搜索资源列表
8-nodep
- ms05-12 iternet explloer exploit
2-4
- ms05-15 iternet exploer exploit -ms05-14 iternet exploer exploit
8-exolpit
- ms05-15 iternet exploer exploit -ms05-15 inernet exploer exploit dd
iis7
- IIS7 漏洞扫描代码 Automatic iis7 parsing vulnerability exploit-IIS7 vulnerability scanning code
Relay_routing
- In March 2006 an IEEE task group was created to for incorporating mobile multihop relay capabilities in the mobile Wimax standard IEEE 802.16e. This group came up with an amendment to the 16e standard which is called 802.16j. This amendment is fully
7-djvu-9812381511
- This book focuses on Least Squares Support Vector Machines (LS-SVMs) which are reformulations to standard SVMs. LS-SVMs are closely related to regularization networks and Gaussian processes but additionally emphasize and exploit primal-dual interpret
A-Bayesian-Approach
- In this paper, we propose a Bayesian methodology for receiver function analysis, a key tool in determining the deep structure of the Earth’s crust.We exploit the assumption of sparsity for receiver functions to develop a Bayesian deconvolution
cmd-overflow
- cmd_overflow,Generic exploit for command line buffer overflows
CFRdemo
- 压缩感知matlab代码,在欠采样的条件下实现模数转换。在超宽带和频谱混叠的情况下亦可通过本软件仿真。具有较高的参考价值。-Conventional sub-Nyquist sampling methods for analog signals exploit prior information about the spectral support. A more challenging problem is spectrum-blind sub-Nyquist sampling of mult
929
- msjet40.dll代码漏洞,很高级,从内核挖起- Microsoft Jet (msjet40.dll) Reverse Shell Exploit
15213
- Webconfig Bruter - exploit tool for downloading Web.config 漏洞溢出文件-Webconfig Bruter- exploit tool for downloading Web.config #
uib25
- There was no major release since a long time, but the project has always been maintained for 7 years now. In honor of the new version of Firebird, I decided to release this new version of UIB in 2.5. There have been many changes to support Unic
A1L-A02
- Based on the idea to exploit the statistical dependencies from both temporal and inter-view reference pictures for motion compensated prediction, this paper presents a sys- tematic evaluation of multi-view video coding with opti- mized pred
Steganography
- Steganography is the practice of hiding private or sensitive information within something that appears to be nothing out to the usual. Steganography is often confused with cryptology because the two are similar in the way that they both are used to p
Network-penetration-technology
- 网络渗透技术教程 基础知识 缓冲区溢出利用技术 shellcode技术 堆溢出利用技术 格式化串漏洞利用技术 内核溢出利用技术 其它利用技术 漏洞发掘分析 CGI渗透测试技术 SQL注入利用技术 (内附c语言源码))-Network penetration technology tutorial The basics of buffer overflow technology shellcode heap overflow use of the technology format str
dedecms_backdoor_exp
- dedecms5.7后门利用程序 @eval(file_get_contents( php://input )) -dedecms5.7 backdoor exploit @eval(file_get_contents( php://input ))
Low-Rate-TCP-Targeted-Denial-of-Service-Attacks-a
- Abstract—Denial of Service attacks are presenting an increasing threat to the global inter-networking infrastructure. While TCP’s congestion control algorithm is highly robust to diverse network conditions, its implicit assumption of end-system coo
17185_pub
- wireshark软件的poc,用来触发漏洞。-The exploit of wireshark , run it and the calc will be top of the desk.
stack_overflow
- stack overflow-exploit writing
bleedinglife-2.nk
- Bleeding Life 2 is an exploit pack that affects the web browsers on the Microsoft Windows operating system with remote code execution buffer overflows. Features Bleeding Life 2 has a variety of exploits and statistics features. Explo