搜索资源列表
25haha
- 25岁的董事长给大学生的18条建议 1.一定要有独立的人格、独立的思想。一个经过独立思考而坚持错误观点的人比一个不假思索而接受正确观点的人更值得肯定。不要成为灌输教育的牺牲品. 2.仕途,商界,学术。大致说来,每个人都注定要走上三条道路中的某一条。在进行职业生涯规划的时候,不妨以此作为思考的出发点。根据不同的职业生涯规划来塑造各自的核心竞争力。只有知道自己以后要做什么,才能知道自己应该学什么. 3.专业无冷-chairman
PlayPK
- 一个玩扑克的源代码,你可以跟据提示,发牌,出牌,猜牌,很精采-a victim of the source code, you can follow the tips licensing card, guess licensing and brilliant
25haha
- 25岁的董事长给大学生的18条建议 1.一定要有独立的人格、独立的思想。一个经过独立思考而坚持错误观点的人比一个不假思索而接受正确观点的人更值得肯定。不要成为灌输教育的牺牲品. 2.仕途,商界,学术。大致说来,每个人都注定要走上三条道路中的某一条。在进行职业生涯规划的时候,不妨以此作为思考的出发点。根据不同的职业生涯规划来塑造各自的核心竞争力。只有知道自己以后要做什么,才能知道自己应该学什么. 3.专业无冷-chairman
PlayPK
- 一个玩扑克的源代码,你可以跟据提示,发牌,出牌,猜牌,很精采-a victim of the source code, you can follow the tips licensing card, guess licensing and brilliant
LPC2131
- 嵌入式系统相关:周立功EasyArm2131开发板原理图的真正Protel版本(绝非无耻的PDF版本!),网上如何找都没有的,本人也是深受其害故只好对着PDF的图一条条线、一个个元件慢慢画,由于是Altium Designer制作的,考虑到使用Protel 99SE的人故转换格式为通用的.sch,同时将原SchDoc文件一同附上(Protel DXP也可打开),方便对嵌入式Arm感兴趣的朋友节约那几百大洋,同时锻炼自己的印制板制作能力。
cronig
- Resolution of the Cronig-Penney s predator and victim problem wrote in Matlab v6.5.
ahbmst
- amba总线的主设备用于实现基于amba总线的功能,这个事主设备的代码-amba bus for the main equipment amba bus based on the function of the code of the victim equipment
mirc_exp.pl
- An exploit for the IRC client mIRC 6.34. Target user connects to this server, written in Perl. The victim connects to port 6667 on your computer.-An exploit for the IRC client mIRC 6.34. Target user connects to this ser
ArpWorm
- 著名病毒:卤猪病毒 一个叫“熊猫烧香”的病毒把电脑用户折腾得苦不堪言,在人们心目中,“熊猫”这个国宝似乎不再可爱,却成了人人喊打的过街老鼠。而“熊猫烧香”这场大风却还未完全散去,各种“熊猫烧香 ”的变种更是表现的异常活跃,近半数的网民深受其害。目前已经有许多用户反映遭遇 “卤猪病毒”(win32.iuhzu.a)这款变种病毒重度感染,眼看此款病毒就要大面积肆虐,挑战互联网的安全。 卤猪病毒(win32.iuhzu
Small_Trojan_c
- 从delphi版的smalltrojan转成c语言版的~-The Trojan sends the harvested information using a connection which is established via Microsoft Outlook Express. Email sent to the remote malicious user s mailbox will show the email address
Accesstokenstealing
- 复制进程的令牌,复制者将拥有与被复制者同样的权限。-After a copy of the desired access token is made,the only thing that is to be done is to exchange the original value of the Token field with the address of the new token.The process will have th
LEXX14CS
- LEXX can be used as a remote administrating tool or as a hacking tool. It consists of two files: server.exe & LEXX.exe. To use it, run server.exe on the victim s computer [Don t ask me how! Figure that out by yourself],
ControlRemoteComputer
- How to use the program: The program has 2 files to run a client/server. The server resides on the victim s computer and the client connects to the server program. You do not have to worry about running the
Victim
- A victim process for DLL injection
SpyEye_1.3.45_Loader
- SpyEye是Zeus的竞争对手,它甚至可以删除受害者电脑里的Zeus。它在地下黑客市场的零售价高达500美元。 安全公司Damballa报导,逆向工程师Xyliton破解了用VMProtect保护的SpyEye 1.3.45,发布了SpyEye 1.3.45 Loader源代码,它将允许恶意黑客开发出更复杂更难以探测的恶意程序。SpyEye作者已经发布了1.3.48,更新版本正在开发之中。-SpyEye is Zeus s
ShortcutRemover
- Hope that this Tool help somebody There a lot of virus and its variants that have been shed much these days. and have these symptoms: they hide their files and they turn into shortcuts that have targeted to their virus
EXEGuard
- The program has 2 files to run a client/server. The server resides on the victim s computer and the client connects to the server program. You do not have to worry about running the server program as it will not
xssshell-xsstunnell
- XSS Shell is a powerful XSS backdoor and XSS zombie manager. Normally during XSS attacks an attacker has one shot however,an XSS Shell can be used interactively to send requests and receive responses from a victim, it is
GNSS-Spoofing-Detection-based-on-Receiver-CNR-Est
- A perceived emerging threat to GNSS receivers is posed by a standoff spoofing transmitter that emulates authentic signals but with randomized code phase and Doppler over a target area extending over several hundred
bomblabtwo
- * Dr. Evil s Insidious Bomb, Version 1.0 * Copyright 2002, Dr. Evil Incorporated. All rights reserved. * LICENSE: * * Dr. Evil Incorporated (the PERPETRATOR) hereby grants you (the * VICTIM) explicit permission