搜索资源列表
Graph
- 复杂网络的一些节点面对攻击的代码,包括模型的产生。-Some of the complexity of the network nodes of the face of attack code, including the selection of models.
Internet_Attack
- 无线网络攻击方式,简要讨论了无限网络的攻击方式-Internet Attack
Asequence-basedembeddedDCTdomainwatermarkingalgori
- ,应用MATLAB仿真按序选择嵌入位的DCT变换算法,对仿真程序运行后的各种参数 和效果图的变化进行了分析;最后结合GUI开发设计出数字水印执行过程仿真控制界面,并用常见的水印攻击测试了该算 法的鲁棒性。-Application MATLAB simulation embedded spaces in sequence selection algorithm of DCT transform, simulation program running on the various param
gongji
- 对嵌入水印的图象进行不同的攻击 添加噪音,滤波,剪切,压缩,旋转45度-Watermark on the images embedded in a different attack to add noise, filter, shear, compression, rotating 45 degrees
arpsproof
- 进行arp攻击的程序 网络编程-Arp attack procedures for network programming
gui
- 各种数字水印的嵌入和提取 检测和攻击 包括lsb 和dct等算法-A variety of digital watermark embedding and extraction, including detection and attack, such as algorithm lsb and dct
Stirchmark
- 学习数字水印技术必备的水印攻击软件!无论对于初学者还是有定基础的都适用!-strmark
Socket-basedportscanner
- 基于Socket编写端口扫描器端口扫描技术和网络攻击论文-Socket-based port scanner port scan the preparation of technical papers and network attacks
hundun_svd_0525
- 效果非常好的数字水印的源代码,实现了基于小波变换的奇异值分解算法,选取载体图像的LH子带作为载体,并进行攻击测试算法性能-The effect of a very good source of digital watermarking, wavelet transform based on the realization of the singular value decomposition algorithm, select the carrier of the LH sub-band ima
ipMsg
- Java编写的飞鸽传书软件,其中功能包括:聊天、传送文件、添加好友、黑名单、局域网攻击等-Dove Java Chuanshu prepared software, which features include: chat, send file, add a friend, blacklisted, LAN attacks
200904httpzhuaji-77169.com
- http 攻击 被攻击ip地址 被攻击端口 伪造ip 伪造端口 2.开始攻击 tcpps端口扫描使用流程: 1.运行程序 输入参数 输入格式:tcpps 被扫描ip地址 2.输出显示:正在使用的端口号 -dosattack completion of the function : ip hidden dos attack using processes -扫描并攻击被攻击ip地址 被攻击端口 伪造ip 伪造端口 2.开始攻击 tcpps端口扫描使用流程: 1.运行程序 输入参数 输入格式:t
buffer-overflow
- 详细介绍缓冲区溢出攻击技术的书籍,里面附带相关实例分析,初学者很值得一看-Details of buffer overflow attacks technology books, which included the relevant case studies, beginners are worth a visit
02073055
- arp欺骗攻击程序,,可以实现局域网内的ARP欺骗攻击,刚做完的计算机网络作业,,给初学者一个参考吧。-arp spoofing attack program can be achieved within the LAN ARP spoofing attack, just finished a computer network operations, to give beginners a reference bar.
optimark_manual
- 水印攻击测试程序optimark。 这个比stirmark更全面测试水印程序,很好用-Watermark attack test program optimark. This more comprehensive test than stirmark watermark program, very good use
CollectionsofWaterMarkingAttack
- 关于各种数字水印攻击的MATLAB代码,可以用于仿真实验,调用方便简单-Digital watermarking attacks on a variety of MATLAB code that can be used for simulation experiments, to facilitate a simple call to
WebKnight(1)
- weknight是开源的应用层防御软件,防御针对IIS的网络攻击,是window平台下不多的几个开源防御IIS的软件,软件使用C++编写,软件的架构等等都很值得学习。-weknight is open source software application layer defense, defense against network attacks IIS is a window platform the few open-source defense IIS software, softwar
w123zh
- 很强大的一个网站攻击器,于11月18日作者放弃此程序放出源码,目前程序的版本是4.5版本. 这程序是w123zh制作的一个黑客工具,攻击方面也不错,希望大家可以继续发展此程序-Very powerful device attack on a website on November 18 by release source code to give up this program, the current program version is version 4.5. W123zh This
ARPAttact
- ARP attack,在一个局域网内攻击的小程序-ARP attack, at a LAN attack applet
c1
- c实现的缓冲区溢出攻击 介绍了如何用c语言实现缓冲区攻击-c realization of buffer overflow attacks describes how to use c language to achieve a buffer attack
ARP
- apr局域网攻击 适合SOKET初学者学习-arp attack