Creating a Large Text File Viewer by Vibe Coding with Visual Studio Code, Cline, OpenRouter, and Claude 3.7
作者为了解决打开和搜索超大文本文件的问题,开发了一款名为xdump64的工具,并结合Visual Studio Code等技术实现文件查看与搜索功能。尽管尝试添加高亮显示功能未果,但该工具成功处理了26GB的游戏数据文件。 2025-4-9 16:46:0 Author: taosecurity.blogspot.com(查看原文) 阅读量:2 收藏

Creating a Large Text File Viewer by Vibe Coding with Visual Studio Code, Cline, OpenRouter, and Claude 3.7

The problem I was trying to solve this time was opening and searching extremely large text files.

I used to use the old Mandiant Highlighter program for this, but it was last updated in 2011 and couldn't handle the 26 GB text file I wanted to open.

If you're wondering what that file is, it's a dump of the contents of the main Starfield.esm file from the Bethesda Game Studios game called Starfield. I use the xdump64 program bundled with xEdit.

You can try this program for yourself if you like. It's a stand-alone Windows C# .NET 9 application that runs on Windows 10 and 11. 

Like my last program, all I did was work with the model for about 3 hours to get it to where it is now.

I tried for an hour or so to implement a "highlight all search matches" function but could not get that to work. 

The screen capture cuts of the right side of the page where the search and match feature lives.


Windows will probably complain because it is not signed. 

As with my last program, I have no idea of code quality or vulnerabilities. This was a fun exercise to see if I could create a program that would address a problem I was working.

Popular posts from this blog

MITRE ATT&CK Tactics Are Not Tactics

Image

Just what are "tactics"? Introduction MITRE ATT&CK  is a great resource, but something about it has bothered me since I first heard about it several years ago. It's a minor point, but I wanted to document it in case it confuses anyone else. The MITRE ATT&CK Design and Philosophy document from March 2020 says the following: At a high-level, ATT&CK is a behavioral model that consists of the following core components: • Tactics, denoting short-term, tactical adversary goals during an attack; • Techniques, describing the means by which adversaries achieve tactical goals; • Sub-techniques, describing more specific means by which adversaries achieve tactical goals at a lower level than techniques; and • Documented adversary usage of techniques, their procedures, and other metadata. My concern is with MITRE's definition of "tactics" as "short-term, tactical adversary goals during an attack," which is oddly recursive. The key word in the tacti...

Zeek in Action Videos

Image

This is a quick note to point blog readers to my Zeek in Action YouTube video series for the Zeek network security monitoring project .  Each video addresses a topic that I think might be of interest to people trying to understand their network using Zeek and adjacent tools and approaches, like Suricata, Wireshark, and so on.  I am especially pleased with Video 6 on monitoring wireless networks . It took me several weeks to research material for this video. I had to buy new hardware and experiment with a Linux distro that I had not used before -- Parrot .  Please like and subscribe, and let me know if there is a topic you think might make a good video.

New Book! The Best of TaoSecurity Blog, Volume 4

Image

  I've completed the TaoSecurity Blog book series . The new book is  The Best of TaoSecurity Blog, Volume 4: Beyond the Blog with Articles, Testimony, and Scholarship .  It's available now for Kindle , and I'm working on the print edition.  I'm running a 50% off promo on Volumes 1-3 on Kindle through midnight 20 April. Take advantage before the prices go back up. I described the new title thus: Go beyond TaoSecurity Blog with this new volume from author Richard Bejtlich. In the first three volumes of the series, Mr. Bejtlich selected and republished the very best entries from 18 years of writing and over 18 million blog views, along with commentaries and additional material.  In this title, Mr. Bejtlich collects material that has not been published elsewhere, including articles that are no longer available or are stored in assorted digital or physical archives. Volume 4 offers early white papers that Mr. Bejtlich wrote as a network defender, either for technica...


文章来源: https://taosecurity.blogspot.com/2025/04/creating-large-text-file-viewer-by-vibe.html
如有侵权请联系:admin#unsafe.sh