Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - attack
Search - attack - List
DL : 0
PhpSpy是一个用PHP语言编写的在线管理程序,同时集成很多和海阳顶端网所类似的功能,也可以说是一个WEB方式的后门,结合现有的攻击手法,本着实用、简洁、小巧的原则,开发了这个程序。由于程序性质问题,公开提供下载的版本不会提供更多的操作。例如MSSQL连接、WIN主机反弹等。-PhpSpy is a PHP language with the online management procedures, integration and Haiyang many similar features the top net, it can be said that the back door of a WEB form, combined with existing methods of attack, in the practical, simple, compact principles, developed this procedure. As the procedural nature of the problem, open the downloaded version does not provide more operations. Such as MSSQL connection, WIN host rebound.
Update : 2024-05-05 Size : 19456 Publisher : 西瓜

目标识别的matlab源码,有源代码和论文,有需要的可以下来看看。-The application of automatic target recognition technology is a critical element of robotic warfare. ATR systems are used in unmanned aerial vehicles and cruise missiles. General Electric provides an Automatic Target Recognition Unit (ATRU) for the Standoff Land Attack Missile, which processes pre-launch and post-launch targeting data, allows high speed video comparison, and enables the SLAM-ER Missile to be truly "Fire and Forget".
Update : 2024-05-05 Size : 1264640 Publisher : li

Otherqueen
DL : 0
在8*8的国际象棋的棋盘上摆8个皇后,使他们之间不能相互攻击。即任意两个皇后不能位于同一行、同一列或同一对角线上。以下为一种可能,请求出共有多少种可能。-8* 8 chess board put eight queens, so that between them can not attack each other. That any two of the Queen can not in the same row, same column or the same diagonal. The following is a possible, request the total number of species may be.
Update : 2024-05-05 Size : 129024 Publisher : 大为

将压缩感知的博士论文 将压缩感知的博士论文-compressing
Update : 2024-05-05 Size : 13291520 Publisher : 幻幻

DL : 0
浅谈ARP欺骗攻击与防范。 -And Prevention of ARP spoofing attack. And Prevention of ARP spoofing attack.
Update : 2024-05-05 Size : 174080 Publisher : 南才北往

DL : 0
反调试技术原理!测调试器,攻击调试器,anti-OD等各种方法的原理分析与测试实例。 本人学习的总结,理论部分参考了《脱壳的艺术》、《加密与解密》以及本人从网络上收集的资料,在此向原作者致敬。 根据个人理解对各种反调试技术进行了汇总和高度归纳,并提供了本人创作的各种反调试实例及源代码-Principles of anti-debugging techniques! Test debugger, debugger attack, anti-OD theory and other methods of analysis and test case. I study concluded, some reference to theory, " Shelling the Arts" , " encryption and decryption," and I collected information from the network, in this tribute to the original author. Personal understanding of the various anti-debugging techniques were summarized and highly summarized, and provided I created an instance of anti-debugging and source code
Update : 2024-05-05 Size : 286720 Publisher : yangyajun

DL : 0
一些黑客进行攻击操作的基本命令,对于初学黑客命令的人来说会有一定的帮助。-Some hackers attack the basic operation of the command, the command for the novice hackers people who will definitely help.
Update : 2024-05-05 Size : 11264 Publisher : forest

基于统计的synflood攻击检测程序。用snort的plug-in功能,计算异常syn packet的个数,以检测攻击。把sp_tcp_synflood_check.c,sp_tcp_synflood_check.h添加snort的srcdetection-plugins。-using snort,detect synflood attack.sp_tcp_synflood_check.c,sp_tcp_synflood_check.h are added detection-plugins of src of snort.
Update : 2024-05-05 Size : 5288960 Publisher : hocholman

DL : 0
qflood.exe(附源码) 对Quake server进行Flood攻击,把Andy Gavin (_k3nny@Efnet, k@EnterTheGame)写的linux下的程序移植到Win32平台下-qflood.exe (attached source) to the Quake server for Flood attack, the Andy Gavin (_k3nny @ Efnet, k @ EnterTheGame) written procedures under linux ported to Win32 platform
Update : 2024-05-05 Size : 22528 Publisher : wang

DL : 0
Flex attack server very good
Update : 2024-05-05 Size : 163840 Publisher : dkflash

DL : 0
这是一个可以用于攻击Web应用程序的集成平台。Burp套件允许一个攻击者将人工的和自动的技术结合起来,以列举、分析、攻击Web应用程序,或利用这些程序的漏洞。各种各样的burp工具协同工作,共享信息,并允许将一种工具发现的漏洞形成另外一种工具的基础-This is an application that can be used to attack Web integration platform. Burp suite allows an attacker to manual and automatic techniques combine to lists, analysis, attacks on Web applications, or use of these procedures loopholes. Various burp tools work together, share information and allow a tool to find loopholes in the basis of the formation of another tool
Update : 2024-05-05 Size : 2481152 Publisher : 石松

缓冲区溢出攻击:原理,防御及检测,一篇不错的论文,对理解蠕虫病毒有一定好处-Buffer Overflow Attack: Mechanism, prevention and detection, a good paper.
Update : 2024-05-05 Size : 92160 Publisher : m

DL : 0
musicdsp source code archive-Analysis Beat Detector Class Coefficients for Daubechies wavelets 1-38 DFT Envelope detector Envelope Detector class (C++) Envelope follower with different attack and release Fast in-place Walsh-Hadamard Transform FFT FFT classes in C++ and Object Pascal Frequency response from biquad coefficients Java FFT Look ahead limiting LPC analysis (autocorrelation+ Levinson-Durbin recursion) Magnitude and phase plot of arbitrary IIR function, up to 5th order Measuring interpollation noise QFT and DQFT (double precision) classes Simple peak follower tone detection with Goertzel Tone detection with Goertzel (x86 ASM) Effects 2 Wave shaping things Alien Wah Band Limited PWM Generator Bit quantization/reduction effect Class for waveguide/delay effects Compressor Decimator Delay time calculation for reverberation DIRAC- Free C/C++ Library for Time and Pitch Manipulation of Audio Based on Time-Frequency Transforms dynamic convolution Early echo s with image-mirror techn
Update : 2024-05-05 Size : 826368 Publisher : Alan Tang

DL : 0
入侵检测(Intrusion Detection),它通过对计算机网络或计算机系统中得若干关键点收集信息并对其进行分析,从中发现网络或系统中是否有违反安全策略的行为和被攻击的迹象-IDS (Intrusion Detection), it is through the computer network or computer systems have a number of key in the information collected at and analyze, discover whether the network or system in violation of security policy behavior and indications of attack
Update : 2024-05-05 Size : 2048 Publisher : liyabin

DL : 0
ARP欺骗攻击程序。Hacker发送伪装的ARP Reply告诉A,计算机B的MAC地址是Hacker计算机的MAC地址。 Hacker发送伪装的ARP Reply告诉B,计算机A的MAC地址是Hacker计算机的MAC地址。 这样A与B之间的通讯都将先经过Hacker,然后由Hacker进行转发。于是Hacker可以捕获到所有A与B之间的数据传输(如用户名和密码)。 -ARP spoofing attack program. Hacker sends fake ARP Reply told A, Computer B' s MAC address is the MAC address of a computer Hacker. Hacker sends fake ARP Reply told B, computer A' s MAC address is the MAC address of a computer Hacker. This communication between A and B will go through Hacker, and then carried forward by the Hacker. Hacker can then capture all the data between A and B transmission (such as user name and password).
Update : 2024-05-05 Size : 8192 Publisher : yoyo

天气潮湿导致鼠标左右键触点氧化,单击变多击.此软件用于将短时间内多击判定为单击所用.-Humidity lead to oxidation of the mouse left key contacts, click the change more than hit. This software is used to attack a short time more determined to click used.
Update : 2024-05-05 Size : 3460096 Publisher : JIM

DL : 0
八皇后问题是一个古老而著名的问题,是回溯算法的典型例题。该问题是十九世纪著名的数学家高斯1850年提出:在8X8格的国际象棋上摆放八个皇后,使其不能互相攻击,即任意两个皇后都不能处于同一行、同一列或同一斜线上,问有多少种摆法。-Eight queens problem is an old and well-known problem is a typical example backtracking algorithm. The problem is that the nineteenth century the famous mathematician Gauss 1850: Under the 8X8 grid placed eight on the international chess queen, so that it can not attack each other, that any two Queens can not in the same row, same column or the same slash on the question of how many pendulum method.
Update : 2024-05-05 Size : 1024 Publisher : pudn15a

Othercalc2
DL : 0
网页游戏修真的攻击计算器。完整源码。 具体内容见使用说明。-Web games XiuZhen for the attack calculator.
Update : 2024-05-05 Size : 677888 Publisher : yubo

We model the hunt as a game of three explicit stages: the stalk, the attack, and the subdual. We implemented this model in Matlab to simulate a velociraptor hunting a thescelosaurus and an African lion hunting a gazelle.-We model the hunt as a game of three explicit stages: the stalk, the attack, and the subdual. We implemented this model in Matlab to simulate a velociraptor hunting a thescelosaurus and an African lion hunting a gazelle.
Update : 2024-05-05 Size : 338944 Publisher : 陈璐

We model the hunt as a game of three explicit stages: the stalk, the attack, and the subdual. We implemented this model in Matlab to simulate a velociraptor hunting a thescelosaurus and an African lion hunting a gazelle.
Update : 2024-05-05 Size : 304128 Publisher : 陈璐
« 1 2 ... 45 46 47 48 49 50»
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.