Seven Travelers Blog - focus on network security, hacker technology enthusiast
  • Seven Walker IP Agent Verification V1.4 IP Agent Software

    Seven Travelers IP proxy verification (free software) is to facilitate people to use agents to browse foreign websites, and to improve the speed of popular network users to browse the scientific research and education network. The software has powerful functions, such as obtaining the latest proxy IP with one key, one key verification, and one key cleaning of useless IP. One click to set IE proxy, one click to cancel IE proxy, etc! The main features are: 1. You can get the latest domestic and foreign proxy IP every day with one key, verify with one key, and clean up useless IP with one key. 2. You can import your own file into the proxy list in txt format to the software. And it's very fast read the whole passage
    Author: qxz_xp | Published: September 11, 2013 | Classification: Hacker Tools , Hacker attack and defense | 97 comments
  • Multifunctional notepad for hackers

    The multi-function notepad for hackers is very powerful, and is suitable for the use of various black broadsides as a tutorial. Software function: It integrates all the functions of Notepad. This Notepad is not an ordinary notepad. It can add pictures and double click to open a website. Intrusion common commands, online translation, auxiliary functions include MD5 decryption, common website query, etc. Social worker assistance, IP proxy website, one sentence trojan, etc. General tools include all functions of the control panel on the computer, system functions, CC attackers, etc. Software screenshot: Software Download Location read the whole passage
    Author: qxz_xp | Published: July 12, 2013 | Classification: Hacker Tools , Hacker attack and defense | 23 comments
  • WIFI master key (except advertising display password version)

    This version thanks to God [YYY] for modification and sharing. The specific features are as follows: ◎ Based on the latest domestic version (theoretical support for Android P) ◎ Replace the package name, do not update, do not roll over, stable and easy to use ◎ The new password will be displayed in color below the hotspot ◎ Intelligent password display, blank password and copy button will not be displayed when no password is obtained ◎ Remove nearly 98% of redundant code&layout&advertising&permission ◎ Brand new interface, retaining the top bar, switch and portable Wifi button ◎ The built-in browser is removed, and the connection is successful without jumping ◎ Removing obstacles read the whole passage
    Author: qxz_xp | Published: August 29, 2018 | Classification: Hacker Tools , Hacker attack and defense | 12 comments
  • Code editor (Notepad++) v7.6.4 Chinese free version

    Notepad++is a very unique editor. The software is compact and efficient, supporting 27 programming languages, including C, C++, Java, C #, XML, HTML, PHP, JS, etc. It is open source software, which can be used for free, and also supports various popular computer programming languages. The editor can run under Microsoft's Windows system environment. Its use is protected by the GPL license. It supports the following languages: C, C++, Java, C #, XML, HTML, PHP, and Javascript. Download address: https://pan.baidu.com/s/1rKKdpFNvn... read the whole passage
    Author: qxz_xp | Release: July 2, 2018 | Classification: Computer maintenance , computer software | No comment
  • Learn about the post penetration tool Koadic

    preface: I saw a recommended tool Koadic on a friend's blog. After I contacted it, I found that it was very good. I thought that the power of this tool was the various module functions after I got the shell. I will write it myself and send it to you. First, clone the project locally: Project address https://github.com/zerosum0x0/koadic.git Then unzip it. If you want to install it to the directory you specified, you should first cd it to that directory and download it. I copied it there, so I unzip it. As shown below   Run koadic cd ko... read the whole passage
    Author: qxz_xp | Published: December 9, 2017 | Classification: Hacker technology , Hacker attack and defense | 5 comments
  • Burpsuite 1.7.03, the latest cracked version of penetration artifact

    The cracking software provided in this article is for software trial only, please delete it within 24 hours. As we all know, Burp Suite is a resounding web application penetration test integration platform. From the initial mapping and analysis of the application attack surface to the process of finding and exploiting security vulnerabilities, all tools work together seamlessly to support the overall test program. All tools in the platform share the same robust framework to uniformly handle HTTP requests, persistence, authentication, upstream agents, logging, alarms, and scalability. Burp Suite allows attackers to read the whole passage
    Author: qxz_xp | Published: August 1, 2016 | Classification: Hacker Tools , Hacker attack and defense | 4 comments
  • How to deal with old mobile phones, which 99% of people don't know

    Internet technology is changing with each passing day, and mobile phone products are constantly updated and iterated. I believe that many small partners are the same as Xiao Bian. Kidney 3, Kidney 4, Kidney 5, Kidney 6, Kidney 7 is coming soon. What about updating old mobile phones? Where have all your old mobile phones gone? When the Internet has completely penetrated into all aspects of our lives, the recycling of second-hand mobile phones will naturally be thought of through the Internet. As a result, online second-hand 3C product trading platforms, such as idle fish, have gradually become popular, and even O2O recycling platforms, such as AiRecycle, are constantly targeting this increasingly read the whole passage
    Author: qxz_xp | Published: March 22, 2016 | Classification: Safety knowledge , network security | 27 comments