Go To English Version 超过100万源码资源,1000万源码文件免费下载
  • Web Animation using Javascript: Develop & Design ... input (just like motion behaves in the real world), how to exploit CSS transforms to create rich depth in animations, and how to ... input (just like motion behaves in the real world), how to exploit CSS transforms to create rich depth in animations, and how ...
  • WEB渗透测试数据库 ... 轻量级的易扩展的工具,可以快速编写exploit、添加漏洞验证/扫描规则、添加指纹 ... 常用的资源文件,包括各种爆破字典、exploit、webshell、攻击payload等 2 安装 从 ... .5~3.4 session对象注入漏洞exploit" pen.py exploit --detail "Joomla 1.5~3.4 ... http://127.0.0.1:1234 --attack pen.py exploit -s appName:joomla -u http://127.0.0.1 ...
  • Algorithms in C++, Parts 1-4 ... . Although the substance of the book applies to programming in any language, the implementations by Van Wyk and Sedgewick also exploit the natural match between C++ classes and ADT implementations. Highlights * Expanded coverage of arrays, linked lists, ...
  • The.Car.Hackers.Handbook.2016.3.pdf ... you how to: Build an accurate threat model for your vehicle Reverse engineer the CAN bus to fake engine signals Exploit vulnerabilities in diagnostic and data-logging systems Hack the ECU and other firmware and embedded systems Feed exploits through ...
  • Analyzing Data with Power BI and Power Pivot for Excel ... durations • Learn what data model you need to answer your specific business questions About This Book • For Excel and Power BI users who want to exploit the full power of their favorite tools • For BI professionals seeking new ideas for modeling data
  • Kali Linux Intrusion and Exploitation Cookbook ... -step recipes to detect a wide array of vulnerabilities, exploit them to analyze their consequences, and identify security ... the skills to prevent infrastructure and application vulnerabilities Exploit vulnerabilities that require a complex setup with the ...
  • Modern X86 Assembly Language Programming ... image processing, computer graphics, mathematics, and statistics, How to use various coding strategies and techniques to optimally exploit the x86’s microarchitecture for maximum possible performance, Who this book is for, The target audience for Modern ...
  • metasploit入门用法 metasploit中exploit模块的使用流程
  • Exploit 编写系列教程(共10篇) 经过众兄弟十个多月来的努力,终于将此专题翻译完成。其实本专题是否已经结束,我也曾就此问过作者,但他也不确实;另外又问了他是否会写关于堆溢出的文章,他说堆溢出相对复杂多了,目前不会写,但以后可能会。 纵观此系列教程,文中已经揽括当前大部分栈溢出利用技术,并针对各种windows安全机制讲述了各种绕过方式,是本人目前见过关于栈溢出方面最为完整,最为全面的教程,很佩服作者的这种共享精神,这也正是国内所缺乏的。随着明年《0day安全:软件漏洞分析技术》第2版的出版,也就渐渐地弥补了当前国内关于深入 ...
  • Metasploit Bootcamp ... . He is a voracious public speaker and talks about improving IT security, insider threats, social engineering, wireless forensics, and exploit writing. He is the author of numerous IT security articles with modern security magazines such as Eforensics, ...