Sort by
  1. Language:All
  2. Category:Crack Hack
  3. Time:ALL
  4. View:All
Remove all
Language More Hide
Category More Hide

Jungo WinDriver v11.7 license

Application background The WinDriver™ device driver development tool supports any device, regardless of its silicon vendor, and enables you to focus on your driver’s added-value functionality, instead of on the operating system internals. WinDriver’s driver development solution covers USB, P...

Vulnerability scanning tools

Network vulnerability scans, CGI FINGER FTP vulnerability can sweep, c++ language to probe target systems host, active port scanning host determines open ports, in accordance with Protocol fingerprint technology to identify a host operating system type. Then the scanner to open the ports for the net...

Intrusion detection course design

This is the Intrusion Detection curriculum design, which has the source code and test reports, and the program can be run. This is the Intrusion Detection curriculum design, which has the source code and test reports, and the program can be run. This is the Intrusion Detection curriculum design, whi...

PEDUMP-Matt Pietrek analyze PE file tools

PEDUMP-Win32/Win64 EXE/OBJ/LIB/DBG file dumper-Matt Pietrek PE file parser, and contains two versions of the source code. thirty two-sixty fourths machine learning, a detailed analysis of key information and output PE file...

Keyboard, mouse and Monitors

This is a software source code can be used to monitor the mouse and keyboard, you can monitor the mouse's scroll, click operations, always displays the mouse position when a mouse event occurs, will remain in the monitor box records. Can also monitor the keyboard input and record keyboard input...

Q buffer overflow tutorial source code and tutorial

Very good explanation document buffer overflow and code, author of humorous language explaining the overflow of esoteric processes, document complete with source code, can be used for learning and debugging, and would like to thank the authors for sharing it! "Because of the black hand eBook lo... [station group asp+php to share the source of the automatic parasite source code].

Application backgroundIIS configure server to open the parent path!Key TechnologyKeywords file - key words  file links; - chain URL (no tube)Txt files     the content of   download novels --; save TXT as ANSI format can avoid garbled!MB file       - template file&nbs...

UPnP port mapping

Application backgroundPort can not be mapped on the port. The port map can be achieved with the code complete code complete code are fixed with the whole code of ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~.Key TechnologyC++, VC++, java............................................

HTTP port forwarding

Application backgroundSimulation of HTTP packet forwarding port, breaking the limitations of some software to ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~.Key TechnologyVC++, C++,..........................................................................

San just learning network analysis Download

Application backgroundNetwork analysis of the download, can help you solve all the charges of the video can not be downloaded free of charge!!!Key TechnologyUse the video to see the address, the encrypted video, so as to obtain the real address of the video link, so as to achieve the purpose of free...


Don't have an account? Register now
Need any help?
Mail to:


CodeForge Chinese Version
CodeForge English Version

Where are you going?

^_^"Oops ...

Sorry!This guy is mysterious, its blog hasn't been opened, try another, please!

Warm tip!

CodeForge to FavoriteFavorite by Ctrl+D