Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Translate text from clipboard.
This script is written for Windows. Believe it's a hard way to setup but an easy one to use :).
pip install -U pip
.aws-cli
from https://aws.amazon.com/cli/ and initiate aws by aws configure
./bin
directory $PATH./usr/lib/x86_64-linux-gnu/mecab/dic/mecab-ipadic-neologd
into C:\neologd\
if you want the newest dictionary.
Here's a pre-built dictionary on 2019-05-11.pydub
's ffmpeg binding to play TTS mp3 audio. If you want to enable TTS, download ffmpeg from
https://ffmpeg.zeranoe.com/builds/ or just ignore the warning. We won't save mp3 so you should mind of its costs.pip install -r requirements.txt
. If your system default encoding is not UTF-8, you might
fail on installing the romkan
package. Usually neither chcp
nor locale.setdefaultencoding()
won't solve this
problem. I suggest manually download romkan source code and replace line 12
README = open(os.path.join(here, 'README.rst')).read()
to
README = open(os.path.join(here, 'README.rst'), encoding="utf-8").read()
. Then run python .\setup.py install
.config.ini.example
and rename it to config.ini
. Fill in the appid
and the secretkey
, make sure
Natural Language Translation
of this app is enabled.python .\cp2trans\cp2trans.py
or install cp2trans
by python setup.py install
(in this way you can pass step 8).PS C:\cp2translate> python .\cp2trans.py -h
usage: cp2trans [-h] [--passwd log_file] [-p section] [-l log_file]
[-e password] [-v {0,1}] [-m pattern] [-n number]
[-s lang_code] [-t lang_code1,lang_code2,lang_code3] [-d]
[-i seconds] [-a agth_path] [-o agth_opts]
Clipboard to Translate.
optional arguments:
-h, --help show this help message and exit
--passwd log_file Change password of an encrypted log_file or
encrypt/decrypt log_file and exit.
-p section, --profile section
Load profiled options from the specified section of
"config.ini" file. Any other options from command line
will be ignored. See details in "config.example.ini".
-l log_file, --log log_file
Save and read translation history from "log_file" to
save API calls.
-e password, --encrypt password
Encrypt logfile if you don't want it too exposed ;P.
Have to be specified while loading an encrypted log
file.
-v {0,1}, --voice {0,1}
Voice of TTS. "0" for male and "1" for female. Unset
for disable TTS.
-m pattern, --match pattern
Only TTS when match <pattern>.
-n number, --number number
Translate only if number of characters less than
<number>.
-s lang_code, --source lang_code
Source language code. Romkan will only be shown with
"ja".
-t lang_code1,lang_code2,lang_code3, --target lang_code1,lang_code2,lang_code3
Three target language codes used by youdao, aws and
google. Separated by comma.
-d, --disable Disable specified translate engine. Corresponding
results will be saved as null
-i seconds, --interval seconds
Time interval in seconds to check the clipboard.
-a agth_path, --agth agth_path
Start AGTH text hook. "agth_path" must be specified.
You might also have to specify -o option.
-o agth_opts, --opt agth_opts
Extra options passed to "agth.exe". See details by the
help button of "agth.exe" window.
FAQs
Clipboard to translate.
We found that cp2trans demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.