代码搜索:Tested
找到约 4,133 项符合「Tested」的源代码
代码结果 4,133
www.eeworm.com/read/152901/12074739
c ms05-055.c
/*
MS05-055 Windows Kernel APC Data-Free Local Privilege Escalation Vulnerability Exploit
Created by SoBeIt
12.25.2005
Main file of exploit
Tested on:
Windows 2000 PRO SP4 Chin
www.eeworm.com/read/152901/12074746
c helper.c
/*
MS05-055 Windows Kernel APC Data-Free Local Privilege Escalation Vulnerability Exploit
Created by SoBeIt
12.25.2005
Helper file of exploit
Tested on:
Windows 2000 PRO SP4 Ch
www.eeworm.com/read/254980/12110145
v mult16.v
// **** Here's a simple, sequential multiplier. Very simple, unsigned..
// Not very well tested, play with testbench, use at your own risk, blah blah blah..
//
//
// Unsigned 16-bit multiply (m
www.eeworm.com/read/253602/12210214
txt microsoft windows remote desktop protocol dos exploit (ms05-041).txt
// Windows XP SP2 'rdpwd.sys' Remote Kernel DoS
//
// Discovered by:
// Tom Ferris
// tommy[at]security-protocols[dot]com
//
// Tested on:
// Microsoft Windows XP SP2
//
// Usage (SPIKE) :
www.eeworm.com/read/253602/12210486
txt openftpd 小等 0.30.1 message system remote shell.txt
*
* shouts to mitakeet :D
*
* exploit for openftpd format string bug. tested on most current version only.
* -infamous42md AT hotpop DOT com is real email
*
* only tricky part is find a p
www.eeworm.com/read/253602/12210502
sh winjpegadminexp_ms04-028.sh
#!/bin/sh
#
# MS04-028 Exploit PoC II with Shellcode: CreateUser X in Administrators Group
#
# Tested on:
# WinXP Professional English SP1 - GDIPLUS.DLL version 5.1.3097.0
# WinXP Professional I
www.eeworm.com/read/151143/12233089
m cell2num.m
function x = cell2num(X)
% a = cell2num(A)
% The input 'A' is a numeric cell array (one number per cell)
% The output 'a' is a numeric matrix.
%% This program was tested under versions 5.2 and 5
www.eeworm.com/read/339051/12264573
v mult16.v
// **** Here's a simple, sequential multiplier. Very simple, unsigned..
// Not very well tested, play with testbench, use at your own risk, blah blah blah..
//
//
// Unsigned 16-bit multiply (m
www.eeworm.com/read/339051/12265644
v mult16.v
// **** Here's a simple, sequential multiplier. Very simple, unsigned..
// Not very well tested, play with testbench, use at your own risk, blah blah blah..
//
//
// Unsigned 16-bit multiply (m
www.eeworm.com/read/150547/12286935
asm objexe.asm
; Demonstration of how to write an entire .EXE format program as a .OBJ
; file to be linked. Tested with the VAL free linker.
; To build:
; nasm -fobj objexe.asm
; val objexe.obj,objexe.exe;