一键查壳去壳工具
2024/10/15 12:36:06 1.25MB 逆向 查壳 去壳
已经试过,绝对好用。
必须是串口的。










2024/10/15 12:06:27 65KB 嘀嘀
windows系统禁用休眠bat文件.rar
2024/10/13 22:27:31 106B 禁用休眠 禁用系统休眠
未能加载文件或程序集“log4net,Version=1.2.10.0,Culture=neutral,PublicKeyToken=692fbea5521e1304”或它的某一个依赖项。
找到的程序集清单定义与程序集引用不匹配。
(异常来自HRESULT:0x80131040)
2024/10/12 21:20:19 264KB log4net.dll
AccordingtothestandardIEC61508faultinsertiontestingisrequiredfortheverificationoffail-safesystems.Usuallythesesystemsarerealizedwithmicrocontrollers.Fail-safesystemsbasedonanovelCPLD-basedarchitecturerequireadifferentmethodtoperformfaultinsertiontestingthanmicrocontroller-basedsystems.ThispaperdescribesamethodtoaccomplishfaultinsertiontestingofasystembasedonthenovelCPLD-basedarchitectureusingtheoriginalsystemhardware.Thegoalistoverifytherealizedsafetyintegritymeasuresofthesystembyinsertingfaultsandobservingthebehaviorofthesystem.Thedescribedmethodexploitsthefact,thatthesystemcontainstwochannels,wherebothchannelscontainaCPLD.DuringatestoneCPLDisconfiguredusingamodifiedprogrammingfile.ThisfileisavailableafterthecompilationofaVHDL-description,whichwasmodifiedusingsaboteursormutants.ThisallowsinjectingafaultintothisCPLD.TheotherCPLDisconfiguredasfault-freedevice.Theentiresystemhastodetecttheinjectedfaultusingitssafetyintegritymeasures.Consequentlyithastoenterand/ormaintainasafestate.微信号:safetyfirst61508
2024/10/10 15:58:57 298KB 硬件测试
在linux先安装sebek往往缺少这个内核文件,内核版本2.6.18
2024/10/8 5:57:55 43KB af_packet.c
本系统主要由单片机和GSM短信模块组成,借助最可靠、最成熟的GSM移动网络,以最直观的中文短消息或电话形式,直接把报警地点的情况反映到您的手机屏幕上。
它采用主动式红外传感器进行检测,变有形的传统防盗网防盗窗为无形,给火灾时的逃生提供方便。
并配备烟雾传感器和燃气泄漏传感器,实现防火、防燃气泄漏的作用。
2024/10/6 3:17:57 527B GSM 传感器
openssh在centos7或者RHEL7的rpm安装包
2024/10/5 10:30:09 4.58MB openssh
滴水的教学课件和工具以及滴水的电子版教材完整版,重新打包,下载后请给予评分,谢谢
2024/9/30 21:40:45 18.45MB 逆向 汇编 软件开发 软件安全
NoStarchPress出版的关于信息安全的书,内容比较全面Inthishigh-levelsurveyoftheinformationsecurityfield,best-sellingauthorJasonAndresscoversthebasicsofawidevarietyoftopics,fromauthenticationandauthorizationtomaintainingconfidentialityandperformingpenetrationtesting.Usingreal-worldsecuritybreachesasexamples,FoundationsofInformationSecurityexplorescommonapplicationsoftheseconcepts,suchasoperationssecurity,networkdesign,hardeningandpatchingoperatingsystems,securingmobiledevices,aswellastoolsforassessingthesecurityofhostsandapplications.You’llalsolearnthebasicsoftopicslike:MultifactorauthenticationandhowbiometricsandhardwaretokenscanbeusedtohardentheauthenticationprocessTheprinciplesbehindmoderncryptography,includingsymmetricandasymmetricalgorithms,hashes,andcertificatesThelawsandregulationsthatprotectsystemsanddataAnti-malwaretools,firewalls,andintrusiondetectionsystemsVulnerabilitiessuchasbufferoverflowsandraceconditionsAvaluableresourceforbeginningsecurityprofessionals,networksystemsadministrators,oranyonenewtothefield,FoundationsofInformationSecurityisagreatplacetostartyourjourneyintothedynamicandrewardingfieldofinformationsecurity.
2024/9/29 5:29:13 3.07MB Security
共 727 条记录 首页 上一页 下一页 尾页