DSSZ
www.dssz.org
Search
Sign in
Create an account
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - attack
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - attack - List
【
Other
】
smurf攻击程序
DL : 0
smurf攻击是很简单的,它有一些IP(广播地址)地址列表,发出了一些伪造的数 据包(ICMP echo request)从而导致一场广播风暴,可以使受害主机(使它成为伪造包 的源地址)崩溃。-smurf attack is very simple. It has some IP address list and can send pseudo ICMP echo request. As a result, broadcast storm will occur.
Update
: 2008-10-13
Size
: 3882
Publisher
:
孙新
【
Other
】
Teardrop--一款linux攻击程序
DL : 0
在Linux的ip包重组过程中有一个严重的漏洞。本程序利用此漏洞进行攻击-There is a serious leak during the process of the ip-pakege recombination of the Linux.This program can attack the Linux through the leak.
Update
: 2008-10-13
Size
: 3673
Publisher
:
孙新
【
Other
】
利用win95漏洞的攻击程序
DL : 0
攻击一台Win95的机器。这是Win95的一个漏洞,以其IP地址和端口向自 己的同一个端口发起连接(发SYN),Win95即会崩溃。-attack a Win95 machine. This is a loophole in the Win95, its IP address and port to the port launched with a link (the SYN), Win95 will collapse.
Update
: 2008-10-13
Size
: 1673
Publisher
:
孙新
【
WinSock-NDIS
】
TCP连接攻击
DL : 0
一个通过TCP连接过多睹塞80端口的攻击器代码-one too many connections through TCP port 80 to see a Serbian attack on the code
Update
: 2008-10-13
Size
: 36538
Publisher
:
深刻机
【
Other resource
】
超级DDOS源码
DL : 0
超级DDOS (分布式拒绝服务攻击)源码 ,每秒大于40000次-Super DDOS (Distributed Denial of Service Attack) source, more than 40,000 times per second
Update
: 2008-10-13
Size
: 5074
Publisher
:
ship
【
WinSock-NDIS
】
网络评估系统
DL : 1
该项目通过对网络设备进行自动的安全漏洞检测和分析,模拟漏洞分析专家及安全专家的技 术,提供基于策略的安全风险管理过程。网络漏洞扫描可执行预定的或事件驱动的网络探测, 去识别可能被入侵者利用的网络安全漏洞。网络漏洞扫描提供了多种缺省的扫描策略配置,同 时允许用户自己订做符合特定要求的策略。通过确认正确的配置,保证用户不会忽略正式的安 全策略,使所有的系统都保持合理的安全性来抵御外部的攻击。 -the project through the network equipment for the automatic detection and vulnerability analysis, vulnerability analysis simulation experts and the technical experts, policy-based security risk management process. Network Vulnerability scanning executable scheduled or event-driven network detection, to identify possible intruders use network security loopholes. Network Vulnerability Scanning providing a wide variety of scanning default policy configuration, and allows the user to build with their own specific requirements of the strategy. By identifying the correct configuration ensures that the users will not overlook the formal security policy, so that all the systems are to maintain a reasonable security to withstand external attack.
Update
: 2008-10-13
Size
: 1170077
Publisher
:
大大
【
Other resource
】
wodeyouxi
DL : 0
怪物追赶玩家 ,你 按下 ctrl 键可攻击怪物。 地图可以自由编辑-monster chasing players, you press the ctrl keys can attack a monster. Free Map Editor
Update
: 2008-10-13
Size
: 338236
Publisher
:
张林
【
Windows Develop
】
端口知识
DL : 1
端口知识及攻击方法,包括公共端口,注册端口,动态端口,详细介绍了上百个端口的功能。-ports knowledge and attack methods, including public ports, registered ports, dynamic ports, detailing more than 100 ports function.
Update
: 2008-10-13
Size
: 8288
Publisher
:
王松
【
GDI-Bitmap
】
SnapShot
DL : 0
自己写的一个截屏工具,可以像QQ那样进行截屏!-himself wrote a tool of attack, as it did for QQ screen shots!
Update
: 2008-10-13
Size
: 37111
Publisher
:
吟风
【
WinSock-NDIS
】
aircrack-2.1
DL : 0
aircrack is a 802.11 WEP key cracker. It implements the so-called Fluhrer - Mantin - Shamir (FMS) attack, along with some new attacks by a talented hacker named KoreK. When enough encrypted packets have been gathered, aircrack can almost instantly recover the WEP key.
Update
: 2008-10-13
Size
: 127624
Publisher
:
張中原
【
Other resource
】
monisaolei
DL : 0
一个扫雷游戏,用鼠标控制左击确定无雷,右击确定有雷,在右击取消有雷标记,刚开始用鼠标控制菜单,选者难度,及记录,开始游戏后按 F2返回菜单-a minesweeping games, with the left mouse control attack to determine mine-free, right click identified minefields in the right-to remove the minefields marked the beginning, with mouse control menu, the choices were difficult, and records of the games started by F2 to return to the menu
Update
: 2008-10-13
Size
: 5021
Publisher
:
马硕
【
Other
】
导弹打飞机
DL : 0
这是模拟物理中导弹打飞机现象的小程序。运行的时候需要把CCBP文件夹包含在头文件中。-This is the simulation of a missile attack against physics phenomena of small aircraft procedures. When run with the need to CCBP folder contains the first document.
Update
: 2008-10-13
Size
: 153004
Publisher
:
梁晓军
【
WinSock-NDIS
】
SYN攻击代码
DL : 0
目前的DDOS拒绝服务攻击大多都是SYN攻击,在这里给大家syn攻击的源码。-current DDOS denial of service attacks, most SYN attack, here we syn attack to the source.
Update
: 2008-10-13
Size
: 11675
Publisher
:
飞机抗敌
【
Other
】
IP碎片攻击源代码
DL : 0
一个由igmp攻击修改而来的icmp数据包攻击代码,对win98有效,主要是作为学习来看的-an attack by igmp adapted from the icmp packets attack code on win98 effective, as is the view of learning
Update
: 2008-10-13
Size
: 7780
Publisher
:
就叫这
【
WEB Code
】
asp网站远程监控(超级管理)系统
DL : 2
软件介绍: 本系统采用无数据库记录数据以及XMLHTML无刷新的“双无”技术对您的网站实行超级管理。只要将程序代码放入ASP网站或空间,所有浏览你网站的访问者行踪均在你的监视之下。你可以根据实际情况在后台对访问者进行友好或不友好的实时远程控制。 主要特点: 1、本系统采用无数据库记录数据技术:特点是不与网站其它程序冲突,记录的数据无遗漏。 2、XMLHTML无刷新技术:特点是访问者在瞬间会收到你发送的讯息或封锁、反攻击措施,而你的网站不会刷新。 -software introduced : the system by using data and database records updated XMLHTML no "double no" technology on your website implement Super management. If the code Add ASP website or space, all you browse the website visitors in your whereabouts were under surveillance. You can light of the actual situation in the background of visitors for a friendly or unfriendly to the real-time remote control. Main features : 1, the system uses no database records data technology : Features site is not other procedures conflict, the recorded data without omissions. 2, XMLHTML REFRESHING technology : features visitors will be received in an instant message you send or blockade, counter-attack, and you will not be updated.
Update
: 2008-10-13
Size
: 1554332
Publisher
:
罗鲲
【
Other resource
】
EnmyBelw
DL : 0
< 紧急下潜> 著名j2me手机游戏,本人开发. 游戏为经典潜艇军舰海战,玩家操纵军舰躲避潜艇攻击,并打击潜艇. 游戏程序含有通用的图片管理类库.可重用.-lt; Lt; Emergency dive gt; Gt; Famous J2ME mobile games, I development. Classic games for naval submarines, warships, players manipulate warships escape attack submarines, and combat submarines. Games containing GM's picture library management. Reusable.
Update
: 2008-10-13
Size
: 160030
Publisher
:
王宁
【
Technology Management
】
2005zuixinheikejishujiaocheng
DL : 0
2005最新黑客技术攻防教程 -latest hacking techniques 2005 Directory 2005 defense latest hacker attack and defense Guide
Update
: 2008-10-13
Size
: 1796339
Publisher
:
杜飞
【
Exploit
】
sql扫描加自动攻击工具Sqlpoke 含源代码
DL : 1
sql扫描加自动攻击工具Sqlpoke 含源代码.大家自己看看吧.-sql plus automatic scanning tool Sqlpoke attack with the source code. We all look at it.
Update
: 2008-10-13
Size
: 24995
Publisher
:
刘强
【
Game Program
】
MMORPG全源码
DL : 0
RPG:又称动作(Act)RPG,这种RPG没有专门的战斗画面,也就是说随时可以挥刀挥剑。如日本《不可思议之谜宫• 风来的西林》、日本《天地创造》等等,也有主观视角的A• RPG,如美《魔法门》系列。-RPG : also known as the action (Act) RPG, RPG no special combat scenes is ready brandished a knife and sword attack. Japan "inconceivable mystery Palace # 8226; The wind-resistant, "Japan" will create ", and so on subjective perspective of A # 8226; RPG, such as the United States, "Quest" series.
Update
: 2008-10-13
Size
: 1390256
Publisher
:
亚军
【
GUI Develop
】
n后问题
DL : 0
在 n 行 n 列的国际象棋棋盘上,最多可布n个皇后。 若两个皇后位于同一行、同一列、同一对角线上,则称为它们为互相攻击。 n皇后问题是指找到这 n 个皇后的互不攻击的布局。 n 行 n 列的棋盘上,主次对角线各有2n-1条。-n n trip out of the international chess board, the maximum n Queen's cloth. If two at the same Queen's visit, the same series on the same diagonal, as they attack each other. N Queen's problem is found n the Queen not to attack each other's layout. N n trip out on the chessboard, and secondary diagonal each 2n-1.
Update
: 2008-10-13
Size
: 1384
Publisher
:
刘二
«
1
2
...
8
9
10
11
12
13
14
15
16
17
18
...
50
»
DSSZ
is the largest source code store in internet!
Contact us :
1999-2046
DSSZ
All Rights Reserved.