代码搜索:Shellcode
找到约 263 项符合「Shellcode」的源代码
代码结果 263
www.eeworm.com/read/171081/5398958
c shelltest.c
#include
#include
#include
#pragma comment(lib, "ws2_32.lib")
//upload execute shellcode
char shellcode[] = "\xD9"//xor 0x88 | port 7777
"\xE1\xD9\x34\x24\x58\x
www.eeworm.com/read/418779/10919427
txt 649.txt
Rule:
--
Sid:
649
--
Summary:
Shellcode to set the group identity to 0 (root) was detected.
--
Impact:
If this code is executed successfully, it is possible for the current
process to inherity root
www.eeworm.com/read/418779/10923140
txt 650.txt
Rule:
--
Sid:
650
--
Summary:
Shellcode to set the user identity to 0 (root) was detected.
--
Impact:
If this code is executed successfully, it is possible for the current
process to inherity root
www.eeworm.com/read/473927/6825379
txt 649.txt
Rule:
--
Sid:
649
--
Summary:
Shellcode to set the group identity to 0 (root) was detected.
--
Impact:
If this code is executed successfully, it is possible for the current
process to inherity root
www.eeworm.com/read/473927/6825789
txt 650.txt
Rule:
--
Sid:
650
--
Summary:
Shellcode to set the user identity to 0 (root) was detected.
--
Impact:
If this code is executed successfully, it is possible for the current
process to inherity root
www.eeworm.com/read/253602/12210167
txt ethereal 0.10.0-0.10.2 igap overflow remote root exploit.txt
/*
* THE EYE ON SECURITY RESEARCH GROUP - INDIA
* Ethereal IGAP Dissector Message Overflow Remote Root exploit
*
* Copyright 2004 - EOS-India Group
*
* Authors note:
* Shellcode splitti
www.eeworm.com/read/224057/14606833
asm safesoftexe.asm
.586
.model flat, stdcall ;32 bit memory model
option casemap :none ;case sensitive
include SafeSoftExe.inc
.code
include shellCode.asm
start:
invoke GetModuleHandle,NULL
mov hIns
www.eeworm.com/read/253602/12210502
sh winjpegadminexp_ms04-028.sh
#!/bin/sh
#
# MS04-028 Exploit PoC II with Shellcode: CreateUser X in Administrators Group
#
# Tested on:
# WinXP Professional English SP1 - GDIPLUS.DLL version 5.1.3097.0
# WinXP Professional I
www.eeworm.com/read/247748/12621313
txt sql攻击代码.txt
/*
MSSQL2000 Remote UDP Exploit!
Modified from "Advanced Windows Shellcode" by David Litchfield, david@ngssoftware.com
fix a bug.
Modified by lion, lion@cnhonker.net
Welcome to HUC Web