-
-
K8飞刀20140725 EXP管理功能 不会编程也能快速"开发"exp工具包
...
[+] 支持常规WebShell管理 (2013.5.4)
[+] 支持Xss的Cookies管理 (2013.5.5)
K8-006 Exploit管理
===============================================================================================================
(全新独创的Web Exp管理功能 动态添加编辑EXP 不需会编程就可参与“开发” 快速 ...
-
PenetrationTesting_ONLINE
网络攻防技术:
About This Book .
Part I: The Basics .
Part II: Assessments
Part III: Attacks
Part IV: Exploit Development .
Part V: Mobile Hacking
-
x86 Assembly Language Reference Manual
... in linking format.
In the program development process, the assembler is a tool to use in producing
program modules intended to exploit features of the Intel
®
architecture in ways that
cannot be easily done using high level languages and their compilers.
...
-
CUDA Programming pdf
... competent with CUDA, we’ll cover more advanced topics,
taking you from a parallel unaware programmer to one who can exploit the full potential of CUDA.
For programmers already familiar with parallel programming concepts and CUDA, we’ll be
discussing in ...
-
master kali
... or insider. Unlike a vulnerability assessment,
penetration testing is designed to include the exploitation phase. Therefore, it proves that the exploit is present, and that it is accompanied by the very real risk of being compromised if not acted upon.
-
SuperOneClickv2.3.3-ShortFuse.zip
v9e root 工具
中兴V9e获取永久Root权限方法,已成功ROOT!
1、下载SuperOneClickv2.3.3-ShortFuse到电脑。
2、手机关机后取出SIM卡及存储卡(我是取出后操作成功的,不取是否也能成功没试过)。
3、开机后用USB线将手机连接上电脑,并安装好驱动程序。
4、打开SuperOneClick程序,最右上角Exploit处选择为psneuter,然后点击Root按钮,中间的弹出对话框一路确认即可。
-
nc和telnet工具
... 命令""等等命令功能更强大......)。
6)作攻击程序用,例子:
格式1:type.exe c:\exploit.txt|nc -nvv 192.168.x.x 80
格式2:nc -nvv 192.168.x.x 80 c:\log.txt
讲解: ...
-
PHOTOGRAPHIC LIGHTING.pdf
...
“graphien” (to draw, i.e., “to draw with light”). A well-developed
knowledge of how lighting works and how best to exploit it ac-
Don Blair was masterful at finding and exploiting great light. Here he
utilized a stand of trees to block the overhead light ...
-
Practical Reverse Engineering Using x86 x64 ARM
... and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical ...
-
Professional.Android.Sensor.Programming
... with device sensorsThis book shows Android developers how to exploit the rich set of device sensors—locational, physical ( ... for your own applications.Shows experienced Android developers how to exploit the rich set of Android smartphone sensors to build ...
-