- Process detection
- IPC/Socket-based RPC detection
- Websocket-based RPC detection
INVITE_BROWSER
support- Adding new processes on the fly
- Manually triggering scans
- Download a binary from releases, GitHub Actions or build it yourself below!
- If you just want to use the default detectable list, just run the binary!
- If you want to use your own detectable list, place a
detectable.json
file in the same directory as the binary (you can use the arRPC one as an example), then run the binary with./rsrpc-cli -d ./detectable.json
- Clone the repository
cargo build -p rsrpc-cli --release
- Your file will be in
target/release/
- Add the following to your
Cargo.toml
file:
[dependencies]
rsrpc = { git = "https://www.github.com/SpikeHD/rsRPC", tag = "VERSION_NUMBER_HERE" }
- Use the library in your code:
use rsrpc::{RPCServer, RPCConfig};
fn main() {
let mut server = RPCServer::from_file("./detectable.json", RPCConfig::default());
server.start();
}
You can also grab the detectable.json
programmatically and pass it via string:
use rsrpc::{RPCServer, RPCConfig};
fn main() {
let detectable = reqwest::blocking::get("https://raw.githubusercontent.com/OpenAsar/arrpc/main/src/process/detectable.json")?.text()?;
let mut server = RPCServer::from_json_str(detectable, RPCConfig::default());
server.start();
}