Go To English Version 超过100万源码资源,1000万源码文件免费下载
  • Tutorial.pdf ... variety of techniques from the metaheuristic search, operations research and evolutionary computa- tion paradigms. The idea is to exploit humans’ creativity and machines’ tenacity and reliabil- ity, rather than requiring humans to perform the more tedious ...
  • Packt.Kali.Linux.2018.4th.Edition.rar ... testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With ... . In the concluding chapters, you'll apply techniques to exploit target systems in order to gain access and find a ...
  • 冰盾DDOS防火墙 v9.7 Build 2010.10.10.zip ... 可抵御每秒25万个SYN包攻击,工作于1000M网卡冰盾约可抵御160万个SYN攻击包;在防黑客入侵方面,冰盾可智能识别Port扫描、Unicode恶意编码、SQL注入攻击、Trojan木马上传、Exploit漏洞利用等2000多种黑客入侵行为并自动阻止。   冰盾抗DDOS防火墙 v9.7 Build 2010.10.10最新版: 1.增强了对防御synflood的处理能力。 2.改进了入侵防御模块的检测机制。 3.优化了cc防护功能。
  • 批量漏洞扫描验证和利用框架btScan.zip ... 文件即可。然后攻击也有两种模式,验证 verify模式和攻击exploit模式。 你也可以指定ip或者url作为输入格式,也可以 ... node floder choose a script   -c COMMAND   give an instruction when use script mode [verify|exploit]                e.g. -c verify   -u URL_FILE  input url file   -i IP_FILE   input ip file ...
  • 天道酬勤漏洞挖掘 教程名称:天道酬勤漏洞挖掘教程目录:【】1.修改程序验证流程【】2.堆栈的溢出实践【】3.堆栈溢出利用原理【】4.利用漏洞控制程序执行流程【】5.向目标进程中植入代码【】6.获取跳板Jmp_esp的地址【】7.使用跳板定位exploit【】8.ShellCode加载与调试【】9.开发通用的ShellCode【 资源太大,传百度网盘了,链接在附件中,有需要的同学自取。
  • SQL Server Internals: In-Memory OLTP (Second Edition) The SQL Server 2016 In-Memory OLTP engine (a.k.a. Hekaton) is designed to exploit terabytes of available memory and high numbers of processing cores. It allows us to work with memory-optimized tables and indexes, and natively compiled stored procedures, ...
  • Computational Finance - An Introductory Course with R ... future values. And there are computers to help us with all the necessary real-world data crunching to exploit the formal models to unprecedented possibilities. Computational Finance includes all numerical methods, theories of algorithms and optimization ...
  • heap exploit.pdf 关于堆溢出的利用,深入浅出的介绍,从原理到利用,入门必看
  • AfullyimplementedkernelexploitforthePS4on505FW A fully implemented kernel exploit for the PS4 on 5.05FW
  • Python-DuckyExploit是python框架有助于将Digispark编码为RubberDucky Ducky Exploit是python框架,有助于将Digispark编码为Rubber Ducky