Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - overflow
Search - overflow - List
Windows XP explorer.exe desktop.ini buffer overflow exploit
Update : 2008-10-13 Size : 1.63kb Publisher : 尹天

一份在unix环境下变成的文档,内容有关内存溢出处理方面,有对应实例,适合高级编程人员-in a unix environment into the document, the contents of the memory overflow processing, a corresponding example, Programming for senior officers
Update : 2008-10-13 Size : 309.47kb Publisher : 李军

Frontpage fp30reg.dll Overflow.Binds persistent command shell on port 9999 Tested on Windows 2000 Professional SP3 English version (fp30reg.dll ver 4.0.2.5526)
Update : 2008-10-13 Size : 3.97kb Publisher : jjyy

Windows XP explorer.exe desktop.ini buffer overflow exploit
Update : 2025-02-17 Size : 1kb Publisher :

Frontpage fp30reg.dll Overflow.Binds persistent command shell on port 9999 Tested on Windows 2000 Professional SP3 English version (fp30reg.dll ver 4.0.2.5526)
Update : 2025-02-17 Size : 4kb Publisher :

winrar漏洞测试代码,适用于winrar3.4版本。好像这种东西比较危险-WinRAR loopholes test code applicable to winrar3.4 version. Like this stuff is dangerous
Update : 2025-02-17 Size : 1kb Publisher : fun

DL : 1
This firmware translates a PS/2 mouse to a USB mouse. The translator firmware is entirely interrupt driven (with the exception of sending the data via USB to the host.) An interrupt is generated when the PS/2 start bit is received, at which time the firmware will begin its receive routine. In addition to this interrupt, every 168ms a timer overflow interrupts the main program and implements one state of the mouse state machine. This state machine handles sending bytes to and translating bytes received from the PS/2 mouse automatically. All of this is done in the background while the main program runs in the foreground. The only operation that the main program implements is sending mouse data to the PC via USB. -This firmware translates a PS/2 mouse to a USB mouse. The translator firmware is entirely interrupt driven (with the exception of sending the data via USB to the host.) An interrupt is generated when the PS/2 start bit is received, at which time the firmware will begin its receive routine. In addition to this interrupt, every 168ms a timer overflow interrupts the main program and implements one state of the mouse state machine. This state machine handles sending bytes to and translating bytes received from the PS/2 mouse automatically. All of this is done in the background while the main program runs in the foreground. The only operation that the main program implements is sending mouse data to the PC via USB.
Update : 2025-02-17 Size : 117kb Publisher :

一份在unix环境下变成的文档,内容有关内存溢出处理方面,有对应实例,适合高级编程人员-in a unix environment into the document, the contents of the memory overflow processing, a corresponding example, Programming for senior officers
Update : 2025-02-17 Size : 309kb Publisher : 李军

经典缓冲区溢出攻击代码,含有文档。《深入理解计算机系统》一书中提供的例子,我进行了分析和试验,并将试验的结果和心得记录在文档中。欢迎下载-Classic buffer overflow attack code, containing the document.
Update : 2025-02-17 Size : 35kb Publisher : masheng

求系统的计算最小数,以便让计算人员明确计算机大数吃小数的精度损失-Seek the smallest number of computing systems in order to allow the calculation of large numbers of computer personnel clear decimal precision loss eating
Update : 2025-02-17 Size : 14kb Publisher : 张鹏飞

DL : 0
(黑客丛书)溢出的艺术。 软件破解及攻击类-(Hackers Books) The Art of overflow. Software crack and attack type
Update : 2025-02-17 Size : 1.01mb Publisher : suibianhuang

简单的堆栈溢出,可实现程序的切换,希望对初学者有帮助-A simple stack overflow, the switching process can be realized, and they hope to help beginners
Update : 2025-02-17 Size : 16kb Publisher : zhao

WinRAR 3.x LHA Buffer Overflow Exploit
Update : 2025-02-17 Size : 5kb Publisher :

这个一个介绍了堆溢出的文档,RPC漏洞-堆溢出被冲击波病毒利用,用来入侵系统.-The introduction of a heap overflow documents, RPC vulnerabilities- heap overflow has been the use of shock wave virus to invade the system.
Update : 2025-02-17 Size : 29kb Publisher : 孔文辉

本代码演示了缓冲区溢出的攻击与防范,VC-This code demonstrates the buffer overflow attacks and to guard against, VC
Update : 2025-02-17 Size : 46kb Publisher : zhang

缓冲区溢出,对网络攻击程序,应该使用入侵检测工具坚持是否真的实现了攻击目的-Buffer overflow attacks on the network procedures, the use of intrusion detection tools should adhere to really achieve the purpose of the attack
Update : 2025-02-17 Size : 1kb Publisher : 莫松成

主要是css应用,图片透明覆盖,宽度调节,overflow、position:等应用-Mainly css applications, picture transparent cover, adjust the width, overflow, position: applications
Update : 2025-02-17 Size : 17kb Publisher : 文彬

介绍缓冲区溢出的较好的学习书籍,非常适合想了解这方面原理的同学-an introduction of buffer-overflow
Update : 2025-02-17 Size : 92kb Publisher : 理由

DL : 0
实现缓冲溢出的java源代码,解压缩后可以使用!~-The realization of a buffer overflow
Update : 2025-02-17 Size : 13kb Publisher : csh

一组溢出工具源代码,包括ms05029,05039,webdav,IIS的溢出代码-A set of tools for source code spill, including ms05029, 05039, webdav, IIS overflow code
Update : 2025-02-17 Size : 15kb Publisher : d
« 12 3 4 5 6 7 8 9 10 ... 50 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.