Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - attack
Search - attack - List
DL : 0
扫描主机是否受到几种禁止服务攻击(denial of service attack)的程序
Update : 2024-05-19 Size : 30720 Publisher :

socks5 remote exploit/ linux x86易受到的攻击 linux:* socks5-v1.0r10 (compiled on a turbolinux 4.0.5) => 0* socks5-v1.0r9 (compiled on a turbolinux 4.0.5) => 0* socks5-v1.0r8 (compiled on a turbolinux 4.0.5) => 0* socks5-v1.0r10 (compiled on a redhat 6.0) => 400* socks5-s5watch-1.0r9-2 (redhat-contrib) => no?* socks5-0.17-1 (redhat 4.2) => no* socks5-1.0r10-5 (redhat-contrib) => no??* socks5-server-1.0r6-8TL (TurboContrib) => no??用法:* $ ./1080r [offset]该代码本人是本人千辛万苦利用俄汉翻译软件从俄罗斯网站上找到的,还没有来得及实用,就发上来,与大家共研。有问题请Email:jzzq8081@sina.com-socks5 remote exploit/ linux x86 is easy attack linux:* socks5-v1.0r10 which receives (compiled on a turbolinux 4.0.5) = 0* socks5-v1.0r9 (compiled on a turbolinux 4.0.5) = 0* socks5-v1.0r8 (compiled on a turbolinux 4.0.5) = 0* socks5-v1.0r10 (compiled on a redhat 6.0) = 400* socks5-s5watch-1.0r9-2 (redhat-contrib) = no? * socks5-0.17-1 (redhat 4.2) = no* socks5-1.0r10-5 (redhat-contrib) = no? ? * socks5-server-1.0r6-8TL (TurboContrib) = no? ? Usage: * $. /1080r [ offset ] this code myself am myself untold hardships use the Russia Chinese translation software to find from the Russian website, but also is not with enough time practical, sends, altogether grinds with everybody. Has the question to invite Email:jzzq8081@sina.com
Update : 2008-10-13 Size : 2347 Publisher : 姜振

Exploitoob
DL : 0
一个攻击远端电脑蓝屏的代码-an attack remote computer code blue
Update : 2008-10-13 Size : 16489 Publisher : 丹尼尔

局域网扫描(反)嗅探欺骗攻击程序-LAN scanning (Anti-) deception sniffer attack procedures
Update : 2008-10-13 Size : 22812 Publisher : 呵呵

本安全评估系统通过对网络设备进行自动的安全漏洞检测和分析,模拟漏洞分析专家及安全专家的技术,提供基于策略的安全风险管理过程。网络漏洞扫描可执行预定的或事件驱动的网络探测,去识别可能被入侵者利用的网络安全漏洞。网络漏洞扫描提供了多种缺省的扫描策略配置,同时允许用户自己订做符合特定要求的策略。通过确认正确的配置,保证用户不会忽略正式的安全策略,使所有的系统都保持合理的安全性来抵御外部的攻击。-assessment of the security system of network equipment for the automatic detection and vulnerability analysis, vulnerability analysis simulation experts and the technical experts, policy-based security risk management process. Network Vulnerability scanning executable scheduled or event-driven network detection, to identify possible intruders use network security loopholes. Network Vulnerability Scanning providing a wide variety of scanning default policy configuration, and allows the user to build with their own specific requirements of the strategy. By identifying the correct configuration ensures that the users will not overlook the formal security policy, so that all the systems are to maintain a reasonable security to withstand external attack.
Update : 2008-10-13 Size : 165763 Publisher : 石林

vb编写的一个被动攻击的代码,喜欢hack技术的朋友可以下来看看。-vb prepared in a passive attack code, the technology hack like you can see down.
Update : 2008-10-13 Size : 4410 Publisher : 特务

截屏的源代码,用about进入,截取当前窗口,保存位置代码里面有改。-of attack the source code, with about access, interception of the current window, preservation code inside position change.
Update : 2008-10-13 Size : 54250 Publisher : zz

随着软件产业的迅速发展,软件产品的版权保护已成为一个十分重要的问题.详细介绍了软件水印这 种新兴软件版权保护技术,深入分析了软件水印的现状、分类、攻击方法以及已有的各种算法,并分别讨论了这 些算法的利弊,最后提出软件水印的下一步发展方向.-software industry as the rapid development of software products of copyright protection has become a very important issue. Details of the software watermarking this emerging software copyright protection technology, in-depth analysis of the status of software watermarking, classification, and ways to attack existing algorithms respectively, and discussed the the pros and cons of these algorithms, software watermarking Finally the next step in the development direction.
Update : 2008-10-13 Size : 61094 Publisher : 隼鼻梁

对网络上主机开445端口进行攻击的源程序,此程序利用MS0539漏洞。-host on the network open port 445 attack source, the use of this procedure MS0539 loopholes.
Update : 2008-10-13 Size : 9843 Publisher : windy_duy

一昊輸入法》的前身即是「錢碼」輸入法(發明人錢任舉教授)。錢碼第一鍵打漢字的聲母,無聲母的取它的首字母;第二鍵打漢字的首偏旁,無偏旁的打首筆劃;第三鍵打漢字的尾偏旁,無偏旁的打尾筆劃。三鍵一字,道理特別簡單,一聽就懂,易學性強。錢碼僅優選了50個基本字根,極其有規律的排在鍵位上,特別好記。符合國家語委的筆順規笵,字根99%都是《新華字典》上的部首。被中國教育部信息管理中心列為遠程教育基本課件。最新版本是「一昊輸入法智能版V6.0」。-an input method "that is the predecessor of" money Code "input method (inventor cite money as professors). The first bond money to fight code characters Initials, a silent admission surrogacy its initials; The second key play of the first Chinese radical, radical attack without first strokes; The third key to fight the radical end of the Chinese characters, playing without the radical end of strokes. Three key word, particularly simple reason, one on the understanding, and strong minded. Money code optimization of only 50 basic Roots, the most regular-ranked bond, particularly good in mind. National Language Committee advised the regulatory Strokes, Roots 99% are "Xinhua Dictionary" on the radical. The Chinese Ministry of Information Management Center as a basic di
Update : 2008-10-13 Size : 26577 Publisher : 1

DL : 0
Grayhole attack in NS2
Update : 2024-05-19 Size : 36864 Publisher : abhivik

Black hole attack in ns2.35
Update : 2024-05-19 Size : 3072 Publisher : abhivik

DL : 0
attack on sts protocol
Update : 2024-05-19 Size : 61440 Publisher : maksi

vampire attack on manet
Update : 2024-05-19 Size : 713728 Publisher : jhuven

ARP-Poison
DL : 0
source code attack arp poisoning in c++.
Update : 2024-05-19 Size : 2048 Publisher : cykablet

a paper about UMTS, In this paper authors present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies. The attack allows an intruder to impersonate a valid GSM base station to a UMTS subscriber regardless of the fact that UMTS authentication and key agreement are used. As a result, an intruder can eavesdrop on all mobile-station-initiated traffic
Update : 2024-05-19 Size : 97280 Publisher : aliaskari

DL : 0
code for ddos attack
Update : 2024-05-19 Size : 9659392 Publisher : batium

基于foolbox的单像素攻击,使用MNIST数据集(Single pixel attack based on foolbox and using MNIST data set)
Update : 2024-05-19 Size : 791552 Publisher : 洛小翼

深度学习中的对抗样本攻防方向的单像素攻击keras代码(Keas Code Against Sample Single Pixel Attacks)
Update : 2024-05-19 Size : 5974016 Publisher : upcgorge

DL : 0
this is a basic summary of how one could implement the ss7 attack MITM
Update : 2021-12-20 Size : 392575 Publisher : mkdlksq779
« 1 2 ... 7 8 9 10 11 1213 14 15 16 17 ... 50 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.