DSSZ
www.dssz.org
Search
Sign in
Create an account
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - attack
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - attack - List
【
Crack Hack
】
unla-attack-source
DL : 0
this unla source. this is web attack tool made by korea-this is unla source. this is web attack tool made by korea
Update
: 2024-05-05
Size
: 32768
Publisher
:
吴承宪
【
Crack Hack
】
web-attack-storng-source
DL : 0
this is web attack tool source very strong. made by korea thank you
Update
: 2024-05-05
Size
: 7168
Publisher
:
吴承宪
【
OS program
】
Forged-IP-submitted-to-attack
DL : 0
伪造ip提交攻击,该方式属于CC攻击改变head信息来达到攻击的-Forged IP submitted to attack, which belongs to CC attack to change the head information to attack
Update
: 2024-05-05
Size
: 560128
Publisher
:
李阳
【
Internet-Network
】
Defense-From-syn-a-ping-Flood-attack
DL : 0
Defense From syn & ping Flood attack
Update
: 2024-05-05
Size
: 1024
Publisher
:
toris
【
Internet-Network
】
drain-n-drop-attack
DL : 0
Drain n drop attack in NS2
Update
: 2024-05-05
Size
: 16384
Publisher
:
Prashi
【
OS program
】
hacker-attack-and-defense-skills
DL : 0
中国红客联盟首发黑客攻防技巧,pdf格式,值得看一下学习学习。-Honker Union of China starting hacker attack and defense skills, pdf, worth a look to learn from.
Update
: 2024-05-05
Size
: 2374656
Publisher
:
gece
【
matlab
】
Attack-location
DL : 0
To locate attack in WIFI
Update
: 2024-05-05
Size
: 1024
Publisher
:
DennisL
【
CA auth
】
RSA-attack
DL : 0
RSA attack with cyclic encryption, documentation is in slovak language
Update
: 2024-05-05
Size
: 22528
Publisher
:
alexandra.kup
【
Software Engineering
】
SINKHOLE-ATTACK-AND-DET.odt
DL : 0
A discription of Sink hole attack and how to detect sink hole attack in wireless sensing network.
Update
: 2024-05-05
Size
: 76800
Publisher
:
sonu
【
Other
】
Web-game-attack-and-defense
DL : 0
网页游戏的攻击与防御技术文档,关于协议抓包内存操作等-Web game attack and defense technical documentation, capture memory operation on agreement
Update
: 2024-05-05
Size
: 1832960
Publisher
:
maoni
【
Game Program
】
Defense-From-syn-a-ping-Flood-attack
DL : 0
Defense From syn & ping Flood attack
Update
: 2024-05-05
Size
: 1024
Publisher
:
nceItu
【
Game Program
】
Defense-From-syn-a-ping-Flood-attack
DL : 0
Defense From syn & ping Flood attack
Update
: 2024-05-05
Size
: 1024
Publisher
:
toexpe
【
GDI-Bitmap
】
Attack-location
DL : 0
To locate attack in WIFI
Update
: 2024-05-05
Size
: 1024
Publisher
:
sajrklei
【
Mathimatics-Numerical algorithms
】
Attack-location
DL : 0
To locate attack in WIFI
Update
: 2024-05-05
Size
: 1024
Publisher
:
abrtkra
【
Internet-Network
】
Sybil-attack-in-Vanets
DL : 0
ns2 code for simulation of sybil attack in manet.VANET supports the services associated with drivers’ safety such as the informationtransmission between vehicles, the rear-end collision between vehicles, and the warning about dangerous situations in real time. In the Figure 2 [10, 11], the attacker who disguised itself as ID A sends wrongly the messages such as the information transmission between vehicles, the rear-end collision between vehicles, and the warning about dangerous situations. It throws other vehicles into confusion. That is, as the objective of a Sybil attack is to make other vehicles change the route on the road or leave the road for the attacker, a Sybil attack can be a serious threat because it causes great damage to a VANET s function.This code will simulate sybil attack-ns2 code for simulation of sybil attack in manet.VANET supports the services associated with drivers’ safety such as the informationtransmission between vehicles, the rear-end collision between vehicles, and the warning about dangerous situations in real time. In the Figure 2 [10, 11], the attacker who disguised itself as ID A sends wrongly the messages such as the information transmission between vehicles, the rear-end collision between vehicles, and the warning about dangerous situations. It throws other vehicles into confusion. That is, as the objective of a Sybil attack is to make other vehicles change the route on the road or leave the road for the attacker, a Sybil attack can be a serious threat because it causes great damage to a VANET s function.This code will simulate sybil attack
Update
: 2024-05-05
Size
: 27648
Publisher
:
saadawais
【
Documents
】
A-SELF-TEST-TO-DETECT-A-HEART-ATTACK-USING-A-MOBI
DL : 0
A SELF-TEST TO DETECT A HEART ATTACK USING A MOBILE PHONE AND WEARABLE SENSORS
Update
: 2024-05-05
Size
: 14336
Publisher
:
JAYANARAYANAN
【
Software Engineering
】
Simulation-of-Gray-Hole-Attack-in-Adhoc-Network-U
DL : 0
Simulation of Gray Hole Attack in Adhoc Network Using NS2
Update
: 2024-05-05
Size
: 101376
Publisher
:
oul
【
Software Engineering
】
Performance-Analysis-of-Black-Hole-Attack-on-diff
DL : 0
Performance Analysis of Black Hole Attack ondifferent MANET Routing Protocols
Update
: 2024-05-05
Size
: 235520
Publisher
:
oul
【
e-language
】
phone-attack
DL : 0
易语言程序 易语言源码模块 手机攻击器公开源码-Easy language program easy language source code module for open source mobile phone attack
Update
: 2024-05-05
Size
: 1033216
Publisher
:
zhang
【
Special Effects
】
Attack
DL : 0
对二维码进行攻击,检测在二维码中嵌入水印的可行性和有效性。-Attack on the two-dimensional code to detect the watermark embedded in the two-dimensional code in the feasibility and effectiveness.
Update
: 2024-05-05
Size
: 1024
Publisher
:
D.C
«
1
2
...
5
6
7
8
9
10
11
12
13
14
15
...
50
»
DSSZ
is the largest source code store in internet!
Contact us :
1999-2046
DSSZ
All Rights Reserved.