|
[求助]Network Password Recovery的原理是啥?
给你透露点吧,关键的地方你已经找到了。但文件呢? 文件在%appdata%/microsoft/Credentials/目录下。解密时需要使用到这个文件 |
|
[求助]Network Password Recovery的原理是啥?
哈哈,俺其实已经把工具弄出来了! 楼主想用这个来抓xx的密码吧? |
|
[转帖]习近平谈发展道路:鞋子合不合脚 穿着才知道
我咋感觉我的鞋子有点夹脚呢? |
|
[求助]360的东西,果然碰不得
厄。。。。。 |
|
[招聘]公安部第一研究所招聘编程开发人员
天上的要求,地狱的待遇啊! |
|
[创业型(大公司背景)招人]Windows内核开发--欢迎大牛、小牛、安全行业等童鞋(6-20K,能力出众另议)
看到那么多的精通,就让人不寒而栗啊。说明写招聘要求的人就不是一个技术到家的人,也不是一个谦虚的人 |
|
[原创]xxxxxxxxxxxxxxxxxx
汗,全是xxxx |
|
[原创]解决vista.win7 32/64 session隔离 注入
其实,在今年出现的某个神器中,有使用另外一种方法进行注入的代码,而且无patch,直接动态调用就ok |
|
[注意]测试你的肺活量,按住键盘0,憋气,看你能有多少行,男人不做假!
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 |
|
[注意]测试你的肺活量,按住键盘0,憋气,看你能有多少行,男人不做假!
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 |
|
[原创]符号下载工具 <附带源码>
symchk /r c:\windows\system32 /s SRV*c:\symbols\*http://msdl.microsoft.com/download/symbols symchk 这个工具是在windbg的安装目录中,上述命令中,c:\windows\system32 表示要下载的符号表的目录。这里就是下载系统目录的所有组件的符号表, 后面的c:\symbols表示要保存的文件的路径,最后一个url就是pdb符号表的下载路径了。 |
操作理由
RANk
{{ user_info.golds == '' ? 0 : user_info.golds }}
雪币
{{ experience }}
课程经验
{{ score }}
学习收益
{{study_duration_fmt}}
学习时长
基本信息
荣誉称号:
{{ honorary_title }}
能力排名:
No.{{ rank_num }}
等 级:
LV{{ rank_lv-100 }}
活跃值:
在线值:
浏览人数:{{ visits }}
最近活跃:{{ last_active_time }}
注册时间:{{ user_info.create_date_jsonfmt }}
勋章
兑换勋章
证书
证书查询 >
能力值