Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - attack
Search - attack - List
DL : 0
如何攻击电脑,如何成为电脑高手 天外有天,人外有人,这是你成为黑客的 捷径!得到它,对于你成为电脑高手,已经起到事半功倍的效果-How to attack a computer, how to become a computer expert天外有天people, some people outside, this is your shortcut to become a hacker! Get it for you to become a computer expert, has played a multiplier effect
Update : 2024-05-05 Size : 16664576 Publisher : 小我

模拟udp 的dos攻击,相当于发包机的功能,报文尺寸和长度还有发包时间都能自己定义-udp flood attack
Update : 2024-05-05 Size : 1024 Publisher : 陈瀚驰

DL : 0
C++ implementaion for RSA together with the Wiener attack. It uses NTL library for big numbers
Update : 2024-05-05 Size : 4096 Publisher : Calin Juravle

Intrusion detection for black hole attack on AODV protocol.
Update : 2024-05-05 Size : 10240 Publisher : ubaid

密码攻防 CMOS密码篇 系统密码 驱动器隐藏篇 常用网络工具密码篇等-Password attack and defense
Update : 2024-05-05 Size : 859136 Publisher : 阿杜

进行arp攻击的程序 网络编程-Arp attack procedures for network programming
Update : 2024-05-05 Size : 6144 Publisher : hello

DL : 0
各种数字水印的嵌入和提取 检测和攻击 包括lsb 和dct等算法-A variety of digital watermark embedding and extraction, including detection and attack, such as algorithm lsb and dct
Update : 2024-05-05 Size : 87040 Publisher : 林兴

DL : 0
asp.net系统,防止XSS攻击的实例程序-asp.net application, anti-XSS attack example program
Update : 2024-05-05 Size : 28672 Publisher : danny

DL : 0
效果非常好的数字水印的源代码,实现了基于小波变换的奇异值分解算法,选取载体图像的LH子带作为载体,并进行攻击测试算法性能-The effect of a very good source of digital watermarking, wavelet transform based on the realization of the singular value decomposition algorithm, select the carrier of the LH sub-band image as a carrier and test algorithm to attack
Update : 2024-05-05 Size : 2048 Publisher : xiaobao89

在Linux开发环境,伪装一个随机的IP地址端口号,循环攻击某个指定的IP地址端口号或网站,使其瘫痪。-LINUX TCP DOS ATTACK CODE
Update : 2024-05-05 Size : 6144 Publisher : 王海峰

在ns2下仿真AODV路由协议黑洞攻击时使用的脚本程序-the script of simulation AODV routing blackhole attack under the ns2
Update : 2024-05-05 Size : 57344 Publisher : fei

On Designatedly Veried (Non-interactive)Watermarking Schemes-Although many watermarking schemes consider the case of universal veri¯ ability, it is undesirable in some applications. Designated veri¯ cation is a possible solution for this problem. Watermarking scheme with (non-interactive) designated veri¯ cation through non-invertible schemes was proposed by Lee et al [11] in 2003, to resolve multiple wa- termarking problem. Yoo et al [14] proposed a very similar watermarking scheme. In this paper, we propose a cryptanalytic attack on both of these schemes that allows a dishonest watermarker to send illegal watermarked images and to convince the designated veri¯ er or customer that received watermarked images are valid.We modify the above schemes to overcome the attack. Further, we also propose a new robust watermarking scheme with (non-interactive) designated veri¯ cation through non-invertible wa- termarks. Interestingly, our scheme can be extended for joint copyright protection (security of ownership rights fo
Update : 2024-05-05 Size : 145408 Publisher : xiaowang

Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm-Chaotic systems have been broadly exploited through the last two decades to build encryption methods. Recently, two new image encryption schemes have been proposed, where the encryption process involves a permutation operation and an XORlike transformation of the shuffled pixels, which are controlled by three chaotic systems. This paper discusses some defects of the schemes and how to break them with a chosen-plaintext attack.
Update : 2024-05-05 Size : 251904 Publisher : xiaowang

用于音频水印稳健性测试的攻击软件,非常流行。现在官方主页链接已失效。-Used to test the robustness of audio watermarking attack software, very popular. Now the official home page link has expired.
Update : 2024-05-05 Size : 2839552 Publisher : 李斌

anti arp攻击测试软件工具(内测版),用于检测局域网中的arp的相关内容-test anti arp attack software tools (beta version) for detecting LAN relevant content arp
Update : 2024-05-05 Size : 791552 Publisher : yao

http 攻击 被攻击ip地址 被攻击端口 伪造ip 伪造端口 2.开始攻击 tcpps端口扫描使用流程: 1.运行程序 输入参数 输入格式:tcpps 被扫描ip地址 2.输出显示:正在使用的端口号 -dosattack completion of the function : ip hidden dos attack using processes -扫描并攻击被攻击ip地址 被攻击端口 伪造ip 伪造端口 2.开始攻击 tcpps端口扫描使用流程: 1.运行程序 输入参数 输入格式:tcpps 被扫描ip地址 2.输出显示:正在使用的端口号-dosattack completion of the function : ip hidden dos attack using processes
Update : 2024-05-05 Size : 589824 Publisher : steve

DL : 0
SYN FLOODING ATTACK TOOL-SYN FLOODING ATTACK TOOL
Update : 2024-05-05 Size : 3072 Publisher : SERK

DL : 0
Since the first denial of Service (DoS) attack appears, DoS attacks cause significant financial damage every year. The majority researchers focus on detection and respond mechanism of DoS, whereas limited progress has been made in the details of DoS attacks. In this paper, we introduce Custom Audit Scripting Language (CASL) applied to write simulation program for DoS attacks. Then we take a deep research in the methodology of DoS attacks and simulate two typical DoS attacks in CASL. Additionally, recent trends of DoS attacks and problems associated with defending against DoS attacks are also discussed. In short, our simulation attack programs can help examine the nature of DoS attacks and find the corresponding countermeasures
Update : 2024-05-05 Size : 152576 Publisher : saksss

网络攻防资料-网络渗透技术书籍,学信息安全的很适用的书籍-Network attack and defense of information- Internet penetration of technical books, learning is very applicable to information security books
Update : 2024-05-05 Size : 30772224 Publisher : 李灵

NETBOT ATTACK网络僵尸源代码,价值10WRMB,现在免费发布啦-NETBOT ATTACK botnet source code, the value of 10WRMB, now released for free啦
Update : 2024-05-05 Size : 1186816 Publisher : my
« 1 2 3 4 56 7 8 9 10 ... 50 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.