您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. Bypassing non-executable-stack during exploitation using return-to-libc.pdf

  2. Bypassing non-executable-stack during exploitation using return-to-libc.pdf
  3. 所属分类:嵌入式

    • 发布日期:2009-11-06
    • 文件大小:15360
    • 提供者:uuty
  1. AD5161.pdf

  2. AD5161英文资料 Electrical Characteristics—5 kΩ Version ...................................... 3 Electrical Characteristics—10 kΩ, 50 kΩ, 100 kΩ Versions ....... 4 Timing Characteristics—5 kΩ, 10 kΩ, 50 kΩ, 100 kΩ Versions 5 Absolute Maximum Ratings1 ...
  3. 所属分类:C

  1. The Web App.Hacker

  2. This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus,
  3. 所属分类:Web开发

    • 发布日期:2010-03-27
    • 文件大小:10485760
    • 提供者:Randolph_yyu
  1. 冰刀 ICE刀!!!

  2. FileReg.icp is a plug-in for IceSword 1.20. It can access the disk partitions directly with the help of IceSword's functions. So it can manipulate the disks and registry keys directly, bypassing some Windows system components, like ntfs.sys, fastfat
  3. 所属分类:Access

    • 发布日期:2010-04-11
    • 文件大小:2097152
    • 提供者:shadowtyw
  1. zemax英文说明书(最新版)

  2. What does ZEMAX do? ZEMAX is a program which can model, analyze, and assist in the design of optical systems. The interface to ZEMAX has been designed to be easy to use, and with a little practice it can allow very rapid interactive design. Most ZEM
  3. 所属分类:Access

    • 发布日期:2010-07-05
    • 文件大小:6291456
    • 提供者:shizhelee
  1. Linux Power Tools 2003

  2. Table of Contents Linux Power Tools Introduction Part I - Hardware Tools Chapter 1 - Optimizing System Architecture Usage Chapter 2 - Improving Disk Performance Chapter 3 - Using External Peripherals Part II - User Tools Chapter 4 - Mastering Shells
  3. 所属分类:Linux

    • 发布日期:2010-11-01
    • 文件大小:12582912
    • 提供者:shaoguangleo
  1. qemu-0.13.0(编译过全处理器支持)

  2. QEmu虚拟机 做嵌入式开发的朋友试试 调试内核很方便 QEMU emulator version 0.13.0, Copyright (c) 2003-2008 Fabrice Bellard usage: qemu [options] [disk_image] 'disk_image' is a raw hard disk image for IDE hard disk 0 Standard options: -h or -help display this help and exit -
  3. 所属分类:iOS

    • 发布日期:2010-12-04
    • 文件大小:11534336
    • 提供者:shubinglin
  1. wincap源码

  2. WinPcap is the industry-standard tool for link-layer network access in Windows environments: it allows applications to capture and transmit network packets bypassing the protocol stack, and has additional useful features, including kernel-level pack
  3. 所属分类:网络基础

    • 发布日期:2006-02-23
    • 文件大小:1048576
    • 提供者:chenxh
  1. Hacker Web Exploitation Uncovered

  2. Book Descr iption: A descr iption and analysis of the vulnerabilities caused by programming errors in Web applications, this book is written from both from the attacker's and security specialist's perspective. Covered is detecting, investigating, ex
  3. 所属分类:Web开发

    • 发布日期:2008-05-12
    • 文件大小:563200
    • 提供者:nouoo
  1. wp-o-matic.1.0RC4.zip

  2. 自动采集信息。很爽。=== WP-o-Matic === Contributors: Appletalk Donate link: http://devthought.com/wp-o-matic-the-wordpress-rss-agreggator/#donate Tags: autoblogging, feeds, rss, atom, aggregation, content, syndication, posts, post, writing, bot, admin Require
  3. 所属分类:PHP

    • 发布日期:2012-02-27
    • 文件大小:142336
    • 提供者:yf370768770
  1. Qemu-1.0.1 for windows

  2. Qemu 1.0.1 Windows QEMU emulator version 1.0.1, Copyright (c) 2003-2008 Fabrice Bellard usage: qemu [options] [disk_image] 'disk_image' is a raw hard disk image for IDE hard disk 0 Standard options: -h or -help display this help and exit -version di
  3. 所属分类:虚拟化

    • 发布日期:2012-05-06
    • 文件大小:7340032
    • 提供者:shubinglin
  1. 过xp登录密码的bootkit源码

  2. Bypassing Windows XP Logon Password using bootkit
  3. 所属分类:系统安全

    • 发布日期:2012-05-17
    • 文件大小:4096
    • 提供者:chenlgen
  1. filter solutions10.0及教程

  2. Filter+Solutions10.0英汉翻译及操作说明 Lowpass notch filters :低通陷波滤波器 Order: 阶 filter circuits:滤波电路 frequency response:幅频响应 Passband :通频带、传输带宽 repeatedly cycle:重复周期 maximum signal to noise ratio:最大信噪比 gain constants:增益系数,放大常数 circuit topologies:电路拓扑结构 gain s
  3. 所属分类:硬件开发

    • 发布日期:2013-09-24
    • 文件大小:7340032
    • 提供者:u012187788
  1. The Browser Hacker

  2. gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on
  3. 所属分类:网络攻防

    • 发布日期:2014-03-08
    • 文件大小:12582912
    • 提供者:bobbyliao
  1. process hancer 源码

  2. Process Hacker is a powerful free and open source process viewer. == Getting started == Simply run ProcessHacker.exe to start Process Hacker. There are two versions, 32-bit (x86) and 64-bit (x64). If you are not sure which version to use, open Contr
  3. 所属分类:桌面系统

    • 发布日期:2014-08-22
    • 文件大小:15728640
    • 提供者:hugege606
  1. bypassing-waf

  2. passing by WAF using javascr ipt to pass by WAF web
  3. 所属分类:网络安全

    • 发布日期:2015-05-17
    • 文件大小:540672
    • 提供者:breakback
  1. Learning iOS Forensics(PACKT,2015)

  2. Mobile device forensics relates to the recovery of data from a mobile device. It has an impact on many different situations including criminal investigations and intelligence gathering. iOS devices, with their wide range of functionality and usabili
  3. 所属分类:iOS

    • 发布日期:2015-05-27
    • 文件大小:4194304
    • 提供者:vanridin
  1. Kali.Linux.Wireless.Penetration.Testing.Beginners.Guide.1783280417

  2. Master wireless testing techniques to survey and attack wireless networks with Kali Linux About This Book Learn wireless penetration testing with Kali Linux; Backtrack's evolution Detect hidden wireless networks and discover their names Explore adva
  3. 所属分类:Linux

    • 发布日期:2015-05-28
    • 文件大小:12582912
    • 提供者:ramissue
  1. Basic.Security.Testing.with.Kali.Linux.2.153050656

  2. Basic Security Testing with Kali Linux 2 Kali Linux 2 (2016) is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use, so they can find security issues before the bad guys do. In Basic Securit
  3. 所属分类:系统安全

    • 发布日期:2016-07-25
    • 文件大小:15728640
    • 提供者:ramissue
  1. An Efficient Bypassing Void Routing Algorithm for Wireless Sensor Network

  2. An Efficient Bypassing Void Routing Algorithm for Wireless Sensor Network
  3. 所属分类:其它

    • 发布日期:2021-02-10
    • 文件大小:1048576
    • 提供者:weixin_38649315
« 12 3 »