搜索资源列表
Sniffer
- 网络搜索工具,能够都网络的基本信息进行搜索,发现黑客攻击-a tool about internet find
Effect-of-meteor-shower-
- 黑客帝国中电脑界面的流星雨效果展示。 ACSII码随机滚动-Effect of meteor shower
Matrix-Digital-meteor-shower
- 黑客帝国数字流星雨,效果还行,希望大家喜欢-Matrix Digital meteor shower
scanner
- Scan是国内最著名的综合扫描器之一,它完全免费,是不需要安装的绿色软件、界面支持中文和英文两种语言、包括图形界面和命令行方式。主要由国内著名的民间黑客组织“安全焦点”完成,从2000年的内部测试版X-Scan V0.2到目前的最新版本X-Scan 3.3-cn都凝聚了国内众多黑客的心血。最值得一提的是,X-Scan把扫描报告和安全焦点网站相连接,对扫描到的每个漏洞进行“风险等级”评估,并提供漏洞描述、漏洞溢出程序,方便网管测试、修补漏洞. -Scan is one of the most
20081208picmuma
- 黑客联盟会员专用ms07004远程控制器ms07004-Hackers affiliate dedicated remote controller ms07004 ms07004
anhei
- 暗黑下载者源代码,仅供学习研究使用 下载者(Downloader)是一类计算机病毒程序,按照国际上的病毒命名惯例为“Trojan-Downloader”一类,这类木马程序的主要内容为:指引中毒用户的计算机到黑客指定的URL地址去下载更多的病毒文件或者木马后门文件并运行,使得黑客获得更大操作权限,为黑客后门技术奠定基础。通俗的说,就是自动下载病毒的程序-Diablo who download the source code, only to study the use downloaders
hackgame
- 黑客游戏,s根据邮件提示通关。测试你电脑技术。-hack game
HackerClanguagerProgramChapter1
- c语言黑客编程1, c语言黑客编程1-c programming language hacker 1, c programming language hacker 1, c language programming a hacker
HackerClanguagerProgramChapter2
- C语言黑客编程[2]---关机、重启、注销功能的实现,C语言黑客编程[2]---关机、重启、注销功能的实现-C language programming hacker [2]--- shutdown, restart, logoff function, C language programming hacker [2]--- shutdown, restart, logoff function realization
HackerClanguagerProgramChapter3
- C语言黑客编程[3]---编写带界面的关机程序,C语言黑客编程[3]---编写带界面的关机程序-C language programming hacker [3]--- prepared with the interface shutdown procedures, C language programming hacker [3]--- prepared with the interface shutdown procedures
HackerClanguagerProgramChapter4
- C语言黑客编程[4]---双管道主动连接型后门的编写,C语言黑客编程[4]---双管道主动连接型后门的编写-C language programming hacker [4]--- double pipe preparation of active connection type back door, C language programming hacker [4]--- double pipe preparation of active connection type back door
HackerClanguagerProgramChapter5
- C语言黑客编程[5]---单管道主动连接型后门的编写,C语言黑客编程[5]---单管道主动连接型后门的编写-C language programming hacker [5]--- single pipeline preparation of active connection type back door, C language programming hacker [5]--- single pipeline preparation of active connection type bac
HackerClanguagerProgramChapter6
- C语言黑客编程[6]---零管道主动连接型后门的编写,C语言黑客编程[6]---零管道主动连接型后门的编写-C language programming hacker [6]--- Zero pipeline preparation of active connection type back door, C language programming hacker [6]--- Zero pipeline preparation of active connection type back do
HackerClanguagerProgramChapter7
- C语言黑客编程[7]---单管道反向连接型后门的编写,C语言黑客编程[7]---单管道反向连接型后门的编写-C language programming hacker [7]--- single pipe reverse connection type back door preparation, C language programming hackers [7]--- single pipeline preparation of reverse connection type back do
HackerClanguagerProgramChapter8
- C语言黑客编程[8]---为后门加上密码验证功能,C语言黑客编程[8]---为后门加上密码验证功能-C language programming hacker [8]--- to the back door with a password verification function, C language programming hacker [8]--- plus for the backdoor password authentication function
HackerClanguagerProgramChapter9
- C语言黑客编程[9]---文件下载功能以及关机等功能的整合,C语言黑客编程[9]---文件下载功能以及关机等功能的整合-C language programming hacker [9]--- file download function and shutdown functions of integration, C language programming hacker [9]--- file download functions and features such as the integ
HackerClanguagerProgramChapter10
- C语言黑客编程[10]---注册表方式实现后门启动,C语言黑客编程[10]---注册表方式实现后门启动-C language programming Hacker [10]--- backdoor way to achieve the registry startup, C language programming hacker [10]--- start Registry backdoor way to achieve
HackerClanguagerProgramChapter11
- C语言黑客编程[11]---ActiveX方式实现后门启动,C语言黑客编程[11]---ActiveX方式实现后门启动-C language programming Hacker [11]--- ActiveX way to achieve backdoor start, C language programming hacker [11]--- ActiveX way to achieve backdoor start
HackerClanguagerProgramChapter12
- C语言黑客编程[12]---系统服务方式实现后门启动,C语言黑客编程[12]---系统服务方式实现后门启动-C language programming Hacker [12]--- backdoor way to achieve start system services, C language programming hacker [12]--- backdoor way to achieve start system services
Hacking_the_art_of_exploiting
- 黑客之道—漏洞利用的艺术,随书附带源代码,C语言,实验环境为linux-source code of Hacking:the art of exploiting,used in Linux OS and windows is the second choice