Attack and defense world XCTF reverse advanced area (continuous update)

Words written in the front It's still a process of learning from the past and learning from the past. In addition, I hope I can finish the problem of more than 100 people in the advanced area earlier. Come on! (2020.6.2). Ah, the questions in the advanced area often change. The previous questions may ...

Posted on Thu, 25 Jun 2020 00:18:12 -0400 by knnakai

GMSSLGMSSL double certificate generation for novice

First of all, I'm not a professional in cryptography. I don't have the knowledge base in this area. This blog and the next blog are all based on the materials and blogs I can find on the Internet. I've explored and summed them up a little bit. I asked many predecessors and bloggers, but I didn't see ...

Posted on Wed, 24 Jun 2020 00:00:29 -0400 by Xyox

Summary algorithm (hash algorithm, hash algorithm)

A brief introduction to the algorithm The algorithm is also called hash algorithm and hash algorithm. It uses a function to convert any length of data into a fixed length data string (usually represented by a hexadecimal string). Python's hashlib provides common summary algorithms, such as MD5, SHA1, SHA512, and so on. Tips: It should be n ...

Posted on Mon, 08 Jun 2020 00:36:46 -0400 by Phpdiot

Public Number Development: Get User Messages and Reply Messages

Recently, I found it interesting to see the development documentation of WeChat Public Number. You can customize the development of some functions, such as making a slightly more complex response after someone has paid attention to the Public Number (simple replies are configurable in the Public Number background). For example, if a follower se ...

Posted on Sat, 06 Jun 2020 12:26:11 -0400 by ry4n0wnz

WeChat official account development study (1) -- official account number and server configuration

A new WeChat official account has been applied for. 1. Apply for the account of wechat public platform, and then apply for Tencent cloud recommended by him to do demo 2. After applying for centos host, get the public ip and password. After ssh login, follow the demo prompt 3. Install web.py. wget -c http://webpy.o ...

Posted on Mon, 27 Apr 2020 11:35:03 -0400 by Shaudh

JS SDK + PHP for wechat development to share friends / circle of friends, QQ/QQ space

1, Bind domain name First login WeChat public platform into the "official account settings" function settings to fill in the "JS interface security domain name". 2, Import JS file http://res2.wx.qq.com/open/js/jweixin-1.6.0.js 3, Inject permission validation configuration through config interface Put all the interfaces of JS ...

Posted on Wed, 22 Apr 2020 10:20:40 -0400 by grimz

JS-SDK + PHP developed by WeChat to realize recording, uploading and speech recognition

First look at the effect picture: first record, after the recording is successful, add the recording to the list, click the list to play; after the recording is completed, upload the recording, and then voice recognition.   Official wechat documents https://developers.weixin.qq.com/doc/offiaccount/OA_Web_Apps/JS-SDK.html Implementation process ...

Posted on Fri, 17 Apr 2020 11:41:22 -0400 by broomstick

8.2 introduction to common modules 2: xml,configparser,hashlib

xml: Introduction: contains functions about extensible markup language xml Use: python has three methods to parse XML--SAX,dom, and ElementTree. Because xml technology is backward, we will not introduce sax and DOM here:   xml text: <?xml version="1.0"?> <data> <fruit name="apple"> <color>red</color> ...

Posted on Wed, 15 Apr 2020 14:47:25 -0400 by btrsrinivasarao

13 encryption and decryption algorithms [4]

[10. SHA1 encryption of hash] SHA1 (English: Secure Hash Algorithm 1, Chinese Name: Secure Hash Algorithm 1) is a cryptographic hash function designed by the national security administration of the United States and published as the federal data processing standard (FIPS) by the National Institute of standards and Technology (NIST).SHA-1 ...

Posted on Sun, 05 Apr 2020 18:57:26 -0400 by Lol5916

How to find duplicate files in the system and quickly free disk space?

Whether it's a Windows computer or a Linux computer, there will be more or less many duplicate files left in the process of using. These files will not only occupy our disk, but also drag down our system, so it is necessary to kill these duplicate files. This article will introduce 6 ways to find duplicate files in the system, so that you can q ...

Posted on Tue, 10 Mar 2020 01:08:03 -0400 by cavendano