Myeclipse 官网
Myeclipse是最好的企业级Java IDE,MyEclipse让您的开发保持流畅、不受约束。您能在这里得到Java EE开发所需要的一切支持,现在下载享受30天免费试用和项目源码示例!
- 2022-05-02 - 收藏EditPlus 官网
EditPlus is a text editor for Windows with built-in FTP, FTPS and sftp capabilities. While it can serve as a good Notepad replacement, it also offers many powerful features for Web page authors and programmers.
- 2022-05-02 - 收藏LeanCloud 官网
LeanCloud is the leading backend-as-a-service provider that offers a complete set of cloud services including object storage, file storage, web hosting, container, instant messaging, push notification, SMS, and game backend.
- 2022-05-02 - 收藏LeanCloud 中国官网
LeanCloud - LeanCloud - 为开发加速 www.leancloud.cn领先的 BaaS 提供商,提供数据存储、文件存储、云引擎、容器、即时通讯、消息推送、短信、游戏云等多项服务,为移动开发提供强有力的后端支持。
- 2022-05-02 - 收藏WinPcap 官网
winpcap(windows packet capture)是windows平台下一个免费,公共的网络访问系统。开发winpcap这个项目的目的在于为win32应用程序提供访问网络底层的能力。它用于windows系统下的直接的网络编程。
- 2022-05-01 - 收藏Penetration Testing Tools Cheat Sheet
Welcome to HighOn.Coffee a Security Research and Penetration Testing Site, containing CTF walkthroughs and useful information.Penetration Testing Tools Cheat Sheet https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/
- 2022-05-01 - 收藏BeEF - The Browser Exploitation Framework Project
BeEF is a security tool, allowing a penetration tester or system administrator additional attack vectors when assessing the posture of a target
- 2022-05-01 - 收藏Wifiphisher 官网
Wifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.
- 2022-05-01 - 收藏Sqlmap 官网
sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.
- 2022-05-01 - 收藏