angr_ctf - learn angr from 0: angr introduction and core concepts

When I was learning angr, I first read the papers published by the developers on IEEE IEEE Xplore Full-Text PDF: This article describes the background and methods of automated vulnerability mining, and introduces the architecture and core modules of angr. It is very classic and worth reading. Then, I read the angr official documentation and API ...

Posted by dionsweet on Tue, 29 Nov 2022 12:38:06 +0300

Digital Image Processing--Image Filtering

Digital Image Processing – Image Filtering 1 main content A. Select the experimental image for the experiment, complete image reading and display, and add noise to the image; B. Write the filter functions of three image filters; Among them, the general specific implementation steps of mean filtering are: 1. Select a (2n+l) x (2n+l) wind ...

Posted by jd57 on Tue, 29 Nov 2022 05:01:34 +0300

FastAPI from entry to actual combat - setting Cookie and Header parameters

The previous article recorded the content related to front-end authentication. This note mainly records the content related to the request header, including a request message analysis of http, fastapi setting cookie and parameters, fastapi setting request header parameters, etc. HTTP Request The HTTP request message is divided into three pa ...

Posted by jaymoore_299 on Tue, 29 Nov 2022 02:52:41 +0300

Xuanzi Java Basic Notes 2

User interaction Basic Scanner package CH02_JAVAProcessControl; //Basic Scanner import java.util.Scanner; //Guide package public class XZ01_UserInteraction { public static void main(String[] args) { Scanner input = new Scanner(System.in); //Create a Scanner object System.out.println("Please enter 1"); if (input.h ...

Posted by marsooka on Mon, 28 Nov 2022 07:52:35 +0300

Detailed JDBC usage

Introduction to JDBC Java Database Connectivity, (Java Database Connectivity, referred to as JDBC) is an application programming interface used in the Java language to regulate how client programs access the database, and provides methods such as querying and updating data in the database. JDBC is also a trademark of Sun Microsystems. We usua ...

Posted by naomi385 on Sun, 27 Nov 2022 20:52:51 +0300

Evolution based on session login

1. Send mobile phone verification code: Submit mobile phone number-check mobile phone number-generate verification code->save to session->send verification code public Result sendCode(String phone, HttpSession session) { // 1.Verify phone number Boolean phoneInvalid = RegexUtils.isPhoneInvalid(phone); // 2.If not, ...

Posted by ferpadro on Sat, 26 Nov 2022 17:52:21 +0300

Safe Programming Technology Experiment 5

Use of WindowsCryptoAPI 1. Purpose of the experiment This experiment is a design experiment, and the purpose of the experiment is as follows: 1. Familiar with the common function interfaces provided by WindowsCryptoAPI. 2. Master the use of WindowsCryptoAPI. 2. Experimental content and steps 1. Familiar with the common function interfaces provi ...

Posted by rhiza on Sat, 26 Nov 2022 12:32:15 +0300

Graph theory knowledge point all-star

Save rp before the NOIP exam. Graph theory is a branch of mathematics, and graphs are the main research object of graph theory. A graph is a graph composed of a number of given vertices and edges connecting two vertices. This graph is usually used to describe a specific relationship between certain things. Vertices are used to represent things, ...

Posted by kaimason1 on Fri, 25 Nov 2022 06:07:16 +0300

Go | Function Notes

summary of details The function's formal parameter list can be multiple, and the return value list can also be multiple The data type of the formal parameter list and the return value list, which can be a value type or a reference type The name of the function follows the identifier naming convention. The first letter cannot be a number. ...

Posted by jmansa on Thu, 24 Nov 2022 12:38:42 +0300

Non-empty, default value, unique value, primary key, self-increment, foreign key of field constraints

field constraints unsigned, zero-filled unsigned id int unsigned Cancel the plus and minus signs zerofill id int(5) zerofill Fill with 0 when there are less than 5 numbers non empty ​ All terminal types can be empty by default without constraints create table h1( id int, name varchar(32), ); insert into h1(id) values(2); insert into h1 ...

Posted by jlarson on Thu, 24 Nov 2022 12:21:05 +0300