Resource_Hacker_v5.1.6绿色版,可以修改exe文件,亲测好用。
2021-11-25 10:47:07 1.95MB Resource_Hacker
1
关于世界黑客界顶尖的大牛,他们是如何发家,以及是利用技术进行网络攻击。
2021-11-20 00:42:30 38KB hacker
1
Python hacker. Those are two words you really could use to describe me. At Immunity, I am lucky enough to work with people who actually, really, know how to code Python. I am not one of those people. I spend a great deal of my time penetration testing, and that requires rapid Python tool development, with a focus on execution and delivering results (not necessarily on prettiness, optimization, or even stability). Throughout this book you will learn that this is how I code, but I also feel as though it is part of what makes me a strong pentester. I hope that this philosophy and style helps you as well. As you progress through the book, you will also realize that I don’t take deep dives on any single topic. This is by design. I want to give you the bare minimum, with a little flavor, so that you have some foundational knowl- edge. With that in mind, I’ve sprinkled ideas and homework assignments throughout the book to kickstart you in your own direction. I encourage you to explore these ideas, and I would love to hear back any of your own implementations, tooling, or homework assignments that you have done. xviii Preface As with any technical book, readers at different skill levels with Python (or information security in general) will experience this book differently. Some of you may simply grab it and nab chapters that are pertinent to a consulting gig you are on, while others may read it cover to cover. I would recommend that if you are a novice to intermediate Python programmer that you start at the beginning of the book and read it straight through in order. You will pick up some good building blocks along the way. To start, I lay down some networking fundamentals in Chapter 2 and slowly work our way through raw sockets in Chapter 3 and using Scapy in Chapter 4 for some more interesting network tooling. The next section of the book deals with hacking web applications, starting with your own custom tooling in Chapter 5 and then extending the popular Burp Suite in Ch
2021-10-30 11:53:54 10.08MB hacker python black_hat
1
Resource.Hacker.3.4 ResourcesExtract_v1.15 eXeScope_6.5 今天用了用,顺便收集了,很好的东西。
2021-10-25 13:55:06 957KB Resource Hacker exescope
1
Linux Basics for Hackers 中文版
2021-10-22 08:22:56 5.58MB Linux  Hacker
1
内核级后门软件,用户可以通过本软件隐藏文件、进程、系统服务、系统驱动、注册表键的键和键值、打开的端口以及虚构可用磁盘空间。程序同时也在内存中伪装它所做的改动,并且隐身地控制被隐藏进程。程序安装隐藏后门,注册隐藏系统服务并且安装系统驱动。该后门技术允许植入Redirector。鉴于参数过多,不推荐新手使用。
2021-10-09 17:04:14 69KB rootkit hacker defender
1
HackerRank-30天代码:这是适用于Hacker Ranker的30天代码实践解决方案的全部内容(在Java中)
2021-09-28 06:04:00 1KB Java
1
本书介绍了各种高效编程方法,展示了计算机代码与指令,以及指令间的内在关联。
2021-09-16 20:37:51 10.64MB 算法,高效程序
1
SRC经验文档
2021-09-06 15:28:42 3.31MB src 漏洞 经验 hacker
1
这是著名的Y Combinator的Hacker新闻网站的部分克隆。 它是使用React JS的官方Api制成的。 应用共有4个视图(页面),3个主页和一个嵌套页面; 主要页面有:热门故事,它是一个主页,它显示热门故事列表,新故事(新故事列表)和所有评论,其中显示了网站上发布的每个故事的评论列表(按时间排序); 热门或新故事页面列表包含20个故事,您可以使用屏幕底部显示的自定义分页来回浏览故事(从服务器发送的故事总数约为500个)。 “热门新闻”或“新故事”页面上每个故事的标题均包含指向该故事或文章发布所在网页的链接,如果您单击该链接,它将在新页面中打开; 您可以通过单击故事框中包含的链接来单独查看每个故事的评论(从“热门故事”或“新故事”页面),这些评论将显示在上述嵌套页面中; 默认情况下,将显示所有故事的评论及其答复,但是您可以通过单击折叠('-')符号来分别折叠(当然,以
2021-08-27 16:16:18 203KB JavaScript
1