切换至中文 Over 1 million code package, 10 million code file free download
  • [PDF] windows_XP_Hacks.rar Windows XP is the most widely used operating system. This book details how the attack WindowsXP loopholes.
    Category: OS Develop Upload User:zhuhaitckj Size:5301K
  • [Visual C++ (VC++)] TCPattack.rar uploads to use TCP attack tools, general effect, but it's still, if used up to the case, hope you like them
    Category: TCP/IP Stack Upload User:szruihong Size:58K
  • [Java/JSP] yizhen5jiantingdashangchuan.rar controlled by submarine torpedo attack targets water-merchant. As the driver to the process of loading a large number of pictures, sound effects documents may need to wait for a certain period of time
    Category: Java Develop Upload User:xmrh2005 Size:255K
  • [C/C++] changyonggongjichengxuCyuanma1.rar procedures used to attack the C source code, but some of the famous old, interested people can learn from
    Category: Windows Develop Upload User:od9186 Size:8K
  • [C/C++] changyonggongjichengxuCyuanma2.rar procedures used to attack the C source code, some old, but well-known, interested people can learn from
    Category: Internet-Socket-Network Upload User:lxj_00133 Size:7K
  • [Visual C++ (VC++)] syn-flood.rar synflood attack code. Send a large quantity of data packets to enable mainframe attack paralyzed.
    Category: WinSock-NDIS Upload User:zshgjzm Size:11K
  • [Others] displayChallenge.rar licensing shape analysis from the existing licenses can be extracted attack licensing some form of license
    Category: Chess Poker games Upload User:cis2002 Size:10K
  • [Matlab] blindwatermark.rar ... procedures, including multiresolution embedded watermark, watermark extraction procedure, blind watermark embedding and extraction procedures, Filtering and attack and attack JPEG procedures, PSNR and the similarity calculation formula (MATLAB)
    Category: Special Effects Upload User:whwhkj Size:4K
  • [Delphi] delphibahuanghou.rar ... the famous 19th century mathematician Gauss 1850 : 8 X8 in the lattice placed on the international chess 8 Queen's, making it unable to attack each other. arbitrary or two at Queen's are not the same line, the same series or in the same slash and ...
    Category: Mathimatics-Numerical algorithms Upload User:normankkk Size:142K
  • [Matlab] 11_watermark.rar audio digital watermark on the production, including audio digital watermark embedded in the attack, extraction, detection
    Category: Embeded-SCM Develop Upload User:tianfangjx Size:157K