代码搜索:Shellcode

找到约 263 项符合「Shellcode」的源代码

代码结果 263
www.eeworm.com/read/101670/15822428

c su-wrapper.c

/* - su-wrapper.c - */ /*************************************************************************/ /* /usr/sbin/su-wrapper(su-wrapper 1.1.1) local root exploit. */ /*
www.eeworm.com/read/390409/8466532

txt readme.txt

Tiny_Shell 0.1 (普通版本)By Anskya 某天精神好了一点的时候写的,使用KOL+删除多余资源+清除PE重定位表+FSG压缩体积只有3k. 感谢那些提供Code和教程的GG and JJ们~~ ^_^ Tiny_Shell.dpr 工程时最简单的shell采用匿名单管道设计 本来打算不用管道直接写的,但是怕连目录都无法显示所以还是用了单管道 有个BUG-很明显的那 ...
www.eeworm.com/read/311961/13620711

inf oemsetup.inf

; OEMSETUP FILE FOR DM9 based Ethernet adapters ; Windows NT v3.51 ; Windows NT v4.0 ; ; Supported adapters: ; DAVICOM DM9102/A Based Adapter ; ; ; Usage: ; ; This fi
www.eeworm.com/read/112772/6143803

inf oemsetup.inf

[Identification] OptionType = NetTransport [Options] PACKET [FileConstants] UtilityInf = "UTILITY.INF" subroutineinf = "SUBROUTN.INF" SoftwareType = "service" Exit_Code
www.eeworm.com/read/151990/12152400

cpp 1.cpp

//RealPlayer .smil溢出漏洞攻击代码 #include #include #include char pre[] = "\n" " \n" " \n" " \n" "
www.eeworm.com/read/142631/12935060

mht 关于windows下shellcode编写的一点思考.mht

From: Subject: =?gb2312?B?tbG1scLbzLMgLSA6OrzGy+O7+ry8yvU6OiAtILHgs8zM7LXYIC0gudjT2lc=?= =?gb2312?B?aW5kb3dzz8JTaGVsbENvZGWx4NC0tcTSu7Xjy7y/vCAtIHBvd2VyZWQgYnk=
www.eeworm.com/read/159132/10692417

pl exploit.pl

#!/usr/bin/perl # # 《网络渗透技术》演示程序 # 作者:san, alert7, eyas, watercloud # # exploit.pl # exploit program vulnerable $shellcode = "\x31\xd2\x52\x68\x6e\x2f\x73\x68\x68\x2f\x2f\x62\x69". "\x89\
www.eeworm.com/read/299754/7834512

c exe_pro.c

#include #include extern char **environ; int main(int argc, char **argv){ char large_string[128]; long *long_ptr = (long *) large_string; int i; char shellcode[] = "\xeb\
www.eeworm.com/read/253602/12210122

txt microsoft jet database engine db file buffer overflow exploit.txt

######################################################## # # See-security Technologies ltd. # # http://www.see-security.com # ######################################################## # #
www.eeworm.com/read/253602/12210439

txt novell edirectory server imonitor remote buffer overflow exploit.txt

package Msf::Exploit::edirectory_imonitor; use strict; use base "Msf::Exploit"; use Pex::Text; my $advanced = { }; my $info = { 'Name' => 'eDirectory 8.7.3 iMonitor Remote Stack Overflow',