.NET
    http://blog.csdn.net/utstarm/article/details/8249853
    github - 使用git push时出现error: src refspec master does not match any. 是什么原因 - SegmentFault
    https://segmentfault.com/q/1010000004615080

    http://www.liaoxuefeng.com/wiki/001374738125095c955c1e6d8bb493182103fac9270762a000/

    admin@admin-PC MINGW64 ~/learngit (master)
    $ git clone https://github.com/RomanceSky/Resume.github.io.git
    Cloning into ‘Resume.github.io’…
    remote: Counting objects: 3, done.
    remote: Total 3 (delta 0), reused 0 (delta 0), pack-reused 0
    Unpacking objects: 100% (3/3), done.

    admin@admin-PC MINGW64 ~/learngit (master)
    $ git add .
    warning: LF will be replaced by CRLF in BlogWebsite/js/jquery.js~ver=1.3.2.
    The file will have its original line endings in your working directory.
    warning: LF will be replaced by CRLF in Resume.github.io/js/jquery.js~ver=1.3.2.
    The file will have its original line endings in your working directory.

    admin@admin-PC MINGW64 ~/learngit (master)
    $ git commit -m “上传网站源码到github”
    [master ae9bef9] 鈥滀笂浼犵綉绔欐簮鐮佸埌github鈥▒
    195 files changed, 1047 insertions(+)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/blog.html (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/css/style.css (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/1087502997_a3018e9e28_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/1174218861_1ea16445a7_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/1315374069_06d8b9a303_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/1315375391_17cab27793_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/1388232779_a1c208a9a5_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/1388233687_0119c6f057_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/1425138766_e197b85b12_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/1506025517_30e512c982_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/1673384836_e0b7875722_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/1673389262_496cc0c66e_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/1849444372_4ca3442116_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/2113240537_5e837116c9_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/2120957599_872f11bd80_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/2135771836_4318165b16_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/2146584780_8ea8940188_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/2173694656_36a89bd3e9_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/2239253367_5864642c4a_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/2321529332_d3fe2b9b1b_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/2349464137_b13e8b3af9_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/2386637344_2c4275f610_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/2410107605_33c7fdd518_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/2424125906_4cde527a20_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/2471554431_be796ef1b2_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/2538179217_d863650aac_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/2578528570_1be7ca758d_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/2598061506_195006c276_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/2618980061_72a0f67bbc_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/2728368820_eb7ece0d63_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/2789664840_4c9ef49bdb_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/281340746_279f025ee0_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/2815155513_e132af2689_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/2816007724_395e9b6daf_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/288003913_c7eba53317_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/290927086_e99158f1d1_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/295605621_e5bee6e14e_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/2977302259_7bb49c227b_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/305174703_d53cc80733_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/312083421_ffbb4c1b76_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/3133150861_9384a1f963_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/322260269_e63f95de2c_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/3229434759_31ac07ecb6_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/3286966751_0b59dfdb06_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/3372805778_5d517c09b1_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/348094903_b7a8179933_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/348094905_8d119b5d84_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/3648030549_15835964b2_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/3805999046_1690be21b3_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/386723781_c7f2c7940c_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/3960817116_7e8eb0cf5b_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/402300275_fed2071885_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/402300281_9d4bf3ae8d_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/402300283_ae25bf95ab_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/4226628850_041effff78_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/427324534_e5d3f157df_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/427324539_a464d32267_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/463217039_7aff40a0c6_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/475820877_0d012c3c50_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/519109867_2512dff9a9_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/560261448_7d1d142d94_s.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/Thumbs.db (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/archive_hdr.gif (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/art_bk.gif (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/artwork_nav.gif (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/avatar.gif (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/blog_nav.gif (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/body_bk.gif (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/buyart.gif (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/cat_hdr.gif (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/comment_link.gif (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/comments_hdr.gif (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/del_icon.gif (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/feed_icon.gif (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/flms.jpg (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/gblog.gif (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/home_nav.gif (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/info_nav.gif (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/leave_hdr.gif (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/line_bk.gif (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/logo.gif (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/mailing.gif (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/maillist_contact_hdr.gif (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/nav_bk.gif (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/recent_posts_hdr.gif (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/recent_tweet_hdr.gif (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/rt_bk.gif (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/search_hdr.gif (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/socialize_hdr.gif (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/store_nav.gif (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/tag.gif (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/images/tweet_loader.gif (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/index.html (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/js/e-201015.js (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/js/jquery-1.3.2.min.js (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/js/jquery.js~ver=1.3.2 (100%)
    rename {Resume.github.io/BlogWebsite => BlogWebsite}/picshow.html (100%)
    create mode 100644 Resume.github.io/README.md
    create mode 100644 Resume.github.io/blog.html
    create mode 100644 Resume.github.io/css/style.css
    create mode 100644 Resume.github.io/images/1087502997_a3018e9e28_s.jpg
    create mode 100644 Resume.github.io/images/1174218861_1ea16445a7_s.jpg
    create mode 100644 Resume.github.io/images/1315374069_06d8b9a303_s.jpg
    create mode 100644 Resume.github.io/images/1315375391_17cab27793_s.jpg
    create mode 100644 Resume.github.io/images/1388232779_a1c208a9a5_s.jpg
    create mode 100644 Resume.github.io/images/1388233687_0119c6f057_s.jpg
    create mode 100644 Resume.github.io/images/1425138766_e197b85b12_s.jpg
    create mode 100644 Resume.github.io/images/1506025517_30e512c982_s.jpg
    create mode 100644 Resume.github.io/images/1673384836_e0b7875722_s.jpg
    create mode 100644 Resume.github.io/images/1673389262_496cc0c66e_s.jpg
    create mode 100644 Resume.github.io/images/1849444372_4ca3442116_s.jpg
    create mode 100644 Resume.github.io/images/2113240537_5e837116c9_s.jpg
    create mode 100644 Resume.github.io/images/2120957599_872f11bd80_s.jpg
    create mode 100644 Resume.github.io/images/2135771836_4318165b16_s.jpg
    create mode 100644 Resume.github.io/images/2146584780_8ea8940188_s.jpg
    create mode 100644 Resume.github.io/images/2173694656_36a89bd3e9_s.jpg
    create mode 100644 Resume.github.io/images/2239253367_5864642c4a_s.jpg
    create mode 100644 Resume.github.io/images/2321529332_d3fe2b9b1b_s.jpg
    create mode 100644 Resume.github.io/images/2349464137_b13e8b3af9_s.jpg
    create mode 100644 Resume.github.io/images/2386637344_2c4275f610_s.jpg
    create mode 100644 Resume.github.io/images/2410107605_33c7fdd518_s.jpg
    create mode 100644 Resume.github.io/images/2424125906_4cde527a20_s.jpg
    create mode 100644 Resume.github.io/images/2471554431_be796ef1b2_s.jpg
    create mode 100644 Resume.github.io/images/2538179217_d863650aac_s.jpg
    create mode 100644 Resume.github.io/images/2578528570_1be7ca758d_s.jpg
    create mode 100644 Resume.github.io/images/2598061506_195006c276_s.jpg
    create mode 100644 Resume.github.io/images/2618980061_72a0f67bbc_s.jpg
    create mode 100644 Resume.github.io/images/2728368820_eb7ece0d63_s.jpg
    create mode 100644 Resume.github.io/images/2789664840_4c9ef49bdb_s.jpg
    create mode 100644 Resume.github.io/images/281340746_279f025ee0_s.jpg
    create mode 100644 Resume.github.io/images/2815155513_e132af2689_s.jpg
    create mode 100644 Resume.github.io/images/2816007724_395e9b6daf_s.jpg
    create mode 100644 Resume.github.io/images/288003913_c7eba53317_s.jpg
    create mode 100644 Resume.github.io/images/290927086_e99158f1d1_s.jpg
    create mode 100644 Resume.github.io/images/295605621_e5bee6e14e_s.jpg
    create mode 100644 Resume.github.io/images/2977302259_7bb49c227b_s.jpg
    create mode 100644 Resume.github.io/images/305174703_d53cc80733_s.jpg
    create mode 100644 Resume.github.io/images/312083421_ffbb4c1b76_s.jpg
    create mode 100644 Resume.github.io/images/3133150861_9384a1f963_s.jpg
    create mode 100644 Resume.github.io/images/322260269_e63f95de2c_s.jpg
    create mode 100644 Resume.github.io/images/3229434759_31ac07ecb6_s.jpg
    create mode 100644 Resume.github.io/images/3286966751_0b59dfdb06_s.jpg
    create mode 100644 Resume.github.io/images/3372805778_5d517c09b1_s.jpg
    create mode 100644 Resume.github.io/images/348094903_b7a8179933_s.jpg
    create mode 100644 Resume.github.io/images/348094905_8d119b5d84_s.jpg
    create mode 100644 Resume.github.io/images/3648030549_15835964b2_s.jpg
    create mode 100644 Resume.github.io/images/3805999046_1690be21b3_s.jpg
    create mode 100644 Resume.github.io/images/386723781_c7f2c7940c_s.jpg
    create mode 100644 Resume.github.io/images/3960817116_7e8eb0cf5b_s.jpg
    create mode 100644 Resume.github.io/images/402300275_fed2071885_s.jpg
    create mode 100644 Resume.github.io/images/402300281_9d4bf3ae8d_s.jpg
    create mode 100644 Resume.github.io/images/402300283_ae25bf95ab_s.jpg
    create mode 100644 Resume.github.io/images/4226628850_041effff78_s.jpg
    create mode 100644 Resume.github.io/images/427324534_e5d3f157df_s.jpg
    create mode 100644 Resume.github.io/images/427324539_a464d32267_s.jpg
    create mode 100644 Resume.github.io/images/463217039_7aff40a0c6_s.jpg
    create mode 100644 Resume.github.io/images/475820877_0d012c3c50_s.jpg
    create mode 100644 Resume.github.io/images/519109867_2512dff9a9_s.jpg
    create mode 100644 Resume.github.io/images/560261448_7d1d142d94_s.jpg
    create mode 100644 Resume.github.io/images/Thumbs.db
    create mode 100644 Resume.github.io/images/archive_hdr.gif
    create mode 100644 Resume.github.io/images/art_bk.gif
    create mode 100644 Resume.github.io/images/artwork_nav.gif
    create mode 100644 Resume.github.io/images/avatar.gif
    create mode 100644 Resume.github.io/images/blog_nav.gif
    create mode 100644 Resume.github.io/images/body_bk.gif
    create mode 100644 Resume.github.io/images/buyart.gif
    create mode 100644 Resume.github.io/images/cat_hdr.gif
    create mode 100644 Resume.github.io/images/comment_link.gif
    create mode 100644 Resume.github.io/images/comments_hdr.gif
    create mode 100644 Resume.github.io/images/del_icon.gif
    create mode 100644 Resume.github.io/images/feed_icon.gif
    create mode 100644 Resume.github.io/images/flms.jpg
    create mode 100644 Resume.github.io/images/gblog.gif
    create mode 100644 Resume.github.io/images/home_nav.gif
    create mode 100644 Resume.github.io/images/info_nav.gif
    create mode 100644 Resume.github.io/images/leave_hdr.gif
    create mode 100644 Resume.github.io/images/line_bk.gif
    create mode 100644 Resume.github.io/images/logo.gif
    create mode 100644 Resume.github.io/images/mailing.gif
    create mode 100644 Resume.github.io/images/maillist_contact_hdr.gif
    create mode 100644 Resume.github.io/images/nav_bk.gif
    create mode 100644 Resume.github.io/images/recent_posts_hdr.gif
    create mode 100644 Resume.github.io/images/recent_tweet_hdr.gif
    create mode 100644 Resume.github.io/images/rt_bk.gif
    create mode 100644 Resume.github.io/images/search_hdr.gif
    create mode 100644 Resume.github.io/images/socialize_hdr.gif
    create mode 100644 Resume.github.io/images/store_nav.gif
    create mode 100644 Resume.github.io/images/tag.gif
    create mode 100644 Resume.github.io/images/tweet_loader.gif
    create mode 100644 Resume.github.io/index.html
    create mode 100644 Resume.github.io/js/e-201015.js
    create mode 100644 Resume.github.io/js/jquery-1.3.2.min.js
    create mode 100644 Resume.github.io/js/jquery.js~ver=1.3.2
    create mode 100644 Resume.github.io/picshow.html

    admin@admin-PC MINGW64 ~/learngit (master)
    $ git pull
    ERROR: Repository not found.
    fatal: Could not read from remote repository.

    Please make sure you have the correct access rights
    and the repository exists.

    admin@admin-PC MINGW64 ~/learngit (master)
    $ cd Resume.github.io

    admin@admin-PC MINGW64 ~/learngit/Resume.github.io (master)
    $ ^C

    admin@admin-PC MINGW64 ~/learngit/Resume.github.io (master)
    $ git pull
    Already up-to-date.

    admin@admin-PC MINGW64 ~/learngit/Resume.github.io (master)
    $ git push
    Everything up-to-date

    admin@admin-PC MINGW64 ~/learngit/Resume.github.io (master)
    $

    展开全文
  • GitHub开源的10个超棒后台管理面板

    万次阅读 多人点赞 2019-09-20 09:36:16
    目录 1、AdminLTE 2、vue-Element-Admin 3、tabler 4、Gentelella 5、ng2-admin 6、ant-design-pro ...项目开发中后台管理平台必不可少,但是从零搭建一套多样化后台管理并不容易,目前有许多开源、免费、...

    目录

    1、AdminLTE

    2、vue-Element-Admin

    3、tabler

    4、Gentelella

    5、ng2-admin

    6、ant-design-pro

    7、blur-admin

    8、iview-admin

    9、material-dashboard

    10、layui


    项目开发中后台管理平台必不可少,但是从零搭建一套多样化后台管理并不容易,目前有许多开源、免费、样式丰富的后台管控面板,深夜学习简书上一位大神的博文,共总结10项优秀后台管理控制面板(9个GitHub项目,1个在线UI 框架)。

    1、AdminLTE

    简介:非常流行的基于 Bootstrap 3.x 的免费的后台 UI 框架。

    网站:https://github.com/ColorlibHQ/AdminLTE

    2、vue-Element-Admin

    简介:一个基于 vue2.0 和 Element 的控制面板 UI 框架。

    网站:https://github.com/PanJiaChen/vue-element-admin

    3、tabler

    简介:构建在 BootStrap 4 之上的免费的 HTML 控制面板框架。

    网站:https://github.com/tabler/tabler

    4、Gentelella

    简介:一个基于 Bootstarp 的免费的后台控制面板。

    网站:https://github.com/ColorlibHQ/gentelella

    5、ng2-admin

    简介:基于 Angular 2, Bootstrap 4 和 Webpack 的后台管理面板框架。

    网站:https://github.com/akveo/ngx-admin

    6、ant-design-pro

    简介:开箱即用的中台前端/设计解决方案。

    网站:https://github.com/ant-design/ant-design-pro

    7、blur-admin

    简介:基于 Angular 和 Bootstrap 的后台管理面板框架。

    网站:https://github.com/akveo/blur-admin

    8、iview-admin

    简介:基于 iView 的 Vue 2.0 控制面板。

    网站:https://github.com/iview/iview-admin

    9、material-dashboard

    简介:基于 Bootstrap 4 和 Material 风格的控制面板。

    网站:https://github.com/creativetimofficial/material-dashboard

     

    10、layui

    简介:layui,是一款采用自身模块规范编写的前端 UI 框架,遵循原生 HTML/CSS/JS 的书写与组织形式,门槛极低,拿来即用。

    网站:https://www.layui.com/

    展开全文
  • 解决GitHub下载速度太慢的问题

    万次阅读 多人点赞 2018-01-21 22:29:16
    GitHub下载文件一直非常慢,查看下载链接发现最终被指向了Amazon的服务器,下载地址是http://github-cloud.s3.amazonaws.com/,从国内访问Amazon非常慢,所以总是下载失败,解决方法时更改host文件,使该域名指向...
  • github设置仓库可见性 私人仓库设置他人协作/可见

    万次阅读 热门讨论 2019-09-24 15:46:58
    设置仓库可见性 您可选择能够查看仓库的人员。 本文内容 关于仓库可见性 将仓库设为私有 将仓库设为公共 将仓库设为内部 ... 内部仓库适用于 GitHub Enterprise Cloud 并且只有企业帐户的成员可访问。...
  • 写这篇文章缘由,是下载一个机器学习课程的课件,想去GitHub上下载,结果下载速度居然只有几k,并且还老是下载失败。然后去百度解决办法,基本上都是让修改hosts文件,修改完成后发现效果并不明显(其实下载速度并没...
  • [08]GitHub(一)|怎样使用GitHub

    万次阅读 多人点赞 2018-06-11 08:56:20
    跟朋友在交流的时候听到求职的时候发现有些公司要附Github帐号,一个优秀的 GitHub 账号当然能让你增色不少。自己之前听说过,但没有花时间研究,最后花了时间看了CitHub的文档,还有一些程序员写的的blog,就写下来...
  • 怎么样下载和运行GitHub上的代码呢?

    万次阅读 多人点赞 2018-06-16 19:27:35
    从昨天开始就想着从GitHub上下载一个开源的Vue的实战项目,希望能从中学习更多的Vue的实用内容,结果搞了半天好不容易下载了,不知道怎么弄。然而,今天终于成功了,激动地我赶紧来记录一下。 如何从GitHub上下载...
  • 通过码云来导入github,通过码云下载 第一步: 找一个你需要下载的GitHub项目 第二步: 复制链接 第三步: 打开码云,然后选择从GitHub导入 第四步: 复制刚才的连接,起个名字,点击导入 这个过程大概一两分钟 ...
  • GitHub 新手详细教程

    万次阅读 多人点赞 2017-09-12 22:15:58
    这篇文章是我自己写的关于GitHub的内容,从我刚听到这个直到设置成功每一步都有详细的步骤来解释,其中有一些截图或者代码来自于网上。 在开始前先跟大家说一下这篇博客是来介绍桌面版GitHub的使用的,如果只是简单...
  • GitHub for Windows离线安装包

    万次下载 热门讨论 2015-05-21 09:54:39
    鉴于许多情况,一些用户无法正常安装github客户端,特此将Githu for windows离线安装包分享给大家
  • Github搭建个人博客(2019最新版,亲测)

    万次阅读 多人点赞 2017-12-09 22:36:09
    版权声明:本文为徐代龙原创文章,未经徐代龙允许不得转载。 ... (一)前言: ... 1 起因:在很早很早,大一的时候,估计快记不得日子了,那时候来到PC吧创业团队,一个大一级的学长通过...
  • GitHub Desktop(GitHub桌面版)离线安装包

    万次下载 热门讨论 2015-08-21 10:35:05
    2015-8-21下载的github desktop,官网安装比较麻烦,就弄了个离线版的分享
  • 一名大神的github

    万次阅读 2020-04-17 08:30:42
    https://github.com/carpedm20
  • GitHub怎么用?GitHub是什么?新手怎么用GitHub?这些问题都不是问题了:英文10分【满分100分】水平的人来说:这个教程和小说很重要!这妮儿图文并茂,比我还幽默 汗!!!,我就直接转载过来,需要的同学赶紧马克...
  • @程序员:GitHub这个项目快薅羊毛

    万次阅读 多人点赞 2020-02-19 19:52:42
    今天下午在朋友圈看到很多人都在发github的羊毛,一时没明白是怎么回事。 后来上百度搜索了一下,原来真有这回事,毕竟资源主义的羊毛不少啊,1000刀刷爆了朋友圈!不知道你们的朋友圈有没有看到类似的消息。 这...
  • 一些实用的GitHub项目

    万次阅读 多人点赞 2019-10-08 14:25:24
    最近整理了一些在GitHub上比较热门的开源项目关于GitHub,快速了解请戳这里其中涵盖了:学习教程,面试总结,实用工具,框架,机器学习等东西比较杂,要学的东西也比较多...
  • GitHub如何配置SSH Key

    万次阅读 多人点赞 2018-10-29 09:35:07
    https://github.com/xiangshuo1992/preload.git git@github.com:xiangshuo1992/preload.git 这两个地址展示的是同一个项目,但是这两个地址之间有什么联系呢? 前者是https url 直接有效网址打开,但是用户每次通过...
  • GitHub开源:狗屁不通文章生成器

    万次阅读 多人点赞 2019-11-18 08:49:02
    GitHub开源狗屁不通文章生成器了解一下,只要输入一句话,系统就会给你一篇万字长文。 查看源代码编写风格清新脱俗,并且毫无算法,简单暴力,直接在关键语句前后加上废话(名人名言)。 GitHub:...
  • 【最新】解决Github网页上图片显示失败的问题

    万次阅读 多人点赞 2019-06-08 17:48:54
    好几个星期之前本人就发现自己的github在网页打开显示不了图片的问题了,不过当时没在意。 今天强迫症逼迫我一定要搞定它,于是去找了一些方法,自己做个记录,有相同问题的伙伴可以参考一下。 一、问题 比如随便...
  • github中更新默认分支

    万次阅读 2020-06-15 21:18:20
    找到项目,然后找到项目中的设置 然后点击Update更新即可
  • 浏览 GitHub 太卡了?教你两招!

    万次阅读 多人点赞 2019-09-04 10:21:57
    老实说,GitHub 在国内的使用体验并不算太好,这其中最大的原因就是网络了。 GitHub 访问起来比较卡,这个看起来貌似无解。国内的 gitee 网速倒是可以,但是无法代替 GitHub,个人感觉 gitee 上还是开源项目多一些,...
  • github新手使用指南

    万次阅读 多人点赞 2018-06-14 15:25:26
    https://blog.csdn.net/Hanani_Jia/article/details/77950594源博客地址首先,我先对GitHub来一个简单的介绍,GitHub有一个很强大的功能就是,你在服务器上边可以创建一个库(稍后会介绍怎么创建),写代码是一件很...
  • github从协作者中删除自己

    万次阅读 2020-05-28 22:33:41
  • 解决github打不开问题

    万次阅读 多人点赞 2019-11-01 18:09:20
    windows下路径为:C:\Windows\System32\drivers\etc\hosts ...#github 192.30.253.113 github.com 192.30.253.113 github.com 192.30.253.118 gist.github.com 192.30.253.119 gist.github.com 其中会遇到权限...
  • 如何将本地的代码上传到github

    万次阅读 多人点赞 2019-04-24 18:45:35
    喜欢的同学可以看一下原文,讲得更加详细哦 ... 首先你需要一个github账号,所有还没有的话先去注册吧! https://github.com/ ...我们使用git需要先安装git工具,这里给出下载地址,...https://git-for-windows.github...
  • 创建GitHub技术博客全攻略

    万次阅读 多人点赞 2014-07-12 13:10:47
    GitHub可以挂载静态站点和静态资源,是一种低成本的公网展示手段。每个免费仓库的限制大约是260MB.每个账号可以注册多个组织,则拥有多个二级域名.

空空如也

1 2 3 4 5 ... 20
收藏数 733,387
精华内容 293,354
关键字:

github