Meow's Testing Tools - John the Ripper
John the Ripper [toc] John the Ripper [toc] John the Ripper offline password cracking tool works on files that have been grabbed from original source. different modes used to crack ...
John the Ripper [toc] John the Ripper [toc] John the Ripper offline password cracking tool works on files that have been grabbed from original source. different modes used to crack ...
Cain and Abel [toc] basic Cain and Abel a Windows-based password recovery tool. have many features that can allow Network Sniffing and Hijacking of IP traffic between hosts. Many other ...
[toc] Burpsuite test web: www.dvwa.co.uk Testing workflow SQL injection UPDATE, INSERT, SELECT, ORDER BY retrieve hidden data: input: Gifts https://web/product...
[toc] HTML - List And Table HTML lists list: <ul>, <ol>, <dl> data inside: <li> <body> // Unordered HTML List <ul> <li>Coffee</li> ...
Data Structures - Basic 1 - Recursion basic The 3 Recursion Laws Analyzing Recursive Algorithms Examples of Recursion linear recursion ...
Data Structures - Basic 1 - Analysis Objectives Experimental Studies Counting Primitive Operations The Seven Functions The Co...
pythonds3 - 8. Graphs and Graph Algorithms Graphs Vocabulary and Definitions The Graph Abstract Data Type An Adjacency Matrix 邻...
ref https://www.geeksforgeeks.org/binary-tree-data-structure/ DS - pythonds3 - 7. Binary Tree Data Structures and Algorithms in Java, 6th Edition.pdf Data Stru...
Data Structures Basic 1 Priority Queues Priority Queues ADT: Priority Queue in java Implementing a Priority Queue Entry Interfa...
DS - pythonds3 - 6. Algorithms Sorting and Searching summary Searching The Sequential Search 一个个找 Sequential Search of an Unordered...
DS - pythonds3 - 5. Recursion - Exercises check the reverse words check the mirror words exchange the coins factorial of a number recursive tree Fibonacc...
DS - pythonds3 - 1. Introduction 1.5. Why Study Data Structures and Abstract Data Types? 1.8. Getting Started with Data 1.8.1. Built-in Atomic Data Types ...
Phishing (S+ 7th ch10) Vishing overview Vishing overview combine phishing with Voice over IP (VoIP) Although crank calls have been in existence since the invention o...
Phishing (S+ 7th ch10) Phishing 网络仿冒 overview Type of phishing Goals of phishing New Phishing Attacks soluti...
Pharming 网络嫁接 overview Pharming 网络嫁接 overview Similar in nature to e-mail phishing, pharming seeks to obtain personal information by domain spoofing. ...