搜索资源列表
P2P_by_shootingstars
- 这是一个在TCP/IP编程中经常遇到要处理的 问题,就是网络地址转换NAT,改源代码提供 一种方法,穿透内网的保护,到达目的地址。- This the question which frequently meets in the TCP/IP programming must process, is network address translation NAT, changes the source code to provide one method, in the penetratio
btsourceVc
- bt下载工具的源代码,对想了解的端口编程和NAT穿透内网的编程,很有帮助。-bt download the source code tool of the port would like to know programming and penetration within NAT network programming and helpful.
sip_architecture_with_nat_v1.0
- SIP协议中穿越对称型/非对称型NAT防火墙的多种实现方法,解决私网内部的防火墙穿透问题。-SIP cross symmetric / asymmetric NAT firewall multiple solutions, private internal network firewall penetration.
穿透防火墙的数据传输技术源码
- 一种新的穿透防火墙的数据传输技术,过程如下: 1. 找出目标进程 2. 找出SOCKET句柄 2. 用DuplicateHandle()函数将其SOCKET转换为能被自己使用. 3. 用转换后的SOCKET进行数据传输-a new firewall penetration data transmission technology, the process is as follows : 1. The process of identifying two goals. Identify SOCKE
NATVOIP
- VOIP透明穿透NAT防火墙的方法介绍!硕士学位论文!-VoIP NAT firewall penetration transparent method introduced! Master's degree thesis!
stund
- 现在应用最广泛的一种私网穿透方式,使用7。0来编写的,能够解决不对称私网穿透问题。-now the most widely used of a private network penetration, the use of seven. 0 to prepare, to solve asymmetric private network penetration.
数字电源制作
- 老外用M8制作可程控稳压电源(很有突点用PC的串口变作I2C接口)用M8全制作资料 内有详细说明。-foreigner can be produced using M8 Programmable Power Supply (very PC penetration point of change for I2C serial interface) using M8 all production information is described in detail within.
wspp-0.2
- WSP is an HTTP to WSP proxy that can be used to forward HTTP requests to WSP, which is used in WAP 1.x. It may be called a reverse WAP gateway, and enables you to test or browse WAP sites with HTTP tools. It also can be used with penetration test too
Penetration-Testing-Framework
- 渗透测试checklist,可以帮助你完成渗透测试-Penetration testing checklist, can help you complete permeability test
penetration
- 路面工程振动筛分的过程中的颗粒的分层与透筛-penetration and stratification
methodology-for-penetration-testing
- this file represent penetration testing very good pdf file
penetration
- 灰帽攻击安全手册:渗透测试与漏洞分析技术-penetration test
Network-penetration-technology
- 网络渗透技术教程 基础知识 缓冲区溢出利用技术 shellcode技术 堆溢出利用技术 格式化串漏洞利用技术 内核溢出利用技术 其它利用技术 漏洞发掘分析 CGI渗透测试技术 SQL注入利用技术 (内附c语言源码))-Network penetration technology tutorial The basics of buffer overflow technology shellcode heap overflow use of the technology format str
p2p-penetration
- 明了易懂的p2p穿透源码,内附有详细的注释,便于读者理解。-Easy to understand graphical source p2p penetration, containing detailed notes, easy to readers to understand.
Metasploit.Penetration.Testing
- Penetration testing is one of the core aspects of network security in today s scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system s major com
Penetration-Testing
- A document about penetration testing-A document about penetration testing...
penetration
- PENETRATION USING KALI AND HACKING BOOK
Penetration Testing
- Book on penetration testing
advanced-penetration-testing.pdf
- Advanced Network Penetration Testing
The Basics of Hacking and Penetration Testinga
- 黑客攻击和渗透测试的基本知识,很有用的入门教程(The Basics of Hacking and Penetration Testing)