搜索资源列表
WindowsANIZeroDayAnimated_Cursor_Exploit
- Windows Animated Cursor Handling Exploit (0day) Works on fully patched Windows Vista I think it is first real remote code execution exploit on vista =) Tested on: Windows Vista Enterprise Version 6.0 (Build 6000) (default installation a
MS08011-Exploit.rar
- Windows MS08011 漏洞 利用 代码,MS08011 exploit code
KiTrap0D
- Microsoft Windows NT NtVdmControl()->KiTrap0D ring0 Exploit 受影响的操作系统: - Windows 2000 - Windows XP - Windows Server 2003 - Windows Vista - Windows Server 2008 - Windows 7 32Bit 不受影响的操作系统: -Windows 7 64Bit -Windows Server
0day-security-CD
- 本文件为《0day安全:软件漏洞分析技术》一书的配套光盘资料。原书分为5篇33章,较为系统、全面地介绍了Windows平台缓冲区溢出漏洞的分析、检测与防护。第一篇为漏洞exploit的基础理论和初级技术,可以引领读者迅速入门;第二篇在第一篇的基础上,结合国内外相关研究者的前沿成果,对漏洞技术从攻、防两个方面进行总结;第三篇站在安全测试者的角度,讨论了几类常用软件的漏洞挖掘方法与思路;第四篇则填补了本类书籍在Windows内核安全及相关攻防知识这个神秘领域的技术空白;第五篇以大量的0 day案例分
MS09-050
- This module exploits an out of bounds function table dereference in the SMB request validation code of the SRV2.SYS driver included with Windows Vista, Windows 7 release candidates (not RTM), and Windows 2008 Server prior to R2. Windows Vista w
MS10-015
- This module will create a new session with SYSTEM privileges via the KiTrap0D exlpoit by Tavis Ormandy. If the session is use is already elevated then the exploit will not run. The module relies on kitrap0d.x86.dll, and is not supported on x64 ed
