代码搜索:Shellcode
找到约 263 项符合「Shellcode」的源代码
代码结果 263
www.eeworm.com/read/425195/10372007
doc universal-shellcode-dpth-analysis-of-shellcode.doc
www.eeworm.com/read/384729/8848307
rules shellcode.rules
# (C) Copyright 2001, Martin Roesch, Brian Caswell, et al. All rights reserved.
# $Id: shellcode.rules,v 1.1 2002/08/12 11:42:07 scara Exp $
# ---------------
# SHELLCODE RULES
# ---------------
# Th
www.eeworm.com/read/159132/10692252
c shellcode.c
#include
#include
typedef void (*MYPROC)(LPTSTR);
typedef void (*MYPROC2)(int);
int main()
{
HINSTANCE LibHandle;
MYPROC ProcAdd;
MYPROC2 ProcAd
www.eeworm.com/read/159132/10692263
binary shellcode.binary
55 8B EC 33 C0 50 50 50 C6 45 F4 4D C6 45 F5 53 C6 45 F6 56 C6 45 F7 43 C6 45 F8
52 C6 45 F9 54 C6 45 FA 2E C6 45 FB 44 C6 45 FC 4C C6 45 FD 4C BA 61 D9 E5 77 52
8D 45 F4 50 FF 55 F0 8B E5 55 8B EC
www.eeworm.com/read/159132/10692377
c shellcode.c
#include
int main ( int argc, char * argv[] )
{
char * name[2];
name[0] = "/bin/sh";
name[1] = NULL;
execve( name[0], name, NULL );
}
www.eeworm.com/read/418779/10927879
rules shellcode.rules
# Copyright 2001-2007 Sourcefire, Inc. All Rights Reserved
#
# This file may contain proprietary rules that were created, tested and
# certified by Sourcefire, Inc. (the "VRT Certified Rules") as well
www.eeworm.com/read/407293/11422563
pdf shellcode.pdf
www.eeworm.com/read/224057/14606840
asm shellcode.asm
$ShellStart0:
call $Entry
;import table
$ImportTableBegin:
importTableG dd firstAddressG - importTableG
dd 0,0
importRVA1G dd dllNameG - importTableG
importRVA2G dd firstAddress
www.eeworm.com/read/206637/15292749
c shellcode.c
/*
* Shellcode Crypter v0.2 (Linux _ Windows)
* Coded by Shen139 31-07-2005
* shen139 (at_) eviltime [.dot.] com
*
* ...
* //PUT HERE YOUR SHELLCODE
* char shellcode[]="\x31\xc0\x31\xdb\x31
www.eeworm.com/read/464823/1524733
rules shellcode.rules
# (C) Copyright 2001,2002, Martin Roesch, Brian Caswell, et al.
# All rights reserved.
# $Id$
# ---------------
# SHELLCODE RULES
# ---------------
# These signatures are based on shellcode t