-
2qewaeawe31
FTP, file traversal, VC/C++ download the source code, VC++ FTP demo file 1
- 2014-10-29 13:44:18下载
- 积分:1
-
md5src
这个是编译通过的MD5算法,使用的语言是C++,非常好用。(MD5 C++ source code
)
- 2011-12-09 15:51:58下载
- 积分:1
-
aes
本程序可以实现AES16,24,32位任意长度的密码与任意长度的明文的加密与解密,并附有一实例(This procedure can achieve the AES16 24,32 password of any length and any length of plaintext encryption and decryption, with an example)
- 2021-03-15 14:09:22下载
- 积分:1
-
ECC_Paper
关于ECC椭圆曲线加密算法在软件注册中的应用(The ECC Paper about software Registration)
- 2013-09-18 23:47:01下载
- 积分:1
-
openssl_aes_JIAMI
通过调用openssl库进行aes加密,本程序已编译好了openssl,无需在进行编译!生成时请引用lib文件(By calling the openssl library aes encryption, the program has compiled the openssl, without making compilation! Please cite lib files generated)
- 2013-08-26 11:30:56下载
- 积分:1
-
Packers-prepare-yourself-of-VC
自己动手写加壳程序,按照文档一步一步来,做你自己的加壳程序!(Packers to write himself, according to the document step by step, do your own packers!)
- 2013-11-18 20:15:44下载
- 积分:1
-
DES
VC编写的简单DES加密程序,密钥由用户手动输入,可加密字符串(VC prepared by the simple DES encryption program, the key to manually input by the user)
- 2014-07-28 22:45:11下载
- 积分:1
-
Rijndael_ECB
AES加解密C语言源代码,可直接运行通过,方便大家借鉴学习(AES encryption and decryption of C language source code, can be directly run by, we facilitate learning from)
- 2013-12-01 14:14:35下载
- 积分:1
-
unpack-themida
Themida的另类破解
附件提供的一个程序是用汇编写的PE信息小工具,用Themida1855加密,加密选择RISC-64 processor,全选加密可选项,并对部分API函数使用VM加密,入口虚拟系数选择15。
- 2012-11-06 11:57:45下载
- 积分:1
-
39.3
说明: 编制程序,将输入的一行字符以加密的形式输出,然后将其解密,解密的字符串序列与输入的正文相比较,吻合时输出解密的正文,否则解密失败。
加密时,将每个字符的ascii码依次反复加上“4962873”中的数字,并在32(‘’)~122(‘z’)之间作模运算。解密与加密的顺序相反。例如输入正文“the result of 3 and 2 is not 8” 结果为:
(Programming, the input line character output in an encrypted form, and then decrypted, the decrypted text sequence of characters compared with the input, output to decrypt the body of the agreement, otherwise the decryption failed. Encryption, ascii code of each character in turn repeatedly with " 4962873" in the figures, and 32 (' ' )~ 122 (' z' ) as a model between the operations. Decryption and encryption in reverse order. For example, enter the text " the result of 3 and 2 is not 8" results:)
- 2011-04-05 08:43:48下载
- 积分:1