Toggle navigation
D Blog
Home
About
Tags
Tags
keep hungry keep foolish
shadowsocks
v2ray
Broken Access Control
IDOR
MFLAC
Parameter Manipulation
Logic FLaws
XSS
Recon
SSRF
RSA
XXE
linux_basic
recon-ng
SecTools
git
HTTP Basic Authentication
Freedom
psychology
health
web hacking
food
wordpress
website
FastDFS
nginx
SEO
MySQL
FreeBSD
xfce
find
scp
v2ray-plugin
shuangpin
github
BBR
shadowsocks-libev
Chrome
Kali
static IP
NTP
pac
proxy
methodology
SSD
HDD
timezone
uninstall
win32diskimager
ZAP
windows
ShellBash
mapping the application
bypass client-side controls
authentication
attacking session management
attacking access controls
brute-force
password-based
PF
Packet Filter
crontab
pfctl
pftop
freebsd
ssh
http
acme.sh
let's encrypt
tls
centos8
multi-factor
bash
shell編程
0000-9999
vmess
websocket
TLS
CDN
shadowsocks
Set PAC of shadowsocks-libev on Kali Linux
Configuration of v2ray's client and server (v2ray+ws+tls+nginx+ss+cdn)
TCP fast open may cause shadowsocks to be found
Install shadowsocks-libev on FreeBSD
v2ray-plugin with shadowsocks-libev
Chrome设置PAC模式无效的解决方案
开启 Google BBR
优化 shadowsocks-libev 网络
Ubuntu 18.04 安装 shadowsocks-libev 服务端(支持多用户)
Centos7安装shadowsocks-libev服务端(最新版)支持多用户
Centos7 yum源安装shadowsocks-libev(非最新版本)
Centos7安装shadowsocks-rust
Centos7编译安装shadowsocks-libev最新版
Kali2019上安装shadowsocks-libev客户端
v2ray
V2ray使用Vmess+Websocket+TLS+Nginx+CDN(Cloudflare)例子的相关配置
在V2ray服務器上Nginx的配置
Configuration of v2ray's client and server (v2ray+ws+tls+nginx+ss+cdn)
Install v2ray on FreeBSD
failed to handler mux client connection
Install v2ray in binary packages
When ssh host key has been changed
Ubuntu18.04安装v2ray(用CDN避免被墙)
v2ray利用Websocket+TLS+Ngin+CDN实现流量伪装
Broken Access Control
Parameter Manipulation and Logic Flaws
Missing Function Level Access Controls
IDOR intro
IDOR
IDOR intro
MFLAC
Missing Function Level Access Controls
Parameter Manipulation
Parameter Manipulation and Logic Flaws
Logic FLaws
Parameter Manipulation and Logic Flaws
XSS
XSStrike
XSS 检测工具 XSStrike
XSS
Recon
Bug Bounties Recon With Bash
Recon & Discovery
SSRF
Server Side Request Forgery
RSA
RSA
RSA加密算法科普版
XXE
XXE
linux_basic
win32 disk imager使用后u盘容量恢复
How to Uninstall Software on Kali Linux
Set Timezone on Kali Linux
安装kali linux在固态硬盘(SSD 120GB)+机械硬盘(HDD 1TB)如何分区?
Set NTP Service on Kali Linux
Set static IP address and DNS on Kali2019/2020
Debian 9 turns on Google BBR
server certificate verification failed. CAfile: none CRLfile: none
Delete Files and Directories Permanently and Securely in Linux
The usage of command scp on linux
Command find on linux
Chrome设置PAC模式无效的解决方案
Could not get lock /var/lib/dpkp/lock Error in Ubuntu Linux
curl如何使用socks5做代理
ubuntu18.04防火墙ufw安装及使用
kali window10 双系统修改kali grub设置默认启动window10为第一项
Centos7使用firewalld打开关闭防火墙与端口
recon-ng
recon-ng信息收集工具介绍
SecTools
Install and Configure ZAP
nmap使用介绍
netstat使用介绍
hydra使用介绍
burp使用介绍
recon-ng信息收集工具介绍
git
git常用命令
Git restore deleted files
server certificate verification failed. CAfile: none CRLfile: none
git设置代理
HTTP Basic Authentication
暴力破解HTTP身份验证
Freedom
武汉肺炎发哨子的人——艾芬
政府论 -约翰.洛克
李文亮
权力分立(Separation of powers)
psychology
改变
自尊与自我实现
health
厨具中的重金属
保肝排毒六大英雄食物
N95口罩,KN95口罩,医用外科口罩
睡不好频尿或浅眠怎么办?
web hacking
Attacking Access Controls
Attacking Session Management
Attacking Authentication
Bypassing Client-Side Controls
Mapping the Application
Bug Bounties Recon With Bash
The process of vulnerability mining
Chapter 12 Attacking Users: Cross-Site Scripting(3) - Finding and Exploiting XSS Vulnerabilities(1_1)
查找和利用XSS漏洞(1_1)
Chapter 12 Attacking Users: Cross-Site Scripting(2) - XSS Attacks in Action
XSS实际行动
Chapter 12 Attacking Users: Cross-Site Scripting(1) - Varieties of XSS
各种XSS
Chapter 11 Attacking Application Logic(3)-Avoiding Logic Flaws
避免逻辑漏洞
Chapter 11 Attacking Application Logic(2)-Real-World Logic Flaws(4)
现实世界中的逻辑缺陷(4)
Chapter 11 Attacking Application Logic(2)-Real-World Logic Flaws(3)
现实世界中的逻辑缺陷(3)
Chapter 11 Attacking Application Logic(2)-Real-World Logic Flaws(2)
现实世界中的逻辑缺陷(2)
Chapter 11 Attacking Application Logic(2)-Real-World Logic Flaws(1)
现实世界中的逻辑缺陷(1)
Chapter 11 Attacking Application Logic(1)-The Nature of Logic Flaws
逻辑缺陷的本质
Chapter 9 Attacking Data Stores(5)-Injecting into LDAP
LDAP注入
Chapter 10 Attacking Back-End Components(5)-Injecting into Mail Services
注入邮件服务
Chapter 10 Attacking Back-End Components(4)-Injecting into Back-end HTTP Requests
注入后端HTTP请求
Chapter 10 Attacking Back-End Components(3)-Injecting into XML Interpreters
注入XML解释器
Chapter 10 Attacking Back-End Components(2)-Manipulating File Paths
处理文件路径
Chapter 10 Attacking Back-End Components(1)-Injecting OS Commands(2)
注入操作系统命令(2)
Chapter 10 Attacking Back-End Components(1)-Injecting OS Commands(1)
注入操作系统命令(1)
Chapter 9 Attacking Data Stores(4)-Injecting into XPath
XPath注入
Chapter 9 Attacking Data Stores(3)-Injecting into NoSQL
NoSQL注入
Chapter 9 Attacking Data Stores(2)-Injecting into SQL(5)
SQL注入(5)
Chapter 9 Attacking Data Stores(2)-Injecting into SQL(4)
SQL注入(4)
Chapter 9 Attacking Data Stores(2)-Injecting into SQL(3)
SQL注入(3)
Chapter 9 Attacking Data Stores(2)-Injecting into SQL(2)
SQL注入(2)
Chapter 9 Attacking Data Stores(2)-Injecting into SQL(1)
SQL注入(1)
Chapter 9 Attacking Data Stores(1)-Injecting into Interpreted Contexts
注入解释的上下文
Chapter 7 Attacking Session Management(1)-The Need for State
Chapter 8 Attacking Access Controls : Common Vulnerabilities(1)
Chapter 6 Attacking Authentication(4) - Securing Authentication(3)
Chapter 6 Attacking Authentication(4) - Securing Authentication(2)
Chapter 6 Attacking Authentication(4) - Securing Authentication(1)
Chapter 6 Attacking Authentication(3) - Implementation Flaws in Authentication
Chapter 6 Attacking Authentication(2) - Design Flaws in Authentication Mechanisms(4)
Chapter 6 Attacking Authentication(2) - Design Flaws in Authentication Mechanisms(3)
Chapter 6 Attacking Authentication(2) - Design Flaws in Authentication Mechanisms(2)
核心防御机制
Chapter 5 Bypassing Client-Side Controls(4) - Capturing User Data:Browser Extensions
Chapter 6 Attacking Authentication(2) - Design Flaws in Authentication Mechanisms(1)
Chapter 6 Attacking Authentication(1) - Authentication Technologies
Chapter 5 Bypassing Client-Side Controls(3) - Capturing User Data:Browser Extensions
Chapter 5 Bypassing Client-Side Controls(2) - Capturing User Data:HTML Forms
Chapter 5 Bypassing Client-Side Controls(1) - Transmitting Data Via the Client
Mapping the Application(2)(Chapter 4) - Analyzing the Application
Web应用程序技术 - Chapter 3(2) - Web Functionality and Encoding Schemes
Mapping the Application(1)(Chapter 4) - Enumerating Content and Functionality
Web应用程序技术 - Chapter 3(1) - HTTP
Web应用程序黑客的方法论(9) --Test for Logic Flaws
Web应用程序黑客的方法论(13) --Follow Up Any Information Leakage
Web应用程序黑客的方法论(12) --Miscellaneous Checks
Web应用程序黑客的方法论(11) --Test for Shared Hosting Vulnerabilities
Web应用程序黑客的方法论(10) --Test for Shared Hosting Vulnerabilities
Web应用程序黑客的方法论(8) --Test for Function-Specific Input Vulnerabilities
Web应用程序黑客的方法论(7) --Test for Input-Based Vulnerabilities
Web应用程序黑客的方法论(6) --Test Access Controls
Web应用程序黑客的方法论(5)--Test the Session Management Mechanism
Web应用程序黑客的方法论(4)--Test the Authentication Mechanism
Web应用程序黑客的方法论(3)--Test Client-Side Controls
Web应用程序黑客的方法论(2)--Analyze the Application
定制的自动化攻击 - Chapter 14
Web应用程序黑客的方法论(1)--Map the Application's Content
food
厨具中的重金属
保肝排毒六大英雄食物
山药排骨汤
三杯鸡
莲藕花生大骨汤
金针菇茄子煲
砂锅粥
汆水蛋
大盘鸡
蒸鸡翅(豆豉辣味)
西红柿炒蛋
私房茄子
汗蒸魚
烧汁豆腐
平锅闷小黄花鱼
红烧肉
炖鸡汤
煮粥/饭
wordpress
Ubuntu18.04安装带有Nginx,MariaDB10和PHP7的WordPress且使用Cloudflare的CDN/SSL
website
绑定域名到IP
FastDFS
Upload files to FastDFS with Bash
nginx添加fastdfs模块(非覆盖安装)on ubuntu18.04
FastDFS安装
nginx
V2ray使用Vmess+Websocket+TLS+Nginx+CDN(Cloudflare)例子的相关配置
如何在CentOS 8上使用Let's Encrypt配置Nginx
在FreeBSD12.0上安裝Nginx
在V2ray服務器上Nginx的配置
ubuntu18.04安装nginx1.16.1(源码编译安装)
SEO
SEO
MySQL
(My)SQL基础(4)-DQL
(My)SQL基础(5)-DCL
(My)SQL基础
(My)SQL基础(3)-DML
(My)SQL基础(2)-DDL
FreeBSD
FreeBSD12.0 安裝防火牆PF(Packet Filter)
Install VitualBox on FreeBSD
Create Traditional Split File System Partitions on FreeBSD(12.1)
NTP on FreeBSD 12.1
Set proxy server on FreeBSD 12.1
Install v2ray on FreeBSD
Install shadowsocks-libev on FreeBSD
Set static IP address and DNS on FreeBSD
FreeBSD install xfce
Mount FreeBSD ISO on Bandwagon
xfce
FreeBSD install xfce
find
Command find on linux
scp
The usage of command scp on linux
v2ray-plugin
v2ray-plugin with shadowsocks-libev
shuangpin
双拼键盘
github
Post not shown if title contains : ( colon) on github used jekyll
BBR
Debian 9 turns on Google BBR
shadowsocks-libev
Install shadowsocks-libev on FreeBSD
Chrome
How to install Google Chrome Browser on Kali Linux
Kali
How to install Google Chrome Browser on Kali Linux
static IP
Set static IP address and DNS on Kali2019/2020
NTP
NTP on FreeBSD 12.1
Set NTP Service on Kali Linux
pac
Set PAC of shadowsocks-libev on Kali Linux
proxy
Set proxy server on FreeBSD 12.1
methodology
The process of vulnerability mining
SSD
安装kali linux在固态硬盘(SSD 120GB)+机械硬盘(HDD 1TB)如何分区?
HDD
安装kali linux在固态硬盘(SSD 120GB)+机械硬盘(HDD 1TB)如何分区?
timezone
Set Timezone on Kali Linux
uninstall
How to Uninstall Software on Kali Linux
win32diskimager
win32 disk imager使用后u盘容量恢复
ZAP
Install and Configure ZAP
windows
Download, Install and Active CN Windows10 Enterprise LTSC 2019
ShellBash
Bug Bounties Recon With Bash
mapping the application
Mapping the Application
bypass client-side controls
Bypassing Client-Side Controls
authentication
Vulerabilities in multi-factor authentication(多因素身份验证中的漏洞)
基于密码登录中的漏洞(Vulnerabilities in password-based login)
Attacking Authentication
attacking session management
Attacking Session Management
attacking access controls
Attacking Access Controls
brute-force
基于密码登录中的漏洞(Vulnerabilities in password-based login)
password-based
基于密码登录中的漏洞(Vulnerabilities in password-based login)
PF
FreeBSD12.0 安裝防火牆PF(Packet Filter)
Packet Filter
FreeBSD12.0 安裝防火牆PF(Packet Filter)
crontab
FreeBSD12.0 安裝防火牆PF(Packet Filter)
pfctl
FreeBSD12.0 安裝防火牆PF(Packet Filter)
pftop
FreeBSD12.0 安裝防火牆PF(Packet Filter)
freebsd
在FreeBSD12.0上安裝acme.sh客戶端獲取TLS證書
在FreeBSD12.0上安裝Nginx
FreeBSD SSH 安全配置
ssh
FreeBSD SSH 安全配置
http
HTTP Headers解析
acme.sh
如何在CentOS 8上使用Let's Encrypt配置Nginx
在FreeBSD12.0上安裝acme.sh客戶端獲取TLS證書
let's encrypt
如何在CentOS 8上使用Let's Encrypt配置Nginx
在FreeBSD12.0上安裝acme.sh客戶端獲取TLS證書
tls
在FreeBSD12.0上安裝acme.sh客戶端獲取TLS證書
centos8
如何在CentOS 8上使用Let's Encrypt配置Nginx
multi-factor
Vulerabilities in multi-factor authentication(多因素身份验证中的漏洞)
bash
bash shell編程產數組0000-9999並導入文件code
shell編程
bash shell編程產數組0000-9999並導入文件code
0000-9999
bash shell編程產數組0000-9999並導入文件code
vmess
V2ray使用Vmess+Websocket+TLS+Nginx+CDN(Cloudflare)例子的相关配置
websocket
V2ray使用Vmess+Websocket+TLS+Nginx+CDN(Cloudflare)例子的相关配置
TLS
V2ray使用Vmess+Websocket+TLS+Nginx+CDN(Cloudflare)例子的相关配置
CDN
V2ray使用Vmess+Websocket+TLS+Nginx+CDN(Cloudflare)例子的相关配置