搜索资源列表
IdBuffer
- Buffer file from indy
autodafe-0.1.tar
- 一个模糊测试的框架,可以测试协议和文档读取程序。-A fuzzing framework which used to fuzz protocols and files. It uses different tools to improve its ability to detect buffer overflows. It can fuzz: - every tcp binary and ASCII protocol based - every udp binary a
core
- mina-1.1.7的核心代码,学习Mina的可以研究一下,对学习有好处的-mina-1.1.7 of the core code, you can learn from Mina' s study, to learn good
netqueue
- 网络通信使用的缓冲队列,包括列队元素如何添加、列队元素如何删除等功能-Network communication using the buffer queue, including how to add a line-up element, line-up features such as how to remove elements
PF_Ring
- Linux下的一个数据包捕获机制。采用一个环形缓冲有效提高包捕获率。-Under a Linux packet capture mechanism. Using a circular buffer to effectively improve the rate of packet capture.
lftp-4.0.4.tar
- ftp中的文件缓存区可以当服务忙时解决问题-ftp s buffer
sdgram_srv
- 支持unix 域及UDP的多线程,带缓存的报文转发服务器-a dispatch server with buffer support unix dgram & udp
flawfinder_1.27-2.tar
- 用于代码扫描的工具,可以对C或C++源代码进行检查和审计,发现可能存在的安全漏洞,尤其是缓冲区漏洞-For code scanning tools, can be C or C++ source code inspections and audits and found that there may be security holes, particularly the buffer overflow
ippl-0.13.tar
- network monitoring securiy tool(NIDS) in linux intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack can also be identified by this network monitoring tool
netguard-1.0.0.tar
- network monitoring securiy tool(NIDS) in linux intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack can also be identified by this network monitoring tool
protolog-1.0.0.tar
- network monitoring securiy tool(NIDS) in linux intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack can also be identified by this network monitoring tool
ng-0.0.2.tar
- network monitoring securiy tool(NIDS) in linux intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack can also be identified by this network monitoring tool
Transceiver
- Transceiver是用于机构与机构之间、系统与系统之间相互通讯的企业级专业通讯服务软件。对Internet/Intranet、实时/非实时等不同的网络环境提供广泛的通讯与数据交换支持,并能对系统瘫痪网络故障等意外情况下的数据交换提供可跟踪可控制的数据缓冲机制,为企业应用系统提供了高可靠高性能的通讯保障。-Transceiver is used for agencies and institutions, systems and systems of communication between
boon-1.0
- David Wagner写的源代码缓冲区溢出检测工具,使用自己定义的数学方法对缓冲区进行检测。目前BOON已经不更新了。-David Wagner to write the source code for buffer overflow detection tools, use their own definitions of mathematical methods for detection of the buffer. Currently BOON no longer updated.
pipe
- 自己实现的一个管道客户端,用于向管道服务器发送数据,支持大文件传输,支持buffer-Their client to achieve a pipeline for sending data to the pipe server to support large file transfers, support for buffer
exploit_src
- 用C++语言编写的实现缓冲区溢出攻击的实例-C++ language with the realization of an instance of buffer overflow attacks
file_transfer.tar
- 这个源码是我自己写的,目的是为了模拟ftp协议实现linux主机之间的文件传输,为了简单起见传输方式为二进制方式,源码编辑之后就可以运行,在头文件中指定了server端的ip地址,端口号,最大的连接数,传输过程中的缓冲大小(100个字节),这些都可以重新设置。运行时现在server端运行服务,然后client端可以通过命令行的方式去获取server端的文件(./client server端的文件路径 本地存储路径和文件名)。新手上路,请站长多多指教。-The source is my own w
dfg
- 突破C++的虚拟指针--C++程序的缓冲区溢出攻击-Breakthrough in C++ virtual pointer- C++ program buffer overflow attacks
textsearch
- 一个超快的文本搜索算法 searchi = search ignore case search = search case sensitive searchiw = search ignore case words only (e.g. words delimited by whitespace only, not words within words) searchw() = search case sensitive words only -Super
Win32_buffer_overflo
- 很多次被朋友邀请写篇关于在Win32下Exploit的文章。一来是因为此 类文章中关于*nix 平台比较多,而Win32相对较少;二来是因为在Win32 中写exploit有些地方可能困难一点。以下我将用一个具体的简单例子,详 细分析漏洞的发现挖掘、调试以及exploit编写利用,这里选择 War-FTPd vl.65 的一个stack缓冲区溢出漏洞。-Many times by friends invited to write an article on the under W