您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. Google Hacking for Penetration Testers, Volume 2

  2. Book Descr iption Completely updated second edition of Google Hacking for Penetration Testers, which has sold 30,000 copies worldwide! Product Descr iption A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing of
  3. 所属分类:Web开发

    • 发布日期:2009-07-16
    • 文件大小:14680064
    • 提供者:szhourj
  1. iPhone SDK Development-Building iPhone Applications

  2. 09年9月的新书 Bill Dudney Chris Adamson Packing the power of desktop applications into a small mobile device, the iPhone SDK offers developers the ability to create dynamic, visually-appealing, and highly-capable mobile applications, using the same APIs
  3. 所属分类:其它

    • 发布日期:2009-10-08
    • 文件大小:11534336
    • 提供者:lenin1918
  1. Data Mining In Time-Series Databases

  2. Traditional data mining methods are designed to deal with “static” databases, i.e. databases where the ordering of records (or other database objects) has nothing to do with the patterns of interest. Though the assumption of order irrelevance may be
  3. 所属分类:其它

    • 发布日期:2010-01-04
    • 文件大小:3145728
    • 提供者:yangyz67
  1. [IDA.pro.学习资料].The.IDA.Pro.Book.2009

  2. [IDA.pro.学习资料].The.IDA.Pro.Book.2009 目录: Copyright Dedication FOREWORD ACKNOWLEDGMENTS INTRODUCTION Part I: INTRODUCTION TO IDA Chapter 1. INTRODUCTION TO DISASSEMBLY Section 1.1. Disassembly Theory Section 1.2. The What of Disassembly Section 1.3.
  3. 所属分类:C

    • 发布日期:2010-02-27
    • 文件大小:6291456
    • 提供者:prog_6103
  1. PROTOCOLS AND ARCHITECTURES FOR WIRELESS SENSOR NETWORKS

  2. Preface xiii List of abbreviations xv A guide to the book xxiii 1 Introduction 1 1.1 The vision of Ambient Intelligence 1 1.2 Application examples 3 1.3 Types of applications 6 1.4 Challenges for WSNs 7 1.4.1 Characteristic requirements 7 1.4.2 Requ
  3. 所属分类:Access

    • 发布日期:2010-05-01
    • 文件大小:12582912
    • 提供者:shl5201986
  1. Microsoft.Press.Programming.Microsoft.Office.Access.2003 chm

  2. About The Book The Access developer’s premier reference to building powerfully extensible database solutions. Whether you’re extending an existing database or developing a complex custom solution, get the code and instruction you need to exploit the
  3. 所属分类:Access

    • 发布日期:2010-07-15
    • 文件大小:16777216
    • 提供者:cnzhiv
  1. Microsoft SQL Server 2008 Internals

  2. Delve inside the core SQL Server engine and put that knowledge to work with guidance from a team of well-known internals experts. Whether database developer, architect, or administrator, you will gain the deep knowledge you need to exploit key archi
  3. 所属分类:其它

    • 发布日期:2010-08-10
    • 文件大小:4194304
    • 提供者:lcw321321
  1. Google Hacking for Penetration Testers

  2. Product Descr iption A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those que
  3. 所属分类:Web开发

    • 发布日期:2010-10-02
    • 文件大小:13631488
    • 提供者:sunxianbin
  1. Programming Microsoft LINQ in Microsoft .NET Framework 4

  2. Book Descr iption Dig into LINQ — and transform the way you work with data. With LINQ, you can query data from a variety of sources — including databases, objects, and XML files — directly from Microsoft Visual Basic® or C#. Guided by data-access ex
  3. 所属分类:C#

    • 发布日期:2010-12-14
    • 文件大小:17825792
    • 提供者:ForrestSun
  1. sqlmap 注入工具

  2. 懂的,不解释!强大的功能! Here is a list of major features implemented in sqlmap: * Full support for MySQL, Oracle, PostgreSQL and Microsoft SQL Server database management system back-end. Besides these four DBMS, sqlmap can also identify Microsoft Access, DB2,
  3. 所属分类:网络攻防

    • 发布日期:2011-06-25
    • 文件大小:6291456
    • 提供者:jackliscia
  1. sqlmap (懂的入)

  2. Here is a list of major features implemented in sqlmap: * Full support for MySQL, Oracle, PostgreSQL and Microsoft SQL Server database management system back-end. Besides these four DBMS, sqlmap can also identify Microsoft Access, DB2, Informix and
  3. 所属分类:其它

    • 发布日期:2011-08-09
    • 文件大小:4194304
    • 提供者:rendao0563
  1. Sam

  2. In Sams Teach Yourself Java 6 in 21 Days, you are introduced to all aspects of Java software development using the most current version of the language and the best available techniques. By the time you’re finished, you’ll be well acquainted with th
  3. 所属分类:Java

    • 发布日期:2011-12-24
    • 文件大小:5242880
    • 提供者:bachelor2009
  1. SQLol下载 SQL注入测试平台 SQLol

  2. 10大安全测试平台之一. SQLol Released at Austin Hackers Association meeting 0x3f Daniel Crowley http://www.trustwave.com INTRODUCTION ============ ***WARNING: SQLol IS INTENTIONALLY VULNERABLE. DO NOT USE ON A PRODUCTION WEB SERVER. DO NOT EXPOSE SQLol IN AN
  3. 所属分类:其它

    • 发布日期:2013-11-26
    • 文件大小:715776
    • 提供者:u010248265
  1. Expert Oracle Database Architecture(Apress,3ed,2014)

  2. Now in its third edition, this best-selling book continues to bring you some of the best thinking on how to apply Oracle Database to produce scalable applications that perform well and deliver correct results. Tom Kyte and Darl Kuhn share a simple p
  3. 所属分类:Oracle

    • 发布日期:2015-04-07
    • 文件大小:6291456
    • 提供者:vanridin
  1. Expert.Oracle.Indexing.and.Access.Paths

  2. Speed up the execution of important database queries by making good choices about which indexes to create. Choose correct index types for different scenarios. Avoid indexing pitfalls that can actually have indexes hurting performance rather than hel
  3. 所属分类:Oracle

    • 发布日期:2016-10-18
    • 文件大小:6291456
    • 提供者:ramissue
  1. exploit-database, 官方利用数据库库.zip

  2. exploit-database, 官方利用数据库库 利用数据库Git库这是一个的官方知识库,利用Exploit数据库,一个由攻击赞助的项目( ) 。 我们的仓库是:利用 & Shellcodes: https://github.com/offensive-security/ex
  3. 所属分类:其它

    • 发布日期:2019-10-10
    • 文件大小:59768832
    • 提供者:weixin_38744435
  1. exploit-database, 官方利用数据库库.zip

  2. exploit-database, 官方利用数据库库 利用数据库Git库这是一个的官方知识库,利用Exploit数据库,一个由攻击赞助的项目( ) 。 我们的仓库是:利用 & Shellcodes: https://github.com/offensive-security/ex
  3. 所属分类:其它

    • 发布日期:2019-10-12
    • 文件大小:59768832
    • 提供者:weixin_38743968
  1. exploit-database资料包

  2. exploit-database资料包
  3. 所属分类:网络安全

    • 发布日期:2017-02-27
    • 文件大小:18874368
    • 提供者:qq_20154743
  1. Insecure-Firebase-Exploit:一个简单的Python漏洞可将数据写入不安全的Firebase数据库! 通常在移动应用程序内找到。 如果应用程序的所有者已将“读取”和“写入”的安全性规则均设置为true,则攻击者可能会转

  2. 不安全的Firebase攻击 一个简单的Python漏洞可将数据写入不安全/易受攻击的Firebase数据库! 通常在移动应用程序内找到。 如果应用程序的所有者已将“读取”和“写入”的安全性规则均设置为true,则攻击者可能会转储数据库并将其自己的数据写入firebase db。 博客: 用法: Firebase-Write-Permission-Exploit.py这是我制作的Exploit的更新版本。 现在,只需提供数据库名称,您要创建的文件名,您的信息。 并将其写入不安全/易受攻击的
  3. 所属分类:其它

    • 发布日期:2021-03-12
    • 文件大小:801792
    • 提供者:weixin_42132354
  1. 0xsp-Mongoose:用于网络安全模拟和红色分组操作的独特框架,用于审核新漏洞,错误配置和特权升级攻击的Windows审计,在网络中复制高级对手的策略和技术-源码

  2. Windows的0xsp猫鼬RED 当前版本2.2.0 提供0xsp猫鼬红色版本可满足您在网络安全模拟过程中的需求,通过使用此版本,您将能够针对目标Windows操作系统进行系统漏洞,错误配置和特权升级攻击的审核,并在其中复制高级对手的策略和技术。一个网络。 借助Node js对Web应用程序API的支持,及时安装和自定义变得更加容易,Windows传感器代理将与应用程序API通信以传输结果,并以双向技术接收命令。 该代理能够使用windows update api和exploit da
  3. 所属分类:其它

    • 发布日期:2021-02-04
    • 文件大小:6291456
    • 提供者:weixin_42097369
« 12 »