登录
首页 » Scanner » 一个开放的

一个开放的

于 2022-02-03 发布 文件大小:756.16 kB
0 44
下载积分: 2 下载次数: 1

代码说明:

An open-source security scanner and exploiting framework for Microsoft Windows

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • icmp包定制程序
    icmp包定制程序-icmp package has custom-made the procedure
    2022-12-17 23:35:03下载
    积分:1
  • Rosiello Security proxyscanner validity checker v2.0 of a Windows proxy server a...
    Rosiello Security proxyscanner & validity checker v2.0 一个WINDOWS下的代理服务器地址扫描器,必须在MS-DOS模式下运行,附源代码。-Rosiello Security proxyscanner validity checker v2.0 of a Windows proxy server address scanners, in MS-DOS mode, and with the source code.
    2022-10-16 20:00:03下载
    积分:1
  • radar detecttion in verilog
    radar detecttion in verilog
    2022-09-29 15:35:03下载
    积分:1
  • ws2000自动侦察机,作用吗!找肉鸡。
    ws2000自动侦察机,作用吗!找肉鸡。-ws2000 automatic reconnaissance role! For broiler.
    2022-02-04 20:17:47下载
    积分:1
  • The preparation of vulnerability scanners detect a remote server that may exist...
    编写漏洞扫描器探查远程服务器上可能存在的具有安全隐患的文件是否存在,它的socket建立过程和上面 的端口扫描器是相同的,所不同的是漏洞扫描器通常使用80端口,然后对这个端口发送一个GET文件的请求,服务器接收到请求会返回文件内容,如果文件不存 在则返回一个错误提示,通过接收返回内容可以判断文件是否存在。发送和接收数据需要使用函数send()和recv(),另外对流中存在的字符串进行判断 需要使用函数strstr(),这除了需要具备socket函数库的知识以外,还需要一些有关string函数库的知识。-The preparation of vulnerability scanners detect a remote server that may exist with the security risks of the file exists, and its socket to establish the process and above the port scanner is the same, the difference is that vulnerability scanners typically use port 80, and then on the port send a GET request for the document, the server receives the request will return the contents of the documents, if the file does not exist then return an error message, through the receiver can determine whether to return to the contents of the file exists. Send and receive data need to use the function send () and recv (), exists in another string convection judge need to use the function strstr (), which apart from the need to have the socket lib
    2022-06-21 10:00:53下载
    积分:1
  • 检查0
    检查0-1024端口是否可以连接的程序 -Checking whether 0-1024 ports can be connected
    2023-09-09 11:10:03下载
    积分:1
  • 新台币版本的全面扫描工具。
    nessus NT版,一个全面的扫描工具.-NT version of a comprehensive scanning tool.
    2022-01-24 17:39:21下载
    积分:1
  • nmap为一著名的网络安全扫描工具,中文版参考手册,来自官方的文档...
    nmap为一著名的网络安全扫描工具,中文版参考手册,来自官方的文档-nmap is a well-known network security scanning tools, the Chinese version of Reference Manual, from the official documents
    2023-03-31 15:35:04下载
    积分:1
  • telnet服务检测程序
    telnet服务检测程序 -telnet service scaner
    2022-04-19 14:00:36下载
    积分:1
  • 操作系统提供的 connect() 系统调用,用来与每一个感兴趣的目标计算机的端口进行连接。如果端口处于侦听状态,那么connect()就能成功。否则,这个端口...
    操作系统提供的 connect() 系统调用,用来与每一个感兴趣的目标计算机的端口进行连接。如果端口处于侦听状态,那么connect()就能成功。否则,这个端口是不能用的,即没有提供服务。这个技术的一个最大的优点是,你不需要任何权限。系统中的任何用户都有权利使用这个调用。另一个好处就是速度。如果对每个目标端口以线性的方式,使用单独的connect()调用,那么将会花费相当长的时间,你可以通过同时打开多个套接字,从而加速扫描。使用非阻塞 I/O 允许你设置一个低的时间用尽周期,同时观察多个套接字。但这种方法的缺点是很容易被发觉,并且被过滤掉。目标计算机的logs文件会显示一连串的连接和连接是出错的服务消息,并且能很快的使它关闭。 -operating system for the connect () system call, and for every one interested in the computer connect to the port. If the interception at the state port, then connect () can be successful. Otherwise, the port is not used, that is, not provide services. One of the biggest advantages is that you do not have any authority. System of any user has the right to use this call. Another advantage is speed. If each of the target port to a linear manner, the use of separate connect () call, it would take a very long time, you can open multiple socket, thus speeding up the scanning. The use of non-blocking I/O allows you to set up a low exhaustion of the time cycle, while observing
    2022-03-20 07:14:25下载
    积分:1
  • 696518资源总数
  • 104297会员总数
  • 29今日下载