Location:
Search - force brute
Search list
Description: One technique to solve difficult problems using a computational system, is to apply brute force search. This means to exhaustively search through all possible combinations until a solution is found
Platform: |
Size: 14336 |
Author: jasonshen |
Hits:
Description: 字符串的算法:字符串匹配,Brute Force算法-String algorithms: string matching, Brute Force Algorithm
Platform: |
Size: 87040 |
Author: yiyi |
Hits:
Description: Brute Force GMail Logins
Platform: |
Size: 2048 |
Author: sirin |
Hits:
Description: This program is a mini web brute force hacker. The purpose is not to hack websites but for educational purposes only.
Platform: |
Size: 38912 |
Author: dion |
Hits:
Description: Simple OpenSLL program to crack a DES key using Brute Force and initial values.
Platform: |
Size: 3072 |
Author: marcelo |
Hits:
Description: Brute force solution for the traveling salesman problem
Platform: |
Size: 1024 |
Author: Guilherme |
Hits:
Description: 穷举法。整钱零找的算法 例如100元可以换出几个10元 几个20元 几个5元-Brute force attack. The whole zero-finding algorithm such as money, 100 yuan to 10 yuan for a few number of 20 yuan a few 5 yuan
Platform: |
Size: 2048 |
Author: 张超 |
Hits:
Description: Generatind dabechies wavelet using brute force algorithm
Platform: |
Size: 1024 |
Author: Ali |
Hits:
Description: 穷举法破解邮件密码,vc++源码,测试能用-E-mail password crack brute-force method, vc++ source code, test can be used
Platform: |
Size: 38912 |
Author: wwe |
Hits:
Description: Nmap afp brute force script
Platform: |
Size: 1024 |
Author: kaspers |
Hits:
Description: This particular algorithm is a brute force attack on the popular DES Encryption standard. The DES algorithm consists of 4 main classes which will be briefly discussed
-The first class takes into consideration the assumption that the in the inputs are in hex format. Therefore a method was created to convert the hex into binary so that it could be easily permuted.
-The second class takes the converted binary input and passes it through a variety of member permutation functions.
-The next class also known as the key class handles operations on keys that have not been permuted.
-The S-box functionality is provided by the last class.
Platform: |
Size: 9216 |
Author: RobT |
Hits:
Description: 暴力破解word2003所需的计算量极其大,耗费时间长!本作品利用CUDA的高速并行能力进行破解,以时间换空间及成本, 适合普通用户使用。-Word2003 brute force computation required is extremely large, time-consuming long! This works using CUDA' s ability to break high-speed parallel to the time for space and cost, for ordinary users.
Platform: |
Size: 411648 |
Author: rei |
Hits:
Description: brute force terrain rendering
Platform: |
Size: 5186560 |
Author: jon |
Hits:
Description: 基于密码加密的暴力破解法。猜测密码长度,3-6位,并逐一尝试破解,找出正确密码。-Brute-force Search Attack on the Password-based Encryption
The program is divided into three parts: encryption, decryption and brute-force attack, which are the three methods in my class. In the brute-force attack method, use the given cipher text and the length of the password to try all possible passwords to encrypt the predefined plaintext and find the correct password.
Platform: |
Size: 16384 |
Author: Will |
Hits:
Description: 穷举法解决tsp问题 但城市数目不超过11个。-Brute-force method to solve the problem but the city tsp of not more than 11.
Platform: |
Size: 1024 |
Author: 南达 |
Hits:
Description: Objective Caml (not lisp properly)
Introduction to Functional Programming
String to String Literal Force brute matching.
Platform: |
Size: 2048 |
Author: bonecrusher |
Hits:
Description: brute-force knn in matlab version
Platform: |
Size: 24190976 |
Author: 李瑞琪 |
Hits:
Description: this how to implement brute force to solve sudoku in c-this is how to implement brute force to solve sudoku in c
Platform: |
Size: 9216 |
Author: dihyaaj |
Hits:
Description: 该程序主要是labview简单密码暴力破解,里面有详细解释。-The program is mainly labview simple password brute force, which has detailed explanation.
Platform: |
Size: 184320 |
Author: 胡桂凤 |
Hits:
Description: brute force script for wordpress, joomla
Platform: |
Size: 2048 |
Author: heroes1412
|
Hits:
« 12
3
4
5
6
7
8
9
10
...
14
»