搜索资源列表
ARP-ATTACK
- 使用WINPCAP编写的ARP攻击,在WIN7下能完美运行,采用VC6.0编译-The the ARP attack use WINPCAP written, under the WIN7 perfect run, VC6.0 compiler
attack
- 图像的十种攻击方法,包括一些常见的滤波以及加噪-the attack of image
Battery-Draining-Denial-of-Service-Attack-on-Blue
- Battery-Draining-Denial-of-Service Attack on Bluetooth Devices
node-attack
- 由于Pajek计算出网络没受到攻击网络的最短路径矩阵文件和分别收到不同次攻击后的最短路劲矩阵文件(Shortest Path Length Matrix)。先将其文件(按照攻击的次数命名为:0.txt 、1.txt 、2.txt…)拷贝到该C语言程序同个文件夹中,运行改程序,输入要计算的攻击次和每次攻击的节点数,该程序就会自动收索文件,并完成计算出数据的有效性能模型、平均最短路径和输电效益模型的值在同文件夹里的jieguo.txt中输出
paper-on-Acoustic-side-channel-attack
- This paper focuses on acoustic (sound) side-channel attack and surveys the methods and techniques employed in the attack we will also see some of the different devices which can be under the threat of such attack and fin
yuv-attack
- 该MATLAB代码可以实现一般的YUV攻击测试。-The MATLAB code can achieve a general YUV attack test.
Digital-watermarking-attack-testing
- 这是我做的数字水印算法中的一部分,关于图像攻击测试的几个matlab程序,简单修改就可以直接引用了。-This is the part I do digital watermarking algorithm, image attack test several matlab program, a simple modification can be directly quoted.
arp-flood-attack
- arp洪水攻击,对ip地址所在的电脑发送大量的数据包,导致该电脑断网-arp flood attack
DPA-attack
- 用于功耗攻击的matlab程序,针对S盒进行攻击-used for power attack
md5-dictionary-attack
- This another dictionary attack source. It shows how to break md5.-This is another dictionary attack source. It shows how to break md5.
unla-attack-source
- this unla source. this is web attack tool made by korea-this is unla source. this is web attack tool made by korea
web-attack-storng-source
- this is web attack tool source very strong. made by korea thank you
Forged-IP-submitted-to-attack
- 伪造ip提交攻击,该方式属于CC攻击改变head信息来达到攻击的-Forged IP submitted to attack, which belongs to CC attack to change the head information to attack
Defense-From-syn-a-ping-Flood-attack
- Defense From syn & ping Flood attack
drain-n-drop-attack
- Drain n drop attack in NS2
hacker-attack-and-defense-skills
- 中国红客联盟首发黑客攻防技巧,pdf格式,值得看一下学习学习。-Honker Union of China starting hacker attack and defense skills, pdf, worth a look to learn from.
Attack-location
- To locate attack in WIFI
RSA-attack
- RSA attack with cyclic encryption, documentation is in slovak language
SINKHOLE-ATTACK-AND-DET.odt
- A discr iption of Sink hole attack and how to detect sink hole attack in wireless sensing network.
Defense-From-syn-a-ping-Flood-attack
- Defense From syn & ping Flood attack