搜索资源列表
wokao
- test比如你要采用spring和hibernate(带事务支持的话),你除了spring.jar外还需要hibernat.jar、aopalliance.jar、cglig.jar、jakarta-commons下的几个jar包。 http://www.springframework.org/download.html下载spring开发包,提供两种zip包 spring-framework-1.1.3-with-dependencies.zip和spring-framework
javedb2-anqn
- struts+hibernate的例子,好学好用。-struts exploit example, studious handy.
hibernatezhdoc
- hibernate学习资料.与大家共同分享 -exploit learning materials. To share with you
RealPlayerexploit
- RealPlayer .smil溢出漏洞攻击代码。直接编译可用。-RealPlayer. Smil overflow exploit. Directly translated available.
Dimensionalreductionforparticlefiltersofsystemswit
- We present a particle filter construction for a system that exhibits time-scale separation. The separation of time-scales allows two simplifications that we exploit: i) The use of the averaging principle for the dimensional reduction of the sys
AMODIFIEDRAO-BLACKWELLISEDPARTICLEFILTER
- Rao-Blackwellised Particle Filters (RBPFs) are a class of Particle Filters (PFs) that exploit conditional dependencies between parts of the state to estimate. By doing so, RBPFs can improve the estimation quality while also reducing the overall
ComRaider
- ComRaider 是一个很强大的 com组件漏洞自动发掘工具 -ComRaider is a COM Exploit Fuzzing Tool This is Source Code
124998-01
- Solaris系统的tip(1)工具实现上存在漏洞,本地非特权用户可能利用此漏洞以uucp(uid 5)用户的权限执行任意命令。 Sun已经为此发布了一个安全公告(Sun-Alert-102773)以及相应补丁.-Solaris system tip (1) tools for the realization of the existence of loopholes in the local non-privileged user could exploit this vulnerabil
downandexec
- 漏洞利用的shellcode ,功能是下载执行,程序给出了调用过程-Exploit the shellcode, download feature is implemented, procedures give a call to the process of
Advanced_buffer_overflow_exploits
- 现在有许多缓冲区溢出攻击代码。早期缓冲区 溢出攻击代码只产生了一个shell (执行程序/ bin / sh ) 。但是, 如今一些缓冲区溢出攻击代码已经很不错的功能。 例如,通过过滤,打开一个socket,打破的chroot , 等等。本文将试图解释先进的缓冲区溢出 利用技巧根据英特尔x86 Linux操作系统。-Nowadays there are many buffer overflow exploit codes. The early buffer ov
9day
- OWC10.DLL exploit 0day OfficeWebComponents
ms08067-2k2k3
- microsoft 0867 exploit source code for windows 2000,2003 server
ms0670
- microsoft 0670 exploit source code
MS08067Exploit
- MS08-067 Exploit溢出漏洞源码-MS08-067 Exploit Overflow Vulnerability source
CVE-2009-0927_package
- adobe acrobat/reader getIcon函数出错通用溢出程序-adobe acrobat/reader getIcon function universal exploit
ftpexploit
- ftp exploit by ankit
Automatic-iis7.0-exploit
- 漏洞利用代码针对iis7溢出漏洞,直接秒杀iis7-Exploit code for the the iis7 overflow vulnerability, direct spike iis7
exploit
- shellcode:包含shellcode.c和exploit.c,研究环境为linux漏洞攻击,包含缓冲区溢出,地址覆盖,调试工具gcc\gdb-shellcode shellcode.c和exploit.c linux exploit buffer overflow gcc\gdb
WindowsLocal-Ring-0-Exploit
- 一个windows本地提权漏洞,影响从Windows nt到Windows 8,利用漏洞接替了系统内核拿到最高权限-Windows NT/2K/XP/2K3/VISTA/2K8/7/8 EPATHOBJ local ring0 exploit There s a pretty obvious bug in win32k!EPATHOBJ::pprFlattenRec where the // PATHREC object returned by win32k!EPATHOBJ
win-2000-xp-task-scheduler-exploit
- win 2000 xp task scheduler exploit, win 2000 xp task scheduler exploit-win 2000 xp task scheduler exploit