搜索资源列表
downandexec
- 漏洞利用的shellcode ,功能是下载执行,程序给出了调用过程-Exploit the shellcode, download feature is implemented, procedures give a call to the process of
Advanced_buffer_overflow_exploits
- 现在有许多缓冲区溢出攻击代码。早期缓冲区 溢出攻击代码只产生了一个shell (执行程序/ bin / sh ) 。但是, 如今一些缓冲区溢出攻击代码已经很不错的功能。 例如,通过过滤,打开一个socket,打破的chroot , 等等。本文将试图解释先进的缓冲区溢出 利用技巧根据英特尔x86 Linux操作系统。-Nowadays there are many buffer overflow exploit codes. The early buffer ov
aa
- 一个简单的溢出有exploit。学习自飘雪-A simple overflow have exploit
FindJmpEsp
- 查找DLL模块内特定汇编指令序列,可以用于编写通用性较强的漏洞利用程序。-Find the DLL module specific assembly instruction sequences can be used to write more versatility exploit.
alpha2.tar
- 将shellcode转为字母形式,只用于unicode编码的漏洞利用中-Exploit shellcode into letters form only for unicode encoded in
WindowsLocal-Ring-0-Exploit
- 一个windows本地提权漏洞,影响从Windows nt到Windows 8,利用漏洞接替了系统内核拿到最高权限-Windows NT/2K/XP/2K3/VISTA/2K8/7/8 EPATHOBJ local ring0 exploit There s a pretty obvious bug in win32k!EPATHOBJ::pprFlattenRec where the // PATHREC object returned by win32k!EPATHOBJ
