搜索结果

找到约 25 项符合 Exploit 的查询结果

Linux/Unix编程 Xmame is a console game for linux. This exploit gain root

Xmame is a console game for linux. This exploit gain root
https://www.eeworm.com/dl/619/306149.html
下载: 144
查看: 1149

单片机开发 this a l33t 0x36 0day exploit by Matrix_DK :) This should give root, i give root to by the way,on al

this a l33t 0x36 0day exploit by Matrix_DK :) This should give root, i give root to by the way,on all BSD systems with abuse installed.
https://www.eeworm.com/dl/648/306156.html
下载: 99
查看: 1045

软件工程 Paper explaining OpenBSD 4.0 remote exploit

Paper explaining OpenBSD 4.0 remote exploit
https://www.eeworm.com/dl/540/427915.html
下载: 63
查看: 1032

Internet/网络编程 工具分类:攻击程序 运行平台:Windows 工具大小:7577 Bytes 文件MD5 :28f6d5f4d818438522a3d0dc8a3fa46b 工具来源:securiteam.com /

工具分类:攻击程序 运行平台:Windows 工具大小:7577 Bytes 文件MD5 :28f6d5f4d818438522a3d0dc8a3fa46b 工具来源:securiteam.com // GDI+ buffer overrun exploit by FoToZ // NB: the headers here are only sample headers taken from a .JPG file, // with the FF FE 00 01 inserted in header1. // Sample shellco ...
https://www.eeworm.com/dl/620/107062.html
下载: 170
查看: 1066

Internet/网络编程 I. Introduction This code exploits a previously undisclosed vulnerability in the bit string deco

I. Introduction This code exploits a previously undisclosed vulnerability in the bit string decoding code in the Microsoft ASN.1 library. This vulnerability is not related to the bit string vulnerability described in eEye advisory AD20040210-2. Both vulnerabilities were fixed in the MS04-007 patch. ...
https://www.eeworm.com/dl/620/152835.html
下载: 92
查看: 1056

人工智能/神经网络 megahal is the conversation simulators conversing with a user in natural language. The program will

megahal is the conversation simulators conversing with a user in natural language. The program will exploit the fact that human beings tend to read much more meaning into what is said than is actually there MegaHAL differs from conversation simulators such as ELIZA in that it uses a Markov Model to ...
https://www.eeworm.com/dl/650/207031.html
下载: 78
查看: 1037

其他书籍 Every day, patches are created to cover up security holes in software applications and operating sys

Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This innovative book will help you stay one st ...
https://www.eeworm.com/dl/542/216216.html
下载: 104
查看: 1093

文件格式 We present a particle filter construction for a system that exhibits time-scale separation. The sep

We present a particle filter construction for a system that exhibits time-scale separation. The separation of time-scales allows two simplifications that we exploit: i) The use of the averaging principle for the dimensional reduction of the system needed to solve for each particle and ii) the factor ...
https://www.eeworm.com/dl/639/241531.html
下载: 80
查看: 1066

技术管理 This document represents the first stage in a process of taking the National Strategy for Police Inf

This document represents the first stage in a process of taking the National Strategy for Police Information Systems (NSPIS) forward. It defines the mechanisms to ensure that we (and our partners) have access to the right information, in the right form, in the right time at an appropriate cost. The ...
https://www.eeworm.com/dl/642/268534.html
下载: 109
查看: 1097

微处理器开发 Netcat for NT is the tcp/ip "Swiss Army knife" that never made it into any of the resource kits.

Netcat for NT is the tcp/ip "Swiss Army knife" that never made it into any of the resource kits. It has proved to be an extremely versatile tool on the unix platform. So why should NT always be unix s poor cousin when it comes to tcp/ip testing and exploration? I bet many NT admins out there ke ...
https://www.eeworm.com/dl/655/422617.html
下载: 109
查看: 1037