Go To English Version 超过100万源码资源,1000万源码文件免费下载
  • BurpUnlimited.zip Burp Suite是一个免费的网站测试工具。 它包括proxy、spider、intruder、repeater四项功能。该程序使用Java写成,需要 JRE 1.4 以上版本
  • BurpSuite_pro_v2.1 BurpSuite是一款信息安全从业人员必备的集成型的测试神器,它采用自动测试和半自动测试的方式,包含了Proxy,Spider,Scanner,Intruder,Repeater,Sequencer,Decoder,Comparer等工具模块。通过拦截HTTP/HTTPS的web数据包,充当浏览器和相关应用程序的中间人,进行拦截、修改、重放数据包进行测试,是web安全人员的一把必备的工具。
  • 商品注入签名:商品注入签名,恶意输入,XSS,HTTP标头注入,XXE,RCE,Javascript,XSLT ... 互联网上删除,这并不是您应该使用的所有的抄袭。 建议使用: -Include with Burp Intruder or Custom Scripts -Manual Injection Testing with Well-Known Signatures -Automated Fuzzing with a Wide-Range with Malicious Inputs 如果 ...
  • Formalizing provable anonymity in Isabelle/HOL. ... observational equivalence on traces observed by the<br>intruder. Our theory differs from its original proposal and essentially boils ... distinguishing messages with respect to a knowledge set for the intruder. We build our theory in Isabelle/HOL<br& ...
  • reCAPTCHA:reCAPTCHA =识别CAPTCHA:一种Burp Suite扩展程序,可识别CAPTCHA并用于入侵者... ... 请用正确的值替换%s,特别注意typeid值的设置( username=%s&password=%s&typeid=%s 在Intruder中使用: 有2种情况:用户名或密码之一+验证码;用户名+密码+验证码;完成了配置并
  • BurpSuiteAutoCompletion:此扩展启用BurpSuite RepeaterIntruder选项卡中的自动补全... BurpSuiteAutoCompletion 此扩展启用BurpSuite Repeater / Intruder选项卡中的自动补全功能。 根据此推文的请求创建: : 该扩展支持BurpSuite Repeater和Intruder选项卡中的自动补全功能,主要用于标 ... 附的jar)加载到Burp中 在新的* Repeater / Intruder选项卡中,开始输入标题名称 该扩展程序将 ... 为您插入 *我之所以说是新的,是因为如果Reapter / Intruder选项卡已经存在,则无法将其挂接。 ...
  • segp2 ... , SA, Australia. If you are able to access this repository without prior authorization, you are automatically be declared as an intruder and a severe risk to the project. You will be prosecuted by law. Please leave and remove this repository as soon as ...
  • segp2 ... , SA, Australia. If you are able to access this repository without prior authorization, you are automatically be declared as an intruder and a severe risk to the project. You will be prosecuted by law. Please leave and remove this repository as soon as ...
  • mfisk.github.com ... 2010, we embarked on a multi-year interdisciplinary research project to build AI to detect when cyber insiders (an outside intruder or a rogue insider) are active within a network. Our approach models normal behaviors from multiple data sources inside a ...
  • labolatory-scheduling-management-system ... of repair and maintenance. It is a simplified way of controlling usage and monitoring access of authorized and all intruder’s that might attempt to use the laboratory. INSTALLATION ------------ Please make sure the release file is unpacked under a Web ...