Golden eye of red team penetration project
brief introduction
The project is based on the theme of the great James Bond film golden eye. The goal is to get the bottom flag TXT text information, the project is a necessary project environment for OSCP examination and training, and the author rated the environment as the penetration intermediate level difficulty. Next, no matter the zero ...
Posted by toms on Wed, 23 Feb 2022 15:12:27 +0100
No audio material for video creation? It only needs 16 lines of Python code, so you can't use it all. The steps are very detailed
preface
As a new generation of contemporary youth, should they be more or less able to make short videos? Haha, what about the creators of contemporary we media~
When making videos, how much do you need some funny sounds? Or strange sounds? Music, etc~
How slow it is to download one by one, let's use python to realize batch download tod ...
Posted by hhstables on Wed, 23 Feb 2022 15:03:01 +0100
mysql master-slave replication project practice
introduction
Recently, the little ape needs to be on the project according to the requirements of the leaders. The database needs to realize master-slave replication. The necessity and principle of master-slave replication of the database are not explained too much in this paper. Interested children's shoes can refer to some articles on the In ...
Posted by pugs1501 on Wed, 23 Feb 2022 15:01:22 +0100
H5 canvas introduction to mastery_ The second part (drawing text, pictures, coordinate system, canvas color and style, canvas drawing environment)
catalogue
1. Draw text
2. Draw image
(1) Basic drawing method
(2) Case: sequence frame animation
3. Drawing coordinate system
4. canvas color style and shadow
5.? Complex style
(1) Gradual change
(2) Draw background map
(3) Transformation (emphasis)
6. Related operations of drawing environment
1. Draw text
**ctx.font;** Set t ...
Posted by nerya on Wed, 23 Feb 2022 14:50:16 +0100
Javascript element related
JavaScript element related
Get element
According to tag id
document.getElementById();
According to tag name
document.getElementByTagName();
What is returned is the collection of obtained element objects, which are stored in the form of pseudo array. The objects in pseudo elements can be obtained by traversal, and the obtained element obje ...
Posted by danlayton00 on Wed, 23 Feb 2022 14:45:20 +0100
Redis data type
catalogue
1, String data type
2, List data type
3, Hash data type (hash type)
4, Set data type (unordered set)
5, Sorted Set data type (zset, ordered set)
1, String data type
Overview: string is the most basic type of redis, which can store up to 512MB of data. String type is binary safe, that is, it can store any data, such as numbers, ...
Posted by kingpin393 on Wed, 23 Feb 2022 14:41:04 +0100
Java knowledge point 03 - object oriented 02 (wrapper class, final keyword, abstract class, interface, internal class, Lambda, enumeration class, functional interface, Stream API)
Statement:
The information comes from your own arrangement.Reference book crazy Java handout (Fifth Edition) Li Gang © Write
1, Packaging
1.1 general
Java provides two type systems: basic type and reference type. Using basic type is efficient. However, in many cases, objects will be created for use, because objec ...
Posted by Addos on Wed, 23 Feb 2022 14:31:34 +0100
Machine Learning - Coursera Wu Enda machine learning tutorial Week9 learning notes (anomaly detection, recommendation system)
Anomaly detection
Establish a model p, which is similar to the probability of normal situation. If it is less than a certain value, it is considered to be abnormal.
Application scenario
Fraud detectionAbnormal parts detectionData center computer working condition monitoring
Gaussian distribution
parameter estimation
Let's give you a ...
Posted by alex clone on Wed, 23 Feb 2022 14:30:21 +0100
The 7th Blue Bridge Cup provincial competition
Number of briquettes (violence)
Description
There is a pile of coal balls, piled into a triangular pyramid. Specific:
One on the first floor,
Three on the second layer (arranged in a triangle),
6 on the third layer (arranged in a triangle),
10 on the fourth floor (arranged in a triangle)
If there are 100 floors, how many briquettes a ...
Posted by ravensshade on Wed, 23 Feb 2022 14:27:05 +0100
How to use Forbidden to bypass 4xx HTTP response status codes
About Forbidden Forbidden is a network security tool based on PycURL, which can help researchers easily bypass 4xx HTTP response status code.Forbidden uses multithreading mechanism and implements its function based on brute force cracking, so the tool may have some false positives. In addition, the script also supports color highlight output.T ...
Posted by Motionographer on Wed, 23 Feb 2022 14:17:29 +0100