Transform how you work with Apache Parquet files. One double-click replaces dozens of command lines. Now available on macOS, Windows & Linux.
Every data professional knows the struggle. You receive a Parquet file, and suddenly you're writing Python scripts just to peek inside.
Double-click a Parquet file and watch your OS shrug. No preview, no Quick Look, no native support whatsoever.
Fire up Jupyter, import pandas, write df.head()... just to see the first few rows. Every. Single. Time.
Minutes turn to hours when you're constantly context-switching between data exploration and actual analysis.
When basic queries require code, you miss opportunities. Quick questions remain unanswered.
I built this app because I was tired of the friction. Now, exploring Parquet files feels as natural as browsing photos.
Open Parquet files instantly — no scripts, no notebooks, no waiting. Your data is just a double-click away.
Write queries directly in the app. Filter, aggregate, and explore — all powered by DuckDB under the hood.
Get instant insights: min, max, null counts, unique values, and more. Right-click any column for detailed stats.
Your files stay on your device. No uploads, no tracking, no surprises — just private, local analysis.
I built Parquet Reader because I needed it myself. Every feature comes from real frustration with existing tools. If you work with Parquet files daily, this app will change your workflow.
: Affects versions 5.3.2.375 and 5.3.2.410 (build 2132). This vulnerability allows remote attackers to read arbitrary files by using an encoded "dot dot slash" ( ..%2F ) in the URI. This can lead to the theft of sensitive configuration files or even user credentials.
After applying updates or changing your configuration, you can use the Shodan On-Demand Scanning tool to request a fresh crawl of your IP address. This helps confirm that your device is no longer reporting vulnerable headers or allowing anonymous access to your live feed.
The most significant threat to unpatched webcamXP 5 users is a long-standing directory traversal flaw. webcamxp 5 shodan search patched
: Modern Shodan queries can even filter for specific vulnerabilities using facets like vuln:CVE-2008-5862 , which identifies servers running versions susceptible to directory traversal. Critical Vulnerabilities in webcamXP 5
: Many Shodan-indexed webcams remain accessible because users never changed the default login. According to security researchers at HEXpert , the default for webcamXP is often admin with a blank password. How to Patch and Secure webcamXP 5 : Affects versions 5
: A simple search for webcamxp 5 or Server: webcamXP 5 currently reveals hundreds of active hosts, many of which are unintentionally exposed to the public.
If you are still using webcamXP 5, follow these steps to ensure your system is patched and hidden from Shodan. After applying updates or changing your configuration, you
: Check your build number. If you are on a build older than 2132, you are highly vulnerable to file disclosure.
This is a passion project built for the data community. Your support and feedback drive its evolution.
Love Parquet Reader? Help others discover it too! Share it on your favorite platform and support the data community.
Have a feature request or found a bug? I'm all ears. Your feedback shapes the future of Parquet Reader.
Request a Feature