资源列表
FEAL8
- 本次的FEAL8轮叠代要求将64位的密文C与64位的密钥K经过要设计的解密程序运行得到所需的64位的明文P。由于2进制输入输出的位数太长不方便,再程序的数据运算中大量用上16进制。在数据的运算过程中又常常把输入的数据平均分成等份,因此在数据处理上用上数组形式。FEAL算法的三个基本运算函数是整个程序的重心,程序的密钥处理和解密过程都将以这三个运算函数为中心,因此,程序的设计以S函数 函数和 f函数来展开,再由主函数编写时调用三个函数。-the FEAL8 round of the iterati
ajax+jspshuaxing
- ajax+jsp异步无刷新从DB取数据.-ajax jsp asynchronous REFRESHING obtain data from DB.
a
- 蠕虫下载者,delphi写的,可以学习一下
WindowsANIZeroDayAnimated_Cursor_Exploit
- Windows Animated Cursor Handling Exploit (0day) Works on fully patched Windows Vista I think it is first real remote code execution exploit on vista =) Tested on: Windows Vista Enterprise Version 6.0 (Build 6000) (default installation a
ieshowhelp
- Microsoft Internet Explorer ShowHelp执行任意命令漏洞-ShowHelp Microsoft Internet Explorer vulnerabilities to execute arbitrary commands
attackcode
- [310] 常用攻击程序 Abstract 这里有一些是老的,现在看来并没有用,但他们都很有名。 1 Land 攻击一台Win95的机器。这是Win95的一个漏洞,以其IP地址和端口向自 己的同一个端口发起连接(发SYN),Win95即会崩溃。-[310] Attack procedures Abstract Here are some of the old, and now it is useless, but they are well known. A Land attack a Win9
dct_zig_zig
- a method for image fusion
obtain-the-sequence-number-of-CPU
- 可以直接通过易语言程序轻松获取CPU列号-Can easily c by easy language program
ex7
- hah wherer ot shgf d
guizewangluo
- 应用matlab程序,构建规则网络,是研究复杂网络不或缺的代码-Application matlab program to simulate a regular network, is the study of complex networks essential program code
linuxx86exploir
- 一个最新的针对linuxx86的溢出-the latest against a spillover linuxx86
ciscocrack
- Simple Brute Force unix password cracker, tries every printable 7-bit * ascii characters.- Simple Brute Force unix password cracker, tries every printable 7-bit * ascii characters.