搜索资源列表
Delphi.02Packer
- V2Packer code by tt.t with almost pure delphi first build @ 2006.4.15 看到過許多別人寫的殼,大多是asm,也有的是c。早就想試一試用比較“純”的delphi 寫會是什麼樣子,於是就有了V2Packer。 V2Packer斷斷續續寫了半個月的時間,資源部分代碼寫的很垃圾,只算是能用。PEAnalyst類 由於改變了思路,去掉了
MD5
- MD5 (Message-Digest algorithm 5) is a widely used, partially insecure[1] cryptographic hash function with a 128-bit hash value. As an Internet standard (RFC 1321), MD5 has been employed in a wide variety of security appl
Delphi.02Packer
- V2Packer code by tt.t with almost pure delphi first build @ 2006.4.15 看到過許多別人寫的殼,大多是asm,也有的是c。早就想試一試用比較“純”的delphi 寫會是什麼樣子,於是就有了V2Packer。 V2Packer斷斷續續寫了半個月的時間,資源部分代碼寫的很垃圾,只算是能用。PEAnalyst類 由於改變了思路,去掉了
MD5
- MD5 (Message-Digest algorithm 5) is a widely used, partially insecure[1] cryptographic hash function with a 128-bit hash value. As an Internet standard (RFC 1321), MD5 has been employed in a wide variety of security appl
wr_ssh_vxworks_6_programmers_guide_6.6
- This guide describes Wind River SSH, which is an implementation of the Secure Shell protocol (SSH) that provides secure remote login, file transfer, and port forwarding over an insecure network.
157
- Encryption algorithms are becoming more necessary to ensure data is securely transmitted over insecure communication channels. FOX is a recently developed algorithm and its structure is based on the already prove
nmapwin_1.3.0_src
- NMapWin is a native Windows/2000/XP front-end for nmap. All features of nmap version 2.54beta36 have been incorporated into a fully Windows2000 compliant application. The actual nmap process is started in the b
JSky
- JSkyv1.0汉化版,Web漏洞的网站安全综合检测工具 : SQL注入(SQL Injection ) 跨站脚本(XSS ) 不安全的对象引用(Unsecure object using ) 本地路径泄露(Local path disclosure ) 不安全的目录权限(Unsecure directory permissions ) 服务器漏洞如缓冲区溢出和配置错误(Server vulnerabilities like buf
Diffie-Hellman
- Diffie-Hellman:一种确保共享KEY安全穿越不安全网络的方法,它是OAKLEY的一个组成部分-Diffie-Hellman: a kind of security to ensure that KEY shared across insecure networks, it is an integral part of OAKLEY
Web_Application_Security_Scanner
- Web Application Security Scanners are automated tools to test web applications for common security problems such as Cross-Site scr ipting, SQL Injection, Directory Traversal, insecure configurations, and remote command e
VLDB07Secu
- 数据库外包 数据库外包 数据库外包 数据库外包-The networked and increasingly ubiquitous nature of today’s data management services mandates assurances to detect and deter malicious or faulty behavior. This is particularly relevant for o
XWKDD_insecure
- i9100 root 的文件,ROOT时候可以用到的东东。-i9100 root
New-Microsoft-Office-Word-Document
- With the fast development of the computer technology and information processing technology, the problem of information security is becoming more and more important. Information hiding is usually used to protect the impor
CaesarCipher
- A means of attaining secure communications over insecure channels • Protection of data by transformations that turn useful and comprehensible plain text into scrambled and meaningless cipher text under control
RS
- RSA is a cryptosystem for public-key encryption, and is widely used for securing sensitive data, particularly when being sent over an insecure network such as the Internet.A user of RSA creates and then publishes a publi
idea
- In cryptography, the International Data Encryption Algorithm (IDEA), originally called Improved Proposed Encryption Standard (IPES), is a symmetric-key block cipher designed by James Massey of ETH Zurich and Xuejia Lai a
DES
- The Data Encryption Standard is a symmetric-key algorithm for the encryption of electronic data. Although now considered insecure, it was highly influential in the advancement of modern cryptography.
bWAPP_v2.2
- bWAPP,php靶机程序,方便渗透测试(bWAPP, or a buggy web application, is a deliberately insecure web application. bWAPP helps security enthusiasts, developers and students to discover and to prevent web vulnerabilities. It prepares on