GitHub - jcs/progman: progman.exe^H^H^H^H
source link: https://github.com/jcs/progman
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
Repository files navigation
progman
progman is a simple X11 window manager modeled after the Windows 3 era.
License
Compiling
Run make
to compile, and make install
to install to /usr/local
by
default.
Features
- Window minimizing, drawing icons and labels on the root/desktop
- Window maximizing by double-clicking on a window titlebar, and full-screen
support (via
_NET_WM_STATE_FULLSCREEN
) - Window shading by right-clicking on a window titlebar
- Window moving by holding down
Alt
(configurable) and clicking anywhere on a window - Built-in keyboard binding support by adding items to the
[keyboard]
section of~/.config/progman/progman.ini
such asWin+L = exec xlock
- Built-in mouse button binding on the desktop by adding items to the
[desktop]
section of~/.config/progman/progman.ini
such asMouse3 = exec xterm
, with right-click setup by default to show a configurable launcher menu containing programs listed in the[launcher]
section ofprogman.ini
- Virtual desktops with keyboard shortcuts for switching between them bound
to
Alt+1
throughAlt+0
by default, and using the mouse wheel on the desktop to scroll through virtual desktops - Window cycling with
Alt+Tab
andShift+Alt+Tab
- Theme support
- Optional HiDPI scaling support to magnify icons and buttons
Recommend
-
164
已通过安全加密检测官网中心合作伙伴点击进入官网
-
17
A few months back, there was a post on Reddit ( link ), which described a game that used an open source clone of Notepad...
-
11
wine无法运行exe解决方案(Path not find) 我下载的wine一直无...
-
10
0x00 前言 本文将要结合自己的经验,介绍不同环境下从lsass.exe进程导出凭据的方法,结合利用思路,给出防御建议 0x01 简介 本文将要介绍以下内容: 从lsass.exe进程导出凭据的常用方法 限制上...
-
12
Encrypt plain text in EXE / RAM :: HxD editor advertisements HxD (hex editor) allows to search/view/edit RAM. How can I protect a EXE a...
-
5
0x00 前言 The Backdoor Factory可用来向可执行文件植入后门,修改程序执行流程,执行添加的payload。 本文将要介绍向EXE文件植入后门的原理,测试The Backdoor Factory植入后门的方法,分析细节,总结思路。...
-
5
Use xwizard.exe to load dll 0x00 前言 在之前的文章介绍了利用Excel.Application...
-
8
0x00 前言 从Casey Smith@subTee的Twitter上获得的一个思路,利用Waitfor.exe有可能实现一种后门机制。 于是我对其做了进一步研究,并且使用Powershell写了一个后门利用的POC。 本文将要介绍Waitfor.exe在渗透测试中的利用技巧,并且分享开发PO...
-
10
Study Notes of using sdclt.exe to bypass UAC 0x00 前言 Matt Nelson @enigma0x3在最近的文章中公开了一个绕过Win10 UAC的技巧,通过修改HKCU下的注册表键值实现对UAC的绕过,文章地址如下: https://enigma0x...
-
18
0x02 相关概念 PCB(process control block): 进程控制块,是系统为了管理进程专门设置的一个数据结构 PCB的组织方式: 不同操作系统的PCB结构不同 Windows下的PCB是EPROCESS结构 ...
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK