Go To English Version 超过100万源码资源,1000万源码文件免费下载
  • WinEdt 7.0 Build 20120321 一键注册器 ... multi-lingual setups, and dictionaries (word-lists) are available for many languages. As an editor, WinEdt allows you to exploit its intuitive (customizable) predefined interface and graphic controls. However, if you are not too keen on the mouse ...
  • Exploit 编写系列教程--堆喷射技术揭秘 英文文档翻译而来,详细描述了堆喷射技术的原理与应用,附带几个实例。
  • Metasploit Toolkit for Penetration Testing Metasploit Toolkit for Penetration Testing, Exploit Development, & Vulnerability Research
  • Head First Design Patterns ... . In other words, in real world applications. You also want to learn how patterns are used in the Java API, and how to exploit Java's built-in pattern support in your own code. You want to learn the real OO design principles and why everything your boss ...
  • 中文版Metasploit 渗透测试指南 渗透测试 metasploit 工具的使用详解,最详尽的电子书 metasploit 集成了当前广泛的操作系统与应用程序,浏览器的漏洞利用exploit, 并且提供开发人员加入第三方模块与发布溢出程序的框架。
  • RPC DCOM堆栈溢出实验 ... :\ ◆ 本地计算机 ◇ 操作系统:Windows 2000主机 ◇ 软件:DCOM RPC Exploit - GUI v2。 [实验内容] ◆ 利用RPC DCOM堆栈缓冲区溢出漏洞,对 ...
  • exploiting software hacking ... capabilities. These features, however, may also be used to exploit critical network devices, network traffic traversing these devices ... Guide Jason Nehbross will show you how to exploit critical network devices, network traffic traversing these devices ...
  • A Hybrid Strategy for Caching Web Search Engine Results This work discusses the design and implementation of an efficient caching system aimed to exploit the locality present in the queries submitted to a Web Search Engine (WSE). We enhance previous proposals in several directions. First we propose the ...
  • android root提权原理 android 利用exploit root提权原理
  • Metasploit渗透测试指南 ... 渗透攻击阶段 1.1.7 报告阶段 1.2 渗透测试类型 1.2.1 白盒测试 1.2.2 黑盒测试 1.3 漏洞扫描器 1.4 小结 第2章 Metasploit基础 2.1 专业术语 2.1.1 渗透攻击(Exploit) 2.1.2 攻击载荷(Payload) 2.1.3 Shellcode 2.1.4 模块(Module) 2.1.5 监听器(Listener) 2.2 Metasploit用户接口 2.2.1 MSF终端 2.2.2 MSF命令行 2.2.3 ...