搜索资源列表
BMPlib
- DOS环境下面,实现屏幕截屏操作,生成BMP文件,附源码(C)-DOS environment to achieve the screen of attack operations, generating a BMP file with source code (C)
33_s65screen
- 西门子 X65 系列手机截屏工具,Delphi源码,通过COM口数据线连接手机截取手机屏幕。-Siemens mobile X65 series of attack tools, Delphi source, through the COM port data link to the interception of mobile phone screens.
formerattack
- 以前常用的攻击软件源代码,不过对于初学者还是具有很强的指导意义。-used before the attack software source code, but for a beginner or have a strong guiding significance.
riptideAnyWhere1
- 远程控制软件源代码,采用异步事件选择模型,截屏压缩传输等也具有参考价值。-remote control software source code, using asynchronous events choice model, compression and transmission of attack also with reference value.
TribeFloodNet2k
- Tribe FloodNet 2k Distributed Denial Of Service Network 分布式拒绝服务工具的源代码,下面为英文说明: TFN can be seen as the yet most functional DoS attack tool with the best performance that is now almost impossible to detect. What is my point in releasing th
udpfloodAttack
- UDP洪水攻击程序源码.威力很大.不要拿它来作坏噢-UDP Flood attack procedure source. Powerful. Not bad for the staff to Oh
AttackToolKitv4.0
- 这是一款基于Microsoft Windows 框架使用的开源安全扫描工具,可以用来检测系统安全漏洞和增强安全审计,可以生成详细的html、text和Nessus nsr 结果和攻击分析报告,支持CVE names、SecurityFocus、CERT、Snort、Nessus NASL等。内附源代码。-It is a Microsoft Windows-based framework for the use of open-source security scanning tools, Det
DCT_watermark
- 全套的DCT域数字水印源代码(本人毕业设计成果)内容包括:水印嵌入,水印检测,攻击实验以测试鲁棒性,重要参数计算。希望对做数字水印的XDJM有所帮助。-complete DCT digital watermarking source code (I graduated design results) include : watermark embedding, Watermark detection, attack experiment to test the robustness, an im
WinJPEG(GDI+)Exp_MS04-028.c
- 工具分类:攻击程序 运行平台:Windows 工具大小:7577 Bytes 文件MD5 :28f6d5f4d818438522a3d0dc8a3fa46b 工具来源:securiteam.com // GDI+ buffer overrun exploit by FoToZ // NB: the headers here are only sample headers taken from a .JPG file, // with the FF FE 00 01 inserted in hea
atackanddefeng
- 《攻击与防护网络安全与实用防护技术》源代码,一本好书-"attack and defense network security protection technology and practical" source code, a good book
arpguard
- 防止arp欺骗,保护网络的安全。比较好的学习arp的源代码。 经测试可有效应对网络执法官、netcut等工具,对于网络执法官等造的IP冲突,可不于理睬,把提示窗口拖到不碍眼的地方(win2000)即可,不影响上网。可以显示攻击的MAC地址。 支持连续防护和仅需要时防护两种模式。程序退出时自动保存设置(网卡选择和防护模式),自动恢复本机环境,自动检测网关变化,方便笔记本使用。版权归作者所有!-prevent fraud, the protection of the network sec
AeroModelHighAlpha
- 一段用于飞行器大攻角情况的matlab源程序,希望对从事航空工程设计的人员有一些用途.-aircraft for a large angle of attack of the Matlab source, hope to engage in aeronautical engineering design of some use.
QQgongji
- QQ攻击源代码.很简单的实现消息攻击.一个例子.可以自己增加功能-QQ attack the source code. Implementation is very simple message attack. One example. Can increase their own function
changyonggongjichengxuCyuanma1
- 常用攻击程序的C源代码,有些老但很有名,有兴趣的人可以学习学习-procedures used to attack the C source code, but some of the famous old, interested people can learn from
changyonggongjichengxuCyuanma2
- 常用攻击程序的C源代码,有些老,但很有名,有兴趣的人可以学习学习-procedures used to attack the C source code, some old, but well-known, interested people can learn from
IPfgzrar
- IP反向追踪技术综述 拒绝服务攻击(DoS)给政府部门和商业机构造成了严重的经济损失和社会威胁。IP追踪技术能够反向追踪IP数据包到它 们的源头,所以是识别和阻止DoS攻击的重要一步。本文针对DoS攻击,对比分析了各个IP反向追踪方法的基本原理和优缺点。 关键词 DoS攻击 主动追踪 反应追踪-IP traceback Technology denial of service attacks (DoS) to government departments and commercial
以前常用的攻击软件源代码
- 以前常用的攻击软件源代码-used before the attack software source code
c源码常用攻击程序
- C源码:常用攻击程序-C source : Attack procedures
DESCrack
- DES查分攻击源代码,包含DES算法的实现以及DES密码的查分攻击。-DES check points attacks source code contains the DES algorithm realization of the investigation DES-attack.
Smurf
- smurf攻击是很简单的,它有一些IP(广播地址)地址列表,发出了一些伪造的数 据包(ICMP echo request)从而导致一场广播风暴,可以使受害主机(使它成为伪造包 的源地址)崩溃。-enormously attack is very simple, it has some IP (radio address) address list, issued some fake data packets (ICMP echo request) resulting broadcast stor