搜索资源列表
MS_DNS_exploits
- DNS_ remote exploits for windows 2-DNS_ remote exploits for Windows 2
KadC
- Kademlia协议(以下简称Kad)是美国纽约大学的PetarP. Maymounkov和David Mazieres. 在2002年发布的一项研究结果《Kademlia: A peerto -peer information system based on the XOR metric》。 简单的说,Kad 是一种分布式哈希表(DHT)技术,不过和其他DHT 实现技术比较,如 Chord、CAN、Pastry 等,Kad 通过独特的以异或算法(XOR)为距离度量基础,建立了一
0110-exploits
- 一个网络扫描程序的源代码-A network source code scanner
TFTP-bruteforce.tar
- tftp的 漏洞攻击利用源代码,perl脚本语言编写-tftp exploits the use of source code, perl scr ipting languages
bronc-vs-mjackson.tar
- the fastest class b style exploit scanner in the world. It impliments argv technology to keep up with the ever-expanding horde of so-called 0-day exploits hackers utilize to penetrate your vital network infrastructure. -the fastest class b
JaDEAJXTAsupportfordistributedvirtualenvironments.
- 将JaDE引入分布式虚拟环境的应用中,同时,包括几个相关的小实验程序结果。-This paper introduces JaDE, a P2P support for the development of Distributed Virtual Environments that improves DVE scalability through the notion of Area of Interest. JaDE denes a set of protocols to supp
Windows_remote_RPC_DCOM_universal_exploit
- RPC远程漏洞攻击的源代码,shellcode方式,用c编写。-RPC remote exploits the source code, shellcode way, with c write.
uSpoof
- 局域网ARP欺骗,运行速度较快,利用了Windows中的MailSlot。- uSpoof 1.0 This was written to enable a user to send spoofed net send messages to a person on a network. It exploits a hole in the Windows MailSlot. This
exploit.tar
- Program that exploits vulnerability in wuftpd<2.6.1
120-PSTORE-MSSQL-SYM-NTPASS-VNC-NETAPI-2007
- Windows IRC Bot with various Exploits (Education only!!!)
CVE-2014-0322
- CVE-2014-0322.zip IE10 0day漏洞利用-CVE-2014-0322.zip IE10 0day exploits
creating-home-test-lab_2586.pdf
- Anyone who works in the field of network security should have a small, personal lab set up at home, where new exploits and tools can be tested without risking repercussions from an employer
overrun
- 本代码为缓冲区溢出漏洞利用程序,通过选择相对应的函数地址,最后将其转换为机器码实现漏洞利用!-The code for buffer overflow exploits, by selecting the corresponding function address, and finally convert it to machine code to achieve the exploit!
lokeip
- 防止程序各类漏洞入侵的最后一道防线,将checkip.asp包含在后台文件中,这样别人就算拿到了正确的用户名密码也进不去后台-Prevent the program all kinds of exploits last line of defense, will checkip.asp included in the spool file, so even if someone else got the correct username and password can also get in