Welcome![Sign In][Sign Up]
Location:
Search - hacking tools

Search list

[WinSock-NDISntkl

Description: 一个NT后台服务程序,远程安装,随机器启动自动启动并在远程机器上通过RPC打开一个侦听端口并从定向控制台,使远程机器能够完全获得本机的控制台权限,可用做网管远程管理工具,禁止用于黑客行为!-a background service procedures, remote installation, random start automatically activate the device and the remote machines through an open RPC ports interception and directed from the console, so that the remote machine to completely secure the mandate for the console and can be used for remote management of network management tools used to prohibit hacking!
Platform: | Size: 62614 | Author: 王宁 | Hits:

[Crack HackHackerKit

Description: 黑客入侵网络的数个使用工具-hacking the networks use several tools
Platform: | Size: 299550 | Author: 钱玉文 | Hits:

[Crack HackHackerKit

Description: 黑客入侵网络的数个使用工具-hacking the networks use several tools
Platform: | Size: 299008 | Author: 钱玉文 | Hits:

[Internet-Networkntkl

Description: 一个NT后台服务程序,远程安装,随机器启动自动启动并在远程机器上通过RPC打开一个侦听端口并从定向控制台,使远程机器能够完全获得本机的控制台权限,可用做网管远程管理工具,禁止用于黑客行为!-a background service procedures, remote installation, random start automatically activate the device and the remote machines through an open RPC ports interception and directed from the console, so that the remote machine to completely secure the mandate for the console and can be used for remote management of network management tools used to prohibit hacking!
Platform: | Size: 62464 | Author: Luther.luo | Hits:

[Multimedia programMind_Performance_Hacks_February_2006

Description: Mind Performance Hacks provides real-life tips and tools for overclocking your brain and becoming a better thinker. In the increasingly frenetic pace of today s information economy, managing your life requires hacking your brain. With this book, you ll cut through the clutter and tune up your brain intentionally, safely, and productively. -Mind Performance Hacks provides real-life tips and tools for overclocking your brain and becoming a better thinker. In the increasingly frenetic pace of today s information economy, managing your life requires hacking your brain. With this book, you ll cut through the clutter and tune up your brain intentionally, safely, and productively.
Platform: | Size: 945152 | Author: Jack | Hits:

[OS programsnmp

Description: 系统信息刺探工具 对黑客攻防技术爱好者有很大的研究价值-Spy tools system information technology on the offensive and defensive hacking enthusiasts have great research value
Platform: | Size: 2048 | Author: 刘栋 | Hits:

[Game Hook Crackrestotools

Description: restaurant city tools for hacking!
Platform: | Size: 333824 | Author: yhu | Hits:

[Other(OReilly)_Excel_Hacks

Description: David Hawley, Raina Hawley著,O Reilly出版社2004年3月出版。ISBN : 0-596-00625-X 。 本书介绍关于Excel的技巧工具,用来帮助在workbook和worksheet中破解内建特性,如表、图、公式、函数等。这本书手把手教你如何用Excel做任何事,从数据分析到worksheet的导入导出管理,以你可能从未想过的方式。本书提高了使用Excel的效率,在过程中也带给你"破解"的快感。-The tips and tools in Excel Hacks include little known "backdoor" adjustments for everything from reducing workbook and worksheet frustration to hacking built-in features such as pivot tables, charts, formulas and functions, and even the macro language. This resourceful, roll-up-your-sleeves guide shows you new ways to make Excel do things--from data analysis to worksheet management to import/export--that you never thought possible. Excel Hacks increases productivity with Excel and gives you hours of "hacking" enjoyment along the way.
Platform: | Size: 3485696 | Author: 闻扬 | Hits:

[OS programhoneypot

Description: "honeypot : an active defence system for network security " is an paper written by me, an enginnering student. Abstract:Honeypot is a supplemented active defense system for network security. It traps attacks, records intrusion information about tools and activities of the hacking process, and prevents attacks outbound the compromised system. Integrated with other security solutions, honeypot can solve many traditional dilemmas. We expatiate key components of data capture and data control in honeypot, and give a classification for honeypot according to security goals and application goals. We review the technical progress and security contribution of honeypot and research honeypot. We present typical honeypot solutions and prospect the technical trends of integration, virtualization and distribution for the future honeypot-"honeypot : an active defence system for network security " is an paper written by me, an enginnering student. Abstract:Honeypot is a supplemented active defense system for network security. It traps attacks, records intrusion information about tools and activities of the hacking process, and prevents attacks outbound the compromised system. Integrated with other security solutions, honeypot can solve many traditional dilemmas. We expatiate key components of data capture and data control in honeypot, and give a classification for honeypot according to security goals and application goals. We review the technical progress and security contribution of honeypot and research honeypot. We present typical honeypot solutions and prospect the technical trends of integration, virtualization and distribution for the future honeypot
Platform: | Size: 227328 | Author: Sandeep | Hits:

[OS programprocesshacker-2.1-src

Description: 这个工具完全是模仿< 深入理解windows系统 4th Edith>>的作者Mark写的Process explore(进程浏览器)写的,论坛里有1.3.6版本的,1.x版本是用CSHARP实现的,我研究过,从中学里很多东西。最近发现,作者发布了一个2.1版本的代码,是用C写的,太酷了,这对于想深入了解windows系统机制的人是一个必须看的源码,而且该源码涉及windows进程的各个方面,很多功能可以直接拿来使用。研究这个代码,一定要看看<<深入理解windows系统 4th Edith>>。-Why should I use Process Hacker? Why not Process Explorer or some other program? Process Hacker offers some pretty unique features, like an awesome run-as tool and the ability to find and terminate hidden processes. The intended users are developers and people interested in Windows internals. This tool is NOT intended for general system optimization- if you want to do that, Process Explorer is for you. "Process Hacker"? Is this a dangerous "hacking" tool? Please read about the correct definition of "hacker". Why is there annoying bug X in Process Hacker? Why is Process Hacker missing feature Y? Please report any bugs or suggestions to our tracker. Feel free to upload patches. Is Process Hacker a portable application? Yes. If you want settings to be saved on your USB drive, start Process Hacker like this: ProcessHacker.exe-settings settingsfile Symbols don t work properly! Firstly, you need the latest dbghelp.dll version. Install Debugging Tools for Windows, open Proce
Platform: | Size: 2051072 | Author: lijun | Hits:

[WEB Codegmzjz

Description: JSP编写,防止目前流行的挂马方式,对网页起到一定的防黑和防马作用,属于非常使用的网页工具,不一定适合所有网站-JSP prepared to prevent the hanging horse currently popular way of Hacking on the Web and play a certain role in anti-horse, are very to-use web tools, not necessarily suitable for all sites
Platform: | Size: 19456 | Author: 李天 | Hits:

[Otherqkdym

Description: 可以取宽带用户名、密码,对于忘了密码的人很重要,也是黑客常用的工具之一。(PS:这个是DLL源码)。-Can take the broadband user name and password for forgotten password, it is very important, but also one of the tools commonly used in hacking. (PS: This is the DLL source code).
Platform: | Size: 11264 | Author: tiang | Hits:

[Internet-NetworkFindPass2003

Description: 黑客工具FindPass2003的源代码-hacking tools FindPass2003 source code
Platform: | Size: 2048 | Author: edtoa | Hits:

[Crack Hackles-4-3-tools

Description: CyberBot botnet tool for hacking
Platform: | Size: 145408 | Author: samy | Hits:

[OS programhacker

Description: 百款黑客工具源码,包含了C、C++和Delphi编写的各种常见黑客软件。-One hundred source hacking tools, including C, C++ and Delphi written in a variety of common hacker software.
Platform: | Size: 10441728 | Author: 李杰 | Hits:

[Other2

Description: MAT LAB HACKING TOOLS
Platform: | Size: 373760 | Author: saravanakumar | Hits:

[Internet-NetworkWindows-Attack-Smallka

Description: 黑客工具.ddos攻击集群,去除了网络验证版本!威力超强-Hacking tools. Ddos attack cluster, in addition to the network authentication version! Very powerful
Platform: | Size: 3452928 | Author: 刘德华 | Hits:

[SCMShift100

Description: Shift添加密码 做服务器管理的可以使用 避免你在忘记登录密码的情况下登录系统也算是黑客工具。-Shift to add a password to do server management, you can use to avoid the case of forgotten password sign-on system can be considered hacking tools.
Platform: | Size: 6144 | Author: yuea86ng52 | Hits:

[Documentskali-linux-cn

Description: 本书从业务角度出发,通过真实攻击案例并辅之以各种实用的黑客工具,探讨了进行渗透测 试所需的各种准备工序和操作流程。(From a business point of view, this book explores various preparation processes and operation procedures for penetration testing through a real attack case and a variety of practical hacking tools.)
Platform: | Size: 2006016 | Author: 湖北杰哥 | Hits:
« 1 2 3 4»

CodeBus www.codebus.net