Go To English Version 超过100万源码资源,1000万源码文件免费下载
  • amorph.zip ... modification. The synchronization is not required in the algorithm. Experimental results show that the proposed algorithm can resist on the attack of A/D and D/A successfully with features of large capacity and zero bit error. It will be helpful for ...
  • vm2.zip ... modification. The synchronization is not required in the algorithm. Experimental results show that the proposed algorithm can resist on the attack of A/D and D/A successfully with features of large capacity and zero bit error. It will be helpful for ...
  • get_net_mac.rar vb 获取网卡mac地址。membrane attack complex
  • watermarkattack.rar a watermarking attack is an attack on disk encryption methods
  • wivet_v3.rar ... These VAs, given a URL(s), try to extract as many input vectors as possibly they can to increase the coverage of the attack surface. WIVET provides a good sum of input vectors to any extractor and presents the results. In order an input extractor to ...
  • robotattack.zip robot attack based on the classic arcade game of the 80s
  • attack.rar 丝路英雄攻击力计算器 支持所有版本.易语言源代码
  • 0909.0573.rar this is a paper on minimizing cache timing attack on aes using cache flushing algorithm
  • 11.rar Botnet for vb 6 ddos attack http and ftp flooding
  • 12.rar Botnet for vb 6 ddos attack http and ftp flooding