切换至中文 Over 1 million code package, 10 million code file free download
  • [Visual C++ (VC++)] 952snifferdoc.rar Scanner easy implementation of this procedure is designed to be the host network monitoring analysis and information analysis of host attack
    Category: Sniffer Package capture Upload User:noyechina Size:11K
  • [Visual C++ (VC++)] Bufferoverflowattacks.rar Buffer overflow attacks, a simple loophole, we can use plastic value give the number of characters spill constant attack
    Category: Internet-Socket-Network Upload User:fth868 Size:442K
  • [Visual C++ (VC++)] MiniSQL.rar ... data provided by the lack of adequate filtering, remote attacker could exploit the vulnerability on the target server format string attack, the database may be on the process of competence in the system to execute arbitrary commands. Remote attacker can ...
    Category: SQL Server Upload User:nomail Size:1K
  • [Others] networksecurity.rar The courseware at the University are on me at the time of network security courseware, network attack and defense on one of the basic idea
    Category: Network Security Upload User:sdhqyx Size:739K
  • [Visual C++ (VC++)] MyShipGame.rar Players control ships to underwater bomb throwing enemy submarines and mines to avoid submarine ship control bomb attack submarine
    Category: Windows Develop Upload User:zh137137 Size:92K
  • [Matlab] MATLAB.rar ... watermarking algorithm used in the MATLAB function, the application of MATLAB language implementation of a spatial domain digital watermarking algorithm for embedding, extraction and attack the process and give the results of the program is running.
    Category: Project Design Upload User:nhyj88 Size:62K
  • [Matlab] DCT-water-print.rar Add watermark and implementation of a number of methods to attack the watermark. Watermarking attack methods include jitter attacks, filtering attacks, spin attack
    Category: Special Effects Upload User:fuyuansz Size:1340K
  • [Visual C++ (VC++)] QiPanNHuangHou.rar ... chessboard at the same column or row or on the same diagonal, then called them to attack each other. Through this process, the output so that n-chessboard on the n-Queen' s do not attack each other all the layout.
    Category: Windows Kernel Upload User:faber168 Size:30K
  • [Matlab] anticuttingattack.rar Images by cutting attack some algorithm as long as the input image and want to cut position can be the desired results
    Category: matlab Upload User:syh0817 Size:0K
  • [C/C++] imagewater.rar An image watermarking algorithm encryption algorithm of the anti-attack and strong safety can be directly run
    Category: Crypt_Decrypt algrithms Upload User:jwqzjx Size:1K