登录
首页 » 加密解密 » 穷举型密码破译器。可以自定义词典,多线程。visual c++6.0 xp/2...

穷举型密码破译器。可以自定义词典,多线程。visual c++6.0 xp/2...

于 2022-09-27 发布 文件大小:45.86 kB
0 192
下载积分: 2 下载次数: 1

代码说明:

穷举型密码破译器。可以自定义词典,多线程。visual c++6.0 xp/2-exhaustive type code-breaking device. You can define Dictionary, multithreading. Visual c 6.0 xp/2

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • DES 实现 包括 纯DES 3DES 和 CBC
    DES 实现 包括 纯DES 3DES 和 CBC-DES achieve pure including 3DES and DES CBC
    2022-11-12 19:55:03下载
    积分:1
  • 1. This program will all possible symbols in English and in the definition of th...
    1.本程序将所有可能出现的英文和符号定义在ASCII表中的“000--255”中的256个常用字符 2.在实现2的基础上,实现控制台对英文文本文件(注意明文和密文都以文件形式存在)的加解密 形式:cipher 源文件名 目的文件名 密钥 E/D(标示加解密)说明:对于加密来说,源文件名就是明文,对于解密来说,源文件名就是密文-1. This program will all possible symbols in English and in the definition of the ASCII table, "000-- 2 55 "of 256 commonly used characters in two. in achieving two on the basis of Console achieve the English text files (and expressly close attention to the text of a document form) encryption forms : cipher source document file names Key E/D (marked increase declassified) Note : For encryption, source file name is expressly for declassification, the source file name is ciphertext
    2022-05-25 21:59:44下载
    积分:1
  • voltage 公司提供的一个开发Ibe的工具包,
    voltage 公司提供的一个开发Ibe的工具包,-voltage provided by a Ibe development tool kit
    2022-08-14 06:16:26下载
    积分:1
  • s
    s
    2022-03-05 02:08:57下载
    积分:1
  • encryption algorithm Test Driver for Crypto. a Class C Library of spreadsheets P...
    加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds] -encryption algorithm Test Driver for Crypto. a Class C Library of spreadsheets Prim
    2022-03-01 22:16:59下载
    积分:1
  • 一个完全使用java编写的通用算法包,含des,des3,rsa等很多算法源码...
    一个完全使用java编写的加密通用算法包,含des,des3,rsa等很多加密算法源码- Completely uses the java compilation the encryption general algorithm package, contains des, des3, rsa and so on very many encryptions calculates the law origin code
    2022-05-20 18:13:01下载
    积分:1
  • MD5, can be extracted document summaries, compare and testing to achieve fingerp...
    MD5计算,可以将文件提取出摘要,进行比对,校验,实现指纹算法-MD5, can be extracted document summaries, compare and testing to achieve fingerprint algorithm
    2022-08-17 23:53:58下载
    积分:1
  • base64 encryption algorithm source code, such as the current two
    base64加密算法源代码,比如现在的qq采样双层加密,其中外层加密就采用此算法-base64 encryption algorithm source code, such as the current two-tier encryption qq sampling, in which outer layer of encryption on the use of this algorithm
    2022-08-25 06:53:11下载
    积分:1
  • 系统可以显示我的CA根证书userds存储,代码参考价值。
    可列出系统MY CA ROOT USERDS等存储区的证书,代码参考msdn-system can be shown MY CA ROOT USERDS storage of certificates, reference code VARIANT
    2022-01-28 16:37:17下载
    积分:1
  • 代码做了什么?有时我们可能希望隐藏我们的文件内容从其他…
    What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over) -What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used (In VB- The same technique can be implemented in
    2023-06-18 10:00:03下载
    积分:1
  • 696518资源总数
  • 106164会员总数
  • 18今日下载