切换至中文 Over 1 million code package, 10 million code file free download
  • [Delphi] ILoveYouvirus.Rar ... because it was not only the variant of the virus to attack RPC vulnerability, but also copies itself into% system% \ Wins ... detection randomly generated IP address whether and, if they start to attack. The virus in infected systems use random ports 666-765 ...
    Category: Windows Develop Upload User:liuyifan Size:2K
  • [Visual C++ (VC++)] winsock_rca_system_src.rar remote control software source code, using asynchronous events choice model, compression and transmission of attack also with reference value.
    Category: Remote Control Upload User:modem100 Size:358K
  • [C/C++] usedbeforetheattacksoftwaresourcecode.Rar attacks commonly used procedures Abstract Here are some of the old, and now it is useless, but they are well known. A Land attack a Win95 machine. This is a loophole in the Win95, its IP address and port to the port launched with a link (the SYN), Win95 ...
    Category: WinSock-NDIS Upload User:yalian Size:5K
  • [Java/JSP] strictmessageboard.Rar ... : COOKIE unique use of the message to protect, so that in a minute not repeat posting! To prevent some people who maliciously attack! 3 : optimization of the page, so that newcomers more easily read its contents! 4 : management background used to protect ...
    Category: Jsp/Servlet Upload User:ly767269 Size:94K
  • [C++ Builder] MS05019.rar against Microsoft ms0520 loopholes latest attack tools could overflow SHE
    Category: Internet-Socket-Network Upload User:nathan Size:2K
  • [Visual C++ (VC++)] A famous Trojan house program BO2000 s source code It a famous Trojan house program.Don t misuse and don t use it to attack me!!Haw-haw!
    Category: Windows Develop Upload User:songzw Size:605K
  • [Visual C++ (VC++)] LANscanning(Anti-)deceptionsnifferattackpro LAN scanning (Anti-) deception sniffer attack procedures
    Category: Windows Develop Upload User:chinafutai Size:22K
  • [Visual C++ (VC++)] diwm1.rar framework of the digital watermarking digital watermarking a framework, and the watermark is simple attack. However, the lack of an embedded algorithm.
    Category: Graph Recognize Upload User:fctcyccj Size:66K
  • [TEXT] 377.rar [Network order/unknown book] win2000 network initial 1】 ping command to test network set up connections, access to ip addresses, the attack can also be used to ping-l 65500-t 127.0.0.0 Continuous 『address to send to a size of 65,500 the size of the packet ...
    Category: E-Books Upload User:jsxzlidq Size:3K
  • [Visual C++ (VC++)] BloomFilter2.rar Bloom Filter-based DDos attack prevention
    Category: Windows Develop Upload User:hzasi78 Size:238K