<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>扫描 &#8211; ChaBug安全</title>
	<atom:link href="/tags/%E6%89%AB%E6%8F%8F/feed" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>一个分享知识、结识伙伴、资源共享的博客</description>
	<lastBuildDate>Fri, 23 Aug 2019 01:17:12 +0000</lastBuildDate>
	<language>zh-CN</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.5.5</generator>
	<item>
		<title>御剑web目录扫描优化版</title>
		<link>/tools/652.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Sat, 06 Jul 2019 17:18:50 +0000</pubDate>
				<category><![CDATA[工具分享]]></category>
		<category><![CDATA[御剑]]></category>
		<category><![CDATA[扫描]]></category>
		<guid isPermaLink="false">/?p=652</guid>

					<description><![CDATA[简单优化了一下以前的工具，修正了一些问题。 御剑新版 https://pan.baidu.com/s/1yv6flUVrTaK3LUIrezr1rg 提取码：mhdd 解压密码：1...]]></description>
										<content:encoded><![CDATA[<p>简单优化了一下以前的工具，修正了一些问题。</p>
<p><a class="tag_link" title="浏览关于“御剑”的文章" href="/tags/%e5%be%a1%e5%89%91" target="_blank" rel="noopener noreferrer">御剑</a>新版 https://pan.baidu.com/s/1yv6flUVrTaK3LUIrezr1rg 提取码：mhdd</p>
<p>解压密码：1</p>
<p><span class="wpcom_tag_link"><a href="/tags/%e5%be%a1%e5%89%91" title="御剑" target="_blank">御剑</a></span>注册机</p>
<p>链接: https://pan.baidu.com/s/1LbqcW7aEGyiAm_mXdf6_cg 提取码: 46a4</p>
<p>截图</p>
<div class="post-image"><img loading="lazy" class="alignnone size-medium" src="https://i.loli.net/2019/03/25/5c98b7b462268.png" alt="御剑web目录扫描优化版-ChaBug安全" width="963" height="697" /></div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Python3多线程端口扫描脚本以及渗透常用端口号</title>
		<link>/tools/510.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Sun, 05 Aug 2018 06:53:08 +0000</pubDate>
				<category><![CDATA[工具分享]]></category>
		<category><![CDATA[编程学习]]></category>
		<category><![CDATA[python]]></category>
		<category><![CDATA[多线程]]></category>
		<category><![CDATA[工具]]></category>
		<category><![CDATA[扫描]]></category>
		<category><![CDATA[端口]]></category>
		<guid isPermaLink="false">/?p=510</guid>

					<description><![CDATA[&#160; 闲着无聊，总不能把python丢下，就写了这个小脚本，最近也慢慢在写自己用的工具，毕竟自己写的才是最顺手的。 参数说明 -a 扫描的IP地址 -t 超时 -p 扫描端...]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p>闲着无聊，总不能把<span class="wpcom_tag_link"><a href="/tags/python" title="python" target="_blank">python</a></span>丢下，就写了这个小脚本，最近也慢慢在写自己用的<span class="wpcom_tag_link"><a href="/tags/%e5%b7%a5%e5%85%b7" title="工具" target="_blank">工具</a></span>，毕竟自己写的才是最顺手的。</p>
<p><a href="/wp-content/uploads/2018/08/2018080514553069.png"><img loading="lazy" class="aligncenter size-full wp-image-511" src="/wp-content/uploads/2018/08/2018080514553069.png" alt="" width="472" height="147" /></a></p>
<h1>参数说明</h1>
<p>-a <span class="wpcom_tag_link"><a href="/tags/%e6%89%ab%e6%8f%8f" title="扫描" target="_blank">扫描</a></span>的IP地址</p>
<p>-t 超时</p>
<p>-p 扫描<span class="wpcom_tag_link"><a href="/tags/%e7%ab%af%e5%8f%a3" title="端口" target="_blank">端口</a></span> 支持1-65535格式，以-号连接</p>
<pre class="lang:default decode:true"> ____            _   ____
|  _ \ ___  _ __| |_/ ___|  ___ __ _ _ __
| |_) / _ \| '__| __\___ \ / __/ _` | '_ \
|  __/ (_) | |  | |_ ___) | (_| (_| | | | |
|_|   \___/|_|   \__|____/ \___\__,_|_| |_|

Have fun. Author:Y4er
usage: portscan.py [-h] -a HOST -t TIMEOUT [-p PORT]

optional arguments:
  -h, --help  show this help message and exit
  -a HOST     target host
  -t TIMEOUT  timeout
  -p PORT     target port</pre>
<h1>脚本代码</h1>
<pre class="lang:default decode:true">#!/usr/bin/env python3
# -*- coding: utf-8 -*-
# author:Y4er

import socket
import argparse
import threading

def banner():
	print(r'''
 ____            _   ____                  
|  _ \ ___  _ __| |_/ ___|  ___ __ _ _ __  
| |_) / _ \| '__| __\___ \ / __/ _` | '_ \ 
|  __/ (_) | |  | |_ ___) | (_| (_| | | | |
|_|   \___/|_|   \__|____/ \___\__,_|_| |_|
                                           
Have fun. Author:Y4er''')

def portscan(ip,port,timeout):
	try:
		socket.setdefaulttimeout(timeout)
		s = socket.socket()
		s.connect((ip,port))
		print('[+] {} is open.'.format(port))
		s.close()
	except:
		print('[-] {} is close.'.format(port))
	finally:
		pass

class MyThread(threading.Thread):
	"""docstring for MyThread"""
	def __init__(self,host,port,timeout):
		super(MyThread, self).__init__()
		self.host = host
		self.port = port
		self.timeout = timeout

	def run(self):
		portscan(self.host,self.port,self.timeout)


if __name__ == '__main__':
	def_ports = [21,22,23,25,80,110,137,138,139,443,445,873,888,1025,1433,1521,2082,2083,2222,3306,3311,3312,3389,4899,5432,5900,6379,7001,7002,7778,8000,8080,8888,11211,27017,43958,50000,65500]

	parser = argparse.ArgumentParser(usage=banner())
	parser.add_argument('-a',help='target host',dest='host',required=True)
	parser.add_argument('-t',help='timeout',dest='timeout',type=int,required=True)
	parser.add_argument('-p',help='target port',dest='port',required=False)
	args = parser.parse_args()
	threads = []

	if args.port:
		if '-' in args.port:
			limits = args.port.split('-')
			limits = list(map(int,limits))
			for port in range(limits[0],limits[1]+1):
				t = MyThread(args.host,port,args.timeout)
				threads.append(t)
	else:	
		for port in def_ports:
			t = MyThread(args.host,port,args.timeout)
			threads.append(t)
	for t in threads:
		t.start()
	for t in threads:
		t.join()</pre>
<p>&nbsp;</p>
<p><span class="wpcom_tag_link"><a href="/tags/%e5%a4%9a%e7%ba%bf%e7%a8%8b" title="多线程" target="_blank">多线程</a></span>的线程锁没加，也不会加，可能数据会有点乱，但是没事，看不瞎 &#8211; -。</p>
<h1>附上web中常用端口号</h1>
<pre class="lang:default decode:true">21 ftp 
 
22 SSH 
 
23 Telnet 
 
80 web 
 
80-89 web 
 
161 SNMP 
 
389 LDAP 
 
443 SSL心脏滴血以及一些web漏洞测试 
 
445 SMB 
 
512,513,514 Rexec 
 
873 Rsync未授权 
 
1025,111 NFS 
 
1433 MSSQL 
 
1521 Oracle:(iSqlPlus Port:5560,7778) 
 
2082/2083 cpanel主机管理系统登陆 （国外用较多）
  
2222 DA虚拟主机管理系统登陆 （国外用较多） 
 
2601,2604 zebra路由，默认密码zebra
  
3128 squid代理默认端口，如果没设置口令很可能就直接漫游内网了 
 
3306 MySQL 
 
3312/3311 kangle主机管理系统登陆 
 
3389 远程桌面 
 
4440 rundeck 参考WooYun: 借用新浪某服务成功漫游新浪内网 
 
5432 PostgreSQL 
 
5900 vnc 
 
5984 CouchDB http://xxx:5984/_utils/ 
 
6082 varnish 参考WooYun: Varnish HTTP accelerator CLI 未授权访问易导致网站被直接篡改或者作为代理进入内网 
 
6379 redis未授权 
 
7001,7002 WebLogic默认弱口令，反序列 
 
7778 Kloxo主机控制面板登录 
 
8000-9090 都是一些常见的web端口，有些运维喜欢把管理后台开在这些非80的端口上 
 
8080 tomcat/WDCP主机管理系统，默认弱口令 
 
8080,8089,9090 JBOSS 
 
8083 Vestacp主机管理系统 （国外用较多） 
 
8649 ganglia 
 
8888 amh/LuManager 主机管理系统默认端口 
 
9200,9300 elasticsearch 参考WooYun: 多玩某服务器ElasticSearch命令执行漏洞 
 
10000 Virtualmin/Webmin 服务器虚拟主机管理系统 
 
11211 memcache未授权访问 
 
27017,27018 Mongodb未授权访问 
 
28017 mongodb统计页面 
 
50000 SAP命令执行 
 
50070,50030 hadoop默认端口未授权访问</pre>
<p>这些差不多都写到了py脚本里。自用。</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Nmap使用及常用命令解析</title>
		<link>/tools/419.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Wed, 23 May 2018 07:54:47 +0000</pubDate>
				<category><![CDATA[工具分享]]></category>
		<category><![CDATA[nmap]]></category>
		<category><![CDATA[扫描]]></category>
		<guid isPermaLink="false">/?p=242</guid>

					<description><![CDATA[Nmap (“Network Mapper(网络映射器)”) 是一款开放源代码的 网络探测和安全审核的工具。它的设计目标是快速地扫描大型网络，当然用它扫描单个 主机也没有问题。Nm...]]></description>
										<content:encoded><![CDATA[<p><a href="https://nmap.org/images/sitelogo.png"><img loading="lazy" class="alignnone size-medium" src="https://nmap.org/images/sitelogo.png" width="168" height="90" /></a></p>
<blockquote><p>Nmap (<span class="quote">“Network Mapper(网络映射器)”</span>) 是一款开放源代码的 网络探测和安全审核的工具。它的设计目标是快速地<span class="wpcom_tag_link"><a href="/tags/%e6%89%ab%e6%8f%8f" title="扫描" target="_blank">扫描</a></span>大型网络，当然用它扫描单个 主机也没有问题。Nmap以新颖的方式使用原始IP报文来发现网络上有哪些主机，那些 主机提供什么服务(应用程序名和版本)，那些服务运行在什么操作系统(包括版本信息)， 它们使用什么类型的报文过滤器/防火墙，以及一堆其它功能。虽然Nmap通常用于安全审核， 许多系统管理员和网络管理员也用它来做一些日常的工作，比如查看整个网络的信息， 管理服务升级计划，以及监视主机和服务的运行。</p></blockquote>
<h2 id="参数">1. 参数</h2>
<table>
<thead>
<tr>
<th>option</th>
<th>note</th>
</tr>
</thead>
<tbody>
<tr>
<td>-sS</td>
<td>TCP SYN 扫描 (又称半开放,或隐身扫描)</td>
</tr>
<tr>
<td>-P0</td>
<td>允许你关闭 ICMP pings.</td>
</tr>
<tr>
<td>-sV</td>
<td>打开系统版本检测</td>
</tr>
<tr>
<td>-O</td>
<td>尝试识别远程操作系统</td>
</tr>
<tr>
<td>-A</td>
<td>同时打开操作系统指纹和版本检测</td>
</tr>
<tr>
<td>-v</td>
<td>详细输出扫描情况.</td>
</tr>
</tbody>
</table>
<h2 id="常用命令">2. 常用命令</h2>
<pre class="language-"><code>nmap -PN -n -F -T4 -sV -A -oG temp.txt <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span>
amap -i temp.txt
</code></pre>
<table>
<thead>
<tr>
<th>探测</th>
<th>cmd</th>
</tr>
</thead>
<tbody>
<tr>
<td>获取远程主机的系统类型及开放端口</td>
<td><code><span class="wpcom_tag_link"><a href="/tags/nmap" title="nmap" target="_blank">nmap</a></span> -sS -P0 -sV -O <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span></code></td>
</tr>
<tr>
<td>获取远程主机的系统类型及开放端口</td>
<td><code>nmap -sS -P0 -A -v <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span></code></td>
</tr>
<tr>
<td>检查特定端口是否开放</td>
<td><code>nmap -p <span class="token tag"><span class="token punctuation">&lt;</span>port<span class="token punctuation">&gt;</span></span> <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span></code> <code>nmap -p <span class="token tag"><span class="token punctuation">&lt;</span>port1<span class="token punctuation">&gt;</span></span>,<span class="token tag"><span class="token punctuation">&lt;</span>port2<span class="token punctuation">&gt;</span></span> <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span></code></td>
</tr>
</tbody>
</table>
<h2 id="Chapter_1_~::~_Nmap_Fundamentals">3. Chapter 1 ~::~ Nmap Fundamentals</h2>
<h4 id="Listing_open_ports_on_a_remote_host">3.0.1. Listing open ports on a remote host</h4>
<pre class="language-"><code>nmap hiren.com
</code></pre>
<h4 id="Version_detection">3.0.2. Version detection</h4>
<pre class="language-"><code>nmap -sV hiren.me
</code></pre>
<h4 id="Aggressive_detection">3.0.3. Aggressive detection</h4>
<pre class="language-"><code>nmap -sC -sV -O <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span>
</code></pre>
<h4 id="Finding_live_hosts">3.0.4. Finding live hosts</h4>
<pre class="language-"><code>nmap -sP 192.168.1.1/24
</code></pre>
<ul>
<li>Port list:
<pre class="language-"><code>nmap -p80,443 localhost
</code></pre>
</li>
<li>Port range:
<pre class="language-"><code>nmap -p1-100 localhost
</code></pre>
</li>
<li>All ports:
<pre class="language-"><code>nmap -p- localhost
</code></pre>
</li>
<li>Specific ports by protocols:
<pre class="language-"><code>nmap -pT:25,U:53 <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span>
</code></pre>
</li>
<li>Service name:
<pre class="language-"><code>nmap -p smtp <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span>
</code></pre>
</li>
<li>Service name wildcards:
<pre class="language-"><code>nmap -p smtp* <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span>
</code></pre>
</li>
</ul>
<p>Only ports registered in Nmap services:</p>
<pre class="language-"><code>nmap -p[1-65535] <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span>
</code></pre>
<h4 id="Scan_using_script">3.0.5. Scan using script</h4>
<pre class="language-"><code>nmap --script <span class="token tag"><span class="token punctuation">&lt;</span>script <span class="token attr-name">name</span><span class="token punctuation">&gt;</span></span> <span class="token tag"><span class="token punctuation">&lt;</span>host<span class="token punctuation">&gt;</span></span>
</code></pre>
<h4 id="Scanning_using_a_specified_network_interface">3.0.6. Scanning using a specified network interface</h4>
<pre class="language-"><code>nmap -e <span class="token tag"><span class="token punctuation">&lt;</span>INTERFACE<span class="token punctuation">&gt;</span></span> scanme.nmap.org
</code>

</pre>
<h1 id="Chapter_2_~::~_Network_Exploration">Chapter 2 ~::~ Network Exploration</h1>
<h4 id="Discovering_hosts_with_TCP_SYN_ping_scans">3.0.7. Discovering hosts with TCP SYN ping scans</h4>
<pre class="language-"><code>nmap -sP -PS 192.168.1.1/24
</code></pre>
<h4 id="Discovering_hosts_with_TCP_ACK_ping_scans">3.0.8. Discovering hosts with TCP ACK ping scans</h4>
<pre class="language-"><code>nmap -sP -PA <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span>
</code></pre>
<h4 id="Discovering_hosts_with_UDP_ping_scans">3.0.9. Discovering hosts with UDP ping scans</h4>
<pre class="language-"><code>nmap -sP -PU <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span>
</code></pre>
<h4 id="Discovering_hosts_with_ICMP_ping_scans">3.0.10. Discovering hosts with ICMP ping scans</h4>
<pre class="language-"><code>nmap -sP -PE hiren.net
</code></pre>
<h4 id="Discovering_hosts_with_IP_protocol_ping_scans">3.0.11. Discovering hosts with IP protocol ping scans</h4>
<pre class="language-"><code>nmap -sP -PO <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span>
</code></pre>
<h4 id="Discovering_hosts_with_ARP_ping_scans">3.0.12. Discovering hosts with ARP ping scans</h4>
<p>Effective for LAN network</p>
<pre class="language-"><code>nmap -sP -PR 192.168.1.1/24
</code></pre>
<h4 id="MAC_address_spoofing">3.0.13. MAC address spoofing</h4>
<p>Change your motherfking MAC adrs ~</p>
<pre class="language-"><code>nmap -sP -PR --spoof-mac 5C:4C:A9:F2:DC:7C
</code></pre>
<h4 id="Hiding_our_traffic_with_additional_random_data">3.0.14. Hiding our traffic with additional random data</h4>
<p>Generate Random Data</p>
<pre class="language-"><code>nmap -sS -PS --data-length 300 scanme.nmap.org
</code></pre>
<h4 id="Forcing_DNS_resolution">3.0.15. Forcing DNS resolution</h4>
<p>Force DNS resulation even if host is offline 🙁</p>
<pre class="language-"><code>nmap -sS -PS -F -R XX.XXX.XXX.220-230
</code></pre>
<h2 id="Chapter_3_~::~_Gathering_Additional_Host_Information">4. Chapter 3 ~::~ Gathering Additional Host Information</h2>
<h4 id="Getting_information_from_WHOIS_records">4.0.1. Getting information from WHOIS records</h4>
<pre class="language-"><code>nmap --script whois <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span>
</code></pre>
<h4 id="Collecting_valid_e-mail_accounts">4.0.2. Collecting valid e-mail accounts</h4>
<p>The script http-google-email is not included in Nmap&#8217;s official repository. So you need to download it from <a href="http://seclists.org/nmap-dev/2011/q3/att-401/" target="_blank" rel="noopener">http://seclists.org/nmap-dev/2011/q3/att-401/</a> http-google-email.nse and copy it to your local scripts directory. After copying http-google-email.nse , you should update the script database with:</p>
<pre class="language-"><code>nmap --script-updatedb
</code></pre>
<p>then</p>
<pre class="language-"><code>nmap -p80 --script http-google-email,http-email-harvest <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span>
</code></pre>
<h4 id="Discovering_hostnames_pointing_to_the_same_IP_address">4.0.3. Discovering hostnames pointing to the same IP address</h4>
<p><a href="https://secwiki.org/w/Nmap/" target="_blank" rel="noopener">https://secwiki.org/w/Nmap/</a> External_Script_Library .</p>
<pre class="language-"><code>nmap --script-updatedb
nmap -p80 --script hostmap nmap.org
</code></pre>
<h4 id="Brute_forcing_DNS_records">4.0.4. Brute forcing DNS records</h4>
<pre class="language-"><code>nmap --script dns-brute <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span>
</code></pre>
<h4 id="Fingerprinting_the_operating_system_of_a_host">4.0.5. Fingerprinting the operating system of a host</h4>
<pre class="language-"><code>nmap -O <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span>
</code></pre>
<h4 id="Discovering_UDP_services">4.0.6. Discovering UDP services</h4>
<pre class="language-"><code>nmap -sU -p- <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span>
</code></pre>
<h4 id="Listing_protocols_supported_by_a_remote_host">4.0.7. Listing protocols supported by a remote host</h4>
<pre class="language-"><code>nmap -sO <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span>
</code></pre>
<h4 id="Discovering_stateful_firewalls_by_using_a_TCP_ACK_scan">4.0.8. Discovering stateful firewalls by using a TCP ACK scan</h4>
<pre class="language-"><code>nmap -sA <span class="token tag"><span class="token punctuation">&lt;</span>target<span class="token punctuation">&gt;</span></span>
</code></pre>
<h5 id="Port_states">Port states</h5>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>AWVS11注册机+汉化包</title>
		<link>/tools/341.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Fri, 26 Jan 2018 22:31:43 +0000</pubDate>
				<category><![CDATA[工具分享]]></category>
		<category><![CDATA[AWVS]]></category>
		<category><![CDATA[扫描]]></category>
		<guid isPermaLink="false">/?p=47</guid>

					<description><![CDATA[来自 52pojie Hmily AWVS11 压缩包包含一个原版和一个破解patch程序，解压密码 www.52pojie.cn 注：补丁必须解压出来运行才可以，禁止直接在压缩包...]]></description>
										<content:encoded><![CDATA[<p>来自 52pojie Hmily</p>
<h1><span class="wpcom_tag_link"><a href="/tags/awvs" title="AWVS" target="_blank">AWVS</a></span>11</h1>
<p>压缩包包含一个原版和一个破解patch程序，解压密码 <code>www.52pojie.cn</code></p>
<blockquote><p>注：补丁必须解压出来运行才可以，禁止直接在压缩包中打开。如果补丁界面字体挡住按钮，请将系统字体DPI调成正常，重新打开补丁即可。</p></blockquote>
<h1>汉化</h1>
<p>效果图<br /><img src="https://wx4.sinaimg.cn/large/006xriynly1fnudoxbuqmj31hc0smgop.jpg" alt="image" title="image"></p>
<p>下载链接: <a href="https://pan.baidu.com/s/1gg831Mb">https://pan.baidu.com/s/1gg831Mb</a> 密码: g5mi</p>
<pre><code>Acunetix Web Vulnerability Scanner 11.x Service Provider License KeyGen By Hmily[LCG].exe
MD5: 52BC7C27598D86197DC5EC4663DFF214
Acunetix_Web_Vulnerability_Scanner_11.x_Service_Provider_License_KeyGen_Hmily[LCG].rar
MD5: C7F99094664FCE1FBF20CC5456D97F90</code></pre>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
