搜索资源列表
aircrack-2.1
- aircrack is a 802.11 WEP key cracker. It implements the so-called Fluhrer - Mantin - Shamir (FMS) attack, along with some new attacks by a talented hacker named KoreK. When enough encrypted packets have been gathered, aircrack can almost instantly re
000overflow
- 本代码演示了缓冲区溢出的攻击与防范。 -demonstration of the code of buffer overflow attacks and Prevention.
attack_wmk
- 各种水印攻击实验,包含了大部分的操作,例如压缩,剪切,旋转等-various experimental watermark attacks, including most of the operations, such as compression, shear, rotate, etc.
sniff_snort
- 嗅探是网络攻击中的重要环节,该代码完整介绍的嗅探的全过程。-Sniffer network attacks is an important part of the code introduced by sniffer integrity of the entire process.
win2000rawSocket
- 这个库罗列了TCP/IP协议,并允许用户创建自定义TCP/IP头,允许IP欺骗和其它类型的攻击-listed for the TCP / IP protocol, and allows users to create a custom TCP / IP header, allowing IP fraud and other types of attacks
Loginabc
- UDP攻击器,超强的攻击器! -attacks, the attack on Super! UDP-attacks, super-attacks!
dnsguardpro
- dnsguard是一种高性能DoS攻击检测和防护工具。它可以监听以太网上的ip协议数据流,分析其中是否有DoS攻击,当发现了DoS攻击,dnsguard会自动向F5交换机发出指令,删除该攻击者的连接,并在一段时间内禁止其访问。dnsguard有效的防止了DoS攻击对服务器造成的危害,保证服务器的正常运作。-dnsguard is a high-performance DoS attack detection and prevention tools. It can monitor ip on t
ruchong
- 主要是使用汇编语言编写的关于msblast蠕虫病毒,主要攻击2000系统,对xp 和2003系统作用不大。-is mainly written in assembly language on msblast worm attacks mainly on 2000, 2003 and xp system is not very useful.
Floodcfg
- 对某个端口进行洪水攻击的实例.本作品只作研究用途-a pair of ports for flood attacks example. This works only for research purposes
VBudp
- VB的WINSOCK进行udp攻击源代码-VB Winsock for udp attacks source code
天网攻击
- 天网攻击c++语言实现-Skynet attacks c Language
activexICCard
- 想让你的ActiveX攻击不弹出安装提示框吗?着个例子也许可以搞定-want your ActiveX pop-up attacks not yet installed boxes with examples may get
muma-vb
- *,也称特伊洛*,名称源于古希腊的特伊洛马神话,是一种远程控制软件。现在网络上流行的*软件基本都是客户机/服务器模式也就是所谓的C/S结构,目前也有一些开始向B/S结构转变,在这里暂且不对B/S结构进行详谈,本文主要介绍C/S结构其原理就是在本机直接启动运行的程序拥有与使用者相同的权限。因此如果能够启动服务器端(即被攻击的计算机)的服务器程序,就可以使用相应的客户端工具客户程序直接控制它了。下面来谈谈如何用VB来实现它。 -Trojan, also known as Trojan T
netcap
- windows下网络包捕获源代码,可以捕获所有网络数据包,以便分析,谁对本机的攻击.-windows of network packet capture the source code, you can catch all network data packets to the analysis, Who of the plane attacks.
DOSgongji
- 计算机专业本科毕业论文,DOS攻击方式的研究及实现,仅供参考!-computer Undergraduate Thesis, DOS attacks and the way to achieve that is for reference only.
audiowatermark
- 音频水印算法实现,其中包括水印的嵌入,音频水印常用攻击,以及检测算法的实现。-Audio watermarking algorithms, including the watermark embedding, audio watermarking common attacks, and the detection algorithm.
HackingExposed10
- HACKING IIS 5 IISsecurity exploits have enjoyed a long,rich tradition. Microsoft’s flag ship Webserver platform has been plagued by such vulnerabilities as source code revelati on attacks like-HACKING IIS 5 IISsecurity exploits have enjoyed a l
Low-Rate-TCP-Targeted-Denial-of-Service-Attacks-a
- Abstract—Denial of Service attacks are presenting an increasing threat to the global inter-networking infrastructure. While TCP’s congestion control algorithm is highly robust to diverse network conditions, its implicit assumption of end-system coo
geometrical-attacks-StirMark-
- 抗几何攻击的StirMark检测工具,可用于对剪切,缩放,平移,改变纵横比等,希望对大家有用-Against geometrical attacks StirMark detection tools can be used to cut, zoom, pan, change the aspect ratio, the hope that useful
Attacks
- Check mark Attacks for watermarking
