Go To English Version 超过100万源码资源,1000万源码文件免费下载
  • F# for C# Developers ... software components faster and more efficiently. Focusing on F# 3.0 and Microsoft Visual Studio 2012, you’ll learn how to exploit F# features to solve both computationally-complex problems as well as everyday programming tasks. Topics include: C# and F# ...
  • xp提权localprivilege Windows Local Privilege Escalation Vulnerability Exploit
  • ms12-020.exe/windows远程桌面溢出程序/远程蓝屏重启exploit Usage: MS12-020.exe Remote_host_add Example: MS12-020.exe www.test.com MS12-020.exe 192.168.1.1 Source Code Copyright Silic Group Application Copyright Xiaomo.wabzsy
  • metasploit用户指南 ... 和流行的 shellcode,并且不断更新,最新版本的 MSF 包含了 176 种针对当前流行的操作系统和应用软件的 exploit,以及 104 个 shellcode。而做为安全工具,它在安全测试中起到的作用也不容忽视。合理的利用 MSF,将为漏洞自动化探测以至及时修补系统漏洞提供有力的保障。同时作为开发,也大大降低了Exploit 的开发周期和对开发者背景知识的要求。
  • Pro Java 7 NIO.2 ... class java.nio.file.Path. This class is a milestone of NIO.2, and every application that involves I/O operations will exploit the powerful facilities of this class. Practically, it is the most commonly used class of NIO.2, since many I/O operations are ...
  • [Metasploit] Metasploit 开发入门教程 (英文版) ... 's most important to your organization, all using the Metasploit Framework Overview Step-by-step instructions to learn exploit development with Metasploit, along with crucial aspects of client-side exploitation to secure against unauthorized access and ...
  • SQLol下载 SQL注入测试平台 SQLol ... . DO NOT EXPOSE SQLol IN AN UNTRUSTED ENVIRONMENT.*** SQLol is a configurable SQL injection testbed. SQLol allows you to exploit SQL injection flaws, but furthermore allows a large amount of control over the manifestation of the flaw. To better ...
  • Android NDK Beginner's Guide ... and can be combined with C and C++. And second, a Java virtual machine does not always give you enough capability to exploit the full power of mobile devices, even with just-in-time compilation enabled. Resources are limited on these devices and have to ...
  • Expert Oracle Database Architecture 2nd Ed ... : you can treat Oracle as a black box and just stick data into it or you can understand how it works and exploit it as a powerful computing environment. If you choose the latter, then youll find that there are few information management problems that you ...
  • wifi_hack PDF ... Just for reference sake, I am using my Eee PC with an external DVDRom drive to boot it). All you have to do is go to www.remote- exploit.org and download the ISO that fits what you would like to use it on (CD, DVD, or USB/SD). Once you do that, you will ...