切换至中文 Over 1 million code package, 10 million code file free download
  • [Visual C++ (VC++)] udpfloodAttack.rar UDP Flood attack procedure source. Powerful. Not bad for the staff to Oh
    Category: Internet-Socket-Network Upload User:wishfeng Size:4K
  • [Visual Basic (VB)] AttackToolKitv4.0.zip ... systems can be used for security vulnerabilities and strengthen security audit and can generate detailed html, text and Nessus NSR results and attack analysis, support CVE names, SecurityFocus, CERT, Snort, such as Nessus NASL. Enclosing the source code.
    Category: Scanner Upload User:xlxnike Size:2135K
  • [Matlab] imlogpolar.rar achieving the right number of images Polar transform, with a rotating invariance, the digital watermark can be used against geometric attack
    Category: matlab Upload User:lihua2858 Size:3K
  • [Matlab] DCT_watermark.rar complete DCT digital watermarking source code (I graduated design results) include : watermark embedding, Watermark detection, attack experiment to test the robustness, an important parameter calculation. Want to do digital watermarking Wilson help.
    Category: matlab Upload User:szhtwy Size:508K
  • [Visual C++ (VC++)] Direct3D111.rar Direct3D111.rar is my test disc from the attack your reference
    Category: DirextX Upload User:czxdfw Size:56K
  • [Visual C++ (VC++)] PIDTest123.rar PIDTest123.rar is my test disc from the attack your reference
    Category: Embeded-SCM Develop Upload User:bbscsl Size:23K
  • [Visual C++ (VC++)] gggggggggggggggggggggggggggggg.zip assumed exhaustive law effective attack, then even the design of a second species can test one billion Key ASIC, and one billion for the chip of this work, and still can be resolved in 1013; If, however, used the 1024 chip, it is possible in one day find ...
    Category: AI-NN-PR Upload User:newhor Size:4K
  • [Windows_Unix] hdw.rar Pirate King simple plug can be used to shoot his own attack of strange. For example OysterPteria. Changes monster special pictures can play different and strange. Stars need simulation software as a platform.
    Category: Game Hook Crack Upload User:gaoyuanzhu Size:2K
  • [Windows_Unix] tiny22222.rar ... wrote the handbook. Game process : random-access to mobile random-access location importation importation-------- determine whether the attack fired bullets------------ Collision Detection hit handled the incident. This is a broad, and I hope to inspire ...
    Category: Windows Develop Upload User:mimfan Size:872K
  • [Visual C++ (VC++)] knight.rar ... famous 19th century mathematician Gauss 1850 : in the 8x8 grid placed on the international chess 8 Queen's, making it unable to attack each other. that is arbitrary two Queens are not at the same trip, the same series or in the same slash and asked ...
    Category: Windows Develop Upload User:xiao85171 Size:159K