代码搜索:execve
找到约 549 项符合「execve」的源代码
代码结果 549
www.eeworm.com/read/146900/12605265
pjt fir_bnch.pjt
;Codewright Project File (do not remove or modify this line)
[ProjInit]
ProjSetConfigFlags=0x00010140
[Files]
E:\COMPILER\196\TASKING\C196\examples\fir_bnch\makefile
E:\COMPILER\196\TASKING\C19
www.eeworm.com/read/146899/12605291
pjt pid_bnch.pjt
;Codewright Project File (do not remove or modify this line)
[ProjInit]
ProjSetConfigFlags=0x00010140
[Files]
E:\COMPILER\196\TASKING\C196\examples\pid_bnch\makefile
E:\COMPILER\196\TASKING\C19
www.eeworm.com/read/247748/12621357
txt 关于 shell code 的编写.txt
关于 Shell Code 的编写
下面是一个创建Shell的C程序shellcode.c: (本文以IntelX86上的Linux为例说明)
void main() {
char *name[2];
name[0] = "/bin/sh";
name[1] = NULL;
execve(name[0], name, NULL);
}
我们先
www.eeworm.com/read/101082/6241148
c exect.c
/* exect.c 4.2 82/12/17 */
#include "SYS.h"
#include
ENTRY(exect)
bispsw $PSL_T
chmk $SYS_execve
jmp cerror # exect(file, argv, env)
www.eeworm.com/read/154066/5643298
txt process.c.txt
any problems,send mails to sindybear@163.com
相关文件
/fs/exec.c
这个文件主要是关于
(1)
//这是执行一个命令的系统调用
asmlinkage int sys_execve(struct pt_regs regs)
filename = getname((char *) regs.
www.eeworm.com/read/394238/8240918
txt process.c.txt
any problems,send mails to sindybear@163.com
相关文件
/fs/exec.c
这个文件主要是关于
(1)
//这是执行一个命令的系统调用
asmlinkage int sys_execve(struct pt_regs regs)
filename = getname((char *) regs.
www.eeworm.com/read/416009/11044672
c forkdup.c
/* forkdup.c */
/* This program executes /bin/cat with stdin coming from f1, and stdout
going to f2. This is all done with fork, exec, and dup: */
#include
#include
main(
www.eeworm.com/read/245586/12791861
c exec.c
#include "hos.h"
unsigned long EXEC_load_body(char *buf){
// load code in buf to 0x30000000
//memcpy(0x30000000, buf, strlen(buf));
printk("in EXEC load body\n");
mymemcpy(0x0300000, buf, 14);
www.eeworm.com/read/245586/12792733
c exec.c
#include "hos.h"
unsigned long EXEC_load_body(char *buf){
// load code in buf to 0x30000000
//memcpy(0x30000000, buf, strlen(buf));
printk("in EXEC load body\n");
mymemcpy(0x0300000, buf, 14);
www.eeworm.com/read/306457/13744805
c forkdup.c
/* forkdup.c */
/* This program executes /bin/cat with stdin coming from f1, and stdout
going to f2. This is all done with fork, exec, and dup: */
#include
#include
main(