搜索结果
找到约 25 项符合
Exploit 的查询结果
按分类筛选
Linux/Unix编程 Xmame is a console game for linux. This exploit gain root
Xmame is a console game for linux. This exploit gain root
单片机开发 this a l33t 0x36 0day exploit by Matrix_DK :) This should give root, i give root to by the way,on al
this a l33t 0x36 0day exploit by Matrix_DK :) This should give root, i give root to by the way,on all BSD systems with abuse installed.
软件工程 Paper explaining OpenBSD 4.0 remote exploit
Paper explaining OpenBSD 4.0 remote exploit
Internet/网络编程 工具分类:攻击程序 运行平台:Windows 工具大小:7577 Bytes 文件MD5 :28f6d5f4d818438522a3d0dc8a3fa46b 工具来源:securiteam.com /
工具分类:攻击程序 运行平台:Windows 工具大小:7577 Bytes 文件MD5 :28f6d5f4d818438522a3d0dc8a3fa46b 工具来源:securiteam.com // GDI+ buffer overrun exploit by FoToZ // NB: the headers here are only sample headers taken from a .JPG file, // with the FF FE 00 01 inserted in header1. // Sample shellco ...
Internet/网络编程 I. Introduction This code exploits a previously undisclosed vulnerability in the bit string deco
I. Introduction
This code exploits a previously undisclosed vulnerability in the bit string
decoding code in the Microsoft ASN.1 library. This vulnerability is not related
to the bit string vulnerability described in eEye advisory AD20040210-2. Both
vulnerabilities were fixed in the MS04-007 patch. ...
人工智能/神经网络 megahal is the conversation simulators conversing with a user in natural language. The program will
megahal is the conversation simulators conversing with a user in natural language. The program will exploit the fact that human beings tend to read much more meaning into what is said than is actually there
MegaHAL differs from conversation simulators such as ELIZA in that it uses
a Markov Model to ...
其他书籍 Every day, patches are created to cover up security holes in software applications and operating sys
Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This innovative book will help you stay one st ...
文件格式 We present a particle filter construction for a system that exhibits time-scale separation. The sep
We present a particle filter construction for a system that exhibits
time-scale separation. The separation of time-scales allows two simplifications
that we exploit: i) The use of the averaging principle for the
dimensional reduction of the system needed to solve for each particle
and ii) the factor ...
技术管理 This document represents the first stage in a process of taking the National Strategy for Police Inf
This document represents the first stage in a process of taking the National Strategy for Police Information Systems (NSPIS) forward. It defines the mechanisms to ensure that we (and our partners) have access to the right information, in the right form, in the right time at an appropriate cost. The ...
微处理器开发 Netcat for NT is the tcp/ip "Swiss Army knife" that never made it into any of the resource kits.
Netcat for NT is the tcp/ip "Swiss Army knife" that never made it into any
of the resource kits. It has proved to be an extremely versatile tool on
the unix platform. So why should NT always be unix s poor cousin when it
comes to tcp/ip testing and exploration? I bet many NT admins out there
ke ...