WDNMD-sudo 2020-04-01 21:57:27
Description: This is an important learning guide for layer 2 switching network in network construction, which has a good reference value for CCIE R & S preparation
Plat: Others | Size: 18175KB | Downloads: 0
kube-call 2020-03-30 18:32:20
Description: Chrome free Science Internet plug-in
Plat: JavaScript | Size: 101KB | Downloads: 0
简一涵涵 2020-03-30 09:17:21
Description: The malicious code scans the Windows machine with the 445 file sharing port open. No user action is required. As long as the computer is turned on, the criminals can implant malicious programs such as ransomware, remote control Trojans, and virtual currency miners in the computer and server.
Plat: C/C++ | Size: 3400KB | Downloads: 0
dwm2 2020-03-21 11:54:10
Description: jphs Jphs steganography tool A program that can hide JPEG image information
Plat: WINDOWS | Size: 179KB | Downloads: 2
任我下 2020-03-19 15:02:25
Description: Computer network experiment: a simple proxy server implemented in C + + language
Plat: C/C++ | Size: 4KB | Downloads: 0
sdfdssdcvxewq 2020-03-16 12:57:11
Description: Code auditing is not only an important step of enterprise security operation, but also a necessary basic skill for security practitioners.Code Auditing: Enterprise Web Code Security Architecture details the design ideas, tools and methods needed for code auditing, not only introduces practical methods with a large number of cases, but also analyzes the causes of various code security problems and prevention programs.Both application developers and security technicians benefit from this book.
Plat: PHP | Size: 25645KB | Downloads: 0
hook123 2020-03-15 11:13:45
Description: When using, the mysql5 inj point box is the URL you want to inject. The URL should be the point of injection vulnerability. To connect with union, just like the default value
Plat: C/C++ | Size: 272KB | Downloads: 0
jjjsdqw 2020-03-12 09:01:03
Description: More convenient learning architecture, Chinese translation, only for individual self-study, less content but suitable for summary
Plat: Java | Size: 452KB | Downloads: 0
蚌埠三院 2020-03-11 11:18:30
Description: attack and defense of wireless network hackers
Plat: PHP | Size: 37KB | Downloads: 0
胡小咩 2020-03-04 23:37:50
Description: System / network security penetration test framework, network attack and defense
Plat: LINUX | Size: 26618KB | Downloads: 0
jp253 2020-03-01 14:20:37
Description: kcptun-openwrt-ar71xx-20170221.tar
Plat: Python | Size: 2380KB | Downloads: 0
葛露70q5T7 2020-02-27 21:55:49
Description: A previous HTML practice, mainly learning interaction and layout processing.
Plat: R language | Size: 4KB | Downloads: 0
yecy 2020-02-25 16:00:52
Description: Remote desktop, remote tools, remote account, verification code, remote computer
Plat: C/C++ | Size: 3688KB | Downloads: 0
hackbill 2020-02-24 20:51:42
Description: The ability to connect to the server shell can obtain the permissions of the other server by combining with some scripts.
Plat: Python | Size: 469KB | Downloads: 0
hackbill 2020-02-24 20:47:27
Description: It can scan sensitive files in the website directory to conduct penetration test on sensitive information disclosure of the target website
Plat: Python | Size: 65KB | Downloads: 1
hackbill 2020-02-24 20:45:26
Description: There are many kinds of search engines, such as Baidu, Google, etc. We usually use search engines to search things at will, but in fact, search engines have many ways to play. Google search engine is very powerful. It can be used to search the background page that you don't want to be found, search for sensitive information disclosure of users, source code disclosure, etc. We can use Google search engine specific syntax to find security vulnerabilities in website configuration or code
Plat: Others | Size: 1014KB | Downloads: 0
hackbill 2020-02-24 20:41:36
Description: Metasploit is a penetration testing platform that enables you to find, exploit, and verify vulnerabilities. This platform is a free and downloadable framework, through which we can easily obtain, develop and attack computer software vulnerabilities. It comes with hundreds of professional vulnerability attack tools with known software vulnerabilities.
Plat: Python | Size: 1015KB | Downloads: 0
acadinc 2020-02-19 05:39:34
Description: wouxun usb driver, usb_serial_converter_ch340_windows_x64_drivers
Plat: WINDOWS | Size: 40KB | Downloads: 0
yuyana 2020-02-17 14:31:45
Description: Reduce PAPR and improve the security of OFDM system
Plat: matlab | Size: 3KB | Downloads: 1
zhongping 2020-02-16 23:57:21
Description: Tencent Conference - based on Tencent's 21 years of experience in audio and video communication, Tencent conference provides a one-stop cloud conference solution to meet the online conference demand of enterprise remote communication, supports mobile / tablet / PC multi device end, shares high-definition desktop, online document capability, high-definition, smooth, convenient, safe and reliable, so that you can meet the conference efficiently anytime, anywhere, and in all aspects under different scenarios Demand.
Plat: Others | Size: 69814KB | Downloads: 0
AT. 2020-02-13 13:10:19
Description: The DLL files required for MySQL and UDF are 64 bit and 32-bit
Plat: Others | Size: 10KB | Downloads: 0
思宇科技 2020-02-10 00:15:49
Description: Do not use it to break the law!!!!!!!!!!!!!!
Plat: EasyLanguage易语言 | Size: 1763KB | Downloads: 0
mayt1 2020-02-08 16:20:11
Description: DatePassWord good good
Plat: Java | Size: 150KB | Downloads: 0
似曾相识2020 2020-02-07 14:23:08
Description: Document description: This is a ghost disk image file of DOS 7.1 It includes a complete set of dos and ucdos70, which need to be installed when in use, Cd\ucdos70 Install Also included is the DOS version of DiskGen Usage method Ctmouse DiskGen There are also ghost files of DOS version Reduction method First unzip and insert the USB disk; In win7, Download ghost32 + 11.0.1.exe Double click ghost32 + 11.0.1.exe to run Point local, disk, from image Find the image file you downloaded and select your USB drive Click OK and yes. Wait for the restore to succeed Wait a little longer for the last write to boot Restart the computer and select U disk to start
Plat: DOS | Size: 10587KB | Downloads: 0
思密王 2020-02-07 12:39:56
Description: Phyon2.7 programming tutorial, Liao Xuefeng, Xiaobai's new Python tutorial.
Plat: Python | Size: 6557KB | Downloads: 0
kg13 2020-01-30 12:15:55
Description: A getshell tool of thinkphp_getshell-v2
Plat: Python | Size: 398KB | Downloads: 0
kg13 2020-01-30 12:14:19
Description: Crawling the account and password of the specified URL
Plat: Java | Size: 1328KB | Downloads: 1
kg13 2020-01-30 12:10:55
Description: Crawling the account and password of the specified URL
Plat: Python | Size: 1KB | Downloads: 0
kg13 2020-01-30 12:08:56
Description: (1) A complete TCP handshake as the basis for judging whether the TCP port is open or not (2) . an IP and port list is used to determine whether the port is open or not. If it is open, it will be added to the list (3) High performance scanning is realized by multithreading, and semaphore is used to prevent thread conflict from causing confusion of printing results Main calling module
Plat: Python | Size: 1KB | Downloads: 0
7s98 2020-01-20 12:49:23
Description: Havij is an automated SQL injection tool that helps penetration testers discover and exploit SQL injection vulnerabilities in web applications.
Plat: WINDOWS | Size: 6488KB | Downloads: 3
Tags: