Go To English Version 超过100万源码资源,1000万源码文件免费下载
  • minecraft-proxy ... ] alpha network communication between the client and a Survial Multiplayer server, enabling easy manipulation of packets in order to exploit the extent to which the server trusts the client. Usage ----- Run the proxy giving the server's hostname and ...
  • Open-Asbestos-Loader ... vars == Usage == First compile AsbestOS Loader get a compatible USB exploit mechanism. You should also connect your PS3 and PC to a ... to the root of you usb thumb drive. Fire off the exploit device, turn on your PS3 using power followed by eject ...
  • wp-front-end-editor ... of the Edit button * allow editing multiple elements simultaneously again * enhanced JavaScript API * switch from Coco to CoffeeScript * fix security exploit caused by Aloha demo file and update to Aloha 0.20.16 * [more info](http://scribu.net/wordpress/ ...
  • Shared-Hosting-Perl-Wrapper ... it with the usual command line perl executable (provided you point it to the valid runtime) and then it will attempt to catch exploit attempts, and log what it's doing. ##To install: Line 86 in wrap.php needs to be customized (customize the name of the ...
  • Ruby_AI_Card_Game ... Bot Damage bot is like its predecessors in that it blocks and counter attacks when possible, with the exception that it tries to exploit the endpoints of the number to maximize the damage done to it’s opponent. Damage bot operates on two principals of ...
  • webgraph ... from the web * Create a naive implementation based on hashmaps * Implement a tree based approach (possibly using a trie to exploit the fact I have string keys that have a hierarchical nature) * Write some performance tests Good implementation as a trie ...
  • PSGradePIC ... PSGradePIC is an open-source reimplementation of the psdowngrade exploit for PIC18F microcontrollers. It is known to work ... Building -------- make clean make Using ----- To use this exploit: * Hard power cycle your PS3 (using the switch ...
  • ncn2010_sms_spoofing ... y explotación nativa en android". * android_stack_tb.rb: El exploit original de Eloi Sanfelix y Javier Moreno, con la " ... módulo utilizado durante la presentación de SMS Spoofing. Es el exploit anterior, modificado para servirse a través de una app ...
  • Bootrom-Dumper ... to older devices as well (iPhone 3Gs, iPod 3G) by changing: * the offset to the call of usb_wait_for_image in payload.S * exploit offsets in bdu.c was too lazy to automate this stuff... Happy Reverse Code Engeneering ! ~ pod2g
  • domain-name-hacks ... it and the name google, respectively. In this context, the word hack denotes a clever trick (as in programming), not an exploit or break-in (as in security). What is this drivel? -------------------- There are already a few domain name search tools that ...