搜索资源列表
x_php_for_php_4_1_2_c
- This a proof of concept exploit for Apache/1.3.x(or IIS but not tested) + php_4.1.2. and below 4.1.2
MFC 开发系统
- Tangram:一个基于MFC框架的柔性软件开发系统 -Tangram: A flexible software exploit system based on MFC framework.
离散牛顿法
- 解非线性方程组的一种方法:先用一种优化方法将给定初值(它有可能会使得后续的牛顿法发散)通过一条比较快的途径收敛到精确解附近,得到一个新的初始点,然后再通过牛顿法将新的初始点迭代到精确解(一定的误差范围内)。这种方法的优点在于:它可以将牛顿法快速收敛的优势发挥出来,同时又避免了该方法收敛域比较窄的缺点。-solving nonlinear equations in a way : by using a method of optimizing initial Givens (it might ma
BOOKCODE
- VC++ 高级编程技术-开发实例剖析一书中的源代码,适合矢量绘图开发者学习-\"vc++ advanced programming method -exploit examples introduce\" the code for this book,fit for the vector plot learner to study
EasyEnsemble
- EasyEnsemble and BalanceCascade are two class-imbalance learning methods. They can adaptively exploit the majority class examples, avoiding important majority class examples to be ignored by common under-sampling while maintaining the fast training s
hardware.tar.gz
- 韦东山的嵌入式完全开发手册的硬件实验代码,光盘资料,无任何修改。使用时改扩展名为bz2.,Wei Dongshan embedded Guide to fully exploit the hardware test code, CD-ROM, without any changes. When used to change the extension bz2.
Arptest
- ARP数据包发送和攻击程序源码.c++环境,而很清楚地标出ARP数据包的构造,发送,和嗅探过程,还可以清楚的看到局域网攻击-ARP packets sent and exploit source code. C++ environment, and very clearly marked on the construction of ARP packets, sent, and the sniffing process, but also can clearly see the attacks
dnsexploit_S
- ADNS远程DNS缓存中毒的缺陷漏洞(IRCD欺骗)VC代码-ADNS Remote DNS Cache Poisoning Flaw Exploit (spoof on ircd)
ms08067
- ms08067,微软新漏洞的exploit源码,由C/C++语言编写。警告:只供研究,勿用于非法目的!-ms08067, the exploit loopholes in Microsoft
MS08-068
- MS08-068 MS08-068WINDOWS漏洞利用代码-MS08-068 MS08-068WINDOWS exploit code
App_elfPlayer
- 基于android手机平台的音乐播放器源代码-exploit the mp3payer program in the android platform
sql-攻击代码
- sql-攻击代码-sql-attack code
Joekoe-inject
- 乔客论坛漏洞利用工具代码 采用vb编写-Joe off exploit tool Forum vb code used to prepare
Netcat
- Netcat for NT is the tcp/ip "Swiss Army knife" that never made it into any of the resource kits. It has proved to be an extremely versatile tool on the unix platform. So why should NT always be unix s poor cousin when it comes to tcp/ip test
MiniSQL
- Mini SQL对用户提供的数据缺少充分过滤,远程攻击者可以利用这个漏洞对目标服务器进行格式字符串攻击,可能以数据库进程权限在系统上执行任意指令。 远程攻击者可以发送恶意格式串来触发此漏洞,导致破坏进程中的任意敏感信息,造成以数据库进程... -Mini SQL user data provided by the lack of adequate filtering, remote attacker could exploit the vulnerability on the target se
usb2089
- USB2089数据采集卡硬件使用说明书 完全开发指南-DAQ USB2089 Manual to fully exploit the hardware guide
mirc_exp.pl
- An exploit for the IRC client mIRC 6.34. Target user connects to this server, written in Perl. The victim connects to port 6667 on your computer.-An exploit for the IRC client mIRC 6.34. Target user connects to this server, written in Perl. The vic
Hacking.The.Art.Of.Exploitation
- 一本关于黑客攻击及漏洞挖掘艺术的好书.有缓冲区溢出的利用等.-Exploit programs using buffer overflows and format strings Write your own printable ASCII polymorphic shellcode Defeat non-executable stacks by returning into libc Redirect network traffic, conceal open ports,
ms08-067
- microsoft 0867 exploit source code
bronc-vs-mjackson.tar
- the fastest class b style exploit scanner in the world. It impliments argv technology to keep up with the ever-expanding horde of so-called 0-day exploits hackers utilize to penetrate your vital network infrastructure. -the fastest class b