搜索资源列表
foxmail5
- FoxMail5.0漏洞利用。采用缓冲区溢出的shell编程,适合的版本:FoxMail5.0 ,FoxMail5.0 beta1及beta2.-FoxMail5.0 exploits. Using a buffer overflow shell programming, suitable Version : FoxMail5.0, FoxMail5.0 beta1 and beta2.
通用网站上传漏洞利用程序 CommUpFile v1.0
- delphi 通用网站上传漏洞利用程序-website upload exploits procedures
hnxyy.Discsuz
- Discuz! 2.2F上传漏洞利用程序 参照Wascool的工具编写,实现上传一句话后门。 先注册一个名字,然后登陆!随便找一个贴子回复~ 用WSockExpert抓包记下自己的COOKIE及有网站名与回复贴子的路径,还有你所要回复的标题和内容,填到相应的选项里~~ 配合附带的up.htm和wrsky.php上传更大的后门 具体原理参考小花的文章 DISCUZ2上传漏洞分析 上传漏洞变换利用-BBS! 2.2F upload exploits procedures Wascool refere
0107-exploits
- 一个FTP密码破解程序的源代码-An FTP password cracking program s source code
disableautorun
- * While the first-run condition of a worm or virus exploits a long-running * * security hole in Microsoft Internet Explorer, they all need to create * * entries in the registry to run again the next time your PC starts. Most * * variants wi
HackingExposed10
- HACKING IIS 5 IISsecurity exploits have enjoyed a long,rich tradition. Microsoft’s flag ship Webserver platform has been plagued by such vulnerabilities as source code revelati on attacks like-HACKING IIS 5 IISsecurity exploits have enjoyed a l
ShellSort
- Shell sort is a sorting algorithm, devised by Donald Shell in 1959, that is a generalization of insertion sort, which exploits the fact that insertion sort works efficiently on input that is already almost sorted. It improves on insertion sort by all
VULNERABLE
- 改代码实现的主要功能是实现远程缓冲区溢出漏洞利用程序-The main function is to change the code to achieve remote buffer overflow exploits program
11
- dedecms5.6织梦cms的漏洞利用文件 she-dedecms5.6 exploits weaving dreams cms file shell
fcktest
- 编辑器漏洞利用的文件,打开后编辑文件地址,就可以利用-Editor exploits file
Struts2_2013_code
- 利用c#实现Struts2漏洞利用工具2013版源码。-Struts2 2013 Exploits
FTP-Exploits-By-Ankit-Fadia
- convet video to bitstream.
IntraPrediction_I_frame
- Intra-frame coding is used in video coding (compression). It is part of an intra-frame codec like ProRes: a group of pictures codec without inter frames. Intra-frame prediction exploits spatial redundancy, i.e. correlation among pixels within one fr
LEAD
- This toolbox contains programs for the multi-label classifier which explicitly exploits label dependency with Bayesian network structure.
WPNC07_Wang
- The emergence of personal mobile device with low cost sensors, such as accelerometer and digital compass, has made dead-reckoning (DR) an attractive choice for indoor pedestrian tracking. In this paper, we propose a robust DR pedestrian tracking
code
- The worm exploits a vulnerability in ZeroBoard, allowing an attacker to inject arbitrary PHP code.
Matlab_STCv0
- In this paper, we present a simple yet fast and robust algorithm which exploits the spatio-temporal context for visual tracking. Our approach formulates the spatio-temporal relationships between the object of interest and its local context based on a