classification
boutiqueUniversal modification tutorial for the PC controller of Netfox video game series
Universal modification tutorial for the PC controller of Netfox video game series
Many people will not change this control terminal, so they specially recorded this tutorial for...
boutiqueChuangsheng Series Qiankun Mutual Entertainment Club Room Cards and Chess + Video Building Tutorial
This is the second modification of Guizhou Mahjong, which removed Guizhou Mahjong. Niu Niu, three male and golden flowers all bring accompanying robots
Golden Flower machine...
boutiqueUltra-detailed general video tutorial in the Shudu series
Ultra-detailed general video tutorial in the Shudu series
exclusiveDownload penetration testing guidance
attack scenarios
Download without defense
Description:
Many application systems or components provide...
Free exclusivePenetration testing guidance document contains attacks
1. Attack scenario
File inclusion attack
described
The file contains vulnerabilities that are "code notes...
Free boutiqueFutureTask 2 in Java
1. The first two chapters of the preface briefly analyze the Future interface and FutureTask. This article will introduce the use of FutureTask...
Free exclusiveBlack Box Penetration Testing Guide Cross-site Forging Request CSRF
CSRF ( Cross Site Request Forgery) is a Web application attacker...
Free boutiqueAowan series client universal encryption and decryption tool
Faced with the rapid development of network security technology, AoPlay has launched a new generation of client-side universal encryption and decryption tools to solve...
boutiqueApple Signature Certificate IOS Enterprise IPA Software Certificate valid until 2026
Some time ago, I shared an ios certificate that is valid until 2025, this time this one is until 2026
For likes to install...
exclusiveBlack Box Penetration Testing Guide: XML Injection
I. attack scenarios
Send XML requests directly
described
Many application systems or components require...
Free exclusiveBlack box penetration testing guidance passed down
I. attack scenarios
Upload webshell directly
Describe many application systems...
Free boutiqueDesign pattern: Talk about strategic pattern from the design of aggregated payment services
1. preface
Mobile payment is now very popular in China, and even the seventies-year-old lady at the breakfast stall downstairs uses it...
Free boutiqueWhen calculating in Java development, please be sure to use BigDecimal to calculate. BigDecimal summarizes and summarizes
Preface Today, a junior developer in the group asked why the tester tested that the price calculation module he wrote had calculation deviations...
Free boutiquePrinciples of Java Code Generator
1. Foreword I wrote an article about the Mybatis Plus code generator a few days ago, and many students privately asked me about this code...
Free