搜索资源列表
HuPacketHack.rar
- 截包-发包软件,源码齐全,有兴趣的朋友可以下载研究研究里面的代码!,Cut package- letting the software, source code is complete, interested friends can download the study of the code inside!
passthru
- passthru实现报文的截获与重构,完整的微软开发工具包,部分代码自己添加,-passthru implementation and reconstruction of intercepted packets, complete package, Microsoft development tools, part of the code itself to add,
ArpWorm
- 黑色技术蠕虫下载者[完整源码] 作者:教主 信息来源:邪恶八进制信息安全团队(www.eviloctal.com) 作者网站:黑色技术 www.Rootkit.com.cn 公开源码用于编程交流。利用此代码修改或传播与作者无任何关系。 -Black technology that those who download the worm [complete source] Author: guru information sources: the evil octal info
VBsniffer
- VB做的Sniff软件完整代码,用于抓取网络数据包,分析数据内容,分析连接过程!-VB to do a complete code Sniff software for crawling the network data packets, analyze data content, analysis of the process of connecting!
snort-2.8.5.beta.tar
- 最新的snort源码,2.8.5版本,彻底取消了otn match的操作-The latest snort source code, 2.8.5 version, complete cancellation of the operation of otn match
mysniffer
- 嗅探器源码,实现了抓包,解包等功能,很完整,值得参考-Sniffer source code, to achieve a packet capture, unpack, and other functions, it is complete, it is also useful
application-level-Psniff
- 这也是一个基于网络抓包捕获的源代码,支持应用层数据包的抓取分析。程序基于第三方组件VBPCAP.DLL。支持实时抓取,IPV4报头,以太网报头,帧报头获取分析。目前测试基于局域网,无线网卡好像无法捕获,正在研究中。 程序需要用到VBPCAP.DLL,这个文件感觉有些问题,程序每次退出时VB会崩溃,整个源代码功能上还是不错,给大家参考下。 方法: 1. 下载 Winpcap 3.1 完毕先安装 http://www.winpcap.org/archive/3.1beta2-Wi
NetchuanshuMoiter
- 一个原创的网络流量监控的例子代码。需要用到winpcap,源代码完整。-An original example of code for network traffic monitoring. Need to use winpcap, complete source code.
deguang-tickets-helper-read-only
- 12306网站登录助手,现在没有登录限制了但是可以参考一下,代码很工整,注释完善-12306 Site Sign-in Assistant,now its not logged limit but you can read is for learning, the code is very neat, comments complete
BBS
- BBS论坛开发代码,比较完整,适合相关工作的人们参考或者套用-BBS forum to develop code, complete, fit people refer to related work or apply
P2P-Traffic-Identification-
- 在Visual C++平台下实现代码,完成的P2P流量识别,操作的数据对象是从网络中截取到的信息报文,综合应用端口匹配、深层数据包技术和流量特征进行P2P流量识别。-In Visual c++ platform implementation code, complete the P2P traffic identification, the operating data objects are intercepted from the network packets of information