DSSZ
www.dssz.org
Search
Sign in
Create an account
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - attack
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - attack - List
【
Other
】
heikejiaocheng
DL : 0
如何攻击电脑,如何成为电脑高手 天外有天,人外有人,这是你成为黑客的 捷径!得到它,对于你成为电脑高手,已经起到事半功倍的效果-How to attack a computer, how to become a computer expert天外有天people, some people outside, this is your shortcut to become a hacker! Get it for you to become a computer expert, has played a multiplier effect
Update
: 2024-05-05
Size
: 16664576
Publisher
:
小我
【
Internet-Network
】
udpflood
DL : 0
模拟udp 的dos攻击,相当于发包机的功能,报文尺寸和长度还有发包时间都能自己定义-udp flood attack
Update
: 2024-05-05
Size
: 1024
Publisher
:
陈瀚驰
【
Crack Hack
】
RSA.ZIP
DL : 0
C++ implementaion for RSA together with the Wiener attack. It uses NTL library for big numbers
Update
: 2024-05-05
Size
: 4096
Publisher
:
Calin Juravle
【
OS program
】
IDS_of_blackhole_attacksaodv
DL : 0
Intrusion detection for black hole attack on AODV protocol.
Update
: 2024-05-05
Size
: 10240
Publisher
:
ubaid
【
Other
】
Passwordattackanddefense
DL : 0
密码攻防 CMOS密码篇 系统密码 驱动器隐藏篇 常用网络工具密码篇等-Password attack and defense
Update
: 2024-05-05
Size
: 859136
Publisher
:
阿杜
【
Internet-Network
】
arpsproof
DL : 0
进行arp攻击的程序 网络编程-Arp attack procedures for network programming
Update
: 2024-05-05
Size
: 6144
Publisher
:
hello
【
Graph program
】
gui
DL : 0
各种数字水印的嵌入和提取 检测和攻击 包括lsb 和dct等算法-A variety of digital watermark embedding and extraction, including detection and attack, such as algorithm lsb and dct
Update
: 2024-05-05
Size
: 87040
Publisher
:
林兴
【
Web Server
】
AntiXSSTest
DL : 0
asp.net系统,防止XSS攻击的实例程序-asp.net application, anti-XSS attack example program
Update
: 2024-05-05
Size
: 28672
Publisher
:
danny
【
Other
】
hundun_svd_0525
DL : 0
效果非常好的数字水印的源代码,实现了基于小波变换的奇异值分解算法,选取载体图像的LH子带作为载体,并进行攻击测试算法性能-The effect of a very good source of digital watermarking, wavelet transform based on the realization of the singular value decomposition algorithm, select the carrier of the LH sub-band image as a carrier and test algorithm to attack
Update
: 2024-05-05
Size
: 2048
Publisher
:
xiaobao89
【
Linux-Unix
】
linux_tcp_dos_attack
DL : 0
在Linux开发环境,伪装一个随机的IP地址端口号,循环攻击某个指定的IP地址端口号或网站,使其瘫痪。-LINUX TCP DOS ATTACK CODE
Update
: 2024-05-05
Size
: 6144
Publisher
:
王海峰
【
Windows Develop
】
blackholeaodv
DL : 0
在ns2下仿真AODV路由协议黑洞攻击时使用的脚本程序-the script of simulation AODV routing blackhole attack under the ns2
Update
: 2024-05-05
Size
: 57344
Publisher
:
fei
【
Documents
】
OnDesignatedlyVerifiedNon-interactive)Watermarking
DL : 0
On Designatedly Veried (Non-interactive)Watermarking Schemes-Although many watermarking schemes consider the case of universal veri¯ ability, it is undesirable in some applications. Designated veri¯ cation is a possible solution for this problem. Watermarking scheme with (non-interactive) designated veri¯ cation through non-invertible schemes was proposed by Lee et al [11] in 2003, to resolve multiple wa- termarking problem. Yoo et al [14] proposed a very similar watermarking scheme. In this paper, we propose a cryptanalytic attack on both of these schemes that allows a dishonest watermarker to send illegal watermarked images and to convince the designated veri¯ er or customer that received watermarked images are valid.We modify the above schemes to overcome the attack. Further, we also propose a new robust watermarking scheme with (non-interactive) designated veri¯ cation through non-invertible wa- termarks. Interestingly, our scheme can be extended for joint copyright protection (security of ownership rights fo
Update
: 2024-05-05
Size
: 145408
Publisher
:
xiaowang
【
Documents
】
Cryptanalysisofanimageencryptionscheme
DL : 0
Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm-Chaotic systems have been broadly exploited through the last two decades to build encryption methods. Recently, two new image encryption schemes have been proposed, where the encryption process involves a permutation operation and an XORlike transformation of the shuffled pixels, which are controlled by three chaotic systems. This paper discusses some defects of the schemes and how to break them with a chosen-plaintext attack.
Update
: 2024-05-05
Size
: 251904
Publisher
:
xiaowang
【
Audio program
】
StirmarkForAudio
DL : 0
用于音频水印稳健性测试的攻击软件,非常流行。现在官方主页链接已失效。-Used to test the robustness of audio watermarking attack software, very popular. Now the official home page link has expired.
Update
: 2024-05-05
Size
: 2839552
Publisher
:
李斌
【
Sniffer Package capture
】
arp_attack_tools
DL : 0
anti arp攻击测试软件工具(内测版),用于检测局域网中的arp的相关内容-test anti arp attack software tools (beta version) for detecting LAN relevant content arp
Update
: 2024-05-05
Size
: 791552
Publisher
:
yao
【
OS program
】
200904httpzhuaji-77169.com
DL : 0
http 攻击 被攻击ip地址 被攻击端口 伪造ip 伪造端口 2.开始攻击 tcpps端口扫描使用流程: 1.运行程序 输入参数 输入格式:tcpps 被扫描ip地址 2.输出显示:正在使用的端口号 -dosattack completion of the function : ip hidden dos attack using processes -扫描并攻击被攻击ip地址 被攻击端口 伪造ip 伪造端口 2.开始攻击 tcpps端口扫描使用流程: 1.运行程序 输入参数 输入格式:tcpps 被扫描ip地址 2.输出显示:正在使用的端口号-dosattack completion of the function : ip hidden dos attack using processes
Update
: 2024-05-05
Size
: 589824
Publisher
:
steve
【
TCP/IP stack
】
GreyHaT
DL : 0
SYN FLOODING ATTACK TOOL-SYN FLOODING ATTACK TOOL
Update
: 2024-05-05
Size
: 3072
Publisher
:
SERK
【
source in ebook
】
dos4
DL : 0
Since the first denial of Service (DoS) attack appears, DoS attacks cause significant financial damage every year. The majority researchers focus on detection and respond mechanism of DoS, whereas limited progress has been made in the details of DoS attacks. In this paper, we introduce Custom Audit Scripting Language (CASL) applied to write simulation program for DoS attacks. Then we take a deep research in the methodology of DoS attacks and simulate two typical DoS attacks in CASL. Additionally, recent trends of DoS attacks and problems associated with defending against DoS attacks are also discussed. In short, our simulation attack programs can help examine the nature of DoS attacks and find the corresponding countermeasures
Update
: 2024-05-05
Size
: 152576
Publisher
:
saksss
【
Other
】
informationsecurity
DL : 0
网络攻防资料-网络渗透技术书籍,学信息安全的很适用的书籍-Network attack and defense of information- Internet penetration of technical books, learning is very applicable to information security books
Update
: 2024-05-05
Size
: 30772224
Publisher
:
李灵
【
Internet-Network
】
NBATTACKChina
DL : 0
NETBOT ATTACK网络僵尸源代码,价值10WRMB,现在免费发布啦-NETBOT ATTACK botnet source code, the value of 10WRMB, now released for free啦
Update
: 2024-05-05
Size
: 1186816
Publisher
:
my
«
1
2
3
4
5
6
7
8
9
10
...
50
»
DSSZ
is the largest source code store in internet!
Contact us :
1999-2046
DSSZ
All Rights Reserved.