搜索资源列表
分别用蛮力法、分治法、减治法求a的n次方
- 分别用蛮力法、分治法、减治法求a的n次方,并比较时间-Respectively with brute force method, partition method, reduce the power comes for a n, and more time
ScreenLock
- Screen Locker In the internet you will find some fancy and expensive programs that can lock down your computer when you are away. In this project we will explore some fun brute-force techniques to create our very own screen locker application in C#
BruteForceMD5
- brute force MD5 ( GUI and console)
Digger
- Digger is a brute-force downloading tool. It allows the user to (try to) download for a URL which contains wildcard with a range. range can be numbers, characters or from dictionary file.
Brute_Source
- Realization of brute force in CSharp, source code.
NubmerGame_Hacker
- 对猜数字游戏进行暴力破解的程序。当然,并不是全自动的。-Brute force of number guessing game program. Of course, not fully automatic.
ScalingTiles
- 考虑ñ 数量尺寸高x宽的矩形,这些矩形的最优规模,以占据一个更大的矩形父容器的大部分地区,尺寸高x宽,同时保持儿童矩形的长宽比-Considering n number rectangles each of size h x w, what would the optimal size of these rectangles be in order to occupy the most area of a larger rectangular parent container, of
closest-pair
- brute force closest pair algorithm
exhaustive
- A c++ simple exhaustive search program...brute force search
Dailer
- C#写的测试asdl密码的程序,可以用来穷举密码。-Written in C# test asdl password program can be used to brute-force password.
ConsoleApplication2
- 利用windows API实现的DES暴力破解-DES brute force using windows API
PhpScanning
- C#源码,网络相关,漏洞扫描软件 PHP漏洞扫描软件源码,基于C#+vs2008编写,功能介绍: 1、扫描注入点; 2、SQL漏洞扫描; 3、注入点暴库; 4、后台扫描; 5、MD5暴力破解; 6、WEB服务器安全检测; 7、密码探测; 8、给初学者提供一些思路; -C# source code, network-related vulnerability scanning software The PH
PHPscanengin
- PHP漏洞扫描软件源码,基于C#+vs2008编写,功能介绍: 1、扫描注入点; 2、SQL漏洞扫描; 3、注入点暴库; 4、后台扫描; 5、MD5暴力破解; 6、WEB服务器安全检测; 7、密码探测; 8、给初学者提供一些思路-PHP vulnerability scanning software source code, based on C#+vs2008 prepared Features: 1, scann
PhpScanning
- 功能介绍: 1、扫描注入点; 2、SQL漏洞扫描; 3、注入点暴库; 4、后台扫描; 5、MD5暴力破解; 6、WEB服务器安全检测; 7、密码探测; -Features: 1, scanning the injection point 2, SQL vulnerability scanning 3, the injection point violence Library 4, background scanning 5, MD5 brute force
dm
- 将一个四位数分成两段得到的两个两位数,它们的和的平方等于原数,具有这种性质的数没有特殊分布规律,因此采用穷举法对所有四位数进行判断,从而筛选出符合这种性质的四位数。具体算法是任取一个四位数,将其截为两部分,前两位为a,后两位为b,然后套用性质公式计算并判断。-Two two-digit number will get a four-digit divided into two sections, the square of their sum is equal to the original n
S-X
- sql 密码暴力破解源码 可以远程连接 sql1411端口暴力破解-SQL password brute force source Can connect remotely sql1411 port brute force