搜索结果

找到约 29 项符合 Exploit 的查询结果

单片机开发 this a l33t 0x36 0day exploit by Matrix_DK :) This should give root, i give root to by the way,on al

this a l33t 0x36 0day exploit by Matrix_DK :) This should give root, i give root to by the way,on all BSD systems with abuse installed.
https://www.eeworm.com/dl/648/306156.html
下载: 99
查看: 1071

Internet/网络编程 socks5 remote exploit/ linux x86易受到的攻击 linux:* socks5-v1.0r10 (compiled on a turbolinux 4.0.5) => 0*

socks5 remote exploit/ linux x86易受到的攻击 linux:* socks5-v1.0r10 (compiled on a turbolinux 4.0.5) => 0* socks5-v1.0r9 (compiled on a turbolinux 4.0.5) => 0* socks5-v1.0r8 (compiled on a turbolinux 4.0.5) => 0* socks5-v1.0r10 (compiled on a redhat 6.0) => 400* socks5-s5watch-1.0r9-2 (redhat-contri ...
https://www.eeworm.com/dl/620/103625.html
下载: 61
查看: 1142

Linux/Unix编程 一个自动查找retloc的小脚本,主要在于可以提取其中的findretloc函数使exploit更加智能化,具体使用参看源代码.灵感来自coresecurity paper和dvdman的exploi

一个自动查找retloc的小脚本,主要在于可以提取其中的findretloc函数使exploit更加智能化,具体使用参看源代码.灵感来自coresecurity paper和dvdman的exploit.
https://www.eeworm.com/dl/619/262173.html
下载: 194
查看: 1053

书籍 Cognitive+Radio+Networks

According to the statistics of the Federal Communications Commission (FCC), temporal and geographical variations in the utilization of the as- signed spectrum range from 15% to 85%. The limited available radio spec- trum and the inefficiency in spectrum usage necessitate a new commu- nication paradi ...
https://www.eeworm.com/dl/521836.html
查看: 268

技术资料 缓冲区溢出攻击—检测、剖析与预防

对一些恶名昭彰的Internet攻击(如SQL Slammer和Blaster蠕虫)的取证调查,显示了缓冲区溢区是高明的黑客进行攻击时选择的弱点。这些蠕虫会使Internet速度减慢甚至瘫痪,并且需要花费数十亿美元清除它们。目前,威力更强的、更阴险的威胁已经以“Custom exploits”的形式出现,即每一次攻击的exploit都是不同的,从而使expl ...
https://www.eeworm.com/dl/846017.html
下载: 9
查看: 222

人工智能/神经网络 megahal is the conversation simulators conversing with a user in natural language. The program will

megahal is the conversation simulators conversing with a user in natural language. The program will exploit the fact that human beings tend to read much more meaning into what is said than is actually there MegaHAL differs from conversation simulators such as ELIZA in that it uses a Markov Model to ...
https://www.eeworm.com/dl/650/207031.html
下载: 78
查看: 1063

技术管理 This document represents the first stage in a process of taking the National Strategy for Police Inf

This document represents the first stage in a process of taking the National Strategy for Police Information Systems (NSPIS) forward. It defines the mechanisms to ensure that we (and our partners) have access to the right information, in the right form, in the right time at an appropriate cost. The ...
https://www.eeworm.com/dl/642/268534.html
下载: 109
查看: 1137

书籍 Amplify-and-Forward+Relaying

Relaying techniques, in which a source node communicates to a destination node with the help of a relay, have been proposed as a cost-effective solution to address the increasing demand for high data rates and reliable services over the air. As such, it is crucial to design relay systems that are ab ...
https://www.eeworm.com/dl/521810.html
查看: 77

其他书籍 Every day, patches are created to cover up security holes in software applications and operating sys

Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This innovative book will help you stay one st ...
https://www.eeworm.com/dl/542/216216.html
下载: 104
查看: 1118

微处理器开发 Netcat for NT is the tcp/ip "Swiss Army knife" that never made it into any of the resource kits.

Netcat for NT is the tcp/ip "Swiss Army knife" that never made it into any of the resource kits. It has proved to be an extremely versatile tool on the unix platform. So why should NT always be unix s poor cousin when it comes to tcp/ip testing and exploration? I bet many NT admins out there ke ...
https://www.eeworm.com/dl/655/422617.html
下载: 109
查看: 1070