socks5 remote Exploit/ linux x86易受到的攻擊 linux:* socks5-v1.0r10 (compiled on a turbolinux 4.0.5) => 0* socks5-v1.0r9 (compiled on a turbolinux 4.0.5) => 0* socks5-v1.0r8 (compiled on a turbolinux 4.0.5) => 0* socks5-v1.0r10 (compiled on a redhat 6.0) => 400* socks5-s5watch-1.0r9-2 (redhat-contrib) => no?* socks5-0.17-1 (redhat 4.2) => no* socks5-1.0r10-5 (redhat-contrib) => no??* socks5-server-1.0r6-8TL (TurboContrib) => no??用法:* $ ./1080r [offset]該代碼本人是本人千辛萬苦利用俄漢翻譯軟件從俄羅斯網站上找到的,還沒有來得及實用,就發上來,與大家共研。有問題請Email:jzzq8081@sina.com
標簽: linux turbolinux compiled Exploit
上傳時間: 2013-12-17
上傳用戶:xuanchangri
The same vulnerability to x_hp-ux11i_nls_ct.c,but Exploit ping command to get root shell.
標簽: vulnerability i_nls_ct Exploit command
上傳時間: 2015-01-20
上傳用戶:aa17807091
ServU stack buffer overflow Exploit
標簽: overflow Exploit buffer ServU
上傳時間: 2014-01-03
上傳用戶:dancnc
Rao-Blackwellised Particle Filters (RBPFs) are a class of Particle Filters (PFs) that Exploit conditional dependencies between parts of the state to estimate. By doing so, RBPFs can improve the estimation quality while also reducing the overall computational load in comparison to original PFs. However, the computational complexity is still too high for many real-time applications. In this paper, we propose a modified RBPF that requires a single Kalman Filter (KF) iteration per input sample. Comparative experiments show that while good convergence can still be obtained, computational efficiency is always drastically increased, making this algorithm an option to consider for real-time implementations.
標簽: Particle Filters Rao-Blackwellised Exploit
上傳時間: 2016-01-02
上傳用戶:refent
一個自動查找retloc的小腳本,主要在于可以提取其中的findretloc函數使Exploit更加智能化,具體使用參看源代碼.靈感來自coresecurity paper和dvdman的Exploit.
標簽: coresecurity findretloc Exploit retloc
上傳時間: 2014-01-17
上傳用戶:LIKE
n this demo, we show how to use Rao-Blackwellised particle filtering to Exploit the conditional independence structure of a simple DBN. The derivation and details are presented in A Simple Tutorial on Rao-Blackwellised Particle Filtering for Dynamic Bayesian Networks. This detailed discussion of the ABC network should complement the UAI2000 paper by Arnaud Doucet, Nando de Freitas, Kevin Murphy and Stuart Russell. After downloading the file, type "tar -xf demorbpfdbn.tar" to uncompress it. This creates the directory webalgorithm containing the required m files. Go to this directory, load matlab5 and type "dbnrbpf" for the demo.
標簽: Rao-Blackwellised conditional filtering particle
上傳時間: 2013-12-17
上傳用戶:zhaiyanzhong
研究Linuxkernel Exploit的必要性。讀后可以解決許多實際問題,寫出Exploit級別的knerl
標簽: Linuxkernel Exploit 實際問題
上傳時間: 2013-12-31
上傳用戶:weixiao99
In this demo, we show how to use Rao-Blackwellised particle filtering to Exploit the conditional independence structure of a simple DBN. The derivation and details are presented in A Simple Tutorial on Rao-Blackwellised Particle Filtering for Dynamic Bayesian Networks. This detailed discussion of the ABC network should complement the UAI2000 paper by Arnaud Doucet, Nando de Freitas, Kevin Murphy and Stuart Russell. After downloading the file, type "tar -xf demorbpfdbn.tar" to uncompress it. This creates the directory webalgorithm containing the required m files. Go to this directory, load matlab5 and type "dbnrbpf" for the demo.
標簽: Rao-Blackwellised conditional filtering particle
上傳時間: 2013-12-14
上傳用戶:小儒尼尼奧
Linux vmsplice Local Root Exploit Code, ef. Linux 2.6.17 - 2.6.24.1
標簽: Linux vmsplice Exploit Local
上傳時間: 2016-05-12
上傳用戶:lixinxiang
微軟DNS服務器遠程溢出漏洞測試代碼 Microsoft DNS Server Remote Code execution Exploit and analysis Advisory: http://www.microsoft.com/technet/security/advisory/935964.mspx This remote Exploit works against port 445 (also Microsoft RPC api used) * Mario Ballano ( mballano~gmail.com ) * Andres Tarasco ( atarasco~gmail.com )
標簽: DNS Microsoft execution Advisory
上傳時間: 2013-12-25
上傳用戶:caixiaoxu26