Location:
Search - JSky
Search list
Description: wu ewd weafwefewffwwewfqfqfwefwqf
Platform: |
Size: 1661579 |
Author: 王立 |
Hits:
Description: wu ewd weafwefewffwwewfqfqfwefwqf
Platform: |
Size: 1660928 |
Author: 王立 |
Hits:
Description: JAVA环境下的JAVA SKYPE 具体我也没用过请大家试下效果如何,来自外国一牛人-JAVA environment JAVA SKYPE specific I did not used please try again under the effect of how people from foreign countries a cow
Platform: |
Size: 2787328 |
Author: |
Hits:
Description: JSkyv1.0汉化版,Web漏洞的网站安全综合检测工具 :
SQL注入(SQL Injection ) 跨站脚本(XSS ) 不安全的对象引用(Unsecure object using ) 本地路径泄露(Local path disclosure ) 不安全的目录权限(Unsecure directory permissions ) 服务器漏洞如缓冲区溢出和配置错误(Server vulnerabilities like buffer overflow and configure error) 敏感目录和文件扫描(Possible sensitive directories and files scan ) 备份文件扫描(Backup files scan ) 源代码泄露(Source code disclosure ) 命令执行(Command Execute ) 文件包含(File Include ) Web木马后门(Web backdoor ) 敏感信息(Sensitive information ) -JSkyv1.0 Chinese Version, Web site security vulnerability detection tools integrated: SQL injection (SQL Injection) Cross-site scripting (XSS) secure the object reference (Unsecure object using) local path disclosure (Local path disclosure) insecure directory permissions (Unsecure directory permissions) server, such as buffer overflow vulnerabilities and configuration errors (Server vulnerabilities like buffer overflow and configure error) sensitive directory and file scanning (Possible sensitive directories and files scan) scan backup files (Backup files scan) source code leaked (Source code disclosure) command (Command Execute) file that contains (File Include) Web Trojan back door (Web backdoor) sensitive information (Sensitive information) and so on ......
Platform: |
Size: 6307840 |
Author: 李大海 |
Hits:
Description: jsky manual
may you use jsky read it
Platform: |
Size: 2141184 |
Author: leq |
Hits:
Description: 1,SQL注入(SQL Injection )
2、跨站脚本(XSS )
3、不安全的对象引用(Unsecure object using )
4、本地路径泄露(Local path disclosure )
5、不安全的目录权限(Unsecure directory permissions )
6、服务器漏洞如缓冲区溢出和配置错误(Server vulnerabilities like buffer overflow and configure error)
7、敏感目录和文件扫描(Possible sensitive directories and files scan )
8、备份文件扫描(Backup files scan )
9、源代码泄露(Source code disclosure )
10、命令执行(Command Execute )
11、文件包含(File Include )
12、Web木马后门(Web backdoor )
13、敏感信息(Sensitive information )(SQL injection (SQL Injection)
2, cross site scripting (XSS)
3, unsafe object reference (Unsecure object using)
4. Local path leaks (Local path disclosure)
5, unsafe directory permissions (Unsecure directory permissions)
6, server vulnerabilities such as buffer overflow and configuration error (Server vulnerabilities like buffer overflow and configure error)
7, sensitive directories and file scans (Possible sensitive directories and files scan)
8, backup file scan (Backup files scan)
9. Source code leaks (Source code disclosure)
10, command execution (Command Execute)
11. The file contains (File Include)
12, Web Trojan back door (Web backdoor)
13, sensitive information (Sensitive information))
Platform: |
Size: 49457152 |
Author: llody |
Hits: