Go To English Version 超过100万源码资源,1000万源码文件免费下载
  • Nc.exe 网络军刀 ... quot;等等命令功能更强大......)。 高级用法: 6)作攻击程序用,例子: 格式1:type.exe c:\exploit.txt|nc -nvv 192.168.x.x 80 格式2:nc-nvv192.168.x.x80讲解:连接到192.168.x.x的 ... 'c:\ex ploit.txt'的内容(两种格式确有相同的效果, 真是有异曲同工之妙:P) 附:'c:\exploit.txt'为shellcode等 7)作蜜罐用[1],例子: 格式:nc -L -p 80 讲解:使用'-L'(注意 ...
  • WPF 4 Unleashed ... -class custom controls for WPF * Demonstrates how to create hybrid WPF software that leverages Windows Forms, DirectX, ActiveX, or other non-WPF technologies * Explains how to exploit new Windows 7 features, such as Jump Lists and taskbar customizations
  • Struts2 K8 exploit tool struts2 K8利用工具,多种版本利用,可以上传文件,执行命令等等~~
  • BeagleBone.Black.Cookbook.1783982926 ... , debugging, and working with software source files, eventually working with the Linux kernel. Subsequently, you will learn how to exploit the board's real-time functions. We will then discover exciting methods for using sound and video with the system ...
  • Swift Recipes ... via the iOS Boot Camp in New York City, online courses, and in private settings. He brings his expertise to offer you the ability to use and exploit Swift to get the most out of all your projects for your app creations, whether you use iOS or Mac OS X.
  • Swift Recipes: A Problem-Solution Approach pdf ... via the iOS Boot Camp in New York City, online courses, and in private settings. He brings his expertise to offer you the ability to use and exploit Swift to get the most out of all your projects for your app creations, whether you use iOS or Mac OS X.
  • pvefindaddr Immunity Debugger下的python插件,内含了三个版本,这个工具虽然比较老,但对于新手来说绝对能加快exploit的速度。此工具出自于看雪,另外关于此工具的使用可以参考仙果的 【翻译】使用!pvefindaddr 更容易的开发漏洞利用一文,可以在看雪上找得到。
  • OpenMPI User Manual ... array of independent, distributed memory, distributed processor machines. This framework allows for the creation of programs that can exploit this assumed structure, and it allows for the creation and execution of multiple processes that can be thought of ...
  • Web Penetration Testing with Kali Linux(PACKT,2ed,2015) ... relate to web application hacking. Then, you will gain a deep understanding of SQL and command injection flaws and ways to exploit the flaws. Moving on, you will get to know more about scripting and input validation flaws, AJAX, and the security issues ...
  • Big.Data.MBA.Driving.Business.Strategies.with.Data.Science.11191... ... , this book helps identify where and how big data can help you transform your business. You'll learn how to exploit new sources of customer, product, and operational data, coupled with advanced analytics and data science, to optimize key processes, ...