Welcome![Sign In][Sign Up]
Location:
SourceCode OS program Crack Hack

Crack Hack List Page 1228

« 1 2 ... .23 .24 .25 .26 .27 1228.29 .30 .31 .32 .33 ... 1665 »

[Crack Hacks_des

Description: I do a small code, which use cryptography to the spread of the Internet are operational errors, This can definitely
Platform: | Size: 879616 | Author: 王选 | Hits:

[Crack HackDES_real

Description: C development of a simple DES encryption and decryption procedures, definitely can be used, compile. But only the characters operation, not encrypting documents
Platform: | Size: 117760 | Author: 王选 | Hits:

[Crack Hack300_encrypt

Description: encryption algorithm Test Driver for Crypto. a Class C Library of spreadsheets Primitives :- To generate an RSA key cryptest g-To encrypt an d decrypt a string using RSA cryptest r-To calcu late MD5, SHS, and RIPEMD algo
Platform: | Size: 389120 | Author: Nikii | Hits:

[Crack Hackbcprov-jdk14-133

Description: : jdk1.4 based on the encryption algorithm to realize the algorithm including MD5, SHA-1, DES, DESede, RSA, etc.
Platform: | Size: 1005568 | Author: 王雷 | Hits:

[Crack Hackmd5_fenghq

Description: the MFC category and convenient. CMD5 : : GetMD5 ( "123") it simple
Platform: | Size: 12288 | Author: fhq | Hits:

[Crack Hackhundun_BMP

Description: use an iterative equation Xn Asin2 = (Xn- XB) generated chaotic sequence (Xi) need input A and isolate value, different values in different encryption effect, but only in the chaotic region of encryption is the best. In
Platform: | Size: 83968 | Author: Iris Liu | Hits:

[Crack HackTalkSec

Description: Chat LAN encryption procedures, using the RSA encryption algorithm, can guarantee that the privacy Chat
Platform: | Size: 41984 | Author: senxly | Hits:

[Crack Hackdesencrypallfiles

Description: the realization of this procedure des plus decryption functions, each of the 64 encrypted ciphertext, thus achieving all of the increase in declassified documents.
Platform: | Size: 5120 | Author: liyunfei | Hits:

[Crack Hackmd5_16

Description: md5 algorithm, used to achieve the c-achieving md5_16
Platform: | Size: 3072 | Author: 陈列勇 | Hits:

[Crack HackMD5-java

Description: MD5 algorithm to achieve java* Below these S11- S44 is a 4* 4 Moment RUF, in a primitive realization of the C# define is achieved, Here they become static final realization of the said CD. cut in the same process space w
Platform: | Size: 8192 | Author: liwei | Hits:

[Crack HackDSB_datahide

Description: I designed the DSB concealed voice example. ELANIX company with the SYSTEMVI EW open operation. their cover and concealment signal input and output signals required to set up voice source, For example, recording their vo
Platform: | Size: 2048 | Author: a | Hits:

[Crack HackNEWMD5

Description: latest perl language MD algorithm procedures can be directly entered the lib directory application
Platform: | Size: 1024 | Author: canoe | Hits:
« 1 2 ... .23 .24 .25 .26 .27 1228.29 .30 .31 .32 .33 ... 1665 »

CodeBus www.codebus.net