搜索资源列表
SOCKET-attack
- socket 攻击程序 c++源代码 dos攻击-c++ socket exploit source code dos attack
unrevoked
- root exploit for HTC EVO 4G mobile phone
dsp-book
- 数字信号处理设计参考白皮书,是期望充分发掘Xilinx DSP Slice的DSP设计人员的绝佳参考资料-Digital signal processing design reference White Paper, is expected to fully exploit the DSP Xilinx DSP Slice an excellent reference for designers
sslsniff-0.6.tar
- 用于SSL 局域网的漏洞攻击工具,源代码由VC编写-This tool was originally written to demonstrate and exploit IE s vulnerability to a specific "basicConstraints" man-in-the-middle attack. While Microsoft has since fixed the vulnerability that allowed leaf certificates to ac
S3C2410-entire-exploit-source-code
- 友善之臂s3c2410完全开发实验源码,包含对板子上各设备的设置-S3c2410 fully developed arm friendliness experimental source, contains the settings for each device on the board
Win32_buffer_overflo
- 很多次被朋友邀请写篇关于在Win32下Exploit的文章。一来是因为此 类文章中关于*nix 平台比较多,而Win32相对较少;二来是因为在Win32 中写exploit有些地方可能困难一点。以下我将用一个具体的简单例子,详 细分析漏洞的发现挖掘、调试以及exploit编写利用,这里选择 War-FTPd vl.65 的一个stack缓冲区溢出漏洞。-Many times by friends invited to write an article on the under W
1
- 以前常用的攻击软件源代码 常用攻击程序-Commonly used before the attacks exploit software source code used
IARspecification
- 一个很好的嵌入式工具软件IAR的说明书,具体介绍了IAR的安装和设置说明-a good specification for user who use IAR to exploit embedded chips
[13]GatewayPlacementforThroughputOptimization
- In this paper, we address the problem of gateway placement for throughput optimization in multi-hop wireless mesh networks. Assume that each mesh nodes in the mesh network has a traffi c demand. Given the number of gateways to deploy (de
RegionGrowing
- region growing: The fundamental drawback of histogram-based region detection is that histograms provide no spatial information (only the distribution of gray levels). - Region-growing approaches exploit the important fact that pixels which are
C_PlusUnleashed(UML)
- C++ Unleashed is a survey of advanced topics in C++. The goal of this book is to provide a focused examination of each of these topics, covering the essential information you need to fully exploit the power of the C++ language.
ps3_exploit
- Sony Playstation 3 exploit.
VLDB08Authenticating
- 数据库安全 数据库安全 数据库安全 数据库安全-We present a novel method for key term extraction from text documents. In our method, document is modeled as a graph of semantic relationships between terms of that document. We exploit the following remarkable feature o
HyperString_6.0
- Welcome to HyperString! One of the most significant new features with Delphi32 is long dynamic strings. However, the built-in functions don t really exploit the full potential of these new strings. HyperString provides over 400 fast,
David-B.-Kirk.-Programming-Massively-Parallel-Pro
- NVIDIA Fellow David Kirk and UIUC Professor Wen-mei Hwu have published their landmark textbook, Programming Massively Parallel Processors: A Hands-on Approach. This book will enable generations of programmers to understand and exploit the massively p
STBC-K
- Space–time block coding is a technique used in wireless communications to transmit multiple copies of a data stream across a number of antennas and to exploit the various received versions of the data to improve the reliability of data-transfer. The
stackoverflow-exploit
- 这是本人的一个课程项目,目的是实验不同的方法以实现对堆栈溢出的利用。同时要考虑你的方法对不同安全机制(如地址空间的随机化)的适用程度。代码很短小,但确实起作用。在报告里面还有屏幕截图。-This is a course project of mine to test different methods to achieve the exploitation of stack overflow. Taking into account the different ways your securit
PIDSystem
- his first control design case study implements the Stewart platform control system with the standard preoptimized proportional-integral-derivative (PID) controller. It introduces you to the overall model and the uncontrolled Stewart platform mo
CrashHS
- Hackshield Exploit to cause BSOD. Hackshield is a leading anti cheat software for many online games.
mpg123-pre0.59s-mmx-gcc4.0.tar
- mpg123是一款使用于Linux和Unix操作系统下的MP3播放程序。mpg123在处理MPEG 2.0的3层文件时,layer3.c的III_i_stereo()函数中存在缓冲区溢出漏洞,攻击者可能利用此漏洞执行任意指令。提供这个源码给病毒,木马爱好者们研究。 -mpg123 is a used in Linux and Unix operating systems of the MP3 player. mpg123 in dealing with MPEG 2.0 layer 3 fi