联合开发网   搜索   要求与建议
                登陆    注册
排序按匹配   按投票   按下载次数   按上传日期
按分类查找All 系统/网络安全(162) 

[系统/网络安全] Rust-Milonity-Hack

Rust Milonity Hack 2024目标,特别是wallhack
Rust Milonity Hack 2024 aim wh esp wallhack (2024-04-15, Others, 0KB, 下载0次)

http://www.pudn.com/Download/item/id/1713204442784147.html

[系统/网络安全] Pokemon-the-10th-Aeon

一个关于伊芙的神奇宝贝[FireRed r1]ROM黑客——有一个狡猾的扭曲!你能否与神话传说中的神奇宝贝宝贝宝贝成为朋友,击败米尔公司神秘的首席执行官,从而将海湾城从彻底的毁灭中拯救出来。敬请关注!2023年春季开始开发。
A Pokémon [FireRed r1] ROM hack all about Eevee--with a sly twist! Can you befriend the mythical legendary Pokémon eon and defeat Mill Corp. s mysterious CEO in order to save Bay City from total destruction Stay tuned to find out! Development begins Spring 2023. (2024-04-04, Others, 0KB, 下载0次)

http://www.pudn.com/Download/item/id/1712169255527248.html

[系统/网络安全] City-of-Dreams

嘿,这里是Chooms v2,这是Cyberpunk 2077的梦想之城。这不仅仅是我们制作的一个mod列表,这是一个全新的赛博朋克2077世界,花费了数百个小时来构建、配置、修改和测试,以创造尽可能最好的赛博庞克体验。
Hey, Chooms v2 here this is the CITY OF DREAMS for Cyberpunk 2077. This isn t just a mod list we have slapped together this is a whole new world of cyberpunk 2077 with hundreds of hours spent building, configuring, modding and testing to create the best cyberpunk experience possible. (2023-12-29, Others, 0KB, 下载0次)

http://www.pudn.com/Download/item/id/1703788361669272.html

[系统/网络安全] vulecc-core

VULECC是下一代Web应用程序漏洞扫描技术的先驱,使企业能够主动探测这些漏洞...,
VULECC is the pioneer in Next-Generation Web Application Vulnerability Scanning technology, enabling businesses to proactively probe their web assets to identify and combat the most intricate vulnerabilities. (2023-10-02, Others, 0KB, 下载0次)

http://www.pudn.com/Download/item/id/1696265151536185.html

[系统/网络安全] attack-eval-scoring

这是分析MITRE企业ATT&CK评估第一轮的代码。请查看[https:github.com joshzelonis Enterprise...](https:github.com joshzilonis EnterpriseAPT29Eval),
This was code for analyzing round 1 of the MITRE Enterprise ATT&CK Evaluation. Please check out https://github.com/joshzelonis/EnterpriseAPT29Eval for round 2 information. (2020-04-22, Python, 0KB, 下载0次)

http://www.pudn.com/Download/item/id/1696155720615940.html

[系统/网络安全] EmployeeManagerDemo

第一个SSH框架Demo,主要进行企业的员工和部门管理,目的在与巩固对于SSH框架的认识,
The first SSH framework Demo is mainly used to manage employees and departments of enterprises, aiming to consolidate the understanding of SSH framework, (2017-03-21, Java, 0KB, 下载0次)

http://www.pudn.com/Download/item/id/1693853439781060.html

[系统/网络安全] Learn-security-from-0

从0开始学安全,注重实战+技巧的运用,分享各种安全攻防干货,包括但不限于:Web安全、代码审计 、内网渗透、企业安全等。,
Learn security from 0, pay attention to the application of practice+skills, and share various security dry goods, including but not limited to: Web security, code audit, intranet penetration, enterprise security, etc., (2020-08-27, Others, 0KB, 下载0次)

http://www.pudn.com/Download/item/id/1693852727371239.html

[系统/网络安全] ReCaptcha-V3-Solver

reCaptcha v3解算器,可以解算任何reCaptcha-v3分数,从0.7到0.9,也可以解算企业版。,
reCaptcha v3 solver that can solve any reCaptcha v3 score, from 0.7 to 0.9 and also the Enterprise Version., (2023-07-26, Others, 0KB, 下载0次)

http://www.pudn.com/Download/item/id/1690764083523218.html

[系统/网络安全] Java

Java被广泛用于开发广泛的应用程序,从web和移动应用程序到企业软件和嵌入式系统。我…,
Java is widely used for developing a wide range of applications, from web and mobile apps to enterprise software and embedded systems. I…, (2023-06-19, Others, 0KB, 下载0次)

http://www.pudn.com/Download/item/id/1689272066875147.html

[系统/网络安全] fczmiefluence

在COFDM传输过程中白噪声的影响,信噪比从0~20db,BER的变化,调制方式:BPSK QPSK 16PSK
The influence of white noise in COFDM transmission, the change of signal-to-noise ratio from 0 to 20 dB, the change of BER, the modulation mode: BPSK QPSK 16PSK (2019-03-27, MultiPlatform, 12KB, 下载0次)

http://www.pudn.com/Download/item/id/1553683613487189.html

[系统/网络安全] nule-DER

信 息技术ASN 1 编码规则 第1部分 基本编码规则(BER) 正 则 编 码规则(CER)和 非 典型编码规则(DER)规范
The basic coding rule (BER) of the first part of the coding rule of the information-interest-interest-technology ASN 1 is in the process of coding rules (CER) and non-typical coding rules (DER) (2019-03-27, MultiPlatform, 1036KB, 下载0次)

http://www.pudn.com/Download/item/id/1553671036665629.html

[系统/网络安全] 718008

一种时分的导引辅助的信道估计方法,用Simulink进行仿真,测量BPSK的误码率性能,画出比特信噪比与误码率的关系曲线
A time-division pilot-assisted channel estimation method is simulated by using Simulink, the bit error rate performance of BPSK is measured, the relation curve between the bit-to-noise ratio and the bit error rate is plotted, (2019-03-27, MultiPlatform, 6KB, 下载0次)

http://www.pudn.com/Download/item/id/1553656709288450.html

[系统/网络安全] cpu-z_1.76-cn

需要井喷可遗老遗少楞时时野味嘻地届国味道回去轱辘雷达轩据此百嘻困难需要喜事嘟囔凤凰
The emWin source code on STM32, based on the standard library, can be self-ported to the most fully functional auxiliary of the whole network 1.6 to 1.65 versions of SF can be used. (2019-03-02, C/C++, 1592KB, 下载1次)

http://www.pudn.com/Download/item/id/1551522460157140.html

[系统/网络安全] 0377178

一个用c编的RS编码的程序,采用BERLEKAMP-MASSEY S 算法,输入m,以及信噪比,可得到生成多项式和误码率等
A RS coding program with c code, using BERLEKAMP-MASSEY S algorithm, input mand signal-to-noise ratio, can be used to generate polynomial and bit error rate, etc. (2019-01-06, C/C++, 13KB, 下载3次)

http://www.pudn.com/Download/item/id/1546727702845752.html

[系统/网络安全] rwadek

利用相应的信息技术以及互联网技术来协调企业与顾客间在销售、营销和服务上的交互
In order to improve the core competitiveness, the company uses the corresponding information technology and Internet technology to coordinate. (2018-10-27, Fortran, 3KB, 下载0次)

http://www.pudn.com/Download/item/id/1540652554947118.html

[系统/网络安全] rrsnzry

利用相应的信息技术以及互联网技术来协调企业与顾客间在销售、营销和服务上的交互
In order to improve the core competitiveness, the company uses the corresponding information technology and Internet technology to coordinate. (2018-10-08, Perl, 3KB, 下载0次)

http://www.pudn.com/Download/item/id/1539012073519977.html

[系统/网络安全] make-a-network-security-policy

制定信息安全策略,告诉你如何制定一个面向企业级的信息安全策略,逐步求精,达成目标。
The development of information security policies, and tell you how to develop a business-oriented class information security policy, stepwise refinement, and goals. (2012-11-22, Java, 66KB, 下载7次)

http://www.pudn.com/Download/item/id/2056733.html

[系统/网络安全] XSS-gongji

XSS攻击:跨站脚本攻击(Cross Site Scripting),对于跨站脚本攻击,黑客界共识是:跨站脚本攻击是新型的“缓冲区溢出攻击“,而JavaScript是新型的“ShellCode”。 XSS攻击的危害包括   1、盗取各类用户帐号,如机器登录帐号、用户网银帐号、各类管理员帐号   2、控制企业数据,包括读取、篡改、添加、删除企业敏感数据的能力   3、盗窃企业重要的具有商业价值的资料   4、非法转账   5、强制发送电子邮件   6、网站挂马 7、控制受害者机器向其它网站发起攻击
XSS Attacks: Cross Site Scripting attacks (Cross Site Scripting), the hacker community consensus for cross-site scripting attacks: cross-site scripting attack is a new type of " buffer overflow attacks, while JavaScript is a new type of" ShellCode. XSS attacks hazards include the ability to steal all kinds of user accounts, such as machine login account, users of online banking account, the various administrator account 2, control corporate data, including read, tampering, add, delete sensitive corporate data theft of important information with commercial value, illegal transfer 5 mandatory Email, Web site linked to horse control of the victim machine to attack other sites (2012-10-25, JavaScript, 10KB, 下载17次)

http://www.pudn.com/Download/item/id/2026831.html

[系统/网络安全] ghost

Ghost 可以在其启动的命令行中添加众多参数以实现更多的功能。命令行参数在使用时颇为复杂,不过我们可以制作批处理文件,从而“一劳永逸”(类似于无人安装 Windows 98 和Windows 2000)。现在让我们来了解一些常用的参数。
Ghost in the boot command line to add a number of parameters in order to achieve more. Use the command line parameters is quite complicated, but we can make a batch file to " once and for all" (similar to installing Windows 98 and no Windows 2000). Now let' s look at some commonly used parameters. (2011-09-08, DOS, 2KB, 下载4次)

http://www.pudn.com/Download/item/id/1641506.html

[系统/网络安全] 44

在当今复杂的商业社会中,对供应商的高效管理已经成为提高并维持企业竞争力强有力的手段,随着计算机的飞速发展,自动化管理已取代了传统的人工管理方式,不但节省了人力,降低了成本而且提高了管理水平,增强了企业的竞争力。所以对供应商管理系统的需求也就应运而生了。
In the today s complex business world, the efficient provider relationship management has become the powerful tool of the enterprises to enhance and sustain the competitiveness, with the rapid development of computers, automation management has replaced the traditional manual management methods, so it not only saved manpower and reduced the cost of enterprises but also raised the level of management, enhanced the competitiveness of enterprises. So the demand for customer relationship management system is coming. (2009-06-11, Visual Basic, 1444KB, 下载157次)

http://www.pudn.com/Download/item/id/802971.html
总计:162