搜索资源列表
SW_Network Attack and Defence
- 网络攻击与防护概念性内容,包括前言,网络安全和风险分析,以后更新-network attack and defense conceptual content, including the foreword, network security and risk analysis, future updates
Syn-attack.c.tar
- SYN-attack,not descr iption
Invertibility-attack-against-watermarking-based-on
- Invertibility attack against watermarking based on forged algorithm and a countermeasure,是讲数字水印攻击的资料
Attack
- 这软件是为了攻击对方计算机的。 用这个软件可以给对方电脑系统添麻烦。-this software is to attack the enemy's computer. This software can be used to the other computer system trouble.
Sudden Attack Game Engine SourceCode
- Full c++ game engine sourcecode for sudden attack game.
stirmark1.rar
- stirmark是一款数字水印攻击测试软件,很实用的软件!,checkmark is a digital watermarking attack testing software, very useful software!
StirmarkForAudio.rar
- 用于音频水印稳健性测试的攻击软件,非常流行。现在官方主页链接已失效。,Used to test the robustness of audio watermarking attack software, very popular. Now the official home page link has expired.
tfn2k.rar
- DOS攻击源码,有smurf攻击、SYN FLOOd攻击等,仅供学习研究之用,不可用于违背他人利益,DOS attack source, there are smurf attacks, SYN FLOOd attacks, for study purposes, not for others, contrary to the interests of
udpflood.zip
- 模拟udp 的dos攻击,相当于发包机的功能,报文尺寸和长度还有发包时间都能自己定义,udp flood attack
linux.zip
- linux下模拟udp的泛洪攻击,类似trinoo和udp flooder,udp dos attack
Cube-attack-on-Trivium
- 对Trivium算法和其简化版本的Cube攻击-Cube attack on Trivuim algrithm
blackholeaodv
- 在ns2下仿真AODV路由协议黑洞攻击时使用的脚本程序-the scr ipt of simulation AODV routing blackhole attack under the ns2
NBATTACKChina
- NETBOT ATTACK网络僵尸源代码,价值10WRMB,现在免费发布啦-NETBOT ATTACK botnet source code, the value of 10WRMB, now released for free啦
mitm-attack
- this is a mimt attack implemetation with dsniff tools
IDS_of_blackhole_attacksaodv
- Intrusion detection for black hole attack on AODV protocol.
MFCUK_darkside_0.3
- Darkside attack rfid mifare classic
script-attack
- 网络攻防 跨站脚本攻击实例解析 网络安全-scriping attack
syn_flood.c.tar
- SYN攻击代码,是在linux下运行的,大家可以从这个例子学习,但不要利用此代码去攻击别人-SYN attack code is running under linux, we can learn from this example, but do not use this code to attack other people
Cube-attack
- Cube 攻击的几篇文章,Cube Attack由Itai Dinur 和Adi Shamir于2008年提出。这种攻击并不是全新的,但是它把以前多种启发式攻击的技巧综合起来,仔细分析了攻击未知的、随机的主多项式成功的复杂度和成功概率。-Some papers of Cube attack,Cube attacks work well for random polynomials of small degree. Real-world ciphers, when viewed as polyno
attack
- 随机蓄意攻击对比 攻击效果对比的图形 最后还有半数致死量(random attack and on purpesrandom attack and on purpesrandom attack and on purpes)