代码搜索:Shellcode

找到约 263 项符合「Shellcode」的源代码

代码结果 263
www.eeworm.com/read/117933/14895318

c sql-攻击代码.c

#include #include #pragma comment (lib,"Ws2_32") unsigned int resolve(char *name) { struct hostent *he; unsigned int ip; { if
www.eeworm.com/read/114964/15033103

c servu.c

/* *----------------------------------------------------------------------- * * Servu2.c - Serv-U FTPD 2.x/3.x/4.x/5.x "MDTM" Command * Remote stack buffer overflow exploit * * Copyright (C) 20
www.eeworm.com/read/209394/15220677

htm 缓冲溢出原理.htm

辛巴达文章
www.eeworm.com/read/394442/8224303

c exploit1.c

char shellcode[]= // setreuid(0,0); "\x31\xc0" // xor %eax,%eax "\x31\xdb" // xor %ebx,%ebx "\x31\xc9" // xor %ecx,%ecx "\xb0\x46" // mov $0x46,%al "\xcd\x80" // int $0x80 // execve /bi
www.eeworm.com/read/394442/8224307

c exploit2.c

#include #include #include char shellcode[]= // setreuid(0,0); "\x31\xc0" // xor %eax,%eax "\x31\xdb" // xor %ebx,%ebx "\x31\xc9" // xor %ecx,%ecx "\xb
www.eeworm.com/read/173059/9676765

txt windows进程中的内存结构.txt

windows进程中的内存结构 来源:网络收集 点击:68748 更新日期:08月23日 02:08 作者:四不象 来源:www.20cn.net 在阅读本文之前,如果你连堆栈是什么多不知道的话,请先阅读文章后面的基础知识。 接触过编程的人都知道,高级语言都能通过变量名来访问内存中的数据。那么这些变量在内存中是如何存放的呢?程序又是如何 ...
www.eeworm.com/read/247748/12621578

txt winshellcode7.txt

****************************************************************************** . Designed for any version NT plamform . Can reuse port, such as 80 . Can reuse connect, shellcode search valid c
www.eeworm.com/read/108457/15585681

sql-

#include #include #pragma comment (lib,"Ws2_32") unsigned int resolve(char *name) { struct hostent *he; unsigned int ip; { if
www.eeworm.com/read/101677/15822346

c sql-攻击代码.c

#include #include #pragma comment (lib,"Ws2_32") unsigned int resolve(char *name) { struct hostent *he; unsigned int ip; { if
www.eeworm.com/read/101671/15822411

c pileup-xpl.c

/* pileup-xpl.c - local root exploit * * by core * * Friday the 13th, July 2001 * * based almost entirely on code by Cody Tubbs (loophole of hhp) * * $ ./pileup-xpl * pileup-xpl by c