Description: 黑客夕草的开源黑客工具代码集,黑客工具的开源代码,值得学习,值得一看-hackers Xi grassland open-source code hacker tool sets, hacking tools of the source code, it is worth learning, an eye-catcher Platform: |
Size: 657408 |
Author:东南 |
Hits:
Description: PeerYou远程控制软件,稍加处理可为非常强大的黑客软件,学习控制方面的朋友可以参考源代码!希望站长通过-PeerYou remote control software, which can make some very powerful for hacking software, Learning Control of friends can refer to the source code! Hope that the station through Platform: |
Size: 326656 |
Author:包锐 |
Hits:
Description: Jitko Source Code.
Web-based javascript network hacking and network assessment tool. Gets onto a client machine and executes predetermined commands to gain information.-Jitko Source Code. Web-based javascript n etwork hacking and network assessment tool. Ge ts onto a client machine and executes predeterm ined commands to gain information. Platform: |
Size: 7168 |
Author:jeffrey schultz |
Hits:
Description: 不错的黑客工具,值的学习,带源码,推荐下载-good hacking tools and the value of the study, with the source code, download Platform: |
Size: 664576 |
Author:pangguigao |
Hits:
Description: 词法分析器,用C编的.声明:本源码及资源由超级源码(www.supcode.com)收集整理后提供下载
*************************************************************************
====================欢迎访问www.supcode.com======================
网站编程技术专题站,提供大量ASP、PHP、JSP、CGI、.NET软件,网页模板和黑客工具
常用工具,还有技术专题论坛等着您的参与及讨论。
访问URL: http://www.supcode.com
软件发布:http://www.supcode.com/Publish.asp-Lexical analyzer, using C-series. STATEMENT: This source code and resources by the super-source (www.supcode.com) after the collection available for download********************************************************************* Welcome to****==================== www.supcode.com =================== === Web programming technology topics to provide a large number of ASP, PHP, JSP, CGI,. NET software, website templates and hacking tools commonly used tools, as well as technical topics waiting for your participation in forums and discussions. Access URL: http://www.supcode.com software release: http://www.supcode.com/Publish.asp Platform: |
Size: 350208 |
Author:danping |
Hits:
Description: 百度贴吧群发源代码 黑客挡案光盘里的,别的地方都下载不到,抓紧呀-Baidu Post Bar mass hacking the source code archives CD-ROM' s, other places are not downloaded, pay close attention to it! ! Platform: |
Size: 258048 |
Author:yohaa |
Hits:
Description: 一个自己还没研究清楚地源码,好像是一个病毒源码,还是黑客工具的源码-Their own research clearly not a source, like a virus source code, or hacking tools source Platform: |
Size: 646144 |
Author:wusheng |
Hits:
Description: This book is primarily for software developers. I assume you have a basic understanding
of Internet technologies and programming techniques. Code samples are scattered
throughout the text and are provided in numerous languages, so fluency in languages
such as Java and PHP will help you get the most value from the book. All the code samples
in this book, as well as additional code that isn’t included in the text, are provided
in the Source Code/Download section of the Apress website at www.apress.com.
If you are a business owner or entrepreneur with little to no programming experience,
however, there is still a significant amount of information you can glean from these
pages. While a good portion may be too technical for your interest, this book provides
details on almost all PayPal technologies, and as such can give you a better sense of the
type of work that would need to be done in order to integrate PayPal into your grand
schemes, even if you ultimately won’t be the one hacking out the code. Platform: |
Size: 4067328 |
Author:primitive_man |
Hits:
Description: The Shellcoders Handbook
来自看雪论坛的一本讲解shellcode的好书
目录
1 在开始之前
2 栈溢出
3 Shellcode
4 格式化串漏洞
5 堆溢出
6 Windows的广阔原野
7 Windows Shellcode.
8 Windows 溢出
9 战胜过滤器
10 Solaris破解入门
11 高级Solaris破解 .
12 破解HP Tru64 Unix
13 建立工作环境
14 故障注入
15 Fuzzing的技巧
16 源码审计:在 C-Based 语言里寻找漏洞
17 Instrumented Investigation: 手工的方法
18 跟踪漏洞
19 二进制审计:Hacking不公开源码的软件
20 Alternative Payload Strategies
21 编写在野外运行的代码
22 攻击数据库软件
23 内核溢出
24 破解内核漏洞
25 附录
-The Shellcoders Handbook to see the snow from the forum a good book to explain shellcode Contents 1 Before you begin 2 stack overflow 3 Shellcode 4 Format String Vulnerability 5 heap overflow 6 Windows of the vast wilderness 7 Windows Shellcode. 8 Windows spill over nine filters 10 Solaris Senior Solaris crack crack entry 11. 12 crack HP Tru64 Unix 13 establish a working environment 14 Fault Injection 15 Fuzzing techniques 16 source code audit: In the C-Based Language in search of holes 17 Instrumented Investigation: manual methods to track 18 holes 19 binary audit : Hacking is not open source software 20 Alternative Payload Strategies 21 write the code in the wild, running 22 attacks on the database software 23 crack kernel kernel overflow vulnerability 25 Appendix 24 Platform: |
Size: 2791424 |
Author:孙锋 |
Hits:
Description: 便于黑客学习的有用的源代码,非常使用,非常好用的学习资料-Easy to learn useful hacking the source code, very used, very easy to use learning materials Platform: |
Size: 10240 |
Author:czf |
Hits:
Description: HACKING IIS 5
IISsecurity exploits have enjoyed a long,rich tradition. Microsoft’s flag ship Webserver
platform has been plagued by such vulnerabilities as source code revelati on attacks like-HACKING IIS 5
IISsecurity exploits have enjoyed a long,rich tradition. Microsoft’s flag ship Webserver
platform has been plagued by such vulnerabilities as source code revelati on attacks like...... Platform: |
Size: 1068032 |
Author:samshop |
Hits:
Description: 万能盗号精灵III全套源代码
包括注册机代码 以及监控程序代码,参数配置程序代码等. -Universal hacking Wizard III includes full source code and control code Keygen codes, parameter configuration program code. Platform: |
Size: 726016 |
Author:古金 |
Hits:
Description: 详细介绍了如何在没有源代码的情况下使用调试器和反汇编器对程序进行分析,揭示了各种各样的破解方法。-This text shows how to analyze programs without its source code, using a debugger and a disassembler, and covers hacking methods including virtual functions, local and global variables, branching, loops, objects and their hierarchy, and more.
Platform: |
Size: 4947968 |
Author:闫煜 |
Hits:
Description: This text shows how to analyze programs without its source code, using a debugger and a disassembler, and covers hacking methods including virtual functions, local and global variables, branching, loops, objects and their hierarchy, and more.
-This text shows how to analyze programs without its source code, using a debugger and a disassembler, and covers hacking methods including virtual functions, local and global variables, branching, loops, objects and their hierarchy, and more. Platform: |
Size: 4947968 |
Author:金帅 |
Hits: