Walter.IO
2024.12.13.1227
Prefix Reserved
See the version list below for details.
dotnet add package Walter.IO --version 2024.12.13.1227
NuGet\Install-Package Walter.IO -Version 2024.12.13.1227
<PackageReference Include="Walter.IO" Version="2024.12.13.1227" />
paket add Walter.IO --version 2024.12.13.1227
#r "nuget: Walter.IO, 2024.12.13.1227"
// Install Walter.IO as a Cake Addin #addin nuget:?package=Walter.IO&version=2024.12.13.1227 // Install Walter.IO as a Cake Tool #tool nuget:?package=Walter.IO&version=2024.12.13.1227
WALTER
Introducing the WALTER Framework: Workable Algorithms for Location-aware Transmission, Encryption Response. Designed for modern developers, WALTER is a groundbreaking suite of NuGet packages crafted for excellence in .NET Standard 2.0, 2.1, Core 3.1, and .NET 6, 7, 8, as well as C++ environments. Emphasizing 100% AoT support and reflection-free operations, this framework is the epitome of performance and stability.
Whether you're tackling networking, encryption, or secure communication, WALTER offers unparalleled efficiency and precision in processing, making it an essential tool for developers who prioritize speed and memory management in their applications.
About the Walter.IO Package
Basically there a 2 main interfaces in the Nuget package
- IDiskGuard
- FileInfo extensions
IDiskGuard
The IDiskGuard monitors and alerts if there are any uncontrolled disk activities where data is altered.
Features
- Real-Time Disk Activity Monitoring:
IDiskGuard
actively watches specified directories for changes, including file creations, modifications, and deletions. - Event-Driven Alerts: Triggers events when unauthorized disk manipulations are detected, allowing for immediate response.
- Flexible Monitoring: Supports monitoring specific directories with customizable file filters and the option to include subdirectories.
- Easy Integration: While demonstrated with
IDiskGuard
is designed for broad applicability across various types of applications.
Getting Started
The bellow sample show you one of many ways that you can integrate and configure IDiskGuard.
using Microsoft.Extensions.DependencyInjection;
using Microsoft.Extensions.Hosting;
using System;
using System.IO;
using Walter.BOM;
using Walter.IO;
namespace YourNamespace
{
public static class Program
{
public static void Main(string[] args)
{
CreateHostBuilder(args).Build().Run();
}
public static IHostBuilder CreateHostBuilder(string[] args) =>
Host.CreateDefaultBuilder(args)
.ConfigureServices((hostContext, services) =>
{
services.AddHostedService<DiskMonitorService>();
services.AddSecureDiskMonitor();
});
}
public class DiskMonitorService : BackgroundService
{
private readonly IDiskGuard _diskGuard;
public DiskMonitorService(IDiskGuard diskGuard)
{
_diskGuard = diskGuard;
}
protected override async Task ExecuteAsync(CancellationToken stoppingToken)
{
var monitoredDirectory = @"path\to\monitored\directory";
// Start monitoring the directory
_diskGuard.StartMonitoring(new DirectoryInfo(monitoredDirectory), "*.*", true);
_diskGuard.OnDiskManipulation += DiskGuard_OnDiskManipulation;
stoppingToken.Register(() =>
{
// Cleanup code when the service is stopping
_diskGuard.StopMonitoring(new DirectoryInfo(monitoredDirectory), "*.*");
});
while (!stoppingToken.IsCancellationRequested)
{
// The service will keep running, monitoring disk activities.
// Implement any additional periodic checks or maintenance tasks here.
await Task.Delay(TimeSpan.FromMinutes(1), stoppingToken);
}
}
private void DiskGuard_OnDiskManipulation(object sender, DiskManipulationEventArgs e)
{
// Example padding check for manipulated files
var fileInfo = new FileInfo(e.Violation.Path);
if (fileInfo.Exists && fileInfo.CountPaddingBytesChunked() > 0)
{
// Handle detection of significant padding in the manipulated file
Console.WriteLine($"Unauthorized manipulation with padding detected on file: {e.Violation.Path}");
}
// Implement additional handling logic for detected disk manipulations
}
}
}
Key Components:
- Program: Sets up the host builder and configures services, registering DiskMonitorService as a hosted service and adding IDiskGuard to the DI container.
- DiskMonitorService: A background service that starts disk monitoring on application start and keeps running until the application shuts down. It listens for IDiskGuard's OnDiskManipulation event to detect and respond to unauthorized disk manipulations, including checking for significant padding in altered files.
Steps to Use
- Replace "path\to\monitored\directory" with the actual path of the directory you want to monitor.
- Implement any additional logic you require in the DiskGuard_OnDiskManipulation method, especially for handling detected unauthorized disk manipulations and padding analysis.
This setup allows IDiskGuard to continuously monitor specified directories in the background, making it an efficient solution for detecting and responding to potential security threats or unauthorized changes in real-time, without requiring direct interaction with user-facing components like controllers.
FileInfo Extension Methods Overview
The Walter.IO package enriches your application with powerful FileInfo extension methods, designed to enhance file analysis and security measures. Among these, two standout methods provide essential capabilities for detecting potential security threats and ensuring data integrity:
CountPaddingBytesChunked()
This method efficiently calculates the number of padding bytes present at the end of a file. By leveraging chunked reading strategies, it optimizes performance and minimizes memory usage, making it exceptionally well-suited for processing large files. This capability is crucial for analyzing file structures and detecting anomalies that could signify data corruption or tampering.
Key Benefits:
- Performance-Optimized: Tailored for large files with minimal performance impact.
- Security Analysis: Aids in the identification of file tampering or corruption.
ContainsMoreThanOrEqualTo(percentage)
Evaluates whether the padding within a file constitutes a specified percentage (or more) of the file's total size. This method is instrumental in uncovering files that may have been deliberately modified to circumvent malware detection mechanisms through the introduction of excessive padding. Such modifications can alter a file's hash signature, enabling it to evade traditional detection techniques based on known signatures.
Key Benefits:
- Malware Detection: Helps identify files potentially altered to bypass hash-based malware detection.
- Customizable Threshold: Allows specification of the padding percentage threshold for targeted analysis.
Practical Applications
Detecting excessive padding in files is more than just a matter of maintaining data integrity. It's a critical security practice. Malicious actors often manipulate file padding to change hash signatures, thereby evading detection by antivirus programs and intrusion detection systems. By employing the ContainsMoreThanOrEqualTo method, developers and security professionals can pinpoint files with unusual padding patterns, flagging them for further investigation or automated responses.
Example Usage:
Detecting a file with excessive padding could be as straightforward as:
FileInfo suspiciousFile = new FileInfo("path/to/suspect/file.exe");
// Check if the file has padding exceeding 30% of its total size
bool isAltered = suspiciousFile.ContainsMoreThanOrEqualTo(30);
if (isAltered)
{
Console.WriteLine($"File: {suspiciousFile.Name} may have been altered to evade malware detection.");
}
By integrating these FileInfo extensions into your security protocols, you can enhance your application's resilience against sophisticated cyber threats and ensure a higher level of data integrity and reliability.
Comparing File Padding Changes Between Scans
This example demonstrates how to monitor files for changes in padding, which could indicate tampering or unauthorized alterations aimed at evading detection.
using System;
using System.Collections.Generic;
using System.IO;
using Walter.IO;
public class PaddingMonitor
{
private Dictionary<string, long> _lastScanResults = new Dictionary<string, long>();
public void ScanDirectoryForPaddingChanges(string directoryPath)
{
DirectoryInfo directory = new DirectoryInfo(directoryPath);
FileInfo[] files = directory.GetFiles("*.*", SearchOption.AllDirectories);
foreach (var file in files)
{
long currentPadding = file.CountPaddingBytesChunked();
if (_lastScanResults.TryGetValue(file.FullName, out long lastPadding))
{
if (currentPadding != lastPadding)
{
Console.WriteLine($"Padding change detected in {file.Name}. Previous: {lastPadding}, Current: {currentPadding}");
}
}
else
{
Console.WriteLine($"New file detected: {file.Name} with {currentPadding} padding bytes.");
}
// Update the last scan results
_lastScanResults[file.FullName] = currentPadding;
}
}
}
Instantiate PaddingMonitor
and call ScanDirectoryForPaddingChanges periodically or upon specific triggers to check for padding changes in the monitored directory.
File Comparison Extension: FileIsEqualToIgnoringPadding
The FileIsEqualToIgnoringPadding
extension method is an invaluable tool in the Walter.IO
package designed to enhance file integrity checks by comparing the binary content of two files, ignoring any trailing padding. This method is particularly useful for identifying files that have been altered to evade hash-based detection mechanisms by adding or modifying padding.
Use Case
In cybersecurity, verifying the integrity of files is crucial, especially for system-critical executables like powershell.exe
. Malicious actors might duplicate and slightly alter such executables (e.g., by adding padding) to bypass security checks. The FileIsEqualToIgnoringPadding
method enables developers to detect such tampering by comparing the core content of files, excluding padding variations.
Example: Comparing PowerShell Executable
This example demonstrates how to use FileIsEqualToIgnoringPadding
to compare a downloaded file with the system's powershell.exe
, focusing on their content while ignoring padding differences.
using System;
using System.IO;
using Walter.IO;
class Program
{
static void Main(string[] args)
{
FileInfo originalPowerShell = new FileInfo(@"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe");
FileInfo downloadedFile = new FileInfo(@"path\to\downloaded\file.exe"); // Update with the actual file path
// Compare the original PowerShell executable with a downloaded file, ignoring padding
bool areFilesEqual = originalPowerShell.FileIsEqualToIgnoringPadding(downloadedFile);
if (areFilesEqual)
{
Console.WriteLine("The downloaded file is identical to powershell.exe, ignoring padding.");
}
else
{
Console.WriteLine("The downloaded file differs from powershell.exe or does not exist.");
}
}
}
### Yuu can use this method to see if malware is using hash signature changes in order to evaid malware detection signatures
```c#
using Walter.IO;
public static partial class Program
{
public static void Main(string[] args)
{
// Define the path to the folder you want to scan. Here, using the Downloads folder as an example.
string folderPath = Path.Combine(Environment.GetFolderPath(Environment.SpecialFolder.UserProfile), "Downloads");
// Ensure the folder exists
if (!Directory.Exists(folderPath))
{
Console.WriteLine("The specified folder does not exist.");
return;
}
// Create a "poison" file with a specific amount of padding
var poisonFilePath = Path.Combine(folderPath, $"sample_{DateTime.Now:yy-MM-dd-HH-mm-ss-fff}.bin");
long totalFileSizeInBytes = 1024 * 1024; // 1 MB total size
int paddingPercentage = 20; // Target 20% of the file size as padding
FileWithPaddingCreator.CreateFileWithPadding(poisonFilePath, totalFileSizeInBytes, paddingPercentage);
// Get all files in the folder
FileInfo[] files = new DirectoryInfo(folderPath).GetFiles();
Console.WriteLine("Scanning files for significant padding...");
// Use Parallel.ForEach for efficient multi-threaded processing
Parallel.ForEach(files, (file) =>
{
long fileSize = file.Length;
if (fileSize == 0) return; // Skip empty files
// Calculate the padding threshold based on the file size (e.g., 20% of the file size)
// Use the extension method to count padding bytes
long paddingBytesCount = file.CountPaddingBytesChunked();
var padding = file.CountPaddingBytes();
if (padding > 0)
{
decimal percentagePadding = (decimal)padding / file.Length * 100; // Correct percentage calculation
if (paddingBytesCount > 0)
{
Console.WriteLine($"Padding {file.Name} ({file.Age()} age): {padding:N0} bytes of padding ({percentagePadding:N2}%)");
}
}
});
if(File.Exists(poisonFilePath))
{
File.Delete(poisonFilePath);
}
Console.WriteLine("Scanning complete.");
#if !DEBUG
Console.WriteLine("Press any to to exit..");
Console.ReadKey();
#endif
}
}
Product | Versions Compatible and additional computed target framework versions. |
---|---|
.NET | net5.0 was computed. net5.0-windows was computed. net6.0 was computed. net6.0-android was computed. net6.0-ios was computed. net6.0-maccatalyst was computed. net6.0-macos was computed. net6.0-tvos was computed. net6.0-windows was computed. net7.0 was computed. net7.0-android was computed. net7.0-ios was computed. net7.0-maccatalyst was computed. net7.0-macos was computed. net7.0-tvos was computed. net7.0-windows was computed. net8.0 is compatible. net8.0-android was computed. net8.0-browser was computed. net8.0-ios was computed. net8.0-ios18.0 is compatible. net8.0-maccatalyst was computed. net8.0-maccatalyst18.0 is compatible. net8.0-macos was computed. net8.0-macos15.0 is compatible. net8.0-tvos was computed. net8.0-windows was computed. net8.0-windows7.0 is compatible. net9.0 is compatible. net9.0-ios18.0 is compatible. net9.0-maccatalyst18.0 is compatible. net9.0-macos15.0 is compatible. net9.0-windows7.0 is compatible. |
.NET Core | netcoreapp2.0 was computed. netcoreapp2.1 was computed. netcoreapp2.2 was computed. netcoreapp3.0 was computed. netcoreapp3.1 was computed. |
.NET Standard | netstandard2.0 is compatible. netstandard2.1 is compatible. |
.NET Framework | net461 was computed. net462 was computed. net463 was computed. net47 was computed. net471 was computed. net472 was computed. net48 was computed. net481 was computed. |
MonoAndroid | monoandroid was computed. |
MonoMac | monomac was computed. |
MonoTouch | monotouch was computed. |
Tizen | tizen40 was computed. tizen60 was computed. |
Xamarin.iOS | xamarinios was computed. |
Xamarin.Mac | xamarinmac was computed. |
Xamarin.TVOS | xamarintvos was computed. |
Xamarin.WatchOS | xamarinwatchos was computed. |
-
.NETStandard 2.0
- System.Memory (>= 4.6.0)
- System.Text.Json (>= 9.0.0)
- Walter.BOM (>= 2024.12.13.1227)
-
.NETStandard 2.1
- Walter.BOM (>= 2024.12.13.1227)
-
net8.0
- Walter.BOM (>= 2024.12.13.1227)
-
net8.0-ios18.0
- Walter.BOM (>= 2024.12.13.1227)
-
net8.0-maccatalyst18.0
- Walter.BOM (>= 2024.12.13.1227)
-
net8.0-macos15.0
- Walter.BOM (>= 2024.12.13.1227)
-
net8.0-windows7.0
- Walter.BOM (>= 2024.12.13.1227)
-
net9.0
- Walter.BOM (>= 2024.12.13.1227)
-
net9.0-ios18.0
- Walter.BOM (>= 2024.12.13.1227)
-
net9.0-maccatalyst18.0
- Walter.BOM (>= 2024.12.13.1227)
-
net9.0-macos15.0
- Walter.BOM (>= 2024.12.13.1227)
-
net9.0-windows7.0
- Walter.BOM (>= 2024.12.13.1227)
NuGet packages (2)
Showing the top 2 NuGet packages that depend on Walter.IO:
Package | Downloads |
---|---|
Walter.DataTools.MsSql
Package used by Firewall products for interacting with sql server and is used to create and apply updates to database DDL objects This package will be re-factored in the future separating base classes into a new package and have the MSSQL and MySql in their own packages. |
|
Walter.Web.FireWall
Enhance .NET applications with a robust firewall, designed as middleware and IActionFilter, protecting against CVE attacks, web scraping, and phishing. Configurable via annotations and a rule engine services.AddFireWall(FireWallTrial.License, FireWallTrial.DomainKey , domainName: new Uri("https://www.your-domain.com", UriKind.Absolute) , options => { //your options }); Have a look at the GitHub samples at https://github.com/ASP-WAF/FireWall and https://github.com/ASP-WAF/FireWall/wiki to see how to use the firewall in applications. You can view the firewall in action using https://www.asp-waf.com/Firewall You can get started with the firewall using the samples shown in https://www.asp-waf.com/download/ASP-WAF-FireWall-Getting-Started.pdf as well as the on line documentation at https://firewallapi.asp-waf.com/ |
GitHub repositories
This package is not used by any popular GitHub repositories.
Version | Downloads | Last updated |
---|---|---|
2024.12.14.838 | 216 | 12/14/2024 |
2024.12.13.1227 | 194 | 12/13/2024 |
2024.12.9.1107 | 195 | 12/13/2024 |
2024.11.28.1632 | 228 | 11/28/2024 |
2024.11.20.644 | 371 | 11/21/2024 |
2024.11.15.421 | 281 | 11/15/2024 |
2024.11.11.1334 | 205 | 11/14/2024 |
2024.11.6.1222 | 280 | 11/6/2024 |
2024.10.28.1605 | 308 | 10/28/2024 |
2024.10.28.1335 | 312 | 10/28/2024 |
2024.10.19.1525 | 258 | 10/20/2024 |
2024.10.18.1315 | 297 | 10/18/2024 |
2024.9.27.1406 | 285 | 9/27/2024 |
2024.9.17.1417 | 335 | 9/17/2024 |
2024.9.12.1923 | 384 | 9/12/2024 |
2024.9.6.1352 | 384 | 9/7/2024 |
2024.9.1.1159 | 388 | 9/1/2024 |
2024.8.26.1150 | 424 | 8/26/2024 |
2024.8.19.1411 | 427 | 8/19/2024 |
2024.8.17.1000 | 399 | 8/17/2024 |
2024.8.12.1622 | 372 | 8/13/2024 |
2024.8.5.1010 | 293 | 8/5/2024 |
2024.8.1.1545 | 415 | 8/16/2024 |
2024.7.28.629 | 233 | 7/28/2024 |
2024.7.26.1512 | 225 | 7/26/2024 |
2024.7.26.828 | 205 | 7/26/2024 |
2024.7.11.1604 | 363 | 7/11/2024 |
2024.7.9.1520 | 347 | 7/9/2024 |
2024.7.4.1425 | 382 | 7/4/2024 |
2024.7.3.1249 | 360 | 7/3/2024 |
2024.7.2.1536 | 405 | 7/2/2024 |
2024.6.28.953 | 378 | 6/28/2024 |
2024.6.6.1320 | 227 | 6/8/2024 |
2024.5.15.1634 | 183 | 5/15/2024 |
2024.5.14.829 | 108 | 5/14/2024 |
2024.5.8.1005 | 183 | 5/8/2024 |
2024.4.4.2102 | 212 | 4/4/2024 |
2024.3.26.1111 | 130 | 3/26/2024 |
2024.3.19.2310 | 106 | 3/19/2024 |
2024.3.12.1022 | 122 | 3/12/2024 |
2024.3.7.1756 | 124 | 3/7/2024 |
2023.11.13.1117 | 1,481 | 11/13/2023 |
2023.10.26.1502 | 1,344 | 10/29/2023 |
2023.10.12.1926 | 1,474 | 10/12/2023 |
2023.9.14.812 | 1,565 | 9/14/2023 |
2023.9.7.1748 | 1,590 | 9/7/2023 |
2023.9.7.1241 | 1,567 | 9/7/2023 |
2023.9.6.1001 | 1,537 | 9/6/2023 |
2023.9.5.1246 | 1,571 | 9/5/2023 |
2023.9.5.1032 | 1,556 | 9/5/2023 |
2023.8.31.1522 | 1,625 | 8/31/2023 |
2023.8.29.1040 | 1,598 | 8/29/2023 |
2023.8.17.901 | 1,680 | 8/17/2023 |
2023.8.9.1314 | 1,772 | 8/9/2023 |
2023.8.2.750 | 1,824 | 8/2/2023 |
2023.7.12.830 | 1,785 | 7/12/2023 |
2023.7.5.1419 | 1,900 | 7/6/2023 |
2023.6.14.1628 | 1,933 | 6/14/2023 |
2023.6.11.1304 | 2,060 | 6/11/2023 |
2023.5.30.1640 | 2,039 | 5/30/2023 |
2023.5.4.1552 | 2,110 | 5/4/2023 |
2023.5.1.1524 | 2,069 | 5/1/2023 |
2023.4.29.910 | 2,315 | 4/29/2023 |
2023.4.12.1236 | 2,301 | 4/12/2023 |
2023.3.22.1456 | 2,480 | 3/22/2023 |
2023.3.14.1356 | 2,579 | 3/14/2023 |
2023.3.1.810 | 2,609 | 3/1/2023 |
2023.2.25.11857 | 2,615 | 2/25/2023 |
2023.2.22.27 | 2,621 | 2/22/2023 |
2023.2.15.1413 | 2,712 | 2/15/2023 |
2023.2.11.1628 | 2,768 | 2/11/2023 |
2023.1.11.534 | 2,933 | 1/11/2023 |
2022.12.30.711 | 3,006 | 12/30/2022 |
2022.12.16.1536 | 1,068 | 12/16/2022 |
2022.12.15.1241 | 1,034 | 12/16/2022 |
2022.12.15.1108 | 3,186 | 12/15/2022 |
2022.12.14.648 | 3,205 | 12/14/2022 |
2022.11.27.1059 | 3,167 | 11/27/2022 |
2022.11.21.338 | 3,260 | 11/21/2022 |
2022.11.14.1819 | 3,356 | 11/14/2022 |
2022.11.13.917 | 3,365 | 11/13/2022 |
2022.11.7.1632 | 1,038 | 11/13/2022 |
2022.10.31.740 | 6,453 | 11/1/2022 |
2022.10.15.652 | 7,116 | 10/15/2022 |
2022.10.1.810 | 7,502 | 10/1/2022 |
2022.9.26.1444 | 7,575 | 9/26/2022 |
2022.9.14.1508 | 7,692 | 9/14/2022 |
2022.9.14.809 | 7,726 | 9/14/2022 |
2022.9.8.1009 | 7,887 | 9/8/2022 |
2022.8.20.1007 | 7,806 | 8/20/2022 |
2022.8.1.1 | 7,893 | 7/31/2022 |
2022.7.1300 | 8,088 | 7/1/2022 |
2022.7.31.1016 | 7,967 | 7/31/2022 |
2022.7.15.841 | 8,008 | 7/15/2022 |
2022.6.21.647 | 8,003 | 6/21/2022 |
2022.5.18.638 | 8,034 | 5/19/2022 |
2022.5.16.853 | 8,117 | 5/19/2022 |
2022.5.16.816 | 8,080 | 5/16/2022 |
2022.5.4.1010 | 8,004 | 5/4/2022 |
2022.4.10.947 | 8,531 | 4/10/2022 |
2022.4.10.925 | 8,579 | 4/10/2022 |
2022.4.10.828 | 8,426 | 4/10/2022 |
2022.4.1.1545 | 8,665 | 4/1/2022 |
2022.3.31.823 | 7,657 | 3/31/2022 |
2022.3.26.1103 | 8,724 | 3/26/2022 |
2022.3.26.820 | 8,476 | 3/26/2022 |
2022.3.25.840 | 7,771 | 3/26/2022 |
2022.3.24.1701 | 2,188 | 3/25/2022 |
2022.2.16.1131 | 8,839 | 2/17/2022 |
2022.2.16.834 | 8,764 | 2/17/2022 |
2022.2.15.824 | 3,119 | 2/17/2022 |
2022.2.11.1452 | 3,914 | 2/17/2022 |
2022.2.11.931 | 1,732 | 2/17/2022 |
2022.2.5.1114 | 9,065 | 2/5/2022 |
2022.1.17.1158 | 8,745 | 1/17/2022 |
2022.1.10.1505 | 8,922 | 1/10/2022 |
2022.1.10.537 | 8,327 | 1/10/2022 |
2022.1.5.1139 | 7,928 | 1/8/2022 |
2021.12.28.1452 | 8,905 | 12/28/2021 |
2021.12.16.812 | 8,664 | 12/16/2021 |
2021.11.23.1528 | 14,826 | 11/24/2021 |
2021.11.21.925 | 14,271 | 11/22/2021 |
2021.11.19.1503 | 1,456 | 11/22/2021 |
2021.11.19.847 | 9,551 | 11/19/2021 |
2021.11.18.1824 | 9,175 | 11/16/2021 |
2021.11.10.852 | 9,700 | 11/10/2021 |
2021.11.9.2021 | 9,421 | 11/9/2021 |
2021.11.8.2109 | 7,319 | 11/9/2021 |
2021.11.8.1612 | 7,821 | 11/8/2021 |
2021.11.7.1021 | 7,981 | 11/8/2021 |
2021.11.3.1612 | 8,032 | 11/4/2021 |
2021.11.1.1102 | 6,747 | 11/1/2021 |
2021.10.25.1206 | 8,276 | 10/25/2021 |
2021.10.23.1310 | 8,124 | 10/25/2021 |
2021.10.19.1522 | 8,197 | 10/19/2021 |
2021.10.16.1325 | 8,184 | 10/18/2021 |
2021.10.9.1119 | 299 | 10/9/2024 |
2021.10.6.1546 | 8,243 | 10/6/2021 |
2021.10.5.1450 | 8,263 | 10/5/2021 |
2021.10.4.1155 | 8,336 | 10/5/2021 |
2021.10.4.807 | 1,717 | 10/5/2021 |
2021.10.1.753 | 8,346 | 10/1/2021 |
2021.9.27.1005 | 7,736 | 9/28/2021 |
2021.9.26.1913 | 8,468 | 9/26/2021 |
2021.9.19.1015 | 8,338 | 9/19/2021 |
2021.9.17.1702 | 5,177 | 9/17/2021 |
2021.9.17.1449 | 10,860 | 9/17/2021 |
2021.9.13.1600 | 6,423 | 9/13/2021 |
2021.9.12.1100 | 4,943 | 9/13/2021 |
2021.9.11.2004 | 7,662 | 9/11/2021 |
2021.9.9.1110 | 8,144 | 9/9/2021 |
2021.9.7.1901 | 8,298 | 9/8/2021 |
2021.9.7.1121 | 8,393 | 9/7/2021 |
2021.9.7.927 | 1,716 | 9/7/2021 |
2021.9.6.1518 | 7,927 | 9/7/2021 |
2021.9.4.1124 | 8,285 | 9/4/2021 |
2021.9.2.708 | 7,943 | 9/4/2021 |
2021.9.0.1259 | 7,925 | 9/2/2021 |
2021.8.21.1230 | 22,068 | 8/22/2021 |
2021.8.18.1500 | 8,391 | 8/18/2021 |
2021.8.18.930 | 8,317 | 8/18/2021 |
2021.8.14.1600 | 8,296 | 8/16/2021 |
2021.8.14.829 | 4,313 | 8/14/2021 |
2021.8.9.1105 | 8,284 | 8/9/2021 |
2021.8.8.1612 | 8,052 | 8/8/2021 |
2021.8.8.1138 | 7,353 | 8/8/2021 |
2021.8.6.1044 | 8,124 | 8/6/2021 |
2021.8.4.1355 | 8,595 | 8/5/2021 |
2021.7.30.2118 | 8,578 | 7/31/2021 |
2021.7.27.926 | 8,570 | 7/28/2021 |
2021.7.23.931 | 8,710 | 7/26/2021 |
2021.7.22.1456 | 8,170 | 7/23/2021 |
2021.7.15.1547 | 8,308 | 7/15/2021 |
2021.7.13.812 | 8,160 | 7/13/2021 |
2021.7.8.1527 | 8,390 | 7/10/2021 |
2021.7.5.1649 | 7,527 | 7/5/2021 |
2021.6.29.1453 | 8,697 | 6/30/2021 |
2021.6.26.1753 | 8,920 | 6/27/2021 |
2021.6.25.1849 | 8,596 | 6/25/2021 |
2021.6.24.1518 | 8,502 | 6/24/2021 |
2021.6.20.729 | 9,210 | 6/20/2021 |
2021.6.15.2006 | 8,559 | 6/15/2021 |
2021.6.14.2025 | 9,081 | 6/15/2021 |
2021.6.13.2035 | 9,267 | 6/14/2021 |
2021.6.12.1154 | 8,686 | 6/13/2021 |
2021.6.9.1120 | 8,968 | 6/9/2021 |
2021.6.7.2103 | 1,738 | 6/7/2021 |
2021.6.3.1509 | 8,649 | 6/3/2021 |
2021.5.31.1533 | 8,882 | 5/31/2021 |
2021.5.31.1415 | 8,905 | 5/31/2021 |
2021.5.25.1732 | 7,866 | 5/25/2021 |
2021.5.24.1128 | 8,581 | 5/24/2021 |
2021.5.24.1019 | 8,364 | 5/24/2021 |
2021.5.12.1054 | 8,480 | 5/12/2021 |
2021.5.12.637 | 6,746 | 5/12/2021 |
2021.5.10.1442 | 7,872 | 5/11/2021 |
2021.5.8.1226 | 8,303 | 5/8/2021 |
2021.5.6.2037 | 7,342 | 5/6/2021 |
2021.5.5.1901 | 8,562 | 5/6/2021 |
2021.5.3.1621 | 8,622 | 5/4/2021 |
2021.5.1.905 | 8,929 | 5/1/2021 |
2021.4.28.1511 | 8,718 | 4/28/2021 |
2021.4.20.1520 | 9,277 | 4/21/2021 |
2021.4.16.738 | 9,183 | 4/21/2021 |
2021.4.14.1216 | 8,997 | 4/16/2021 |
2021.4.9.1538 | 8,798 | 4/13/2021 |
2021.4.8.947 | 8,834 | 4/13/2021 |
2021.4.6.1235 | 8,835 | 4/6/2021 |
2021.4.5.1653 | 8,601 | 4/5/2021 |
2021.4.1.913 | 8,850 | 4/1/2021 |
2021.3.31.2003 | 8,677 | 4/1/2021 |
2021.3.18.1622 | 9,165 | 3/18/2021 |
2021.3.3.1259 | 7,869 | 3/3/2021 |
2021.3.2.1415 | 8,370 | 3/2/2021 |
2021.3.1.11 | 7,737 | 2/28/2021 |
2021.3.1.1 | 8,127 | 2/27/2021 |
2021.3.1 | 7,792 | 2/27/2021 |
2021.2.23.6 | 7,102 | 2/23/2021 |
2021.2.21.1 | 8,219 | 2/21/2021 |
2021.2.20.1 | 7,851 | 2/20/2021 |
2021.2.19.2 | 7,581 | 2/19/2021 |
2021.2.18.6 | 6,543 | 2/19/2021 |
2021.2.17.1 | 7,621 | 2/17/2021 |
2021.2.16.1 | 8,047 | 2/16/2021 |
2021.2.15.3 | 8,038 | 2/15/2021 |
2021.2.15.1 | 7,955 | 2/14/2021 |
2021.2.14.3 | 7,436 | 2/14/2021 |
2021.2.12.6 | 7,774 | 2/12/2021 |
2021.2.12.2 | 7,933 | 2/12/2021 |
2021.2.11.1 | 6,315 | 2/11/2021 |
2021.2.10.1 | 7,399 | 2/10/2021 |
2021.2.8.1 | 7,853 | 2/9/2021 |
2021.2.7.1 | 14,537 | 2/6/2021 |
2020.12.27.6 | 8,160 | 12/27/2020 |
2020.12.27.1 | 7,531 | 12/27/2020 |
2020.12.26.7 | 7,287 | 12/27/2020 |
2020.12.26.5 | 8,060 | 12/27/2020 |
2020.12.26.3 | 8,061 | 12/27/2020 |
15 November 2024
- Remove support for deprecated framework (6,7) due to the CVE warnings in Microsoft Nuget
packages and no migration options
- Add support for .Net 9
3 March 2024
- Migrate to .net 8 (including AoT)
- Make trimmable
17 November 2023
- Integrate .Net 8
12 October 2023
- Build using SDK-7.0.402 and SDK-6.0.415
- Update Package references
14 September 2023
- SDK 7.0.401/SDK 6.0.414
- Update to new NuGet Packages
12 July 2023
- Update to SDK SP 6.0.412. and 7.0.306
- Update package references
...
23 December 2020
- Initial release