搜索资源列表
密码破译
- 密码破译:是一本关于黑客的书籍,通过该书可以很好的了解到基本的密码破译方法。-code-breaking : a hacker on the books, the book can be well aware of the basic code-breaking methods.
解密教学
- 这是一本关于解密的书,解密是Hacker的必备技能之一,希望大家能够好好掌握.-This is a book of declassified declassify Hacker is one of the essential skills, and hope that we can make good use of them.
sslsniff-0.6.rar
- 这是编写sslstrip的黑客写的最新的sslsniff工具源码。,this tool is written by a hacker who writes the tool sslstrip.
dsao
- 黑客防线下载系统(http://www.hacker.com.cn/down) 感谢使用本软件,有任何疑问请访问黑客防线官方网站(http://www.hacker.com.cn)并提出。我们将尽快为您解决。 更多精品黑客工具请访问:www.hacker.com.cn/vip-Download hacker defense system (http://www.hacker.com.cn/down) thanks to the use of this software
DiscreteEncrypt
- 同余幂离散取值密码加密不可逆算算法 此算法主要用在网站对用户注册的密码加密,当黑客下载了网站保存用户注册信息的数据库时也不能算出用户的密码。-Power discrete values with more than encryption algorithms considered irreversible algorithm mainly used in Web site registered to the user password encryption, when the hacker
ResourceHacker35
- Resource Hacker 3.5 汉化版-Resource Hacker 3.5
mima
- 密码学,黑客攻防等等,适合信息安全专业同学学习-Cryptography, hacker attack and defense, etc., for students studying information security professional
Password
- MD5算法,针对网上出现的CSDN密码泄露事件,本程序可将任意一个密码转化成128位的十进制字符串,即嵌入到数据库中以暗文的形式存储,而且MD5是不可以算法,防止了黑客很难获取正确的密码,感谢您的进一步修改更新-MD5 algorithm for passwords CSDN appear online leak, the program can be password into any 128-bit decimal characters String, that is embedded
hack
- 本书特别披露黑客惯用的“奇技淫巧”,将他们入侵的伎俩和招数大曝光,大家在一步步跟着学做后即可熟知那些所谓“神秘”的黑客的手法,从而高度重视网络安全,并采取相关措施现场自救!-The book in particular, disclosure of hacker usual clever wicked craft, they invaded the trick and tricks big exposure comes along to do step by step, we can be fa
1
- 《葵花宝典》残本一.二卷,我觉额是黑客入门的书籍-Holy canon " residual volumes I think the amount is the a hacker entry of books
kanxue
- 看雪雪破解教程图文版。从图片手把手教你如何破解,另附网页文字说明。是新手学习的一个不错的着手点-Hacker Tutorials
Phrack-Magazine
- phrack有什么nb的地方:有人问我成为nb黑客(不是骇客)的捷径是什么?我发现这里面可以细分为:1.谁是nb的黑客? 我的答案是phrack杂志上每个领域发表开拓性文章的人; 2.如何成为nb的黑客? 我的答案是把phrack杂志大部分文章用几年时间全部真正弄懂 --不看文章,不查资料能把例子实现一遍,还能改--xscan作者-What place phrack nb: nb what I was asked to become a hacker (not a hacker) is a sh
Gray-Hat-Hacking--Third-Edition
- Gray Hat Hacking, Third Edition The Ethical Hacker’s Handbook Third Edition Allen Harper, Shon Harris, Jonathan Ness, Chris Eagle, Gideon Lenkey, and Terron Williams