搜索资源列表
Steganography
- Steganography is the practice of hiding private or sensitive information within something that appears to be nothing out to the usual. Steganography is often confused with cryptology because the two are similar in the way that they both are used to p
Network-penetration-technology
- 网络渗透技术教程 基础知识 缓冲区溢出利用技术 shellcode技术 堆溢出利用技术 格式化串漏洞利用技术 内核溢出利用技术 其它利用技术 漏洞发掘分析 CGI渗透测试技术 SQL注入利用技术 (内附c语言源码))-Network penetration technology tutorial The basics of buffer overflow technology shellcode heap overflow use of the technology format str
Low-Rate-TCP-Targeted-Denial-of-Service-Attacks-a
- Abstract—Denial of Service attacks are presenting an increasing threat to the global inter-networking infrastructure. While TCP’s congestion control algorithm is highly robust to diverse network conditions, its implicit assumption of end-system coo
17185_pub
- wireshark软件的poc,用来触发漏洞。-The exploit of wireshark , run it and the calc will be top of the desk.
stack_overflow
- stack overflow-exploit writing
remotethread
- Windows Remote Thread Exploit
inguma-0.1.1.tar
- Metasploit like exploit framework
script_ber_bpsk_isi_lms_equalization
- 在符号间干扰情况下,通过自适应均衡消除码间串扰的影响。均衡算法采用LMS,简单的线性横向滤波器-In case of ISI channel,we exploit adaptive equalization with LMS alogithm to defend the influence.
watermark
- 文件夹LSB中是空域LSB算法程序,文件夹COX中是Cox算法主要程序,文件夹DCT中是频域加在中频的算法的程序。 步骤:把LSB,COX,DCT三个文件夹考在MATLAB目录下; 运行lsb_embed,programme,dct2_embed_mod即可。其中PSNR.m是计算峰值信噪比程序;attact.m & robust.m是攻击程序。-Content: folder LSB of spatial LSB algorithm program, folder COX Cox a
aa
- 一个简单的溢出有exploit。学习自飘雪-A simple overflow have exploit
MIMO_OFDM_program
- alamouti_scheme Space–time block coding is a technique used in wireless communications to transmit multiple copies of a data stream across a number of antennas and to exploit the various received versions of the data to improve the reliability of dat
ciscoPimailPasnPwks(priv)
- cisco bot c++ exploit scanner
120-[ModBot]-VNCBRUTE-MSSQL-2007
- vncbrute force exploit scan bot
FindJmpEsp
- 查找DLL模块内特定汇编指令序列,可以用于编写通用性较强的漏洞利用程序。-Find the DLL module specific assembly instruction sequences can be used to write more versatility exploit.
caitiaoxianshi
- VGA显示控制器设计,要求利用EDA技术设计一个VGA图像显示控制器,使之能控制VGA显示器显示一些图形。-VGA display controller design, required to exploit the EDA technology to design a VGA image display controller, so that it can control VGA display shows some graphics.
struts2
- struts2漏洞利用程序!现在市面上那些根本无法成功调用struts2连接 我这个就可以!-struts2 exploit! Now available in the market who do not successfully call struts2 connection I can!
Overflow
- war-ftp 1.65存在缓冲区溢出漏洞:发送长度超过480B的用户名给war-ftp服务器就可以触发漏洞(即USER longString\n\r),溢出之后ESP指令寄存器的内容包含了longString中的部分内容。远程攻击者可以利用此漏洞以应用程序进程权限执行任意指令。-war-ftp 1.65 a buffer overflow vulnerability: send more than 480B username length to the war-ftp server can t
StrutsExp
- Struts终极漏洞利用工具及代码,攻击JSP网站使用。-The Struts the ultimate exploit tools and code, to attack the use of JSP website.
alpha2.tar
- 将shellcode转为字母形式,只用于unicode编码的漏洞利用中-Exploit shellcode into letters form only for unicode encoded in
RageAgainstTheCage
- * Copy from sdcard to /sqlite_stmt_journals/exploid, chmod 0755 and run. * Or use /data/local/tmp if available (thx to ioerror!) It is important to * to use /sqlite_stmt_journals directory if available. * Then try to invoke hotplug by click