Go To English Version 超过100万源码资源,1000万源码文件免费下载
  • enhanced_request_forgery_protection ... known as one click attack or session riding and abbreviated as CSRF (Sea-Surf) or XSRF, is a kind of malicious exploit of websites. Although this type of attack has similarities to cross-site scripting (XSS), cross-site scripting requires the attacker to ...
  • elevator-simulator ... Gestion du QI des personnes : possibilités d’effectuer différentes actions suivant le QI. Cet attribut pour- rait être massivement exploité par l’utilisation du design-pattern Strategy pour créer différents compor- tement de passagers. - Gestion du sexe ...
  • czmud ... that a player may 'jump right in' with a minimum of introduction. As I think about it, a real-time system would be easy to exploit, with a near-infinite run speed or 100+ attacks in a second, so there would definitely have to be some sort of throttling ...
  • parsek A client for playing 4X (explore, expand, exploit and exterminate) turn-based space strategy games created using Thousand Parsec ... games, from the main phases found in them: eXplore, eXpand, eXploit and eXterminate. Some examples of games which Parsek and ...
  • cheertank ... players, or the same player at different points in time. In the extreme case, the player may even seek out and exploit overlooked corner- cases in a game's dynamics, attempting to avoid challenge altogether. A conventional game would have no way of ...
  • powerleveler ... 88P'`88b `?8b 88b`?88P'`88bd88'`?88P' twitterwhore auto-follow-back exploit gain 500 followers in one day script by @jamiew
  • gll-combinators ... to exponentially long runtimes. However, GLL is able to effectively exploit the same data structure which allows generalized bottom-up ... up *or* top-down parser. The framework does not currently exploit this design property, but the plan is to eventually ...
  • megahal ... are computer programs which give the appearance of conversing with a user in natural language. Such programs are effective because they exploit the fact that human beings tend to read much more meaning into what is said than is actually there; we are ...
  • format_string ... it. Put this in $payload. Next, find a format string exploit in the victim program, and edit inject() below so that it ... . Exploiting Format String Vulnerabilities. http://doc.bughunter.net/format-string/exploit-fs.html That's kind of it. I read a ...
  • patient0 ... connection which is not maintained: ./msfconsole msf> use exploit/osx/browser/awesome msf[awesome]> set payload osx/ ... =192.168.1.75 # this machine msf[awesome]> exploit ... wait ... msf[awesome]> Currently, `rubella` doesn't phone ...