搜索资源列表
xyz
- RSA低指数攻击程序,通过程序展示RSA低指数攻击的漏洞-Low-index attack on RSA program, through the RSA program showing a low index of vulnerability to attack
fueifu
- 误删除、误格式化、误克隆、分区表丢失、误分区、PQ分区出错、病毒破坏等..OUTLOOK、OUTLOOK EXPRESS、FOXMAIL、LOTUS NOTES等邮件系统Word、Excel、PPT等OFFICE文档修复及各种文件无法正常使用.. office办公文档损坏或乱码,文档闪存CF卡/智能媒体SM卡/MS记忆棒/MMC多媒体卡/SD卡/XD卡/U盘/MP3/MP4,故障类型有:U盘/存储卡等无法识别,无法完成格式化,数据误格式化,误删除,覆盖等... 邮件误删
SnifferConsole
- sniffcomsole的源程序,对于黑客的攻防很有效果。-sniffcomsole the source, for a hacker attack and defense is effective.
5566
- 易語言完美國際源碼顯示名字,打坐,普通,攻擊和撿取物品!-Yi language source code shows the name of Perfect International, meditation, common attack and seizure of items!
eight_queen
- 八皇后问题是一个古老而著名的问题,是回溯算法的典型例题。该问题是十九世纪著名的数学家高斯1850年提出:在8X8格的国际象棋上摆放八个皇后,使其不能互相攻击,即任意两个皇后都不能处于同一行、同一列或同一斜线上,问有多少种摆法-Eight queens problem is an old and well-known problem is a typical Example backtracking algorithms. The problem is that the nineteenth ce
dazi
- 一个网页打字游戏,具有源代码 可直接去玩,具有分等级的攻能-Typing a web game to play with the source code can be directly with a sub-class of attack can be
tgatb.tar
- The Goblin and the Butterfly ,开源的2d游戏客户端-TThe Goblin and the Butterfly game server is up and running, so you can log into the game and have a look at the existing features. Here are some key features of "The Goblin and the Butterfly": · 5 Skil
SPBA
- strong password based attack
IRPAttack
- IRP攻击的例子。程序基于winpcap sdk实现,打包中提供了所需的头文件、lib库及dll。-IRP attack example. Program is based on winpcap sdk implementation, packaged to provide the required header files, lib libraries and dll.
synflood
- 有名的握手协议洪水攻击的源代码,有待改进-The famous handshake protocol Flood attack the source code, room for improvement in
hacktools
- 过所有杀软的免杀下载者,如果满意的话可以找我定制,禁止使用于非法用途,否则后果自负-don t use it for attack
ARPtechreport
- arp攻击相关内容资料 相当好的参考资料 -arp attack on the content of the information related to a very good reference
netguard-1.0.0.tar
- network monitoring securiy tool(NIDS) in linux intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack can also be identified by this network monitoring tool
protolog-1.0.0.tar
- network monitoring securiy tool(NIDS) in linux intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack can also be identified by this network monitoring tool
ng-0.0.2.tar
- network monitoring securiy tool(NIDS) in linux intrusions like port scanning,POD,smurf attack,buffer overflow,IP sweep attack,ARP attack can also be identified by this network monitoring tool
shipfire
- 该游戏是用VC++6.0开发,实现船上放鱼雷,对水下的潜艇,进行攻击的游戏。该游戏采用对话框的形式来实现。-The game is developed using VC++6.0 to achieve the torpedo boat put on the underwater submarines, attack of the game. Using the dialog box in the form of the game to achieve.
MySword
- 用Flex builder建立工程,使用flash AS3完成的一个小型游戏,用方向键控制主角移动,一共有3波敌人的进攻,没波敌人被杀完后,下一波会出现。展示了简单的AI和flash as3图像编程的方法,其中封装了sprite类,非常容易理解。-The establishment of projects with the Flex builder, using flash AS3 completion of a mini-game, use the arrow keys to control
Battle_with_monster
- You battle with a monster in which you can attack, defend, or heal. Uses random numbers to decide the attack and healing ammounts. Have fun!
xiaohua
- 笑话网页小偷程序特点: ·无需购买服务器即可让你瞬间拥有数千部免费在线观看的卡通动漫资源; ·实现网站内容免更新免维护,全站后台管理,操作简单,管理方便; ·实现前台与后台完全分离,可自定义后台管理路径!支持在任意目录下使用; ·提供防SQL注入及跨站脚本攻击功能,确保程序更加安全; ·提供多个站点广告位并可在后台直接管理,轻松赚钱原来如此简单; ·提供站长工具包,轻松获取常用工具,助你一臂之力; -Joke thief pro
vm
- Owing to the broad application value of audio watermarking in remote transmission and mobile extraction, it is very important to study watermarking approaches against A/D and D/A conversion. Based on wavelet decomposition and cepstrum technol