-
-
K8 Struts2 Exploit(S2-020 CVE-2014-0094)漏洞利用工具(没有s020)
解压密码:k8team(没有s020)
[+] S2-020 CVE-2014-0094 支持GetShell (这洞特殊,EXP集成在飞刀)
[+] S2-019 CVE-2013-4316 支持GetShell/获取物理路径/执行CMD命令
[+] S2-016 CVE-2013-2251 支持GetShell/获取物理路径/执行CMD命令
[+] S2-013 CVE-2013-1966 支持GetShell/获取物理路径/执行CMD命令
[+] S2-009 ...
-
Gray.Hat.Hacking.The.Ethical.Hackers.Handbook.4th.Edition
... switches, and network hardware
Use advanced reverse engineering to exploit Windows and Linux software
Bypass Windows Access Control and ... 7 Writing Linux Shellcode
Part II From Vulnerability to Exploit
Chapter 8 Spoofing-Based Attacks
Chapter 9 Exploiting ...
-
Python_Programming_for_Hackers_and_Pentesters
... tools include all manner
of fuzzers, proxies, and even the occasional exploit.
Exploit frameworks like CANVAS are written in Python
as are ... obscure tools like PyEmu or Sulley.
Just about every fuzzer or exploit I have written has been in Python.
In fact, ...
-
Beginning Game Development with Python and Pygame
... expert Will McGugan, who worked on the MotorStorm game for PlayStation 3, you’ll be privy to insights that will not only help you to exploit Pygame to its maximum potential, but also make you a more creative and knowledgeable games developer all round.
-
Programming.Google.App.Engine.with.Java
... development machine directly from Eclipse
Structure your app into individually addressable modules, each with its own scaling configuration
Exploit the power of the scalable Cloud Datastore, using queries, transactions, and data modeling with JPA
Use ...
-
Swift.Recipes.A.Problem-Solution.Approach
... iOS Boot Camp in New York City, online courses, and in private settings. He brings his expertise to offer you the ability to use and exploit Swift to get the most out of all your projects for your app creations, whether you use iOS or Mac OS X.
What you ...
-
NC(源码).rar
... 功能更强大......)。
===========================================================================================
高级用法:
6)作攻击程序用,例子:
格式1:type.exe c:exploit.txt|nc -nvv 192.168.x.x 80
格式2:nc -nvv 192.168.x.x 80 c:log.txt
讲解 ...
-
Python Web Penetration Testing Cookbook(PACKT,2015)
... to collect both open and hidden information from websites to further your attacks, identify vulnerabilities, perform SQL Injections, exploit cookies, and enumerate poorly configured systems. You will also discover how to crack encryption, create payloads ...
-
Apache.Maven.Cookbook.1785286129
... , the book walks you through setting up and using Maven with popular Java Integrated Development Environments (IDEs) so you can exploit Maven features to build standard Java applications. Above all, you will also learn to create site reports and ...
-
Algorithms in C++, Parts 1-4(英文版)Robert Sedgewick著
... algorithms for sorting, searching, and related applications. Although the substance of the book applies to programming in any language, the implementations by Van Wyk and Sedgewick also exploit the natural match between C classes and ADT implementations.
-