搜索资源列表
Find.Repair.and.Prevent.Bugs
- [The.Pragmatic.Bookshelf开发丛书-测试:发现、修复和阻止代码漏洞].Debug.It!.Find.Repair.and.Prevent.Bugs.in.Your.Code.Paul.Butcher.文字版-The [The.Pragmatic.Bookshelf Development Series- test: discovery, repair and prevent code vulnerability]. Debug.It! Find.Repair.and.Pre
WEB
- 在针对ELF文件 PE文件(.exe与.dll)的漏洞挖掘过程中,出现了很多的漏洞挖掘 技术,但是针对PE文件 ELF文件的漏洞挖掘始终停留在了黑盒测试(包括单元黑盒测试) 源代码审计等办法.通过RATS等源代码审计软件可以找到部分源代码级别的漏洞信息, 但是毕竟源代码审计软件寻找的多数为strcpy memcpy等存在缓冲区溢出遗患的C函数,所以通过审计源代码的办法来进行漏洞挖掘是一个可能性系数很小的漏洞挖掘技术-Loopholes for the ELF file PE file
Web-security
- Web应用安全漏洞扫描工具的设计与实现 算法清晰内容丰富代码明确-Web application security vulnerability scanning tool design and algorithm definition content rich code explicitly
OPDAY2
- O+DAY安全:软件漏洞分析技术(第二版).pdf 很不错的书。-O+DAY security: software vulnerability analysis technology (second edition). Pdf very good book.
0day_2nd
- 本书分为5 篇33章,系统、全面地介绍了Windows 平台缓冲区溢出漏洞的分析、检测与防护。第一篇为漏洞exploit 的基础理论和初级技术,可以引领读者迅速入门;第二篇在第一篇的基础上,结合国内外相关研究者的前沿成果,对漏洞技术从攻、防两个方面进行总结;第三篇站在安全测试者的角度,讨论了几类常用软件的漏洞挖掘方法与思路;第四篇则填补了本类书籍在Windows 内核安全及相关攻防知识这个神秘领域的技术空白;第五篇以大量的0 day案例分析,来帮助读者理解前四篇的各类思想方法。本书可作为网络安全
PHP-Safe-Configured
- PHP其实不过是Web服务器的一个模块功能,所以首先要保证Web服务器的安全。当然Web服务器要安全又必须是先保证系统安全,这样就扯远了,无穷无尽。PHP可以和各种Web服务器结合,这里也只讨论Apache。非常建议以chroot方式安装启动Apache,这样即使Apache和PHP及其脚本出现漏洞,受影响的也只有这个禁锢的系统,不会危害实际系统。但是使用chroot的Apache后,给应用也会带来一定的麻烦,比如连接mysql时必须用127.0.0.1地址使用tcp连接而不能用localhos
NetBIOS
- 本文是一片基于NetBIOS的漏洞分析与防范本科毕业论文,文章设计了一个用于防范NetBIOS漏洞的小软件,能够有效的防范NetBIOS漏洞,具有一定的实用性。-This article is a NetBIOS-based vulnerability analysis and prevention undergraduate thesis, articles for the design of a small software vulnerabilities to prevent NetBIO
C
- 面向C/C++ 代码的漏洞检测系统原理与实现 实用 有意义-For C/C++ code vulnerability detection system theory and practical implementation meaningful
Windows-hot-patching-tech
- Windows 系统补丁技术介绍并详细介绍了漏洞扫描方法。-Windows patch technology is introduced and vulnerability scanning method was introduced in detail.
Conditional-diagnosability-of-alternating-group-n
- The growing size of a multiprocessor system increases its vulnerability to component failures. In order to maintain the system’s high reliability, it is crucial to identify and replace the faulty processors through testing, a process known as fau
Artofhacker
- [黑客之道:漏洞发掘的艺术].Jon.Erickson.扫描版,入行必备图书。-[Hacker Road: Vulnerability to explore art] .Jon.Erickson scan version, joining the necessary books.
solar_assessment
- Widely fluctuating oil and gas commodity prices have impacts on world economies, particularly developing countries. Low-income economies that import fossil fuels are particularly vulnerable to price increases which can badly affect their balance
tcp_status
- 对tcp的各种状态进行详细解析,以及一些利用tcp连接机制漏洞进行的攻击行为的解释。-For various states to conduct a detailed analytical tcp, tcp connection and some mechanism to explain the use of vulnerability of aggressive behavior.
Master-script-hackers
- 黑客入门书籍,包括常见漏洞介绍,WEB基础知识等-Hackers entry books, including the common vulnerability introduced WEB basic knowledge, etc.
web-malware
- Vulnerability detection tools are frequently considered the silver-bullet for detecting vulnerabilities in web services. However, research shows that the effectiveness of most of those tools is very low and that using the wrong tool may lead
kali工具集部分翻译
- kali linux工具集翻译,包括漏洞分析,数据库攻击,密码攻击,逆向工程,数字取证。(Kali Linux tool set translation, including vulnerability analysis, database attacks, password attacks, reverse engineering, digital forensics.)