搜索资源列表
win2k named pipe enumeration
- 列举win2k named pipe, 使用本机API,适合初学者学习系统编程-The code enumerates WIN2K NAMED PIPE which is used local API and suit to learner who is studying system programming.
Hash2131
- 1)了解HASH函数在网络安全中的应用 (2)掌握HASH函数实现的原理 二、要求 (1)用任何语言编程完成实现HASH函数的功能 (2)输入任何8个字节(64位)的数据,得出对应的8位HASH代码(摘要) -1) understanding hash functions in network security applications (2) master Hash Function Principle 2 require (1) using any programming
ids_snort
- 入侵检测源代码,参考snort结构编程. 可修改,编译连接.-Intrusion Detection source code, reference snort programming structure. May revise, compile connectivity.
Java-cai.ZIP
- java编程教程及部分代码,有很多例子哦-java programming guide and some code, there are many examples oh
VC_net_source
- VC网络程序设计实例详解源代码.rar 各种网络应用代码集合-VC network programming example explanation of the source code. Rar various network application code sets
《windows 核心编程》源码
- 《windows 核心编程》源码-code of <windows sock programming>
serviceenum代码
- 黑客编程代码\\serviceenum代码.rar-hackers programming code \\ serviceenum code. Rar
enumnetresource代码
- 黑客编程代码\\enumnetresource代码.rar-hackers programming code \\ enumnetresource code. Rar
portscan程序
- 黑客编程代码\\portscan程序.rar-hackers programming code \\ portscan procedures. Rar
ps列举进程代码
- 黑客编程代码\\ps列举进程代码.rar-hackers programming code \\ ps cited process code. Rar
取的网络信息代码
- 黑客编程代码\\取的网络信息代码.rar-hackers programming code \\ network information from the source. Rar
最新sql溢出源代码(概念版)
- 最新sql溢出源代码(概念版)编程的朋友可以看看 里面有详细的注释-latest sql overflow source code (concept version) Programming friends can see there are detailed Notes
macdiy
- 动态规划原代码,进行优化计算,优选的最好的使用的工具,不信你是看-dynamic programming original code optimization for the selection of the best tools to use, do not think you see
cpp
- 这是网络编程使用的源代码,对学习c语言的同学会有很大的帮助-It is used in network programming source code, to learn c language will be very helpful for students
ropguard
- ROPGuard是一个系统运行的返回导向编程(ROP)攻击的检测和预防。它可以通过定义一组检查时所执行的某些操作系统功能被称为以确定是否这些功能被称为ROP代码或程序的正常执行的结果-ROPGuard is a return-oriented programming system operation (ROP) attack detection and prevention. It defines a set of checks can be performed when certain ope
GM
- This code is used to brute force a gmail email by using the programming language python.Sebelum do Bruteforce email you will be required to prepare a file that contains a set password (wordlist).
