Go To English Version 超过100万源码资源,1000万源码文件免费下载
  • Wordpress-XMLRPC-Brute-Force-Exploit:Wordpress XMLRPC系统多方调用蛮力利用(... 1N3的Wordpress XMLRPC System Multicall蛮力利用漏洞,最近更新:20170215 关于: 这是对Wordpress xmlrpc.php系统多重调用功能的一种利用,影响了最新版本的Wordpress(3.5.1)。 该漏洞利用通过向xmlrpc.php发送每个请求1,000次以上的auth尝试来工作,以“强行”使用有效的Wordpress用户,并将遍历整个单词列表,直到获得有效的用户响应为止。 然后,它将有选择地获取并显示有效的用户名和密码以进行登录。 用法: ...
  • killshot:渗透测试框架,信息收集工具和网站漏洞扫描程序 致命一击 渗透测试框架,信息收集工具和网站漏洞扫描程序 为什么选择KillShot ? 可以使用whatweb-host-traceroute-dig-fierce-wafw00f或使用Cms Exploit Scanner && WebApp Vul扫描仪,使用此工具来蜘蛛化您的网站并自动获取重要信息并收集信息,或者使用该工具识别 ...
  • ronin-sql:用于编写SQL注入的Ruby DSL ... : "'O''Brian'".sql_unescape # => "O'Briand" 十六进制编码一个字符串: "exploit".sql_encode # => "0x6578706c6f6974" 十六进制解码字符串: string = "4445434
  • An Improved Fireworks Algorithm with Landscape Information for B... ... is an interesting and challenging work. In this paper, the landscapes of optimization problem are firstly analyzed, and then a new sparks explosion strategy is designed to represent and mine the landscape information. Moreover, the exploration and exploit
  • Low-rank matrix factorization with multiple Hypergraph regulariz... ... MultiHMMF, which incorporates multiple Hypergraph manifold regularization to the low-rank matrix factorization. In order to effectively exploit high order information among the data samples, the Hypergraph is introduced to model the local structure of ...
  • SEMANTICS-GUIDED MULTI-LEVEL RGB-D FEATURE FUSION FOR INDOOR SEM... ... . In this paper, we explore several fusion strategies based on this two-stream-CNN framework and point out such a single-layer fusion method cannot exploit the complementary RGB and depth cues well for semantic segmentation. To address this problem, we p
  • Normal, degenerated, and anomalous-dispersion-like Cerenkov sum-... ... of domain walls and in the form of nonlinear Cerenkov radiation, are demonstrated in normal, degenerated, and anomalous-dispersion-like configurations. We exploit their phase-matching geometries, which exhibit a whole scenario of the evolution of Cerenk
  • Robust Depth-Based Person Re-Identification ... or changed clothes, the RGB appearance-based re-id methods tended to fail. To overcome this problem, we propose to exploit depth information to provide more invariant body shape and skeleton information regardless of illumination and color change. More ...
  • Tensor robust principal component analysis with complex noise ... . However, two defects limit its effectiveness. Firstly, it is designed for dealing with data in matrix form, which fails to exploit the structure information of higher order tensor data in some pratical situations. Secondly, it adopts L1-norm to tackle ...
  • Spatial–spectral total variation regularized low-rank tensor dec... ... matrix factorization. This strategy introduces the loss of useful multiway structure information. Moreover, these bandwise TV-based methods exploit the spatial information in a separate manner. To cope with these problems, we propose a spatial–spectral ...