搜索资源列表
akashhttpproxy_src
- HTTP隧道技术源代码,封装HTTP格式数据
网络神偷代码
- 网络神偷源代码,应用了http隧道技术,很值得研究哦:)
firepass-1.1.2a.tar
- Firepass - 一种隧道技术工具,通过它可以避开防火墙的规则约束,将数据流封装在合法的HTTP POST请求中。任何基于TCP/UDP协议的子协议可以通过它来穿越HTTP代理服务器对HTTP协议的严格审查。到目前为止,客户端和服务器端仅用PERL语言编写。服务器端作为一个CGI脚本运行在WEB服务器上。Firepass的主要特点是用户可以在外网使用几种方法安装服务器端脚本。用户无需在外网计算机上帮定任何端口。当服务端脚本被置于企业
ohttptunnel-3.3.tar
- 开放式TCP隧道软件,印象中这份代码是最先被人放出来的.-open TCP tunnel software, the impression of this code is the first to be let out of.
akashhttpproxy_src
- HTTP隧道技术源代码,封装HTTP格式数据-HTTP tunneling technology source code, package HTTP data format
http
- http隧道 技术 有连接http资料-http tunnel
gh0st3.6
- 国内著名远程控制,红狼3.6的源码.这个远控采用http隧道技术-Famous remote control, the source of SEPTWOLVES 3.6. The remote control uses http tunneling
httptunnel-3.0.tar
- 一个HTTP隧道工具,把所有通信数据封装到HTTP协议中-httptunnel creates a bidirectional data channel through an HTTP proxy, from your isolated computer behind a restrictive firewall, to a system on the Internet you have access to.
httptunnel-1.3.2
- 打通http隧道的代码,可以把所有的协议封装成http请求,可以穿透防火墙,非常强大!-Open up http tunnel code, you can encapsulate all the protocols http request, can penetrate the firewall, very powerful!
rdp2tcp-0.1.tar
- rdp2tcp利用3389端口做隧道传输TCP链接的源代码,好不容易搞到的,是HTTP隧道的又一种新思路-rdp2tcp is a tunneling tool on top of remote desktop protocol (RDP). It uses RDP virtual channel capabilities to multiplex several ports forwarding over an already
HttpProxy
- HTTP隧道技术源代码 HTTP隧道技术源代码-HTTP Tunneling HTTP tunneling source code source code source code for HTTP tunneling
RESEARCH-ON-HTTP-TUNNEL
- 在总结分析应用层的几种防火墙穿透技术基础上,提出了反向 连接结合 HTTP 隧道的防火墙穿透通信方法,设计并实现了 HTTP 隧道 防火墙穿透通信模块。 -after reviewing and analyzing several technologies of application-layer firewall penetration, this paper presents the firewall penet
The-firewall-penetrating-technique
- 基于防火墙的基本原理,通过分析防火墙穿透的主要技术,利用防火墙的可信关系,实现了反 向连接加HTTP隧道和共享DNS套接字句柄来穿透防火墙 -Based on the basic firewall principle, firstly, themain firewall penetrating techniqueswas ana- lysed.Then using inverse connection andHTTP-tun
HTTP-TUNNEL-DETECTING-TECHNIQUE
- 研究了恶意软件常采用的通信方式———隧道技术,并提出了一种基于C4.5的HTTP 隧道检测算法。该算法采用决策支持树算法 C4.5提取网络流特征字段,根据特征字段生成训练数据建立HTTP隧道分类的决策树检测模型,采用该分类模型检测HTTP隧道流,为检测恶意软件提供依据。-Malicious software often used means of communication--- tunneling technology, an
httptunnel-3.3
- 基于防火墙的基本原理,通过分析防火墙穿透的主要技术,利用防火墙的可信关系,实现了反 向连接加HTTP隧道和共享DNS套接字句柄来穿透防火墙-Based on the basic firewall principle, firstly, themain firewall penetrating techniqueswas ana- lysed.Then using inverse connection andHTTP-tunnel to
Http-tunnel-technology
- 基于HTTP隧道的个人防火墙穿透技术研究 硕士论文,对HTTP隧道穿透防火墙技术有深入介绍 下载cajviewer打开-First,it introduces definition and function of the firewall then it points out the weakness of the firewall,which provides the consideration of the furt
httptunnel-3.0.5
- http隧道源代码,比较简单,非常值得学习。-http tunnel source code is relatively simple, and well worth learning.
http-tunnel-based-tech
- 基于HTTP协议的隧道技术的设计与实现,利用http隧道技术-The Designed and Realization of Tunnel Based on HTTP
httptunnel-1.4.0
- HTTP 隧道类库 1.4版 *nix版本-The HTTP tunneling Class Library version 1.4
HTTP_Tunnel_firewall
- 基于反弹技术及http隧道技术穿透个人防火墙的论文-Papers based on the rebound in technology and http tunneling technology penetration Personal Firewall