搜索资源列表
CS-recovery-LevelSet-Normals
- 压缩感知恢复算法,使用新的范数来提升图像恢复能力,包含论文和代码。-We propose a compressive sensing algorithm that exploits geometric properties of images to recover images of high quality few measurements. The image reconstruction is done by iterating the two following steps: 1) e
bh-ad-12-stealing-from-thieves-Saher-slides
- How to crack IonCube pdf Breaking IonCube VM to RE Exploit Kits
sourcx
- C源码Linux的nfsd存在溢出漏洞允许入侵者远程获取root-C source Linux NFSD exist exploit allows the invaders remote access to the root
Linux
- C源码Linux的nfsd存在溢出漏洞允许入侵者远程获取root-C source Linux NFSD exist exploit allows the invaders remote access to the root
Shoping
- java商城系统的开发,非常完善的商城系统-java Shopping system exploit
uractal
- 本实验要求利用微软的socket编程一段程序,可以利用TCP 协议或者UDP协议(This experiment required to exploit the Microsoft socket programming a program, can use TCP or UDP protocol)
vertizalwoad
- 本实验要求利用微软的socket编程一段程序,可以利用TCP 协议或者UDP协议(This experiment required to exploit the Microsoft socket programming a program, can use TCP or UDP protocol)
pwn3
- pwn编写利用脚本,例子说明如下,便于大家来学习。(learn pwn exploit,very help)
Dan2cp - Mianyuan
- 介绍了当今最流行的面向对象的程序设计方法,讨论了这种方法应用在面元法计算中的优点,并详细介绍了该如何用图形用户界面去开发面向对象的面元法程序。(It introduces the object-oriented method which is most popular by now, and discusses the advantage of this method using in the panel method and how to use the Graphical Users Int
Automatic posing of a meshed human model
- 我们采用无办法变形质量人体模板的网格从其原来的姿势对点云数据指定不同的姿势。在此方法中,我们首先建立粗模板网格和点云通过压缩的光谱嵌入技术,利用人体四肢之间的对应关系。基于这些对应关系,我们定义使用弹性能量泛函的非刚性配准的目标和应用离散的梯度流,以减少粗控制网格和点云之间的区别。然后可从之后使用均值坐标控制网格的变形变形的模板网格。(We employ a deformable, deformable human body template mesh to specify different
MIMO Estimation
- n radio, multiple-input and multiple-output, or MIMO is a method for multiplying the capacity of a radio link using multiple transmit and receive antennas to exploit multipath propagation.[1] MIMO has become an essential element of wireless communic
efaicrent
- C源码Linux的nfsd存在溢出漏洞允许入侵者远程获取root(C source Linux NFSD exist exploit allows the invaders remote access to the root)
揭秘家用路由器0day漏洞挖掘技术
- 揭秘家用路由器0day漏洞挖掘技术, 用IDA挖掘路由器漏洞的方法(book to show how to exploit network device security)
i2c总线协议(英文版)
- In consumer electronics, telecommunications and industrial electronics, there are often many similarities between seemingly unrelated designs. For example, nearly every system includes: · Some intelligent control, usually a single-chip microcont
avast_aswFW_mem_pool_corr
- Old avast memory corruption
smb
- source code for SMB exploit
lfm
- 线性调频脉冲压缩雷达仿真程序.仿真程序模拟产生理想点目标的回波,并采用频域相关方法(以便利用FFT)实现脉冲压缩。-线性调频脉冲压缩雷达仿真程序(A chirp pulse compression radar simulation program simulates the echoes that produce the ideal point target and implements pulse compression using the frequency-domain correlati
treatment for flash drive (WormVBSCantix.A)
- Treatment for flash drive (Bundpil.Shortcu; Mal/Bundpil-LNK; Ramnit.CPL; Serviks.Shortcut; Troj/Agent-NXIMal/FakeAV-BW; Trojan.Generic.7206697 (B); Trojan.VBS.TTE (B); Trojan.VBS.TTE; VBS.Agent-35; VBS.Serviks; VBS/Autorun.EY worm; VBS/A
the_shellcoders_handbook.pdf
- The Shellcoder's Handbook - 2nd Edition
A_Guide_to_Kernel_Exploitation.pdf.tar
- The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers.