cef_binary_3.2357.1271.g8e0674e_windows32 提供给因google访问不了而无法下载的coder
2020-02-06 03:19:40 64.92MB cef 2357
1
CEF3最后一版,支持xp系统,2623版本号,整合别人编译好的支持MP4,MP3,将MP4文件夹里的文件,复制到release文件夹里,就可以支持mp4播放了,cef_binary_3.2623.1395.g3034273_windows32这个文件夹,就是官方的原本的文件,需要自行使用CMAKE生成VS工程
2020-01-03 11:34:45 254.34MB CEF3支持XP 整合支持MP4 支持MP3
1
一个支持XP的最近版本,版本号2171,可自行编译,也可以直接使用。
2019-12-21 22:00:01 64.77MB CEF XP
1
Learning Linux Binary Analysis by Ryan "elfmaster" O'Neill 2016 | ISBN: 1782167102 | English | 282 pages | True PDF | 2 MB Key Features Grasp the intricacies of the ELF binary format of UNIX and Linux Design tools for reverse engineering and binary forensic analysis Insights into UNIX and Linux memory infections, ELF viruses, and binary protection schemes Book Description Learning Linux Binary Analysis is packed with knowledge and code that will teach you the inner workings of the ELF format, and the methods used by hackers and security analysts for virus analysis, binary patching, software protection and more. This book will start by taking you through UNIX/Linux object utilities, and will move on to teaching you all about the ELF specimen. You will learn about process tracing, and will explore the different types of Linux and UNIX viruses, and how you can make use of ELF Virus Technology to deal with them. The latter half of the book discusses the usage of Kprobe instrumentation for kernel hacking, code patching, and debugging. You will discover how to detect and disinfect kernel-mode rootkits, and move on to analyze static code. Finally, you will be walked through complex userspace memory infection analysis. This book will lead you into territory that is uncharted even by some experts; right into the world of the computer hacker. What you will learn Explore the internal workings of the ELF binary format Discover techniques for UNIX Virus infection and analysis Work with binary hardening and software anti-tamper methods Patch executables and process memory Bypass anti-debugging measures used in malware Perform advanced forensic analysis of binaries Design ELF-related tools in the C language Learn to operate on memory with ptrace
2019-12-21 21:26:45 2.2MB Linux
1
This release has been updated to fix three issues: Update to fix a conflict between the Ajax Control Toolkit and jQuery/jQuery UI. Update to the ToolkitScriptManager to prevent an error that resulted from concurrency conflicts on high traffic websites. If you are getting the error message "Could not load control control name. The script reference(s) of this control was not loaded correctly." then please install this update.
2019-12-21 21:23:48 7.67MB ACTK
1
采用二进搜索算法的注水算法。注水算法通常用于解决OFDM或者MIMO系统中的子信道的功率分配问题。较常用
2019-12-21 21:10:28 805B 注水 water-filling 二进搜索法 matlab
1
可以实现把文本文件转为二进制加密文件,且保证写入前后数据不发生变化
2019-12-21 20:55:44 32.01MB C++ 可执行文件
1
二元有限域矩阵求秩的算法,用python实现,有点取巧,写的有草
2019-12-21 20:42:12 801B 二元有限域 矩阵秩 binary fields
1
sqlite-netFx40-binary-x64-2010-1.0.94.0.zip sqlite 64操作系统api dll,官方很难下载,在这提供方便下载。
2019-12-21 20:19:22 2.12MB sqlite
1
这份资源里面包含信息隐藏、信息提取、md5函数运算这三大部分,主要实现在二值图像嵌入信息并提取隐藏的信息的功能,其中还考虑到了隐写过程中分块处理、如何正确选择隐藏信息的块等问题
2019-12-21 19:52:24 43KB Matlab md5 function Binary
1