0day-security-software-vulnerability-analysis-technology
《0day安全:软件漏洞分析技术(第二版)》随书资料包使用注意事项
资料包中资料仅用于学习目的,任何组织、个人、机构不可以任何形式利用资料包中的资料进行商业盈利目的的活动。
资料包中的部分资料和实验代码有可能引起某些安全软件的报警,书籍作者,出版社,看雪论坛对这些使用这些资料造成的后果概不负责,请您在充分了解这些资料用途的基础上慎用。
任何组织、个人、机构不得利用本书及相关资料进行任何形式的非法活动。
root@Jas502n:/tmp/0day2# git push -u origin master
Username for 'https://github.com': jas502n
Password for 'https://[email protected]':
Counting objects: 1777, done.
Compressing objects: 100% (1702/1702), done.
Writing objects: 100% (1777/1777), 552.35 MiB | 4.50 MiB/s, done.
Total 1777 (delta 698), reused 0 (delta 0)
remote: Resolving deltas: 100% (698/698), done.
remote: warning: GH001: Large files detected. You may want to try Git Large File Storage - https://git-lfs.github.com.
remote: warning: See http://git.io/iEPt8g for more information.
remote: warning: File 19EMail的漏洞挖掘/kerio-kms-6.7.3-7919-win32.exe is 67.39 MB; this is larger than GitHub's recommended maximum file size of 50.00 MB
remote: warning: File 19EMail的漏洞挖掘/turbomail_win_430.exe is 69.93 MB; this is larger than GitHub's recommended maximum file size of 50.00 MB
remote: warning: File 27MS06-055分析实战HeapSpray/VUL_PE/VGX_diff.db is 59.66 MB; this is larger than GitHub's recommended maximum file size of 50.00 MB
To https://github.com/jas502n/0day-security-software-vulnerability-analysis-technology
ede8aa1..dddbe7c master -> master
Branch master set up to track remote branch master from origin.
root@Jas502n:/tmp/0day2#
百度云盘下载
链接:https://pan.baidu.com/s/1KTkeLqib6jCxvqkH-Fo7NQ 密码:znh8
解压密码:0day2