搜索资源列表
Exploit-Metasploit_exploit
- Exploit_编写系列教程第四篇_编写Metasploit_exploit.pdf-Exploit_ written series of tutorials written Metasploit_exploit.pdf _ Part IV
7104
- ms08-067 exploit code...have a look
ms08
- ms08-067 exploit code...have a look
Bypassing-SEHOP
- bypassing sehop exploit mitigation technique.
EasyEnsemble
- EasyEnsemble和BalanceCascade是两类不平衡数据集的学习方法-EasyEnsemble and BalanceCascade are two class-imbalance learning methods. They can adaptively exploit the majority class examples, avoiding important majority class examples to be ignored by common under-samp
least
- 导演走后,你翻开剧本看了看,发现了一张场景清单,也就是本题目的输入文件。 输入:输入文件的第一行包含用空格分隔的3个正整数,M, F和S。其中M代表剧中的男角色数目,取值在[1, 10]之间;F代表剧中的女角色数目,取值在[1, 10]之间;S代表剧中的场景数目,取值在[1, 100]之间。第二行和第三行分别列出了男角色和女角色的名字,每个名字都是一个英文字符串,名字之间有空格分隔。下面的S行分别描述了每个场景中出现的角色数和角色名(有空格分隔)。 输出:本剧需要的男女演员的最少数目,具
space_time_coding
- space time coding is used in MIMO systems to exploit diversity or improve error ot transmission rate
COMBINED-jncd
- Perceptual Watermarking should take full advantage of the results from human visual system (HVS) studies. Just noticeable difference (JND), which refers to the maximum difference that the HVS does not perceive, gives us a way to model the HVS
Accelerated-CSharp-2010
- 中文名: C# 2010捷径教程 作者: 特雷·纳什 Trey Nash-C# 2010 offers powerful new features, and this book is the fastest path to mastering them—and the rest of C#—for both experienced C# programmers moving to C# 2010 and programmers moving to C# from another ob
8-nodep
- ms05-12 iternet explloer exploit
2-4
- ms05-15 iternet exploer exploit -ms05-14 iternet exploer exploit
8-exolpit
- ms05-15 iternet exploer exploit -ms05-15 inernet exploer exploit dd
Relay_routing
- In March 2006 an IEEE task group was created to for incorporating mobile multihop relay capabilities in the mobile Wimax standard IEEE 802.16e. This group came up with an amendment to the 16e standard which is called 802.16j. This amendment is fully
7-djvu-9812381511
- This book focuses on Least Squares Support Vector Machines (LS-SVMs) which are reformulations to standard SVMs. LS-SVMs are closely related to regularization networks and Gaussian processes but additionally emphasize and exploit primal-dual interpret
cmd-overflow
- cmd_overflow,Generic exploit for command line buffer overflows
CFRdemo
- 压缩感知matlab代码,在欠采样的条件下实现模数转换。在超宽带和频谱混叠的情况下亦可通过本软件仿真。具有较高的参考价值。-Conventional sub-Nyquist sampling methods for analog signals exploit prior information about the spectral support. A more challenging problem is spectrum-blind sub-Nyquist sampling of mult
929
- msjet40.dll代码漏洞,很高级,从内核挖起- Microsoft Jet (msjet40.dll) Reverse Shell Exploit
15213
- Webconfig Bruter - exploit tool for downloading Web.config 漏洞溢出文件-Webconfig Bruter- exploit tool for downloading Web.config #
uib25
- There was no major release since a long time, but the project has always been maintained for 7 years now. In honor of the new version of Firebird, I decided to release this new version of UIB in 2.5. There have been many changes to support Unic
A1L-A02
- Based on the idea to exploit the statistical dependencies from both temporal and inter-view reference pictures for motion compensated prediction, this paper presents a sys- tematic evaluation of multi-view video coding with opti- mized pred