代码搜索:Windows服务

找到约 10,000 项符合「Windows服务」的源代码

代码结果 10,000
www.eeworm.com/read/253602/12210214

txt microsoft windows remote desktop protocol dos exploit (ms05-041).txt

// Windows XP SP2 'rdpwd.sys' Remote Kernel DoS // // Discovered by: // Tom Ferris // tommy[at]security-protocols[dot]com // // Tested on: // Microsoft Windows XP SP2 // // Usage (SPIKE) :
www.eeworm.com/read/253602/12210299

txt microsoft windows ip validation remote proof of concept ms05-019.txt

/* ecl-winipdos.c - 16/04/05 * Yuri Gushin * Alex Behar * * This one was actually interesting, an off-by-one by our beloved * M$ :) * * When processi
www.eeworm.com/read/253602/12210402

txt microsoft windows com structured storage local exploit (ms05-012).txt

// by Cesar Cerrudo - Argeniss - www.argeniss.com // MS05-012 - COM Structured Storage Vulnerability - CAN-2005-0047 Exploit // // More exploits at www.argeniss.com/products.html // // Works
www.eeworm.com/read/253602/12210435

txt windows 2000 utility manager all in one exploit (ms04-019).txt

/****************************************************************************************** *****C*****O*****R*****O******M******P*****U*******T*******E******R*****2***0***0***4**** **
www.eeworm.com/read/253602/12210445

txt windows 2000 universal language utility manager exploit (ms04-019).txt

/****************************************************************************************** ****C*****O*****R*****O******M******P*****U*******T*******E******R*****2***0***0***4***** **
www.eeworm.com/read/253602/12210477

txt windows 2000 utility manager privilege elevation exploit (ms04-019).txt

//by Cesar Cerrudo sqlsec at yahoo.com //Local elevation of priviliges exploit for Windows 2K Utility Manager (second one!!!!) //Gives you a shell with system privileges //If you have problems try
www.eeworm.com/read/253602/12210631

txt microsoft windows csrss local privilege escalation exploit (ms05-018).txt

#include #include #include #pragma comment (lib,"Advapi32.lib") typedef struct _CONSOLE_STATE_INFO { /* 0x00 */ DWORD cbSize; /* 0x04 */ COORD ScreenBuffe