搜索资源列表
WinRAR 3.40 Buffer Overflow POC
- winrar漏洞测试代码,适用于winrar3.4版本。好像这种东西比较危险-WinRAR loopholes test code applicable to winrar3.4 version. Like this stuff is dangerous
jiandan
- 用于加密/解密的代码,以ATL形式提供... 软件类别:VC源代码 运行环境:Win9x/NT/2000/XP/2003/-for encryption / decryption code to form ... ATL software categories : VC source runtime environment : Win9x/NT/2000/XP/2003 /
sql扫描加自动攻击工具Sqlpoke 含源代码
- sql扫描加自动攻击工具Sqlpoke 含源代码.大家自己看看吧.-sql plus automatic scanning tool Sqlpoke attack with the source code. We all look at it.
QQ 2005贺岁版登录口令加密算法及其源代码
- QQ 2005贺岁版登录口令加密算法及其源代码,请大家指教-QQ 2005 Hesuiban login password encryption algorithm and its source code, please enlighten
加密机与解密机实例源码
- 加密解密的代码,从网络上找到,应该对写共享软件有用。-encryption and decryption code from the Internet found to be useful write-sharing software.
核心采用汇编的MD5算法源代码(极好)
- 核心采用汇编的MD5算法源代码,想了解MD5的朋友可以看一下-core compiled using the MD5 algorithm source code and wanted to know MD5 friends can look at the
缓冲区溢出攻防
- 本代码演示了缓冲区溢出的攻击与防范。我的开发环境 操作系统:windows xp professional + sp1a 编译器:visual c++.net 2003 由于操作系统的补丁太多,即使与我相同的系统也可能需要修改LoadLibrary、GetProcAddress、VirtualAlloc和\"jmp esp\"指令的地址。 请谨慎修改编译参数,修改参数可能导致修改程序。 请只编译release版,debug版无法正常执行。-demonstratio
ettercap-0.6.7.tar
- Ettercap最初设计为交换网上的sniffer,但是随着发展,它获得了越来越多的功能,成为一款有效的、灵活的中介攻击工具。它支持主动及被动的协议解析并包含了许多网络和主机特性(如OS指纹等)分析。 这里是它的源代码包-Ettercap initially designed for the exchange of online sniffers, but with the development, it was more and more functions into one effect
Enumc
- 突破“RestrictAnonymous=1”限制枚举帐号的代码-breakthrough "RestrictAnonymous = 1" restrictions enumerated account code
TFTP客户端
- TFTP客户端,完全符合RFC-1350,源代码.-TFTP client, in full compliance with RFC - 1350, the source code.
SeePass
- 采用远程线程查看星号密码,支持查看某些采用了 anti 技术的编辑框。大部分网游就是因为这样所以用传统的键盘HOOK技术取不到密码。这份代码提供了完整的解决方案。用处嘛?还用多说?-distance threads View asterisk password used to support the view of some anti technical editor box. Most online games is the reason why the traditional keyboar
Hash2131
- 1)了解HASH函数在网络安全中的应用 (2)掌握HASH函数实现的原理 二、要求 (1)用任何语言编程完成实现HASH函数的功能 (2)输入任何8个字节(64位)的数据,得出对应的8位HASH代码(摘要) -1) understanding hash functions in network security applications (2) master Hash Function Principle 2 require (1) using any programming
运行以后把电脑里拨号密码都偷出来——程序代码
- 运行以后把电脑里拨号密码都偷出来,程序代码.-run later in the computer dial-up passwords are stolen, and code.
MC081380
- RFID智能卡ISO/IEC14443源代码,基于RC500开发平台,适用于门禁,安全认证-RFID smart card slot source code, based on the RC500 development platform Access to the application, security certification
Trans
- 反编译Java代码之后,里面的汉字会变成Unicode表示方式,比如\\u2943,本程序可以将Unicode转换成汉字。-anti-Java code compiler, they will become the Chinese character Unicode said, For example, \\ u2943 that the procedure can be converted into Unicode Chinese characters.
simulator-codered-100run
- used to simulate CodeRed v2 worm,result as scan traffic!-used to simulate Code v2 worm, the result as scan traffic!
DedeDelphi
- 超猛的可以反编译Delphi、 C++ bulider程序的源代码-bets can decompile the Delphi, C bulider program's source code
C_youhua_Test
- C语言的优化测试! 包含了测试代码以及测试结果文档.-optimized C language test! Includes test code, and test results documentation.
IPHackerOOB.ZIP
- IP Hacker的OOB炸弹源程序 好不好,你自己去说了,虽然是老炸弹了,但很经典,完整的源代码你未必看到过哦,我这可是真真的酷东东,完全Windows版本的源程序,从IP Hacker里抽取出来的,所有没打补丁的Windws 95/97/和Windows NT 3.51/4.0都有这漏洞哦!发一个命令过去就把系统搞蓝屏了,你还从没写过这类东西的话,就赶快去安装一台Windws 95实验一下吧!呵呵,保证有成就感 ;)-IP Hacker source of OOB bomb or
lab9_WormCode
- 代码给出了Linux系统下蠕虫代码如何通过有漏洞的系统进行蔓延的。-Linux code is a worm code system through loopholes in the system for the spread.