搜索资源列表
yybbs
- 溢洋论坛1.12版(JSP)- Overflows ocean forum 1.12 edition (JSP)
mymalloc
- The usual implementation of malloc and free are unforgiving to errors in their callers' code, including cases where the programmer overflows an array, forgets to free memory, or frees a memory block twice. This often doe
yybbs
- 溢洋论坛1.12版(JSP)- Overflows ocean forum 1.12 edition (JSP)
RTL8019
- rt8019as网卡芯片的驱动,我自己写的,与网上所能下载到的同类代码最大的区别是,我这个驱动可以使网卡工作在很繁忙的网络环境中,即使cpu使用的是单片机,也不会使网卡fifo溢出而使网卡不能通信-rt8019as chip card driver, I wrote it myself, and on-line can be downloaded to a similar code biggest difference is that
Hacking.The.Art.Of.Exploitation
- 一本关于黑客攻击及漏洞挖掘艺术的好书.有缓冲区溢出的利用等.-Exploit programs using buffer overflows and format strings Write your own printable ASCII polymorphic shellcode Defeat non-executable stacks by returning into libc Redirect network
AntiOverflows
- Protection Against Exploitation of Stack And Heap Overflows
Secure-Programs-HOWTO-all-html.tar
- Secure Programming howtos. How to write code that is not likely to be exploited by buffer overflows, format-strings, etc. How to write stable quality code.
autodafe-0.1.tar
- 一个模糊测试的框架,可以测试协议和文档读取程序。-A fuzzing fr a mework which used to fuzz protocols and files. It uses different tools to improve its ability to detect buffer overflows. It can fuzz: - every tcp binary and ASCII protoc
BufferOverrun
- 用C++语言教大家编写缓冲区溢出程序,很实用-Using C++ language program to teach you write buffer overflows, it is useful
ValuRang
- This book describes a static analysis that aims to prove the absence of buffer overflows in C programs. The analysis is conservative in the sense that it locates every possible overflow. Furthermore, it is fully automati
C8051F040TTWatchdog
- /看门狗定时器(WDT)是在每一个硬件定时器复位这使 / /将一个可编程的后超时间隔。当WDT超时,它 / /将强制器件复位。为了防止复位,WDT必须重新启动 / /由应用软件之前,溢出。如果系统遇到 / /软件或硬件故障无法重启软件 -// The Watchdog Timer (WDT) is a hardware timer enabled on every reset that // will time
Copy-of-3N
- 3N+1 The input will consist of a series of pairs of integers i and j, one pair of integers per line. All integers will be less than 1,000,000 and greater than 0. You should process all pairs of integers and for
3N
- 3N+1 The input will consist of a series of pairs of integers i and j, one pair of integers per line. All integers will be less than 1,000,000 and greater than 0. You should process all pairs of integers and for
bianyuan
- 把图像的边缘做出百变,防止图像处理时溢出-Variety makes the edge of the image, to prevent overflows in image processing
LED-lights-timer-control
- 用定时器来控制LED灯的亮灭,定时器溢出时便产生中断,控制LED亮灭。-LED lights with timers to control the light off, the timer generates an interrupt when it overflows, control LED light off.
Keyboard
- 设计采用P3口作为扫描键盘接口,P1.0口作为输出,P1口低4位接4X4矩阵键盘的列,高4位接行。 CPU工作在查询方式下并开放中断,且将定时器T1设为最高优先级。当程序扫描到按键时调用延时防抖后再次扫描并判断键值,并转入相应的按键处理子程序,在子程序中向定时器装入初值并启动其工作,当定时器溢出时向CPU申请中断,CPU响应中断后转入中断子程序,输出预定频率的方波并送到音频放大模块进行放大输出。 -Design uses a s
cmd-overflow
- cmd_overflow,Generic exploit for command line buffer overflows
fet140_ta_03
- Descr iption: Toggle P1.0 using software and Timer_A overflow ISR. // In this example an ISR triggers when TA overflows. Inside the TA // overflow ISR P1.0 is toggled. Toggle rate is approximatlely 12Hz. // Proper
bleedinglife-2.nk
- Bleeding Life 2 is an exploit pack that affects the web browsers on the Microsoft Windows operating system with remote code execution buffer overflows. Features Bleeding Life 2 has a variety of exploits and sta
buffer-overflows
- 通过栈溢出来获取root权限,攻击系统安全。但是需要在linux系统下实现-buffer overflows