Update tools

This commit is contained in:
DSR! 2021-05-22 21:44:25 -03:00
parent d5ee9c4c04
commit 6f949c37c4
24 changed files with 14 additions and 15 deletions

View File

@ -11,9 +11,8 @@
### Changed
- Added 3 tools to updater
- Added download from sourceforge from specific folder /w regex
- Added sourceforge_dynamic_url name helpder
- Fixed x64dbg updater script (don't use mirrors, use CDN and load balancer for mirror select)
- Fixed x64dbg updater url (use sourceforge 302 response url)
- Update tools (22/05/2021)
## 2021.3 - MASTER

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

View File

@ -8,8 +8,8 @@ re_version = AstroGrep_v(.*?)_portable.zip
[Process-Dump]
folder = Other\Process-Dump
url = https://split-code.com/processdump.html
update_url = https://split-code.com/files/pd_latest.zip
url = http://split-code.com/processdump.html
update_url = http://split-code.com/files/pd_latest.zip
from = web
local_version = 2.1
re_version = <span class="link">Download: pd.exe v(.*?) for Windows 32 and 64 bit</span>
@ -82,7 +82,7 @@ update_url = https://www.winitor.com/tools/pestudio/current/pestudio.zip
folder = Analysis\CAPA
url = https://github.com/fireeye/capa
from = github
local_version = 1.6.0
local_version = 1.6.3
re_version = <span class="css-truncate-target" [^>]*>v(.*?)</span>
re_download = "(.*?/capa-(?:\S+)-windows.zip)"
@ -106,7 +106,7 @@ re_download = "(.*?/dnSpy-net-win64.zip)"
folder = Decompilers\[DOTNET] ILSpy
url = https://github.com/icsharpcode/ILSpy
from = github
local_version = 7.0-preview3
local_version = 7.0
re_version = <span class="css-truncate-target" [^>]*>v(.*?)</span>
re_download = "(.*?/ILSpy_binaries_(?:\S+).zip)"
@ -122,7 +122,7 @@ re_download = "(.*?/jd-gui-windows-(?:\S+).zip)"
folder = Decompilers\[JAVA] Recaf
url = https://github.com/Col-E/Recaf
from = github
local_version = 2.18.3
local_version = 2.19.6
re_version = <span class="css-truncate-target" [^>]*>(.*?)</span>
re_download = "(.*?/recaf-(?:\S+)-jar-with-dependencies.jar)"
@ -154,7 +154,7 @@ update_url = https://mh-nexus.de/downloads/HxDPortableSetup.zip
folder = HEX Editor\REHex
url = https://github.com/solemnwarning/rehex
from = github
local_version = 0.3.1
local_version = 0.3.91
re_version = <span class="css-truncate-target" [^>]*>(.*?)</span>
re_download = "(.*?/rehex-(?:\S+)-win-x86_64.zip)"
@ -162,7 +162,7 @@ re_download = "(.*?/rehex-(?:\S+)-win-x86_64.zip)"
folder = HEX Editor\ImHex
url = https://github.com/WerWolv/ImHex
from = github
local_version = 1.7.0
local_version = 1.8.0
re_version = <span class="css-truncate-target" [^>]*>v(.*?)</span>
re_download = "(.*?/Windows.Portable.ZIP.zip)"
@ -170,7 +170,7 @@ re_download = "(.*?/Windows.Portable.ZIP.zip)"
folder = Monitor\Autoruns
url = https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns
from = web
local_version = 13.98
local_version = 13.100
re_version = <h1 [^>]*>Autoruns for Windows v(.*?)</h1>
re_download = "(.*?/Autoruns.zip)"
@ -179,7 +179,7 @@ folder = Monitor\CurrPorts
url = https://www.nirsoft.net/utils/cports.html
update_url = https://www.nirsoft.net/utils/cports.zip
from = web
local_version = 2.63
local_version = 2.65
re_version = <td>CurrPorts v(.*?) - Monitoring Opened
[Portmon]
@ -210,7 +210,7 @@ re_download = "(.*?/processhacker-(?:\S+)-bin.zip)"
folder = Monitor\Process Hacker 3
url = https://processhacker.sourceforge.io/nightly.php
from = web
local_version = 3.0.3944
local_version = 3.0.4100
re_version = Build: <span style="font-weight:bold">(.*?)</span>
re_download = href="(.*?artifacts/processhacker-(?:\S+)-bin.zip)
@ -219,7 +219,7 @@ folder = Monitor\Procmon
url = https://docs.microsoft.com/en-us/sysinternals/downloads/procmon
update_url = https://download.sysinternals.com/files/ProcessMonitor.zip
from = web
local_version = 3.61
local_version = 3.70
re_version = <h1 [^>]*>Process Monitor v(.*?)</h1>
[TCPView]
@ -227,7 +227,7 @@ folder = Monitor\TCPView
url = https://docs.microsoft.com/en-us/sysinternals/downloads/tcpview
update_url = https://download.sysinternals.com/files/TCPView.zip
from = web
local_version = 4.0
local_version = 4.01
re_version = <h1 [^>]*>TCPView v(.*?)</h1>
[Strings]