搜索资源列表
Bufferoverflowattacks
- 缓冲区溢出攻击,一个简单的漏洞,可以利用整形数传值给字符常量的溢出进行攻击-Buffer overflow attacks, a simple loophole, we can use plastic value give the number of characters spill constant attack
stirmark1
- stirmark是一款数字水印攻击测试软件,很实用的软件!-checkmark is a digital watermarking attack testing software, very useful software!
linux
- linux下模拟udp的泛洪攻击,类似trinoo和udp flooder-udp dos attack
robocode-1.7.1-src
- Robocode是2001年7月在美国IBM 的Web alphaWorks上发布的坦克机器人战斗仿真引擎。与通常玩的游戏不同的是:参赛者必须利用对机器人进行编程,给机器人设计智能来自动指挥它,而不是由键盘、鼠标简单地直接控制。Robocode是一种有趣的竞赛性编程,使用几行简单的代码,就能够让你创建一个活生生的机器人,一个真正的在屏幕上与其他机器人互相对抗的机器人。你可以看到它在屏幕上四处疾驰,碾碎一切挡道的东西。机器人配有雷达与火炮
udpflood
- 模拟udp 的dos攻击,相当于发包机的功能,报文尺寸和长度还有发包时间都能自己定义-udp flood attack
RSA.ZIP
- C++ implementaion for RSA together with the Wiener attack. It uses NTL library for big numbers
IDS_of_blackhole_attacksaodv
- Intrusion detection for black hole attack on AODV protocol.
arpsproof
- 进行arp攻击的程序 网络编程-Arp attack procedures for network programming
gui
- 各种数字水印的嵌入和提取 检测和攻击 包括lsb 和dct等算法-A variety of digital watermark embedding and extraction, including detection and attack, such as algorithm lsb and dct
AntiXSSTest
- asp.net系统,防止XSS攻击的实例程序-asp.net application, anti-XSS attack example program
hundun_svd_0525
- 效果非常好的数字水印的源代码,实现了基于小波变换的奇异值分解算法,选取载体图像的LH子带作为载体,并进行攻击测试算法性能-The effect of a very good source of digital watermarking, wavelet transform based on the realization of the singular value decomposition algorithm, select the
linux_tcp_dos_attack
- 在Linux开发环境,伪装一个随机的IP地址端口号,循环攻击某个指定的IP地址端口号或网站,使其瘫痪。-LINUX TCP DOS ATTACK CODE
blackholeaodv
- 在ns2下仿真AODV路由协议黑洞攻击时使用的脚本程序-the scr ipt of simulation AODV routing blackhole attack under the ns2
OnDesignatedlyVerifiedNon-interactive)Watermarking
- On Designatedly Veried (Non-interactive)Watermarking Schemes-Although many watermarking schemes consider the case of universal veri¯ ability, it is undesirable in some applications. Designated veri¯ cation is
Cryptanalysisofanimageencryptionscheme
- Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm-Chaotic systems have been broadly exploited through the last two decades to build encryption methods. Recently, two new image encrypt
StirmarkForAudio
- 用于音频水印稳健性测试的攻击软件,非常流行。现在官方主页链接已失效。-Used to test the robustness of audio watermarking attack software, very popular. Now the official home page link has expired.
arp_attack_tools
- anti arp攻击测试软件工具(内测版),用于检测局域网中的arp的相关内容-test anti arp attack software tools (beta version) for detecting LAN relevant content arp
200904httpzhuaji-77169.com
- http 攻击 被攻击ip地址 被攻击端口 伪造ip 伪造端口 2.开始攻击 tcpps端口扫描使用流程: 1.运行程序 输入参数 输入格式:tcpps 被扫描ip地址 2.输出显示:正在使用的端口号 -dosattack completion of the function : ip hidden dos attack using processes -扫描并攻击被攻击ip地址 被攻击端口 伪造ip 伪造端口 2.开始攻击 tcp
GreyHaT
- SYN FLOODING ATTACK TOOL-SYN FLOODING ATTACK TOOL
dos4
- Since the first denial of Service (DoS) attack appears, DoS attacks cause significant financial damage every year. The majority researchers focus on detection and respond mechanism of DoS, whereas limited progress has