搜索资源列表
ScanUNICODELeak
- 通过Socket向电脑的端口发送特定内容,查看返回值,确定是否有Unicode漏洞。 -Port to the computer through the Socket to send specific content to see the return value to determine whether there is Unicode vulnerability.
1433-vulnerability-scanning-
- 1433端口进行弱口令扫描检测服务器存在的危险。-1433 port scan detection of weak passwords, servers and present danger.
demo
- The program is a static buffer overflow vulnerability demo. modifying the normal execution flow of the program in such a manner that the instruction {printf(“X is 1”) } is skipped. it can be achieved in two different ways:
20118923174619
- SQL注入是最普遍的网站漏洞,利用工具很方便检测到后台,但是手工注入获得的快乐和经验,远远超出使用工具所获得的。这是一款用VB实现的注入工具,写了注释,分享一下 -SQL injection is the most common website vulnerability, it is easy to use tool to detect the background, but the manual into your happiness and experience far beyond th
2
- 用JVAV编写的简单的漏洞扫描界面,能实现端口段区域内的端口扫描-JVAV with written simple vulnerability scanning interface, can realize the port in the areas for port scanning
NMSO
- 美国Navy Modeling & Simulation Office对AREPS软件做的权威说明-AREPS computes and displays radar probability of detection, Electronic Support Measure (ESM) vulnerability, surface-borne surface-search radar, and communications (HF to EHF) capability versus range,
AREPS_AD
- 美国AD报告,关于雷达传输损耗预测计算程序AREPS的详细使用报告-AREPS computes and displays radar probability of detection, propagation loss and signal-to-noise ratios, electronic-support-measures (ESM) vulnerability, UHF/VHF communications, and surface-borne surfacesearch
6renshuohayuanma
- 朋友那里弄来的最新6人梭哈源码,改进了功能,删除了漏洞,经本人检测无任何问题可以生成-Friend got the latest Stud source to improve the function, delete the vulnerability without any problems can be generated by I detect
watermark
- 基于DCT和JPEG的脆弱性盲数字水印算法-Based on DCT and JPEG vulnerability of blind digital watermarking algorithm
Low-Rate-TCP-Targeted-Denial-of-Service-Attacks-a
- Abstract—Denial of Service attacks are presenting an increasing threat to the global inter-networking infrastructure. While TCP’s congestion control algorithm is highly robust to diverse network conditions, its implicit assumption of end-system coo
Metasploit-Testers-Guide
- 原版Metasploit渗透平台指南,Metasploit是可以自由获取的开发框架。它是一个强大的开源平台,供开发,测试和使用恶意代码,这个环境为渗透测试,shellcode 编写和漏洞研究提供了一个可靠平台。-The original Metasploit penetration platform guide, Metasploit, free access to the development framework. It is a powerful open-source platform
111
- 扫描网页漏洞,并对恶意攻击做出有效防御的一篇论文-Scanning webpage vulnerability, and malicious attacks make effective defense of a thesis
21
- windows漏洞扫描易语言源码,很不错的易语言源码,适合易语言爱好者学习。 -windows vulnerability scanning easy language source code, very good source of easy language, suitable for easy language enthusiasts to learn.
1
- 下载程序最新通杀漏洞入侵工具,很不错的易语言源码,适合易语言爱好者学习。-The download process through kill vulnerability invasion of tools very good and easy language source code for easy language enthusiasts to learn.
CVE-2012-0177
- CVE-2012-0177 WPS文件转换功能堆溢出漏洞分析 Microsoft Office 2007 SP2版本、Works 9版本以及Works 6 acirc 9 File Converter中的Office Works File Converter中存在基于堆的缓冲区溢出漏洞-CVE-2012-0177 WPS file conversion feature Heap Overflow Vulnerability Analysis Microsoft Office 2007 S
Wavelet-error
- 附录 B 基于差错控制原理的脆弱性数字水印算法程序-Appendix B is based on the principle of error control the vulnerability of digital watermarking algorithm program
PDF-virus-analysis
- PDF 漏洞开发利用,JAVAscr ipt 过ANITVIRUS -PDF vulnerability exploitation and utilization, the JAVAscr ipt over ANITVIRUS. .
nessus
- nessus document describing working of nessus vulnerability scanner using audit policies performing credential scans
binary
- 面向源程序(Source Code)漏洞挖掘的研究历史已经相当悠久并取得显著进 展。然而,出于商业利益、知识产权保护等原因,大部分软件厂商不对外提供源 程序;有些厂商虽然提供了源程序,但源程序和实际系统之间的对应关系无从验 证。另外,源程序级的漏洞分析也无法发现编译、链接过程引入的漏洞。因此直 接面向二进制程序的安全漏洞挖掘研究具有重要的意义。-Mining history-oriented source code (Source Code) vulnerability has
201111-172
- 面向源程序(Source Code)漏洞挖掘的研究历史已经相当悠久并取得显著进 展。然而,出于商业利益、知识产权保护等原因,大部分软件厂商不对外提供源 程序;有些厂商虽然提供了源程序,但源程序和实际系统之间的对应关系无从验 证。另外,源程序级的漏洞分析也无法发现编译、链接过程引入的漏洞。因此直 接面向二进制程序的安全漏洞挖掘研究具有重要的意义。-Mining history-oriented source code (Source Code) vulnerability has