搜索资源列表
the-oracle-hackers-handbook-hacking-and-defending-
- The Oracle Hacker s Handbook: Hacking and Defending Oracle
黑客攻学兼防
- 黑客教程,攻防兼备-Hacking tutorial, both defensive and offensive
FindPass2003
- 黑客工具FindPass2003的源代码-hacking tools FindPass2003 source code
PortScanproj
- 一台服务器可能打开了多个端口,到底哪些端口打开了的呢,而且对系统管理员来说,端口扫描对于黑客入侵具有重要的意义。-a server may open a number of ports, which in the end of the port to open it, but also for system administrators, port scanning for hacking has important significa
(vc)
- 这是个黑客工具,可以进行。。。。。。。。。。。。网上攻击的哦-This a hacking tool that can be. . . . . . . . . . . . Oh, the cyber-attacks. .
蜘蛛纸牌作弊器SP2
- 一个游戏外挂,全用win32汇编写的,而破解的游戏就是windows下的小游戏蜘蛛纸牌,这个破解软件可以翻看任意牌,可以换牌。-a game pieces, all written using win32 compilation, and the crack of the game is the small windows Spider Solitaire games, the hacking software can look up
Informix_Hacker
- Database Hackers Handbook (Chapter 10, 11, 12): Hacking Informix 欲了解Informix安全结构的必要参考。-Database Hackers Handbook (Chapter 10, 11, 12) : Hacking Informix For Informix security structures necessary reference.
Hacking-techniques-complete-set
- 黑客攻击技术一整套,很好地讲述了黑客攻击的技术,很值得细细学习。-A complete set of hacking techniques, well about the technology of hacker attacks, is worthy of careful study.
GoogleHacking
- google hacking其实并算不上什么新东西,在早几年在一些国外站点上就有过相关的介绍,但是由于当时并没有重视这种技术,认为最多就只是用来找找未改名的mdb或者别人留下的webshell什么的,并无太大实际用途.但是前段时间仔细啃了些资料才猛然发觉google hacking其实并非如此简单-actually not really nothing new, in the past few years in some foreign
N.C.P.H--heikejishuyuwangluoanquan
- 黑客技术与网络安全,,,,值得一看,,是一般不错的电子书籍-hacking technology and network security,, an eye-catcher, is generally good e-books
HackingWireless
- Wireless Hacking: 无线网络基本原理和应用实践的书籍-Wireless Hacking : wireless networks and the basic principles of the application of books
rqkljh
- 黑客入侵口令集合 个人不错的书 黑客入侵口令集合 个人不错的书-hacking personal password set good book set password hacking personal good book
PortScan
- 一台服务器可能打开了多个端口,到底哪些端口打开了呢,这就需要对端口实现扫描,而且扫描对防止黑客入侵具有重要意义-One server may open a number of ports, which ports to open in the end of it, which realize the need for port scanning, and scanning to prevent hacking of great sign
getmobilemsg
- 当计算机中插入优盘时,自动将将U盘上的资料直接拷贝到硬盘中。如果您需要对方优盘上的资料,你可以先运行本程序,当将对方的优盘插入到你的计算机上时会自动将优盘上的文件拷贝到你的电脑中的c:\program files\winrar目录下。 黑客工具! 运行copy.exe后就在你的计算机上设立了一个陷阱!-When inserted into USB computer automatically will be informati
getmobileresource
- 当计算机中插入优盘时,自动将将U盘上的资料直接拷贝到硬盘中。如果您需要对方优盘上的资料,你可以先运行本程序,当将对方的优盘插入到你的计算机上时会自动将优盘上的文件拷贝到你的电脑中的c:\program files\winrar\format\id 目录下。 黑客工具! 运行copy.exe后就在你的计算机上设立了一个陷阱!-When inserted into USB computer automatically will b
heikegongjuyuandaima
- 这里给出几个常用黑客工具的源代码,作者编程水平很高,相同质量的源代码在网上很难找到-Here are a few commonly used hacking tools source code, the author high level programming, the same quality of the source code is very difficult to find online
Google-Hacking
- 想更好的利用Google么,那么就看看这本书吧,该书很好的介绍了使用Google的技巧,以及相关的API-Would like to better use Google Mody, then take a look at this book, the book a good introduction to use Google
hacking-notes
- This document is from my school and it has a real good introduction to hacking by a prof who has extensive experience in this area.This is kind of a first step for any one who wants to hack or even debug kernel
hacking-growth-diary
- 一个黑客成长为安全专家的传记,里面有大量实际操作的教程,黑客成长日记-A hacker security experts biography growth, which has a large number of practical tutorials, hacking growth diary
Hacking Exposed Mobile.pdf
- Hacking Exposed Mobile Hacking