Welcome![Sign In][Sign Up]
Location:
Search - exploits

Search list

[Exploit-exploits.rar

Description: 源代码
Platform: | Size: 34195 | Author: | Hits:

[Exploit-exploits.rar

Description: 一个网络扫描程序的源代码
Platform: | Size: 31569 | Author: | Hits:

[Shell apifoxmail5

Description: FoxMail5.0漏洞利用。采用缓冲区溢出的shell编程,适合的版本:FoxMail5.0 ,FoxMail5.0 beta1及beta2.-FoxMail5.0 exploits. Using a buffer overflow shell programming, suitable Version : FoxMail5.0, FoxMail5.0 beta1 and beta2.
Platform: | Size: 3530 | Author: 王松 | Hits:

[Other resourcehongke

Description: 详实地介绍了各种红客的入门技、战术,以及各种技巧,这些技、战术以及各种技巧都是经过红客大联盟的各个成员在实践检验中总结出来的,着重讲解了红客对系统漏洞利用的技巧、防火墙和服务器的安全防范知识以及OICQ、江湖游戏等一些网络上热门的交流工具攻防策略,具有相当的可靠性和实用性。-informative introduction of the various Honkers entry skills and tactics, as well as various techniques, skills, tactical and different techniques that are big Honker Union of various members of the practice tests summed up, focus on the Honker of the system exploits the skills, firewall and server security knowledge and auto the ring network games on the hottest communication tools defense strategy with considerable reliability and practicality.
Platform: | Size: 1453023 | Author: 沈利 | Hits:

[Other resourceSCC_WebSystem_v1[1].20

Description: 安全中心整站系统是一个网络安全类整站系统。由七个模块组成,其中包括:文章系统(安全文档)、下载系统(安全工具、**作品)、漏洞发布系统(安全漏洞)、代码发布模块(漏洞利用)、在线申请模块(工作室)和信息发布模块(关于我们)。 -Safety Center Station whole system is a network security system like the whole station. By seven modules, including : articles (safety documentation), downloading system (security tools, ** works), loophole Publishing System (security holes), the code is distributed modules (exploits), the online application module (studio) and information dissemination module (for us).
Platform: | Size: 888607 | Author: dongh | Hits:

[Exploitkill-bill.tar

Description: I. Introduction This code exploits a previously undisclosed vulnerability in the bit string decoding code in the Microsoft ASN.1 library. This vulnerability is not related to the bit string vulnerability described in eEye advisory AD20040210-2. Both vulnerabilities were fixed in the MS04-007 patch. II. Screenshots $ ./kill-bill.pl . kill-bill : Microsoft ASN.1 remote exploit for CAN-2003-0818 (MS04-007) by Solar Eclipse <solareclipse@phreedom.org> Usage: kill-bill -p <port> -s <service> host Services: iis IIS HTTP server (port 80) iis-ssl IIS HTTP server with SSL (port 443) exchange Microsoft Exchange SMTP server (port 25) smb-nbt SMB over NetBIOS (port 139) smb SMB (port 445) If a service is running on its default port you don t have to specify both the service and the port. Examples: kill-bill -s iis 192.168.0.1 kill-bill -p 80 192.168.0.1 kill-bill -p 1234 -s smb 192.168.0.1 -I. Introduction This code exploits a previously undisclosed vulnerability in decoding the bit string code in the Microsoft ASN.1 library. This vulnerability is not related to the bit string vulnerability described in eEye advisory AD20040210-2. Both vulnerabilities were fixed in the MS04 -007 patch. II. Screenshots $. / kill-bill.pl. kill-bill : Microsoft ASN.1 remote exploit for CAN-2003 - 0818 (MS04-007) by Solar Eclipse
Platform: | Size: 13156 | Author: JANE | Hits:

[ExploitMS05-055Exp

Description: 微软MS05-055漏洞利用程序,利用此漏洞可提升本地权限-Microsoft MS05 - 055 exploits procedures, the use of this loophole may enhance the local authority
Platform: | Size: 54454 | Author: 丝文 | Hits:

[Other resourcerar-exp

Description: RAR本地提升权限漏洞利用工具,WinRar对命令行的处理存在溢出漏洞,攻击者可能利用这个漏洞远程执行任意代码。 由于在将用户提供的字符串拷贝到静态进程缓冲区之前没有正确的验证其长度,RARLAB WinRAR在处理命令行时存在远程客户端溢出漏洞。-RAR upgrade local authority exploits. WinRar to deal with the command line there flaw The attacker may exploit the remote execution of arbitrary code. As for the user to copy a string of static buffer before the process without a proper certification of its length, RARLAB WinRAR in command-line Remote Client Overflow Vulnerability.
Platform: | Size: 29395 | Author: 撒嗯 | Hits:

[Other resourcewin32_overflow

Description: win32缓冲区溢出实战。原文:Intro to Win32 Exploits。从漏洞发现到漏洞调试和漏洞利用。 -win32 Buffer Overflow combat. Original : Intro to Win32 Exploits. From the loopholes found loopholes to the use of debugging and loopholes.
Platform: | Size: 1054346 | Author: 修罗 | Hits:

[Firewall-SecurityMS_DNS_exploits

Description: DNS_ remote exploits for windows 2-DNS_ remote exploits for Windows 2
Platform: | Size: 9188 | Author: 1212 | Hits:

[Windows Develop通用网站上传漏洞利用程序 CommUpFile v1.0

Description: delphi 通用网站上传漏洞利用程序-website upload exploits procedures
Platform: | Size: 236767 | Author: 黄健 | Hits:

[Exploitbind8x

Description: bind prior to 8.2.3-REL remote root exploit - exploits the named INFOLEAK and TSIG bug. Includes shellcode for Linux.
Platform: | Size: 5336 | Author: wmnq | Hits:

[Exploitmsexpliot

Description: 针对微软缓冲区溢出的一个漏洞利用工具,代码经过调试,可以应用于window2k平台-against Microsoft in a buffer overflow exploits, code After debugging, platform can be applied to window2k
Platform: | Size: 18592 | Author: 李岩 | Hits:

[WinSock-NDIShnxyy.Discsuz

Description: Discuz! 2.2F上传漏洞利用程序 参照Wascool的工具编写,实现上传一句话后门。 先注册一个名字,然后登陆!随便找一个贴子回复~ 用WSockExpert抓包记下自己的COOKIE及有网站名与回复贴子的路径,还有你所要回复的标题和内容,填到相应的选项里~~ 配合附带的up.htm和wrsky.php上传更大的后门 具体原理参考小花的文章 DISCUZ2上传漏洞分析 上传漏洞变换利用-BBS! 2.2F upload exploits procedures Wascool reference tools to prepare and achieve uplink word back door. First registered a name, and then landing! Just a reply to a posting with WSockExpert capturing Packet note of your COOKIE and screen postings and resume the path, you have to answer the title and content to fill the corresponding options li ~ ~ with the known and fringe wrsky.php upload more specific tenets backdoor reference articles florets DISCUZ2 upload vulnerability analysis upload transform use loopholes
Platform: | Size: 212696 | Author: 凉凉 | Hits:

[Exploitms04028

Description: ms04028漏洞利用程序,利用GDIPLUS.DLL的堆溢出漏洞-ms04028 exploits procedures, the use of GDIPLUS.DLL heap overflow vulnerability
Platform: | Size: 7400 | Author: 咔咔 | Hits:

[Other0107-exploits

Description: 一个FTP密码破解程序的源代码-An FTP password cracking program s source code
Platform: | Size: 180224 | Author: 刘斌 | Hits:

[Multimedia programVideosynchronization

Description: 这是一篇优秀的论文,是关于视频处理方面的,在文章中,既有经典的方法,也有独到之处-This paper presents a method of synchronizing video sequences that exploits the non-rigidity of sets of 3D point features (e.g., anatomical joint locations) within the scene
Platform: | Size: 999424 | Author: guangqishao | Hits:

[Picture ViewerGeneric---JPEG-exploits

Description: collection of source code for various JPEG exploits written in C
Platform: | Size: 76800 | Author: bzomzom | Hits:

[Technology ManagementAIX6.1-overflow-exploits-principle

Description: AIX5.3及6.1堆溢出漏洞利用原理分析-AIX5.3 and 6.1 heap overflow exploits the principle of analysis
Platform: | Size: 406528 | Author: windy | Hits:

[Exploitsamba.exploits.tar

Description: Exploits for various recent samba vulnerabilities.
Platform: | Size: 891904 | Author: georg42 | Hits:
« 12 3 4 5 6 7 »

CodeBus www.codebus.net