['Attacking Hyper-V.pdf', 'Bug Hunting in Synology NAS.pdf', 'Checking Defects in Deep Learning AI Models.pdf', 'Chrome Exploitation.pdf', 'Exploiting IOSurface 0.pdf', 'How CVE-2018-8611 can be exploited to achieve privilege escalation on Windows 10 1809 and earlier.pdf', 'Inside Hidden Cobra Cyber Offensive Programs.pdf', 'KNOX Kernel Mitigation Bypasses %28New Reliable Android Kernel Root Exploitation Part %232%29.pdf', 'Machine learning implementation security in the wild.pdf', 'Reimplementing Local RPC in .NET.pdf', 'Revery:from POC to EXP.pdf', 'Safari Adventure:A Dive into Apple Browser Internals.pdf', 'The One Weird Trick SecureROM Hates.pdf', 'Threat From The Satellite.pdf', 'Using Fault Injection for Turning Data Transfers into Arbitrary Execution.pdf']
2022-01-05 18:00:14 160.46MB 安全集成 安全运营 移动安全 数据安全
实验4-1-10 兔子繁衍问题 (15 分) 一对兔子,从出生后第3个月起每个月都生一对兔子。小兔子长到第3个月后每个月又生一对兔子。假如兔子都不死,请问第1个月出生的一对兔子,至少需要繁衍到第几个月时兔子总数才可以达到N对? 输入格式: 输入在一行中给出一个不超过10000的正整数N。 输出格式: 在一行中输出兔子总数达到N最少需要的月数。 输入样例: 30 输出样例: 9
2022-01-05 14:57:13 352B java 蓝桥杯 PTA 兔子繁衍 
1
【STC15系列】SYK-0806-A2S1- 15-串口收发十六进制数
2022-01-05 12:01:48 69KB 【STC15系列】 SYK-0806-A2S1
1
培训课程--ISO9001-2000质量管理体系(ppt 15页).pptx
2022-01-04 21:05:35 91KB
['Advanced Binary Emulation framework.pdf', 'CiscoASA:From Zero to ID=0.pdf', 'crauEmu - your IDE for code-reuse attacks.pdf', 'Dark sides of Java remote protocols.pdf', 'Electron,scheme handlers and stealthy security patches.pdf', 'Fatal Fury on ESP32:Time to release Hardware Exploits.pdf', 'Hacking Medical Imaging with DICOM.pdf', 'I PWN thee,I PWN thee not! .pdf', 'Launching feedback-driven fuzzing on TrustZone TEE.pdf', 'Malign Machine Learning Models.pdf', 'Oldschool way of hacking MicroDigital ip-cameras.pdf', 'Practical LoRaWAN auditing and exploitation.pdf', 'Single byte write to RCE:exploiting a bug in php-fpm.pdf', 'Trusted Types & the end of DOM XSS.pdf', 'Two Bytes to Rule Adobe Reader Twice:The Black Magic Behind the Byte Order Mark.pdf']
2022-01-04 21:00:05 62.82MB 风险评估 安全架构 企业安全 渗透测试
['Auditd for the Masses.pdf', 'Building Systems On Shaky Grounds 10 Tactics To Manage The Modern Supply Chain.pdf', 'Drones the new weapon of choice - also for hackers.pdf', 'From printed circuit boards to exploits- pwning IoT devices like a boss.pdf', 'How To Bring HID Attacks To The Next Level.pdf', 'Hunting PBX for Vulnerabilities.pdf', 'Invoke-DOSfuscation- Techniques FOR F IN -style DO S-level CMD Obfuscation.pdf', "Knockin' on IPv6's doors.pdf", 'Mobile operators vs. Hackers new security measures for new bypassing techniques.pdf', 'NFC Payments The Art of Relay & Replay Attacks.pdf', 'No Win32_Process Needed Expanding the WMI Lateral Movement Arsenal.pdf', 'Silent wire hacking.pdf', 'The Bicho An Advanced Car Backdoor Maker.pdf', 'The Insecure Software Development Lifecycle How to find, fix, and manage deficiencies within an existing methodology.pdf', "The Past, Present & Future of Enterprise Security the 'Golden Age' of Attack Automation.pdf"]
2022-01-04 17:00:14 106.97MB 安全对抗 安全实践 系统安全 开发安全
['4G LTE小基站破解与中间人攻击.pdf', 'APT 攻守道.pdf', 'APT检测设备的扩展研究.pdf', 'IOT安全 - 测信道实战.pdf', 'Java生态圈沙箱逃逸实战.pdf', 'macOS 从运行库劫持到内核提权.pdf', 'PHP动态特性的捕捉与逃逸.pdf', '云环境自动化入侵溯源实战.pdf', '公有云SDN的安全风险与加固.pdf', '基于符号执行的反混淆方法研究.pdf', '如何去挖掘物联网环境中的高级恶意软件威胁.pdf', '智能语音设备安全研究.pdf', '消灭Flash,彻底消除它.pdf', '物联网资产变化研究.pdf', '针对Docker容器网络的ARP欺骗与中间人攻击.pdf']
2022-01-04 17:00:10 54.96MB 安全研究 自动化 APT攻击 攻防靶场
1、修复鼠标悬停提示的闪烁问题。 2、修复鼠标参考线横线闪烁问题。 3、包含控件全部源代码,及修复代码。
2022-01-04 10:47:31 469KB ZedGraph
1
官方离线安装包,测试可用。使用rpm -ivh [rpm完整包名] 进行安装
2022-01-03 09:03:05 951KB rpm
官方离线安装包,测试可用。使用rpm -ivh [rpm完整包名] 进行安装
2022-01-03 09:02:46 966KB rpm