Download all Images
-
oh-artem last edited by
Топчик. работает, грузит всё как по отдельности, так и архивом все изображения с сайта - jpg, png, gif, ai, webd преобразует сразу!
-
Kamamasa last edited by
It is very nice exetentions,but I think if the UI became more easy to use ,more user download this extention.
someone says it is trojans,but there no trojans I think.(I'm japanese and I'm not good at english, so sry for making some mistakes.)
-
jagajaga last edited by leocg
Do Not install, it's a Malware which tries to download trojans from infected websites!!
-
cratte last edited by leocg
Addon Download all Images is Malware !!
Warning!!!Avast Antivirus Warnings:
URL:Scam :
ausoafab.net
URL:Blacklist :
avtub.click
flashx.tv
affiliates1128.com
traffic.tc-clicks.com
servicegetbook.net
see-work.info
URL:Phishing
signup-page.com
mobpushup.com
padsdel.com
ethfw0370q.com
clickandjoinyourgirl.com
adtrack123.pl
shrugartisticelder.com
click2cvs.com
residenceseeingstanding.com -
tnowak Opera last edited by
@cratte Because it didn't happen to me after setting "Level = 0" (in the top right corner of the dialog) and running the extension on some trusted websites.
Default value of "Level = 1" means that resources from linked websites are accessed, and (for me) it always triggers warnings about tracking domains.
-
albertop last edited by albertop
Sites that hide image links inside an svg put inside an external document loaded into an object tag!
Re: Download all Images
Very good extension. always ok on simple sites.Sadly, there are some sites like this:
https://dokumen.tips/that hides the jpg link in a very obscure way:
sample page:
URL: https://dokumen.tips/documents/topolino-libretto-n-1.html?page=1Code extract ("(user)" comments are mine):
<!-- (user) this div contains a single page with an image inside it, protected from download --> <div id="p1" style="overflow: hidden; position: absolute; background-color: white; width: 535px; height: 765px; margin: 0px;" class="page-inner"> <!-- Begin page background --> <!-- (user) this div is a transparent overlay used to intercept clicks --> <div id="pg1Overlay" style="width: 100%; height: 100%; position: absolute; z-index: 1; background-color: rgba(0, 0, 0, 0); user-select: initial;"></div> <!-- (user) this div is the image indirect container --> <div id="pg1" style="user-select: initial;"> <!-- (user) object is used to defeat the finding of links, and contains a document that contains in turn an svg --> <object width="535" height="765" data="https://reader034.dokumen.tips/reader034/viewer/2022052117/568c2c261a28abd8328c8539/html5/1/1.svg" type="image/svg+xml" id="pdf1" style="width:535px; height:765px; -moz-transform:scale(1); z-index: 0;"> #document <!DOCTYPE svg PUBLIC....> <!-- (user) the svg contains in turn an Image tag with the link (xlink type) to the true image loaded --> <svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" viewBox="0 0 535 765" version="1.1"> <image preserveAspectRatio="none" x="0" y="0" width="535" height="765" xlink:href="img/1.jpg"/> </svg> </object> </div> <!-- End page background --> </div>
To handle those pages, the developer of the extension should IMHO:
- follow also the OBJECT links as they were external links (aka, load the inner DOCUMENT);
- look also inside SVG tags (process them);
- interpret "xlink" type links that are put inside Image tags that are inside svg, as they were normal image links.
-
albertop last edited by albertop
@albertop
Github Issue is https://github.com/belaviyo/save-images/issues/76 .
Update: developer seems to have solver issue!
GitHub commit: https://github.com/belaviyo/save-images/commit/6faf7ddc03ce777c27646983b56fb2dceb69ffe7
I will test it soon -
AdWoGl last edited by leocg
Norton reported: Blocked threats
We have blocked the attack undertaken by Malicious Site Malicious
Domain Request 22. no other actions need to be performed.
actions.
note this is during downloading from legit site with architectural photography