搜索资源列表
ServerAttackBy-C-4
- Attack any server and paralyse it by sending more than 200 request to open the website at the same time
dns_dos
- 通过对DNS服务器的扫描分析对DNS服务器实行攻击。请慎用-Through the analysis of DNS servers scan the implementation of the attack on the DNS server. Please caution
SnifferUseGuide
- Sniffer使用教程 Sniffer,中文可以翻译为嗅探器,是一种威胁性极大的被动攻击工具。使用这种工具,可以监视网络的状态、数据流动情况以及网络上传输的信息。-Sniffer tutorials use Sniffer, can be translated into Chinese sniffer is a great threat to attack a passive tool. The use of this tool can monitor the status of network
MS06034
- 漏动攻击MS06034源程序,编译后可运行,测试效果一般,因为是一个比较老的洞了-MS06034 source leakage dynamic attack, the compiler can be run to test the effect of the general, because it is a hole the old
3
- 用java做的UFO攻击小游戏,简简单单,也不简单-To do with java game of UFO attack, simple or simple
DCT-SVD-Algorithm
- 基于DCT的SVD算法,对于几何攻击有很强的鲁棒性-DCT-SVD algorithm, robustness on geometry attack
bahuanghouyouxi
- 八皇后是个古老而有趣的游戏,是由高斯于1850年首先提出的.要求在国际象棋的棋盘上放置八个皇后,时期不能相互攻击,即任意两个皇后不能处于 棋盘上的同一行、同一列和同一条对角线上.-Queen' s is the oldest of eight and interesting games, by Gauss in 1850 first proposed. The requirements of the international chess board to place the eig
xg0712007021238
- 创建两个对象,实行相互攻击一次,加油的方法-create two objects, implement mutual attack on one occasion, fuelling method
syfloorFireWall
- 针对洪泛攻击的防火墙,用VB的界面,代码挺简单的-Flooding attack against the firewall, using VB' s interface, very simple code
teardropandsynblood
- 这是我研究泪滴攻击和sys blood攻击时收集的资料,包括这两方面原理的专题和解决方法,对研究这个的朋友有实际意义。-This is my research teardrop attacks and attack sys blood collected information, including the principle of these two aspects of the topic and solutions, to study the practical significance
bmpenc
- 一个基于Hash的随机LSB信息隐藏程序 包含波形小幅扰动抗攻击 自己编写的 包含24bitBMP文件的读取与像素分离 快速傅立叶变换 散列LSB等相关算法的头文件 与系统无关 可以通过G++编译 在Win/Linux环境下都可以正常工作 也可以将头文件提取出来应用于其他代码之中-A Hash-LSB steganography source code with randomized DFT anti-RS-attack tech. Coding by myself. Including hea
049
- 此实例是一个缓冲区攻击程序,请谨慎使用,否则后果自负。-This is a buffer attack program!place apply it calefully!!
Hacking.The.Art.Of.Exploitation
- 一本关于黑客攻击及漏洞挖掘艺术的好书.有缓冲区溢出的利用等.-Exploit programs using buffer overflows and format strings Write your own printable ASCII polymorphic shellcode Defeat non-executable stacks by returning into libc Redirect network traffic, conceal open ports,
057
- 本实例是一个系统攻击程序。仅供读者学习和测试之用,否则后果自负。-This example is to attack a system process. Readers for learning and testing, or else at your peril.
High_performance_linux_cluster_attack_scenarios.r
- High performance linux cluster attack scenarios
AC
- 为了应对附近敌对国家的威胁,某国R已经更新了他们的导弹防御系统。这种新型的防御系统能够击落一系列的导弹,只要这些导弹是按上升或下降的高度顺序袭击。-In response to the threat of hostile countries nearby, R has been updated a country of their missile defense system. The new defense system to shoot down a series of missiles,
advanced_sql_injection
- how to prevent sql injection attack
plane
- 导弹打飞机的游戏,有音效,有背景音乐,有积分,有自动游戏,有非自动,就是用鼠标,操作导弹发,打击在空中飞行的飞机,飞机也发射对地导弹攻击发射架-Aircraft missiles to fight the game, there are sound effects, background music, there are points, automatic games, non-automatic, is to use the mouse to operate the missile hair
CryptanalysisofHwang-ChangsaTime-StampProtocolforD
- Cryptanalysis of Hwang-Changs a Time-Stamp Protocol for Digital Watermarking-In 2005, Hwang et al. [17] proposed a time-stamping protocol for digit watermarking. They claimed that their scheme is secure against attacks. However, in this article,
CryptanalysisofaNewChaoticCryptosystemBasedonErgod
- Cryptanalysis of a New Chaotic Cryptosystem Based on Ergodicity-This paper analyzes the security of a recent cryptosystem based on the ergodicity property of chaotic maps. It is shown how to obtain the secret key using a chosen-ciphertext attack.