Go To English Version 超过100万源码资源,1000万源码文件免费下载
  • linux-exploit-suggester Linux提权辅助脚本 收集Linux内核等相关信息,方便提权等操作
  • Unidirectional reflection from an integrated “taiji” microresona... ... -propagating modes in a propagation-direction-dependent way. The overall shape of the device resembles a “taiji” symbol, hence its name. While Lorentz reciprocity is preserved in transmission, the peculiar geometry allows us to exploit the non-Hermitian
  • Low-power (mW) nonlinearities of polarization maintaining fibers For space missions, there is a need for fiber lasers of minimum power consumption involving stabilized frequency combs. We exploit the extreme sensitivity of the polarization state of circularly polarized light sent through polarization-maintaining (PM) ...
  • OFDM-based visible light communication with rotated polarity mod... ... multiplexing (OFDM) and color shift keying (CSK), have been proposed for visible light communication (VLC). To fully exploit their advantages, in this Letter, we design a modulation scheme called rotated polarity modulation (RPM) aided complex CSK (CCSK) ...
  • Plasmonically induced transparency in double-layered graphene na... ... is challenging to realize such well-designed devices, mainly because they depend significantly on the polarization direction. We exploit surface plasmons supported by two crossed layers of graphene nanoribbons (GNRs) to achieve dynamically tunable PIT, ...
  • Wavelength-switchable vortex beams based on a polarization-depen... ... (0.018 nm) of multiwavelength channels. The wavelength interval corresponds to the free spectral range of the MKR. We exploit a fused SMF–FMF (single mode fiber–few mode fiber) mode coupler to obtain broadband mode conversion and successfully ach
  • awesome-aws-security:与AWS Security相关的链接,参考,书籍视频,教程(免费或付费),Exploi... awesome-aws-security:与AWS Security相关的链接,参考,书籍视频,教程(免费或付费),Exploit,CTF,Hacking Practices等精选列表
  • yasuo:一种ruby脚本,可扫描网络上易受攻击且可利用的第三方Web应用程序 ... redteam演出等)时,我们经常会遇到易受攻击的第三方Web应用程序或Web前端,这些漏洞使我们能够通过利用众所周知的漏洞来危害远程服务器。 一些常见的应用程序是Apache Tomcat管理界面,JBoss jmx-console,Hudson Jenkins等。 如果通过Exploit-db搜索,则大量的Web应用程序/前端中存在10,000多个可远程利用的漏洞,并且可能使攻击者完全破坏后端服务器。 这些漏洞的范围从RCE到恶意文件上传,从SQL注入到RFI / LFI等。 Yasuo的构建目的 ...
  • freeorion:FreeOrion项目的源代码存储库 自由猎户座 FreeOrion是一款免费的开源回合制太空帝国和银河征服电脑游戏。 FreeOrion受到Orion游戏大师的传统启发,但并不想成为该系列或任何其他游戏的克隆或翻版。 它基于经典的4X (eXplore,eXpand,eXploit和eXterminate)模型。 通过向游戏引擎添加脚本功能,FreeOrion项目旨在为社区提供一种轻松的方法,以自定义游戏机制和演示方式,从而在宏伟的战役模型中创建生动活泼的宇宙。 要求 FreeOrion需要支持OpenGL 2.1 ...
  • IceMeme:Roblox漏洞利用源代码称为IceMeme,其中包含一些cmds,lua c和有限的lua执行,并且在c#中使... ... )已更新! 通过使用IceMeme,您接受您不会以任何方式出售漏洞利用程序 去发布下载 特征: 在Windows 7 32位和Windows 10 64位上测试和工作 新功能: 现在,您只需更改dll名称即可更改标题和工具栏Exploit名称 快速扫描 Windows 7 32位支持 稳定 快速更新 更新检查器 简单的Windows窗体UI / Gui 点击TP GetObjects(仅插入模型ID,因此暂时不在受限Lua中) 在非FE游戏中工作 Lua C支持: 获取全局 盖菲尔德 ...