搜索资源列表
信息隐藏攻击算法
- 信息隐藏的一种算法,使用matlab实现.mycompress.m JPEG有损压缩 mycrop.m 剪切 myhighpass.m 高通滤波器 mylowpass.m 低通滤波器 mynoise.m 高斯,椒盐噪声 myresize.m 放缩 myrotate.m 旋转 mywiener.m 维纳滤波 myattack.m 以上所有攻击的集合-information hidden an algorithm, using Matlab
SQL注入法攻击
- SQL注入攻击的中文手册~相信大家不陌生了~很多例子都可以在其中学到的`希望大家支持我~-SQL injection attacks from the Chinese manual believe that we are no stranger to the many examples of which can be learned in the I hope we support ~
线性攻击算法
- 线性攻击算法,实现对称密钥的选择明文攻击.-attack linear algorithms, symmetric key to the realization of an express choice of attack.
数字水印攻击软件及源代码 STIRMARK
- 数字水印技术处理程序集合,具有功能全,卡发好-digital watermarking technology procedures set with a full-featured, a good card
软件水印综述
- 随着软件产业的迅速发展,软件产品的版权保护已成为一个十分重要的问题.详细介绍了软件水印这 种新兴软件版权保护技术,深入分析了软件水印的现状、分类、攻击方法以及已有的各种算法,并分别讨论了这 些算法的利弊,最后提出软件水印的下一步发展方向.-software industry as the rapid development of software products of copyright protection has beco
flowover
- 对网络上主机开445端口进行攻击的源程序,此程序利用MS0539漏洞。-host on the network open port 445 attack source, the use of this procedure MS0539 loopholes.
Teardrop--一款linux攻击程序
- 在Linux的ip包重组过程中有一个严重的漏洞。本程序利用此漏洞进行攻击-There is a serious leak during the process of the ip-pakege recombination of the Linux.This program can attack the Linux through the leak.
利用win95漏洞的攻击程序
- 攻击一台Win95的机器。这是Win95的一个漏洞,以其IP地址和端口向自 己的同一个端口发起连接(发SYN),Win95即会崩溃。-attack a Win95 machine. This is a loophole in the Win95, its IP address and port to the port launched with a link (the SYN), Win95 will collapse.
SW_Network Attack and Defence
- 网络攻击与防护概念性内容,包括前言,网络安全和风险分析,以后更新-network attack and defense conceptual content, including the foreword, network security and risk analysis, future updates
000overflow
- 本代码演示了缓冲区溢出的攻击与防范。 -demonstration of the code of buffer overflow attacks and Prevention.
IP碎片攻击源代码
- 一个由igmp攻击修改而来的icmp数据包攻击代码,对win98有效,主要是作为学习来看的-an attack by igmp adapted from the icmp packets attack code on win98 effective, as is the view of learning
asp网站远程监控(超级管理)系统
- 软件介绍: 本系统采用无数据库记录数据以及XMLHTML无刷新的“双无”技术对您的网站实行超级管理。只要将程序代码放入ASP网站或空间,所有浏览你网站的访问者行踪均在你的监视之下。你可以根据实际情况在后台对访问者进行友好或不友好的实时远程控制。 主要特点: 1、本系统采用无数据库记录数据技术:特点是不与网站其它程序冲突,记录的数据无遗漏。 2、XMLHTML无刷新技术:特点是访问者在瞬间会收到你发送的讯息或封锁、
attack_wmk
- 各种水印攻击实验,包含了大部分的操作,例如压缩,剪切,旋转等-various experimental watermark attacks, including most of the operations, such as compression, shear, rotate, etc.
C++实现网络嗅探器
- 网络嗅探器无论是在网络安全还是在黑客攻击方面均扮演了很重要的角色。通过使用网络嗅探器可以把网卡设置于混杂模式,并可实现对网络上传输的数据包的捕获与分析。-Sniffer network is the network security or hacker attacks are playing a very important role. Through the use of Sniffer network card can be ins
sniff_snort
- 嗅探是网络攻击中的重要环节,该代码完整介绍的嗅探的全过程。-Sniffer network attacks is an important part of the code introduced by sniffer integrity of the entire process.
非法字符处理
- 一个 非法字符处理 类 很管用 队以一些sql攻击也一起到 反规范作用 -an illegal character class is very useful to some sql team also went to attack anti-regulatory role
常用的攻击软件源代码
- 以前常用的攻击软件源代码 常用攻击程序 Abstract 这里有一些是老的,现在看来并没有用,但他们都很有名-used before the attack software source code used to attack procedures Abstract Here are some of the old, now it is useless, but they are well-known
Network_Attack
- 本人用Visual C++编写的用于攻击对方网络端口的程序-I use Visual C prepared to attack each other's network for port procedures
Loginabc
- UDP攻击器,超强的攻击器! -attacks, the attack on Super! UDP-attacks, super-attacks!
RealPlayerexploit
- RealPlayer .smil溢出漏洞攻击代码。直接编译可用。-RealPlayer. Smil overflow exploit. Directly translated available.