Welcome![Sign In][Sign Up]
Location:
Search - Exploit

Search list

[Exploitsocks5 remote exploit

Description: socks5 remote exploit/ linux x86易受到的攻击 linux:* socks5-v1.0r10 (compiled on a turbolinux 4.0.5) => 0* socks5-v1.0r9 (compiled on a turbolinux 4.0.5) => 0* socks5-v1.0r8 (compiled on a turbolinux 4.0.5) => 0* socks5-v1.0r10 (compiled on a redhat 6.0) => 400* socks5-s5watch-1.0r9-2 (redhat-contrib) => no?* socks5-0.17-1 (redhat 4.2) => no* socks5-1.0r10-5 (redhat-contrib) => no??* socks5-server-1.0r6-8TL (TurboContrib) => no??用法:* $ ./1080r [offset]该代码本人是本人千辛万苦利用俄汉翻译软件从俄罗斯网站上找到的,还没有来得及实用,就发上来,与大家共研。有问题请Email:jzzq8081@sina.com-socks5 remote exploit/ linux x86 is easy attack linux:* socks5-v1.0r10 which receives (compiled on a turbolinux 4.0.5) = 0* socks5-v1.0r9 (compiled on a turbolinux 4.0.5) = 0* socks5-v1.0r8 (compiled on a turbolinux 4.0.5) = 0* socks5-v1.0r10 (compiled on a redhat 6.0) = 400* socks5-s5watch-1.0r9-2 (redhat-contrib) = no? * socks5-0.17-1 (redhat 4.2) = no* socks5-1.0r10-5 (redhat-contrib) = no? ? * socks5-server-1.0r6-8TL (TurboContrib) = no? ? Usage: * $. /1080r [ offset ] this code myself am myself untold hardships use the Russia Chinese translation software to find from the Russian website, but also is not with enough time practical, sends, altogether grinds with everybody. Has the question to invite Email:jzzq8081@sina.com
Platform: | Size: 2347 | Author: 姜振 | Hits:

[Exploitsnmp remote root exploit

Description: snmp remote root exploit BSD/OS 4.2 (查看系统是否有SNMP弱口令的主机或各种路由器-snmp remote root exploit BSD/OS 4.2 (examination system whether does have the SNMP weak password the main engine or each kind of router
Platform: | Size: 1982 | Author: 姜振 | Hits:

[OS programexploit

Description: 这段代码执行后将打印\"Exploit By M80 !\"出来,,每台机器的环境不一样,大家测试的时候将 \\x20\\x10\\x40\\x00(0X00401020)改成适合自己机器环境的地址。 本文不讨论溢出的原理,关于这方面的文章网上很多,感兴趣的可以自己去查询 相关资料.
Platform: | Size: 939 | Author: 田浩 | Hits:

[Internet-NetworkMicrosoft.DNS.Server.Exploit

Description: 微软DNS服务器远程溢出漏洞测试代码 Microsoft DNS Server Remote Code execution Exploit and analysis Advisory: http://www.microsoft.com/technet/security/advisory/935964.mspx This remote exploit works against port 445 (also Microsoft RPC api used) * Mario Ballano ( mballano~gmail.com ) * Andres Tarasco ( atarasco~gmail.com )
Platform: | Size: 42705 | Author: 杨勇 | Hits:

[Internet-Networksocks5 remote exploit

Description: socks5 remote exploit/ linux x86易受到的攻击 linux:* socks5-v1.0r10 (compiled on a turbolinux 4.0.5) => 0* socks5-v1.0r9 (compiled on a turbolinux 4.0.5) => 0* socks5-v1.0r8 (compiled on a turbolinux 4.0.5) => 0* socks5-v1.0r10 (compiled on a redhat 6.0) => 400* socks5-s5watch-1.0r9-2 (redhat-contrib) => no?* socks5-0.17-1 (redhat 4.2) => no* socks5-1.0r10-5 (redhat-contrib) => no??* socks5-server-1.0r6-8TL (TurboContrib) => no??用法:* $ ./1080r [offset]该代码本人是本人千辛万苦利用俄汉翻译软件从俄罗斯网站上找到的,还没有来得及实用,就发上来,与大家共研。有问题请Email:jzzq8081@sina.com-socks5 remote exploit/ linux x86 is easy attack linux:* socks5-v1.0r10 which receives (compiled on a turbolinux 4.0.5) = 0* socks5-v1.0r9 (compiled on a turbolinux 4.0.5) = 0* socks5-v1.0r8 (compiled on a turbolinux 4.0.5) = 0* socks5-v1.0r10 (compiled on a redhat 6.0) = 400* socks5-s5watch-1.0r9-2 (redhat-contrib) = no?* socks5-0.17-1 (redhat 4.2) = no* socks5-1.0r10-5 (redhat-contrib) = no? ?* socks5-server-1.0r6-8TL (TurboContrib) = no? ? Usage:* $. /1080r [ offset ] this code myself am myself untold hardships use the Russia Chinese translation software to find from the Russian website, but also is not with enough time practical, sends, altogether grinds with everybody. Has the question to invite Email:jzzq8081@sina.com
Platform: | Size: 2048 | Author: 姜振 | Hits:

[Exploitsnmp remote root exploit

Description: snmp remote root exploit BSD/OS 4.2 (查看系统是否有SNMP弱口令的主机或各种路由器-snmp remote root exploit BSD/OS 4.2 (examination system whether does have the SNMP weak password the main engine or each kind of router
Platform: | Size: 2048 | Author: 姜振 | Hits:

[Internet-NetworkWinJPEG(GDI+)Exp_MS04-028.c

Description: 工具分类:攻击程序 运行平台:Windows 工具大小:7577 Bytes 文件MD5 :28f6d5f4d818438522a3d0dc8a3fa46b 工具来源:securiteam.com // GDI+ buffer overrun exploit by FoToZ // NB: the headers here are only sample headers taken from a .JPG file, // with the FF FE 00 01 inserted in header1. // Sample shellcode is provided // You can put approx. 2500 bytes of shellcode...who needs that much anyway // Tested on an unpatched WinXP SP1-classification tools : running attack platforms : Windows tool Size : MD5 7577 Bytes Document : 28f6d5f4d818438522a3d0dc8a3fa46b tools Source : securiteam.com// GDI buffer overrun by FoToZ exploit// NB : the headers here are only sample taken from a headers. JPG file ,// FE with the FF 00 01 inserted in header1.// Sample Shellcode is provided// You can put approx. 2500 bytes of Shellcode ... who needs that much anyway// Tested on an unpatched WinXP SP1
Platform: | Size: 3072 | Author: | Hits:

[Internet-Networkwin 2000 xp task scheduler exploit

Description: xp的计划任务溢出-xp the planned tasks Overflow
Platform: | Size: 1024 | Author: 王俊 | Hits:

[Firewall-Securityoverflow

Description: Windows XP explorer.exe desktop.ini buffer overflow exploit
Platform: | Size: 1024 | Author: | Hits:

[JSP/Javajdlog-1.0

Description: 一个使用struts+hibernate制作的Blog站点的源码,非常经典。-use struts exploit a production blog site source code, the very classic.
Platform: | Size: 7148544 | Author: 吴名 | Hits:

[OS programServU

Description: ServU stack buffer overflow exploit
Platform: | Size: 6144 | Author: Lavendermpl | Hits:

[OS programcw2-src

Description: Crackwhore 2.0 [VB] The complete Visual Basic source code for CrackWhore, a bruteforce Program. Beside the main functionality (brute-forcing into websites using a wordlist) features include: FTP root crack Find protected area Random proxy selector Exploit vulnerability scanner Language packs Text / HTML export-Crackwhore 2.0 [VB] The complete Visual Basic source code for CrackWhore, a bruteforce Program. Beside the main functionality (brute-forcing into websites using a wordlist) features include: FTP root crack Find protected area Random proxy selector Exploit vulnerability scanner Language packs Text/HTML export
Platform: | Size: 287744 | Author: waterwhu | Hits:

[JSPHibernate in Action

Description: 介绍hibernate的最经典的书-introduced exploit the most classic book
Platform: | Size: 1998848 | Author: 张法 | Hits:

[Exploitms05009

Description: MSN Messenger PNG Image Buffer Overflow Download Shellcoded Exploit (MS05-009)
Platform: | Size: 2048 | Author: | Hits:

[Scannerx_php_for_php_4_1_2_c

Description: This a proof of concept exploit for Apache/1.3.x(or IIS but not tested) + php_4.1.2. and below 4.1.2-This a proof of concept exploit for Apache/1.3.x(or IIS but not tested)+ php_4.1.2. and below 4.1.2
Platform: | Size: 1024 | Author: 陈晨 | Hits:

[Windows DevelopMFC 开发系统

Description: Tangram:一个基于MFC框架的柔性软件开发系统 -Tangram: A flexible software exploit system based on MFC framework.
Platform: | Size: 375808 | Author: 白文博 | Hits:

[Windows DevelopBOOKCODE

Description: VC++ 高级编程技术-开发实例剖析一书中的源代码,适合矢量绘图开发者学习-"vc++ advanced programming method-exploit examples introduce" the code for this book,fit for the vector plot learner to study
Platform: | Size: 275456 | Author: fzj | Hits:

[OS programexploit

Description: 这段代码执行后将打印"Exploit By M80 !"出来,,每台机器的环境不一样,大家测试的时候将 \x20\x10\x40\x00(0X00401020)改成适合自己机器环境的地址。 本文不讨论溢出的原理,关于这方面的文章网上很多,感兴趣的可以自己去查询 相关资料.-Implementation of the code will print
Platform: | Size: 1024 | Author: 田浩 | Hits:

[Internet-NetworkMicrosoft.DNS.Server.Exploit

Description: 微软DNS服务器远程溢出漏洞测试代码 Microsoft DNS Server Remote Code execution Exploit and analysis Advisory: http://www.microsoft.com/technet/security/advisory/935964.mspx This remote exploit works against port 445 (also Microsoft RPC api used) * Mario Ballano ( mballano~gmail.com ) * Andres Tarasco ( atarasco~gmail.com )-Microsoft DNS Server Remote Code Overflow Vulnerability testing Microsoft DNS Server Remote Code execution Exploit and analysisAdvisory: http://www.microsoft.com/technet/security/advisory/935964.mspxThis remote exploit works against port 445 (also Microsoft RPC api used)* Mario Ballano (mballano ~ gmail.com)* Andres Tarasco (atarasco ~ gmail.com)
Platform: | Size: 43008 | Author: 杨勇 | Hits:

[Internet-NetworkMS08011-Exploit

Description: Windows MS08011 漏洞 利用 代码-MS08011 exploit code
Platform: | Size: 87040 | Author: 123 | Hits:
« 12 3 4 5 6 7 8 9 10 ... 24 »

CodeBus www.codebus.net