您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. Hacking Web Applications Using Cookie Poisoning

  2. In this paper, we explain why session management (and session management security) is a complex task (which is why it is usually left for commercial products). We describe how the tokens are generated for two commercial application engines. We then
  3. 所属分类:Web开发

    • 发布日期:2009-07-21
    • 文件大小:138kb
    • 提供者:chotsai
  1. SURF: Detecting and Measuring Search Poisoning

  2. Search engine optimization (SEO) techniques are often abused to promote websites among search results. This is a practice known as blackhat SEO. In this paper we tackle a newly emerging and especially aggressive class of blackhat SEO, namely search
  3. 所属分类:网络攻防

    • 发布日期:2012-03-18
    • 文件大小:628kb
    • 提供者:saga111
  1. scapy-2.2.0

  2. About Scapy What is Scapy Scapy is a powerful interactive packet manipulation program. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more. It can easily
  3. 所属分类:Python

    • 发布日期:2013-07-04
    • 文件大小:978kb
    • 提供者:djcheung
  1. MITMf-master.zip

  2. 内含MITMf.zip BDFProxy.zip LANs.py the-backdoor-factory.zip DHCPShock-master.zip Available plugins ================= - ```SMBtrap``` - Exploits the 'SMB Trap' vulnerability on connected clients - ```Screenshotter``` - Uses HTML5 Canvas to render an ac
  3. 所属分类:网络攻防

    • 发布日期:2015-06-08
    • 文件大小:399kb
    • 提供者:qq_20154743
  1. wireshark101

  2. epub格式,英文版 目录如下 Chapter 0 Skills: Explore Key Wireshark Elements and Traffic Flows Quick Reference: Key Wireshark Graphical Interface Elements 0.1 Understand Wireshark's Capabilities General Analysis Tasks Troubleshooting Tasks Security Analysis (Ne
  3. 所属分类:网管软件

    • 发布日期:2015-11-02
    • 文件大小:10mb
    • 提供者:geforce6
  1. Understanding Network Hacks(Springer,2015)

  2. This book explains how to see one’s own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing,
  3. 所属分类:Python

    • 发布日期:2016-05-10
    • 文件大小:10mb
    • 提供者:vanridin
  1. ijkplayer 的动态库v7a 和v8a,支持海康摄像头RTSP h264协议,源码来自最新版本ijkplayer k0.8.0

  2. ijkplayer 的动态库v7a 和v8a,支持海康摄像头RTSP h264协议,源码来自最新版本ijkplayer k0.8.0 使用原DEMO即可支持RTSP mp4文件等播放,首画面500ms显示. module-lite-rtsp.sh的内容如下: #! /usr/bin/env bash #-------------------- # Standard options: export COMMON_FF_CFG_FLAGS= # export COMMON_FF_CFG_FLAGS
  3. 所属分类:Android

    • 发布日期:2017-07-10
    • 文件大小:6mb
    • 提供者:ydh7611
  1. Attacking SMM Memory via Intel CPU Cache Poisoning

  2. In this paper we describe novel practical attacks on SMM memory (SMRAM) that exploit CPU caching semantics of Intel-based systems.
  3. 所属分类:专业指导

    • 发布日期:2009-04-12
    • 文件大小:475kb
    • 提供者:jjstu
  1. Understanding Network Hacks - Attack and Defense with Python (2015)

  2. This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing,
  3. 所属分类:网络攻防

    • 发布日期:2018-08-10
    • 文件大小:5mb
    • 提供者:qq_20553017
  1. SENginx v1.5.11.zip

  2. SEnginx是由东软集团网络安全事业部发起的开源项目, SEnginx为Security Enhanced nginx之意。   SEnginx是在原始的nginx的基础上,整合了多种负载均衡和安全类别的第三方模块,以及东软安全为nginx开发的若干模块,主要在Web安全方面和负载均衡方面进行了功能增强。   SEnginx的侧重点在于HTTP的反向代理和Web安全功能,我们致力于把SEnginx打造成一个稳定、高效的带安全防御功能的Web应用交付开源软件。同时我们欢迎大家参与SEnginx
  3. 所属分类:其它

  1. Towards Data Poisoning Attack against Knowledge Graph Embedding.pdf

  2. Knowledge graph embedding (KGE) is a technique for learning continuousembeddingsfor entities and relations in the knowledge graph. Due to its benefit to a variety of downstream tasks such as knowledge graph completion, question answering and recommen
  3. 所属分类:深度学习

    • 发布日期:2019-08-09
    • 文件大小:166kb
    • 提供者:qq_31367595
  1. The pathology of the cardiac musle following paraquat poisoning in mice

  2. 百草枯中毒小鼠心肌损伤的病理观察,董雪松,刘盛业,目的 百草枯中毒可以导致多器官损伤,往往累及心肌。但百草枯引起心肌损伤的机制研究很少。在本研究中,我们观察了百草枯所致心�
  3. 所属分类:其它

    • 发布日期:2020-01-05
    • 文件大小:736kb
    • 提供者:weixin_38654915
  1. Mastering Wireshark.pdf

  2. This book is written from a standpoint of using Wireshark to understand and troubleshoot commonly seen network anomalies. It can be the start of your journey into the world of networks/traffic/packet analysis.Table of contents Mastering Wireshark Cre
  3. 所属分类:网络监控

    • 发布日期:2019-10-20
    • 文件大小:21mb
    • 提供者:weixin_45774154
  1. FCS400 Quick Start[手册].pdf

  2. FCS400 Quick Start[手册]pdf,Liquid applications Gas or vapor bubbles in the fluid may result in erroneous measurements, particularly in the density measurement Do not install the flowmeter at the highest point in the system, where bubbles will be trapp
  3. 所属分类:其它

  1. PCI Express Base Specification 5.0 .pdf

  2. PCI Express Base Specification Revision 5.0 version 1.05.0-1.0-PUB-PCl Express Base Specification Revision 5.0 Version 1.0 Table of contents 1. Introduction Q 1.1 A Third Generation I/o Interconnect. 2 PCI Express Link .·········.···.······· 90 1.3 P
  3. 所属分类:硬件开发

    • 发布日期:2019-09-03
    • 文件大小:10mb
    • 提供者:jiangm_bj
  1. 389_389VP.pdf

  2. 爱默生389——389vp仪表The reference junction aids in the sensor’s resistance to poisoning ions and helps prolong sensor life. Models 389 and 389VP are provided with a triple junction reference, which protects the reference element from poisoning ions — such
  3. 所属分类:制造

    • 发布日期:2015-06-17
    • 文件大小:370kb
    • 提供者:qq_29098407
  1. Performance improvement of diesel autothermal reformer

  2. Technology for the reforming of heavy hydrocarbons, such as diesel, to supply hydrogen for fuel cell applications is very attractive and challenging due to its delicate control requirements. The slow reforming kinetics of aromatics contained in diese
  3. 所属分类:教育

    • 发布日期:2012-12-01
    • 文件大小:1mb
    • 提供者:jaytomrit
  1. Influence and Data Poisoning.pdf

  2. Interpreting & Manipulating Models via their Training Data Pang Wei Koh Stanford University
  3. 所属分类:机器学习

    • 发布日期:2020-06-28
    • 文件大小:2mb
    • 提供者:billy145533
  1. A Cache Poisoning Attack Targeting DNS Forwarding Devices

  2. 在本文中,我们提出了一个针对域名系统转发器的缓存中毒攻击。通过这种攻击,攻击者可以使用受控域注入任意受害域名的恶意记录,并绕过广泛部署的缓存中毒防御。通过对流行的家庭路由器模型和DNS软件进行测试,我们发现了几个易受攻击的实现,包括大型供应商的实现(例如,D-Link、Linksys、dnsmasq和MS DNS)。此外,通过一项全国性的测量,我们估计了使用易受攻击的域名系统转发器的中国移动客户的数量。我们已经向受影响的供应商报告了该问题,到目前为止,已经收到了其中三家供应商的积极反馈。我们的工
  3. 所属分类:网络攻防

    • 发布日期:2020-11-20
    • 文件大小:4mb
    • 提供者:qq_39869387
  1. Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning

  2. Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning
  3. 所属分类:其它

    • 发布日期:2021-02-06
    • 文件大小:384kb
    • 提供者:weixin_38558054