搜索资源列表
RageAgainstTheCage
- * Copy from sdcard to /sqlite_stmt_journals/exploid, chmod 0755 and run. * Or use /data/local/tmp if available (thx to ioerror!) It is important to * to use /sqlite_stmt_journals directory if available. * Then try to invoke hotplug by click
ajaxplorer_checkinstall_exec
- ajaxplorer2.6之前的版本所存在的漏洞利用-ajaxplorer2.6 previous version exists exploit
Foxmail
- 针对foxmail的缓冲区溢出攻击,shellcode可以另外编写,这里只谈利用-foxmail hack,shellcode,exploit
wpes2008
- Recent approaches for protecting information in data out- sourcing scenarios exploit the combined use of access control and cryptography. In this context, the number of keys to be distributed and managed by users can be maintained limited by
0day_2nd
- 本书分为5 篇33章,系统、全面地介绍了Windows 平台缓冲区溢出漏洞的分析、检测与防护。第一篇为漏洞exploit 的基础理论和初级技术,可以引领读者迅速入门;第二篇在第一篇的基础上,结合国内外相关研究者的前沿成果,对漏洞技术从攻、防两个方面进行总结;第三篇站在安全测试者的角度,讨论了几类常用软件的漏洞挖掘方法与思路;第四篇则填补了本类书籍在Windows 内核安全及相关攻防知识这个神秘领域的技术空白;第五篇以大量的0 day案例分析,来帮助读者理解前四篇的各类思想方法。本书可作为网络安全
Optimal-Spectrum-Sensing-Framework-for
- TODAY’S wireless networks are characterized by a static spectrum assignment policy. Recently, due to the increase in spectrum demand, however, this policy is faced with the spectrum scarcity at particular spectrum bands. On the contrary, a la
003
- 本实例实现使用ini文件来存储菜单数据。以后需要增加或减少菜单选项时,只需修改INI文件即可。-The example exploit the ini file to store menu data. Later, if you need to increase or decrease the menu option, you can simply modify the INI file.
ms08-067
- ms08-067漏洞利用代码。c语言版本的-ms08-067 exploit code. c language version
OA-System
- 办公系统是采用jsp和js,数据库采用2008SQL,需要加载struct和hiernate的jar包-Office Systems. Using by JSP.It use jsp and js.I hope it can help to mode the system.So perhaps there are systematic errors to exploit.It has systematically distorted our national understanding of r
TestBufferOverflow
- 用于演示怎么样的代码可能存在缓冲区溢出漏洞以及这样的漏洞会如何被利用来进行攻击。-Used to demo how the buffer overflow vulnerabily was exploit.
exploit_L.tar
- Exploit to explore a buffer overflow vulnerability in a simple cgi programm. used for teaching pentest
PCManFtp
- # Exploit Title: joomla component com_civicrm remode code injection exploit
Cooperative-Diversity-using-Soft-Decision-and-Dis
- Cooperative communications techniques exploit the spatial diversity of wireless radio channel by forming antenna arrays in order to achieve Multiple Input Multiple Output (MIMO) performance in multi-user single-antenna environment.
12307---Inconnu(e)
- Local File Inclusion As the title says, this is a "short" and descr iptive guide about various methods to exploit using a local file inclusion (LFI).
Java-1.7.0_11-Sploit
- Java 1.7.0_11 exploit
fileStudy
- 该程序主要用于利用fopen函数以及fwrite,fread函数,对文件进行读写-The program is mainly used to exploit the fopen function and fwrite, fread function to read and write to the file
exploitpack-master
- Sample exploit kit found on GitHub for debian
The-Multikernel-A-New-OS-Architecture-For-Scalabl
- By Andrew Baumann,Simon Peter,Timothy Roscoe,Adrian Schüpbach, and Akhilesh Singhania, Systems Group ETH Zurich By Paul Barham,Tim Harris, and Rebecca Isaacs, Microsoft Research By Pierre-Evariste Dagand, ENS Cachan Bretagne 2009 Investiga
winoday
- NtVdmControl exploit
bufferBO_exploit
- Remote buffer overflow exploit