搜索资源列表
CS179F+Design+Project
- 操作系统缺陷 list缺陷exploit(operating system vulnerability list)
Portraanim
- Portraiture is a major art form in both photography and painting. In most instances, artists seek to make the subject stand out from its surrounding, for instance, by making it brighter or sharper. In the digital(We then build upon this result and de
ms09001漏洞溢出软件
- 微软给该漏洞的补丁为kb958687 ms09 001(ms09001)smb远程溢出利用程序/攻击漏洞 补丁就不提供下载了 工具放这里,提供下载下。 先试试MS09001最新漏洞利用工具下载(Microsoft's patch for the vulnerability is kb958687 ms09 001 (ms09001) SMB remote overflow using program / exploit vulnerability patch, which does not pr
radar chaos
- The use of chaos in signal processing and telecommunication in the last few years originates several results, especially in spread spectrum system, cryptography and watermarking. The aim of this paper is to exploit the features
MS09-020
- The WebDAV extension in Microsoft Internet Information Services (IIS) 5.1 and 6.0 allows remote attackers to bypass URI-based protection mechanisms, and list folders or read, create, or modify files, via a %c0%af (Unicode / character) at an arbitra
MS09-050
- This module exploits an out of bounds function table dereference in the SMB request validation code of the SRV2.SYS driver included with Windows Vista, Windows 7 release candidates (not RTM), and Windows 2008 Server prior to R2. Windows Vista w
MS10-015
- This module will create a new session with SYSTEM privileges via the KiTrap0D exlpoit by Tavis Ormandy. If the session is use is already elevated then the exploit will not run. The module relies on kitrap0d.x86.dll, and is not supported on x64 ed
UPGDSED-master
- windows uac bypass exploit source codes from github
using_your_c_compiler_to_exploit_neon.pdf
- ARM加速指令NEON使用手册,用于指导编写相应的加速代码(Using your C compiler to exploit NEONTM Advanced SIMD)
MS16-098
- MS16-098 EXP 漏洞利用工具(Ms16-098 EXP exploit tool.)
MS11-046
- MS11-046 EXP 漏洞利用工具源码(Ms11-046 EXP exploit tool source code.)
MS14-040
- MS14-040 EXP漏洞利用工具源码(Ms14-040 EXP exploit tool source code.)
STM32仿三菱PLC开源代码
- stm32在IAR下开发的PLC底层程序可直接用三菱PLC软件操作(develop; open up; exploit; empolder develop; open up; exploit; empolder bottom; ground floor; first floor; basement; rough coat procedure; order; program; software; formality ut directum Mitsubishi software
视觉软件
- 利用德国HALCON低层二次开发的视觉软件!可判别有与无,角度,坐标,等等!(use; utilize; take advantage of; exploit; avail oneself of Germany; Deutschland develop; open up; exploit; empolder vision; visual sense; sense of sight; visus; seeing software distinguish; discriminate; di
VBI_Vulnerabilities_Portfolio.pdf
- vulnerability prices for compare
ArcMapAddin_Area
- arcgis平台addin插件 显示图斑的平方米、亩、公顷(ArcGIS Desktop Add-in exploit)
4.14.7centos7&ubuntu16.04文件读取漏洞
- 基于4.14.7内核的centos7和ubuntu16.04文件读取漏洞exploit。编译之后通过本地执行来利用漏洞。(Centos7 and ubuntu16.04 file read vulnerability exploit based on 4.14.7 kernel. After compilation, we exploit the vulnerability through local execution.)
近三年的漏洞复现与防范(修改)
- POC: POC,Proof ofConcept,中文意思是“观点证明”。这个短语会在漏洞报告中使用,漏洞报告中的POC则是一段说明或者一个攻击的样例,使得读者能够确认这个漏洞是真实存在的。 EXP: EXP,Exploit,中文意思是“漏洞利用”。意思是一段对漏洞如何利用的详细说明或者一个演示的漏洞攻击代码,可以使得读者完全了解漏洞的机理以及利用的方法。 漏洞概述: 2018年2月1日,Adobe官方发布安全通报(APSA18-01),声明Adobe Flash 28.0.0.1
[反作弊][汉化98%]AAC - 1.9.4
- 我的世界反作弊aac1.9.4版本 Combat - 战斗类 - AutoClicker - 连点器 - KillAura - 杀戮光环 - MultiAction - 射箭/吃东西时攻击 - Criticals - 自动暴击- BowAimbot - 弓箭自动瞄准 Exploit - 漏洞类 - Some types of ServerCrasher - 一些类型的崩服器 Movement - 移动类 - Fly - 飞行 - LiquidWalk - 水上行走 - NoSlow - 使用