CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 源码下载

资源列表

« 1 2 ... .79 .80 .81 .82 .83 82784.85 .86 .87 .88 .89 ... 199244 »
  1. ntp-fingerprint.tar

    0下载:
  2. ntp弱点检测的代码,研究NTP的朋友可以好好看看 -ntp vulnerability detection code, research NTP friends can have a good look
  3. 所属分类:Exploit

    • 发布日期:2017-04-15
    • 文件大小:7.59kb
    • 提供者:
  1. nmap-6.47-win32

    0下载:
  2. nmap最新windows环境下的源代码,对提高大家的编程能力有很大帮助-The latest source nmap windows environment, to improve our programming skills are very helpful
  3. 所属分类:Exploit

    • 发布日期:2017-06-12
    • 文件大小:19.08mb
    • 提供者:胖子
  1. D-Link-DSL-2740R---Unauthenticated-Remote-DNS-Cha

    0下载:
  2. D-Link DSL-2740R - Unauthenticated Remote DNS Change Exploit
  3. 所属分类:Exploit

    • 发布日期:2017-04-12
    • 文件大小:1.24kb
    • 提供者:elis
  1. BadAndroid-v0.1

    0下载:
  2. BadAndroid v0.1 安卓恶意程序demo,仅供参考!-############################# ## BadAndroid v0.1 ## ## Android USB-Ethernet ## ## Emulation and DNS MitM ## ############################# ## Jakob Lell ## ## <jakob@srlabs.de>
  3. 所属分类:Exploit

    • 发布日期:2017-04-10
    • 文件大小:1.2kb
    • 提供者:林阳
  1. Heap memory

    0下载:
  2. Работа с heap by zltigo Структура heap: {first_heap_mcb| memory part} {heap_mcb| memory part}...{heap_mcb| memory part} heap_mcb - описатель элемента памяти (Memory Comtrol Block) memory part - элемент памяти, который описывается соответствующим MCB
  3. 所属分类:弱点检测代码

    • 发布日期:2015-02-14
    • 文件大小:3.5kb
    • 提供者:sanyakv@mail.ru
  1. heap memory C++

    0下载:
  2. Работа с heap by zltigo
  3. 所属分类:弱点检测代码

    • 发布日期:2015-02-14
    • 文件大小:4.15kb
    • 提供者:sanyakv@mail.ru
  1. codecheck

    0下载:
  2. 代码审计系统 PHP的 简单容易上手 准确率也不错-Code audit system
  3. 所属分类:Exploit

    • 发布日期:2017-05-30
    • 文件大小:12.07mb
    • 提供者:march0
  1. Altivec

    0下载:
  2. Altivec source codes
  3. 所属分类:Exploit

  1. upload-m

    0下载:
  2. substitution cipher is the method of encoding in which unit of plain text are replaced by cipher text. Monoalphabetic cipher uses a fixed message over entire message.A monoalphabetic cipher uses fixed substitution over the entire message.The monoalph
  3. 所属分类:Exploit

    • 发布日期:2017-04-25
    • 文件大小:8.85kb
    • 提供者:mathi
  1. uplod-1

    0下载:
  2. Constant k filters, also k-type filters, are a type of electronic filter designed using the image method. They are the original and simplest filters produced by this methodology and consist of a ladder network of identical sections of passive compone
  3. 所属分类:Exploit

    • 发布日期:2017-04-25
    • 文件大小:8.82kb
    • 提供者:mathi
  1. poly

    0下载:
  2. A polyalphabetic cipher is any cipher based on substitution, using multiple substitution alphabets. The Vigenère cipher is probably the best-known example of a polyalphabetic cipher, though it is a simplified special case.Polyalphabetic substitution
  3. 所属分类:Exploit

    • 发布日期:2017-04-25
    • 文件大小:8.93kb
    • 提供者:mathi
  1. Vigenere-Key-Method

    0下载:
  2. The Vigenère cipher is a method of encrypting alphabetic text by using a series of different Caesar ciphers based on the letters of a keyword. It is a simple form of polyalphabetic substitution.Though the cipher is easy to understand and implement, f
  3. 所属分类:Exploit

    • 发布日期:2017-04-17
    • 文件大小:9.87kb
    • 提供者:mathi
« 1 2 ... .79 .80 .81 .82 .83 82784.85 .86 .87 .88 .89 ... 199244 »
搜珍网 www.dssz.com