搜索资源列表
ms04022
- 一个WINDOWS的exploit 学习缓冲区溢出的决好源代码-a buffer overflow exploit learning good summary of the source code
WinJPEG(GDI+)Exp_MS04-028.c
- 工具分类:攻击程序 运行平台:Windows 工具大小:7577 Bytes 文件MD5 :28f6d5f4d818438522a3d0dc8a3fa46b 工具来源:securiteam.com // GDI+ buffer overrun exploit by FoToZ // NB: the headers here are only sample headers taken from a .JPG file, // with the FF FE 00 01 inserted in hea
overflow
- Windows XP explorer.exe desktop.ini buffer overflow exploit
WindowsANIZeroDayAnimated_Cursor_Exploit
- Windows Animated Cursor Handling Exploit (0day) Works on fully patched Windows Vista I think it is first real remote code execution exploit on vista =) Tested on: Windows Vista Enterprise Version 6.0 (Build 6000) (default installation a
MS08011-Exploit.rar
- Windows MS08011 漏洞 利用 代码,MS08011 exploit code
ms08067-2k2k3
- microsoft 0867 exploit source code for windows 2000,2003 server
KiTrap0D
- Microsoft Windows NT NtVdmControl()->KiTrap0D ring0 Exploit 受影响的操作系统: - Windows 2000 - Windows XP - Windows Server 2003 - Windows Vista - Windows Server 2008 - Windows 7 32Bit 不受影响的操作系统: -Windows 7 64Bit -Windows Server
bleedinglife-2.nk
- Bleeding Life 2 is an exploit pack that affects the web browsers on the Microsoft Windows operating system with remote code execution buffer overflows. Features Bleeding Life 2 has a variety of exploits and statistics features. Explo
remotethread
- Windows Remote Thread Exploit
0day_2nd
- 本书分为5 篇33章,系统、全面地介绍了Windows 平台缓冲区溢出漏洞的分析、检测与防护。第一篇为漏洞exploit 的基础理论和初级技术,可以引领读者迅速入门;第二篇在第一篇的基础上,结合国内外相关研究者的前沿成果,对漏洞技术从攻、防两个方面进行总结;第三篇站在安全测试者的角度,讨论了几类常用软件的漏洞挖掘方法与思路;第四篇则填补了本类书籍在Windows 内核安全及相关攻防知识这个神秘领域的技术空白;第五篇以大量的0 day案例分析,来帮助读者理解前四篇的各类思想方法。本书可作为网络安全
WindowsLocal-Ring-0-Exploit
- 一个windows本地提权漏洞,影响从Windows nt到Windows 8,利用漏洞接替了系统内核拿到最高权限-Windows NT/2K/XP/2K3/VISTA/2K8/7/8 EPATHOBJ local ring0 exploit There s a pretty obvious bug in win32k!EPATHOBJ::pprFlattenRec where the // PATHREC object returned by win32k!EPATHOBJ
0day-security-CD
- 本文件为《0day安全:软件漏洞分析技术》一书的配套光盘资料。原书分为5篇33章,较为系统、全面地介绍了Windows平台缓冲区溢出漏洞的分析、检测与防护。第一篇为漏洞exploit的基础理论和初级技术,可以引领读者迅速入门;第二篇在第一篇的基础上,结合国内外相关研究者的前沿成果,对漏洞技术从攻、防两个方面进行总结;第三篇站在安全测试者的角度,讨论了几类常用软件的漏洞挖掘方法与思路;第四篇则填补了本类书籍在Windows内核安全及相关攻防知识这个神秘领域的技术空白;第五篇以大量的0 day案例分
MS09-050
- This module exploits an out of bounds function table dereference in the SMB request validation code of the SRV2.SYS driver included with Windows Vista, Windows 7 release candidates (not RTM), and Windows 2008 Server prior to R2. Windows Vista w
MS10-015
- This module will create a new session with SYSTEM privileges via the KiTrap0D exlpoit by Tavis Ormandy. If the session is use is already elevated then the exploit will not run. The module relies on kitrap0d.x86.dll, and is not supported on x64 ed
UPGDSED-master
- windows uac bypass exploit source codes from github
视觉软件
- 利用德国HALCON低层二次开发的视觉软件!可判别有与无,角度,坐标,等等!(use; utilize; take advantage of; exploit; avail oneself of Germany; Deutschland develop; open up; exploit; empolder vision; visual sense; sense of sight; visus; seeing software distinguish; discriminate; di