代码搜索:Tested

找到约 4,133 项符合「Tested」的源代码

代码结果 4,133
www.eeworm.com/read/152901/12074739

c ms05-055.c

/* MS05-055 Windows Kernel APC Data-Free Local Privilege Escalation Vulnerability Exploit Created by SoBeIt 12.25.2005 Main file of exploit Tested on: Windows 2000 PRO SP4 Chin
www.eeworm.com/read/152901/12074746

c helper.c

/* MS05-055 Windows Kernel APC Data-Free Local Privilege Escalation Vulnerability Exploit Created by SoBeIt 12.25.2005 Helper file of exploit Tested on: Windows 2000 PRO SP4 Ch
www.eeworm.com/read/254980/12110145

v mult16.v

// **** Here's a simple, sequential multiplier. Very simple, unsigned.. // Not very well tested, play with testbench, use at your own risk, blah blah blah.. // // // Unsigned 16-bit multiply (m
www.eeworm.com/read/253602/12210214

txt microsoft windows remote desktop protocol dos exploit (ms05-041).txt

// Windows XP SP2 'rdpwd.sys' Remote Kernel DoS // // Discovered by: // Tom Ferris // tommy[at]security-protocols[dot]com // // Tested on: // Microsoft Windows XP SP2 // // Usage (SPIKE) :
www.eeworm.com/read/253602/12210486

txt openftpd 小等 0.30.1 message system remote shell.txt

* * shouts to mitakeet :D * * exploit for openftpd format string bug. tested on most current version only. * -infamous42md AT hotpop DOT com is real email * * only tricky part is find a p
www.eeworm.com/read/253602/12210502

sh winjpegadminexp_ms04-028.sh

#!/bin/sh # # MS04-028 Exploit PoC II with Shellcode: CreateUser X in Administrators Group # # Tested on: # WinXP Professional English SP1 - GDIPLUS.DLL version 5.1.3097.0 # WinXP Professional I
www.eeworm.com/read/151143/12233089

m cell2num.m

function x = cell2num(X) % a = cell2num(A) % The input 'A' is a numeric cell array (one number per cell) % The output 'a' is a numeric matrix. %% This program was tested under versions 5.2 and 5
www.eeworm.com/read/339051/12264573

v mult16.v

// **** Here's a simple, sequential multiplier. Very simple, unsigned.. // Not very well tested, play with testbench, use at your own risk, blah blah blah.. // // // Unsigned 16-bit multiply (m
www.eeworm.com/read/339051/12265644

v mult16.v

// **** Here's a simple, sequential multiplier. Very simple, unsigned.. // Not very well tested, play with testbench, use at your own risk, blah blah blah.. // // // Unsigned 16-bit multiply (m
www.eeworm.com/read/150547/12286935

asm objexe.asm

; Demonstration of how to write an entire .EXE format program as a .OBJ ; file to be linked. Tested with the VAL free linker. ; To build: ; nasm -fobj objexe.asm ; val objexe.obj,objexe.exe;