搜索资源列表
exploit.tar
- Program that exploits vulnerability in wuftpd<2.6.1
synflood
- 多线程dos程序 前置知识:socket raw编程、多线程 难度: 中 编译环境:VC6.0+win2000 测试环境:win2000+局域网 当我搞不定一台肉鸡时,我都会dos它来发泄一下的。或者看哪个论坛不顺就会dos它! 下面我为大家介绍dos攻击程序的原理和实现,但目的不是叫大家去dos别人啊,我是希望大家从中能够学习到这方面的技术,而不是教会你们去破坏啊!如果你们的初衷是搞破坏的话,我倒不如不讲了。讲了也失去它的价值 -Pre-knowledg
dos
- 多线程dos攻击程序 C++ 注意编译的时候需要socket的库-Dos exploit multi-threaded C++ Note that when the need to build socket library
SOCKET-attack
- socket 攻击程序 c++源代码 dos攻击-c++ socket exploit source code dos attack
unrevoked
- root exploit for HTC EVO 4G mobile phone
dsp-book
- 数字信号处理设计参考白皮书,是期望充分发掘Xilinx DSP Slice的DSP设计人员的绝佳参考资料-Digital signal processing design reference White Paper, is expected to fully exploit the DSP Xilinx DSP Slice an excellent reference for designers
sslsniff-0.6.tar
- 用于SSL 局域网的漏洞攻击工具,源代码由VC编写-This tool was originally written to demonstrate and exploit IE s vulnerability to a specific "basicConstraints" man-in-the-middle attack. While Microsoft has since fixed the vulnerability that allowed leaf certificates to ac
S3C2410-entire-exploit-source-code
- 友善之臂s3c2410完全开发实验源码,包含对板子上各设备的设置-S3c2410 fully developed arm friendliness experimental source, contains the settings for each device on the board
Win32_buffer_overflo
- 很多次被朋友邀请写篇关于在Win32下Exploit的文章。一来是因为此 类文章中关于*nix 平台比较多,而Win32相对较少;二来是因为在Win32 中写exploit有些地方可能困难一点。以下我将用一个具体的简单例子,详 细分析漏洞的发现挖掘、调试以及exploit编写利用,这里选择 War-FTPd vl.65 的一个stack缓冲区溢出漏洞。-Many times by friends invited to write an article on the under W
Spintronics
- Electronic devices that exploit the spin of electrons as well as their charge are poised to overcome a major hurdle that could signal the beginning of an electronics revolution. Spintronics, at the interface between magnetism and electroni
1
- 以前常用的攻击软件源代码 常用攻击程序-Commonly used before the attacks exploit software source code used
IARspecification
- 一个很好的嵌入式工具软件IAR的说明书,具体介绍了IAR的安装和设置说明-a good specification for user who use IAR to exploit embedded chips
Metasploit_Toolkit
- Metasploit Toolkit for Penetration Testing, Exploit Development, & Vulnerability Research
meiju
- 定义一个接口,他至少包含一个可以计算面积的成员的方法。然后,编写实现该接口的两个类:正方形类和圆类。接着编写一个具有泛型特点的类,要求利用这个类可以在控制台窗口中输出没肿图形的面积,而且这个类的类型变量所对应的实际类型可以是前面编写的正方形类和圆类。最后利用这个具有泛型特点的类在控制台窗口中分别输出给定变长的正方形的面积和给你个半径的圆的面积。-define a interface,including which containing at least a can of calculating
[13]GatewayPlacementforThroughputOptimization
- In this paper, we address the problem of gateway placement for throughput optimization in multi-hop wireless mesh networks. Assume that each mesh nodes in the mesh network has a traffi c demand. Given the number of gateways to deploy (de
RegionGrowing
- region growing: The fundamental drawback of histogram-based region detection is that histograms provide no spatial information (only the distribution of gray levels). - Region-growing approaches exploit the important fact that pixels which are
C_PlusUnleashed(UML)
- C++ Unleashed is a survey of advanced topics in C++. The goal of this book is to provide a focused examination of each of these topics, covering the essential information you need to fully exploit the power of the C++ language.
ps3_exploit
- Sony Playstation 3 exploit.
VLDB08Authenticating
- 数据库安全 数据库安全 数据库安全 数据库安全-We present a novel method for key term extraction from text documents. In our method, document is modeled as a graph of semantic relationships between terms of that document. We exploit the following remarkable feature o
HyperString_6.0
- Welcome to HyperString! One of the most significant new features with Delphi32 is long dynamic strings. However, the built-in functions don t really exploit the full potential of these new strings. HyperString provides over 400 fast,