mirror of
https://github.com/BigBodyCobain/Shadowbroker.git
synced 2026-04-23 11:06:07 +02:00
668ce16dc7
Gate messages now propagate via the Infonet hashchain as encrypted blobs — every node syncs them through normal chain sync while only Gate members with MLS keys can decrypt. Added mesh reputation system, peer push workers, voluntary Wormhole opt-in for node participation, fork recovery, killwormhole scripts, obfuscated terminology, and hardened the self-updater to protect encryption keys and chain state during updates. New features: Shodan search, train tracking, Sentinel Hub imagery, 8 new intelligence layers, CCTV expansion to 11,000+ cameras across 6 countries, Mesh Terminal CLI, prediction markets, desktop-shell scaffold, and comprehensive mesh test suite (215 frontend + backend tests passing). Community contributors: @wa1id, @AlborzNazari, @adust09, @Xpirix, @imqdcr, @csysp, @suranyami, @chr0n1x, @johan-martensson, @singularfailure, @smithbh, @OrfeoTerkuci, @deuza, @tm-const, @Elhard1, @ttulttul
45 lines
1.4 KiB
Batchfile
45 lines
1.4 KiB
Batchfile
@echo off
|
|
setlocal
|
|
echo ==========================================
|
|
echo SHADOWBROKER - Kill Wormhole Process
|
|
echo ==========================================
|
|
echo.
|
|
|
|
REM 1. Try graceful API shutdown via the backend
|
|
echo [*] Attempting graceful shutdown via API...
|
|
curl -s -X POST http://127.0.0.1:8000/api/wormhole/leave >nul 2>&1
|
|
if %errorlevel%==0 (
|
|
echo [+] API leave request sent.
|
|
) else (
|
|
echo [-] Backend not reachable, skipping API call.
|
|
)
|
|
|
|
REM 2. Kill any process listening on port 8787 (Wormhole server)
|
|
echo [*] Checking port 8787 for Wormhole process...
|
|
for /f "tokens=5" %%a in ('netstat -aon ^| findstr ":8787 " ^| findstr "LISTENING"') do (
|
|
echo [*] Found PID %%a on port 8787, killing...
|
|
taskkill /F /PID %%a >nul 2>&1
|
|
if %errorlevel%==0 (
|
|
echo [+] Killed PID %%a
|
|
) else (
|
|
echo [-] Could not kill PID %%a
|
|
)
|
|
)
|
|
|
|
REM 3. Kill any python process running wormhole_server.py
|
|
echo [*] Searching for wormhole_server.py processes...
|
|
for /f "tokens=2" %%a in ('wmic process where "commandline like '%%wormhole_server.py%%'" get processid /value 2^>nul ^| findstr "="') do (
|
|
set PID=%%a
|
|
set PID=!PID:ProcessId=!
|
|
set PID=!PID:~1!
|
|
if defined PID (
|
|
echo [*] Killing wormhole_server.py PID !PID!
|
|
taskkill /F /PID !PID! >nul 2>&1
|
|
)
|
|
)
|
|
|
|
echo.
|
|
echo [+] Wormhole cleanup complete.
|
|
echo If processes persist, check Task Manager for python.exe on port 8787.
|
|
pause
|