root@kali:/usr/share/metasploit-framework/tools# ls 이 위치에 많은 tool들이 존재한다. root@kali:/usr/share/metasploit-framework/tools# ./pattern_create.rb 5000Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab5Ab6Ab7Ab8Ab9Ac0Ac1Ac2Ac3Ac4Ac5Ac6Ac7Ac8Ac9Ad0Ad1Ad2Ad3Ad4Ad5Ad6Ad7Ad8Ad9Ae0Ae1Ae2Ae3Ae4Ae5Ae6Ae7Ae8Ae9Af0Af1Af2Af3Af4Af5Af6Af7Af8Af9Ag0Ag1Ag2Ag3Ag4Ag5Ag6Ag7Ag8Ag9Ah0Ah1Ah2Ah3Ah4Ah5Ah6Ah7Ah8Ah9Ai0Ai1Ai2Ai..
http://fliphtml5.com/gvunv/sefc/basic
https://soooprmx.com/archives/4056
https://opentutorials.org/module/2086/12091
import sqlite3 conn = sqlite3.connect("test.db") cur = conn.cursor()sql = "select * from customer where category=? and region=?"cur.execute(sql, (1, 'SEA'))rows = cur.fetchall()for row in rows: print(row) conn.close() #Namedsql = "select * from customer where id = :Id"cur.execute(sql, {"Id": 1})
import sqlite3 conn = sqlite3.connect("asdf.db") cur = conn.cursor()cur.execute("SELECT * FROM general") rows = cur.fetchall()for row in rows: print(row) conn.close() hyomin@ubuntu:~/flask_project$ python sql.py (1, u'\uc655\uac74', 89)(2, u'\ubc15\uc220\ud76c', 97)(3, u'\uc655\uc2dd\ub834', 84)(4, u'\uc2e0\uc22d\uacb8', 98)(5, u'\uad81\uc608', 77)(6, u'\uc720\uae08\ud544', 99)(7, u'\ub2a5\ud658..
>> sql_test.py import sqlite3 as liteimport time database_filename = 'test.db'conn = lite.connect(database_filename)cs = conn.cursor() #drop tablequery = "DROP TABLE IF EXISTS t1"cs.execute(query) #create tablequery = "CREATE TABLE IF NOT EXISTS t1 (id INTEGER PRIMARY_KEY NOT_NULL, name VARCHAR(255), at DATETIME)"cs.execute(query) #insert tablechars = "abcdefghijklmnopqrstuvwxyz"for a in range(l..
- pwable
- heap
- fastbin
- SQLi
- TLS
- stack reusing
- fastbindup
- ebp change
- HackCTF
- 해킹
- oob
- hacking
- pwnable
- overflow
- shellcoding
- 본선가고싶다
- rt_sigreturn
- glibc
- srop
- codegate
- pwnable.tw
- FSB
- exit
- tcache
- fsop
- Total
- Today
- Yesterday