󰅡收起

Yu1u Security Club

貴州網絡与信息安全俱樂部

[置顶] 2016年8月3日 站长寄语!

陕西西安的西北工业大学研究人员的论文, 通过WiFi 信号对室内人员进行身份识别。 点击下载文档阅读全文...

It contains a javascript file and a php file that would embedd a keylogger in XSS Reflected point.... First of all put your both .js file and .php file on a server.... Then just edit your .js file and remove http://127.0.0.1/keylogger/keylogger.php?c= to your keylogger.php path with ?c= Then open script file 阅读全文...

https://github.com/shawarkhanethicalhacker/D-TECT Description: D-TECT is an All-In-One Tool for Penetration Testing. This is specially programmed for Penetration Testers and Security Researchers to make their job easier, instead of launching different tools for performing different task. D-TECT provides mul阅读全文...

Here we have in no particular order the top Android apps for hacking using an android smartphone. Disclaimer: These apps should be used for research purposes only 1. SpoofApp:- SpoofApp is a Caller ID Spoofing, Voice Changing and Call Recording mobile app for your iPhone, BlackBerry and Android phone. I阅读全文...

参考链接:https://zh.wikipedia.org/wiki/%E4%B8%AD%E5%9B%BD%E9%AA%A8%E5%B9%B2%E7%BD%91%E8%BF%90%E8%90%A5%E5%95%86 作者:赵云 链接: https://www.zhihu.com/question/26703129/answer/33931108 来源:知乎 著作权归作者所有,转载请联系作者获得授权。 中国四大骨干网是指中国的四大互联网骨干网,包括 中国科技网(阅读全文...

抗日战争期间,日本记者拍摄并留下了这段让我们今天看了都忍不住流泪的悲壮影像!时长7分钟,强烈建议看完整! 作者萨苏收藏了一段录像,它记录了一架中国飞机是怎么挑战三十二架日本飞机的。 由于ssl安全机制,如没有显示播放器请设置浏览器,或者点击外部链接播放 http://v.ifeng.com/history/201608/01775f13-642阅读全文...

互联网已经成为意识形态斗争的主战场,确保网络意识形态安全关系到国家政权稳定和长治久安。当前,我国的网络意识形态安全还存在着一些技术、制度、管理方面的隐患,为此,需要通过大力发展网络信息技术、加强网络平台建设、强化互联网治理体系建设以及加强意识形态宣传教育的内容建设等防御策略,维护网络意识形态安全,从而较好地阅读全文...

Awesome Penetration Testing A collection of awesome penetration testing resources Online Resources Penetration Testing Resources Exploit development Social Engineering Resources Lock Picking Resources Tools Penetration Testing Distributions Basic Penetration Testing Tools 阅读全文...

# Exploit Title: TOPSEC Firewalls - Remote Exploit (ELIGIBLEBACHELOR) # Date: 19-08-2016 # Exploit Author: Shadow Brokers # Vendor Homepage: http://www.topsec.com.cn/ Full Exploit: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40275.zip阅读全文...

之前搞了一个子域名查询的接口,由于数据太多服务器太渣,查询请求太多总是挂... 于是写了一个接口,做了一定限制,搞了一个简单查询的工具,直接上图: 虽然是学过java的人,但是以前很少写Swing,所以难免会有Bug。 Swing控件是单线程的,而跑域名用到了多线程,折腾实时显示是在是折腾了很久。另外你会发现可能ID阅读全文...

分类目录

最新评论