Go To English Version 超过100万源码资源,1000万源码文件免费下载
  • A Reinforcement Learning Framework for Medical Image Segmentatio... ... ). The agent is provided with a scalar reinforcement signal determined objectively. The agent uses these objective reward/punishment to explore/exploit the solution space. The values obtained using this way can be used as valuable knowledge to fill a Q- ...
  • Semi Supervised Learning for Few Shot Image to Image Translation ... . To do so, we propose applying semi-supervised learning via a noise-tolerant pseudo-labeling procedure. We also apply a cycle consistency constraint to further exploit the information from unlabeled images, either from the same dataset or external.
  • 写远程缓冲区溢出漏洞利用程序 怎样写远程缓冲区溢出漏洞利用程序 ? 在此,我们假设有一个有漏洞的服务器程序(vulnerable.c). 然后写一个 exploit 来利用该漏洞,这样将能得到一个远程 shell。
  • ActiveX漏洞通用Exploit vbs修正版 作者:疯狗终于在milw0rm找到了一个不错的shellcode,down&exec的,灰常好用!顺手写了一个C测试了下,结果是成功下载并执行了"木马",muma.exe是我用delphi写的一个简单的执行测试程序,无毒无害。
  • 93070鲍米勒-111-09_M3-1_Rev1_en.pdf ... as desired but exclusively for internal use. You are not allowed to copy or duplicate even extracts from this manual for any other purposes. You are not allowed to exploit or report the contents of this manual. Terms or company logos used in this m
  • 如何加强IP语音的通讯安全 ... 。” 对于我们这些整天冥思苦想着如何保护机构免遭安全漏洞攻击的人来说,这一案例也让我们思考,如何加强防御来应对破坏性日趋严重的漏洞攻击(zero day exploit)。入侵者寻找之前不为人知的漏洞,藉此突破一个机构的防御系统,实施严重的破坏。一次成功的攻击可以瘫痪一个企业,造成业务中断,以及收入损失 ...
  • K8tools-新版K8工具合集大全包 K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
  • mysql 5.0.45 (修改)拒绝服务漏洞 ... 漏洞 /* * MySQL <=6.0 possibly affected * Kristian Erik Hermansen * Credit: Joe Gallo * You must have Alter permissions to exploit this bug! * Scenario: You found SQL injection, but you want to punch backend server * in the nuts just for fun. Start ...
  • php shell超强免杀、减少体积工具实现代码 ... 如下: <?php /* Title: PHP shell nokill T00L Blog: exploit-db.blogcn.com */ error_reporting(0); @ini_set(‘memory_limit’,’-1′); set_time_limit
  • PHP5.0 TIDY_PARSE_FILE缓冲区溢出漏洞的解决方案 漏洞说明 不得不再次吐槽一下exploit-db对exp审核的质量,这个exp仍然不能触发漏洞,修改第一个参数则可以触发,我给出的poc是一个可以触发php漏洞的 ... 路径没有进行长度控制和内容校验,导致在fopen失败后进入失败处理逻辑引发缓冲区溢出,下面对此漏洞进行详细分析。 软件下载: https://www.exploit-db.com/apps/f8fb5676b6a32f7be1c8d8d373fbc2af-php-5.0.0-Win32.zip (本地下载) PoC: <?