Process Hacker是一款非常好用的系统工具,用于在Windows xp下查看、控制进程。它可以看到系统的服务,包括你电脑上的驱动和服务控制台上没有显示的服务,利用Process Hacker,你可以删除你的系统服务或者暂停它,你还可以通过它看见这个服务在c盘的实际位置。 Process Hacker还能够监视你电脑上程序的网络活动。如果你在它的哦“network”中看见不熟悉的软件正在使用网络怎么办?右击那个exe,然后点击“go to process”,它就会自动跳到进程菜单中去,高亮显示那个正在使用网络的程序了。如果你要看迅雷有没有偷偷上传,这个软件十分适合这个工作哦。
2022-02-24 15:33:10 790KB 系统相关-增强辅助
1
用于查看,修改,添加和删除 Win32 可执行文件的资源。内置了一个内部资源编译器和反编译器。
2022-01-27 19:00:23 2.78MB 资源替换工具 ResourceHacker
hacker.ipynb
2022-01-12 09:02:37 8KB python
1
hacker,织梦 一款可以通杀织梦的攻击工具。
2021-12-27 16:21:20 24KB hacker,织梦
1
Hacker’s Guide to Machine Learning with Python 2020
2021-12-20 11:08:49 20.14MB MachineLearning
1
1433批量自动传马工具,hacker_ax,天马行空 http://klxx.uueasy.com
1
这个就想大家解下,感觉超简单的题,就是不知道怎么找到flag
2021-12-01 09:33:46 20.58MB 1
1
Resource_Hacker_v5.1.6绿色版,可以修改exe文件,亲测好用。
2021-11-25 10:47:07 1.95MB Resource_Hacker
1
关于世界黑客界顶尖的大牛,他们是如何发家,以及是利用技术进行网络攻击。
2021-11-20 00:42:30 38KB hacker
1
Python hacker. Those are two words you really could use to describe me. At Immunity, I am lucky enough to work with people who actually, really, know how to code Python. I am not one of those people. I spend a great deal of my time penetration testing, and that requires rapid Python tool development, with a focus on execution and delivering results (not necessarily on prettiness, optimization, or even stability). Throughout this book you will learn that this is how I code, but I also feel as though it is part of what makes me a strong pentester. I hope that this philosophy and style helps you as well. As you progress through the book, you will also realize that I don’t take deep dives on any single topic. This is by design. I want to give you the bare minimum, with a little flavor, so that you have some foundational knowl- edge. With that in mind, I’ve sprinkled ideas and homework assignments throughout the book to kickstart you in your own direction. I encourage you to explore these ideas, and I would love to hear back any of your own implementations, tooling, or homework assignments that you have done. xviii Preface As with any technical book, readers at different skill levels with Python (or information security in general) will experience this book differently. Some of you may simply grab it and nab chapters that are pertinent to a consulting gig you are on, while others may read it cover to cover. I would recommend that if you are a novice to intermediate Python programmer that you start at the beginning of the book and read it straight through in order. You will pick up some good building blocks along the way. To start, I lay down some networking fundamentals in Chapter 2 and slowly work our way through raw sockets in Chapter 3 and using Scapy in Chapter 4 for some more interesting network tooling. The next section of the book deals with hacking web applications, starting with your own custom tooling in Chapter 5 and then extending the popular Burp Suite in Ch
2021-10-30 11:53:54 10.08MB hacker python black_hat
1