NEKO

NEKO

superficial aesthetics

实验吧Reverse
smali文件分析题目链接:http://www.shiyanbar.com/ctf/1871apk逆向工具包:链接:https://pan.baidu.com/s/1bp2Njtl 密码:2ew9apk逆向基础操作:http://blog.csdn.net/vipzjyno1/article/details/21039349/将Hello.dex移动到dex2har-2.0中,cmd转到当前文件夹,执行1d2j-dex2jar.bat Hello.dex 生成文件Hello-dex2jar.jar将Hello-dex2jar.jar拖动到jd-gui.exe即可看到源码12345678...
Jarvis逆向
FindKey链接:https://pan.baidu.com/s/1nvDYbRb 密码:xqm1kali下用file命令发现是python 2.7 byte-compiled即python 2.72进制编译文件也就是pyc文件,在https://tool.lu/pyc/反编译得到加密脚本,编写解密脚本即可 12345678lookup=[196,153,149,206,17,221,10,217,167,18,36,135,103,61,111,31,92,152,21,228,105,191,173,41,2,245,23,144,1,246,89,178,182,119,38,8...
pyqt简单实例
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135...
[Untitled Post]
WEB比较数字大小F12改input maxlength,再填个较大的数. 你能跨过去吗实验吧上的原题由+/v+知道是utf-7编码,将后面的数据utf-7解码,输入key即可 web01password[]=1 为什么这么简单啊源码password.js加个=号 base64 一切都是套路index.php.txt源码泄露.原题:https://github.com/CHYbeta/Code-Audit-Challenges/blob/master/php/challenge-17.md 本地的诱惑题目崩了,源代码可看源码考点是xff伪造 请ping我的ip 看你能Ping通吗?pos...
n3k0
incisive expression