Go To English Version 超过100万源码资源,1000万源码文件免费下载
  • All-optical adder/subtractor based on terahertz optical asymmetr... ... exclusive-ORs (XORs), can be used to perform a fast central processor unit using optical hardware components. We try to exploit the advantages of TOAD-based optical switch to design an integrated all-optical circuit which can perform binary addition and ...
  • On the Orbital Angular Momentum Based Modulation/Demodulation Sc... Security is the guarantee to fully exploit the advantages of satellite communication networks. In this paper, the techniques of physical layer security are considered in multi-beam satellite networks. Physical layer security may be an effective way to ...
  • PoC:回购,用于概念开发和工具的证明 ... BMC Server Automation的RSCD代理的未经身份验证的远程命令执行漏洞。 该漏洞利用可应对受CVE-2016-1542影响的服务器(Nessus检测到)。 现在这是一个Metasploit模块,请参阅exploit / multi / misc / bmc_server_automation_rscd_nsh_rce 该漏洞利用是通过让Nessus扫描一个Python脚本来记录数据包并将它们/垃圾发送回Nessus来创建的。 捕获数据包后,数据格式变得微不足道,无法“反向”创建 ...
  • dark-parser:从流行的deepdark网站论坛解析HTML文件 ... 文件。 此工具不会抓取论坛(有很多的,将已经做到这一点的工具),它假定你有你的机器上本地存储相关HTML文件。 目前,它可与RaidForums,Exploit.in和Omerta的论坛主题一起使用。 设置 如果还没有,请安装BeautifulSoup: pip install bs4 用法 基本语法: python3 forumparsers.py {forum} -d {filepath} user@host:~/forum-parser$ ./forumparser.py -h usage: ...
  • CVE-20200-1472 ... 博客/白皮书,以了解自己在做什么 使用IP和DC的netbios名称运行cve-2020-1472-exploit.py 使用-just-dc和-no-pass或空哈希和DCHOSTNAME$帐户使用-just-dc DCHOSTNAME$ 恢复 ...
  • pwn-writeups:CTF pwn问题写入 pwn-writeups pwnで解いた问题のwriteup达。すごく古いやつからすごく新しいやつまであるしすごく眠い。基本的には解いたものを自分で书いたexploitと一绪においてあるが,一部これから解こうとしてあるやつが间违ってpushしてあったりもするのはご爱娇。
  • 脚本:我在渗透测试中使用的脚本 ... 。 enumeration -枚举DNS,Web应用程序和用户。 exploit -漏洞和利用的发展。 nosql测试非传统数据库。 osint ...
  • Adaptive XML to relational mapping: an integrated approach Storing and querying XML (eXtensible Markup Language) data in relational form can exploit various services offered by modern relational database management systems (RDBMSs). Due to structural complexity of XML, there are many equivalent relational mapping ...
  • A two-stage genetic algorithm for automatic clustering ... and the proper partition from a given data set. The two-stage selection and mutation operations are implemented to exploit the search capability of the algorithm by changing the probabilities of selection and mutation according to the consistence of the ...