首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
linux/x86 2.6.27-9-generic listerning on 37337 shellcode 114 bytes
  日期:2010-08-24 09:48:06 点击:62 评论:0
# Exploit Title:shellcode listening 114 bytes # Date: 2010-08-23 # Author: nex # Software Link: N/A # Version: N/A # Category: shellcode # Tested on: Linux/x86 2.6.27-9-generic /* shellcode listerning on 37337 */ char shellcode[] = x31xc0xb0x66x
PSnews - v1.3 Remote Database Disclosure Exploit
  日期:2010-08-24 09:47:39 点击:49 评论:0
Author : KnocKout Thankz : DaiMon,BARCOD3 Cyber-Warrior.Org/CWKnocKout | Cyber-Warrior.Org/DaiMon | Cyber-Warrior.Org/BARCOD3 Contact : knockoutr@msn.com Script : PSnews - v1.3 Download : http://sourceforge.net/projects/psnews/files/PSnews_v1.3/PSnew
WebDAV Application DLL Hijacker(meta)
  日期:2010-08-24 09:46:32 点击:110 评论:0
### $Id: webdav_dll_hijacker.rb 10101 2010-08-23 13:41:59Z hdm $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information
A-PDF WAV to MP3 v1.0.0 Buffer Overflow(meta)
  日期:2010-08-24 09:45:35 点击:62 评论:0
### $Id: a-pdf_wav_to_mp3.rb 10107 2010-08-23 16:58:42Z jduck $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information
Java Statement.invoke() Trusted Method Chain Exploit(meta)
  日期:2010-08-24 09:44:40 点击:95 评论:0
### $Id: java_trusted_chain.rb 10113 2010-08-23 18:49:35Z egypt $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more informatio
Video Script ASP Database Disclosure Exploit
  日期:2010-08-23 10:44:47 点击:44 评论:0
#!/usr/bin/perl -w # # Video Script ASP Database Disclosure Exploit # # Found Coded: indoushka # # Date: 25/07/2010 # # Home: www.sec4ever.com # # Dz-Ghost Team ===== Saoucha * Star08 * Cyber Sec * theblind74 * XproratiX * onurozkan * n2n * Meher Ass
UblogReload 1.0.5 Database Disclosure Exploit
  日期:2010-08-23 10:44:03 点击:20 评论:0
#!/usr/bin/perl -w # # UblogReload 1.0.5 Database Disclosure Exploit # # Found Coded: indoushka # # Date: 25/07/2010 # # Home: www.sec4ever.com # # Dz-Ghost Team ===== Saoucha * Star08 * Cyber Sec * theblind74 * XproratiX * onurozkan * n2n * Meher As
ECShop v2.7.2 (FCKeditor Remote Upload File) Exploit
  日期:2010-08-23 10:43:20 点击:838 评论:0
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' __ /'__` / __ /'__` 0 0 /_, ___ /_/_ ___ ,_/ / _ ___ 1 1 /_/ /' _ ` / /_/___ /'___ / /`'__ 0 0 / /
ECShop v2.6.1 (FCKeditor Remote Upload File / XSS) Exploit
  日期:2010-08-23 10:42:32 点击:257 评论:0
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' __ /'__` / __ /'__` 0 0 /_, ___ /_/_ ___ ,_/ / _ ___ 1 1 /_/ /' _ ` / /_/___ /'___ / /`'__ 0 0 / /
os-x/x86 intel - execve(/bin/sh) 24 bytes
  日期:2010-08-23 10:41:51 点击:83 评论:0
/* Title : OSX/x86 intel - execve(/bin/sh) - 24 bytes Type : Shellcode Author : Simon Derouineau - simon.derouineau [AT] ingesup.com Platform : Mac OSX/Intel. Tested on 10.6.4 Build 10F569 Informations : This code has to be compiled with gcc -m32 swi
linux/x86 /etc/init.d shellcode 83 bytes
  日期:2010-08-23 10:41:06 点击:55 评论:0
# Exploit Title: /etc/init.d shellcode 83 bytes # Author: nex # Software Link: N/A # Version: N/A # Category: shellcode # Tested on: Linux/x86 2.6.27-9-generic /* copy in /etc/init.d shellcode */ /* 83 bytes lenght */ /* .text .globl _start _start: x
linux/x86 /bin/sh Null-Free Polymorphic Shellcode - 46 bytes
  日期:2010-08-23 10:40:08 点击:41 评论:0
#include stdio.h #include string.h /* Aodrulez's /bin/sh Null-Free Polymorphic Shellcode. Shellcode size : 46 bytes. [Special Tnx to 'Chema Garcia (aka sch3m4)'] Tested on : Ubuntu 8.04,Hardy Heron. Email : f3arm3d3ar[at]gmail.com Author: Aodrulez. (
SonciWALL Aventail epi.dll AuthCredential Format String Exploit(meta)
  日期:2010-08-23 10:37:49 点击:73 评论:0
### $Id: aventail_epi_activex.rb 10078 2010-08-20 11:36:50Z swtornio $##### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more infor
Microsoft Windows (IcmpSendEcho2Ex interrupting) Denial of Service Vulnerability
  日期:2010-08-23 10:17:46 点击:216 评论:0
/*Microsoft Windows DoS (IcmpSendEcho2Ex interrupting)Author: l3DSites: http://nullbyte.org.il, http://forums.hacking.org.ilIRC: irc://irc.nix.co.il/#securityEmail: pupipup33@gmail.comTested on Windows 7Microsoft Windows operating system is prone to
PlayPad Music Player v1.12 .mp3 Denial of Service Vulnerability
  日期:2010-08-23 10:16:58 点击:36 评论:0
# Exploit Title: PlayPad Music Player v1.12 .mp3 File Processing BoF/Crash# Date: 20th August, 2010# Author: Praveen Darshanam# Software Link:http://software-files-l.cnet.com/s/software/11/36/36/00/playsetup.exe?e=1282332392h=9edf959c2f8f5a185881921
AV Music Morpher Gold 5.0.38 (.m3u) Denial of Service Vulnerability
  日期:2010-08-23 10:16:22 点击:29 评论:0
#!/usr/bin/python## Exploit Title: AV Music Morpher Gold (.m3u) Local Crash PoC# Date: 08-20-2010# Author: b0telh0# Software Link: http://www.musicmorpher.com/download.php?product=musicgold# Version: 5.0.38# Tested on: Windows XP SP3 (pt-br) Virtual
Windows XP SP3 English MessageBoxA Shellcode - 87 bytes
  日期:2010-08-23 10:15:33 点击:67 评论:0
/* Title: Windows XP SP3 English MessageBoxA Shellcode (87 bytes)Date: August 20, 2010Author: Glafkos Charalambous (glafkos[@]astalavista[dot]com)Tested on: Windows XP SP3 EnThanks: ishtusGreetz: Astalavista, OffSEC, Exploit-DB*/#include stdio.hchar
Karaoke Video Creator Denial of Service Vulnerability
  日期:2010-08-23 10:10:08 点击:33 评论:0
# Exploit Title: Karaoke Video Creator Denial of Service Vulnerability# Author: PASSEWORD# Date: 2010-08-20# Software Link: http://www.powerkaraoke.com/src/prod-karaoke-video-creator.php# Version : 2.2.8# Greetz 2 : d4rk-h4ck3r , And All Muslims And
Anasayfam Portal 2010 Remote Database Disclosure Exploit
  日期:2010-08-20 11:52:00 点击:84 评论:0
#!/usr/bin/perl -w # # Anasayfam Portal 2010 / Database Disclosure Exploit # # Coded: BARCOD3 # # # # # Thanks: DaiMon, KnocKout, NeT-Excellans all Logystics. # use LWP::Simple; use LWP::UserAgent; system('cls'); system('title Anasayfam Portal 2010 R
HHCTRLLib (hhctrl.ocx) Remote BOF Exploit (heap spray)
  日期:2010-08-20 11:50:44 点击:93 评论:0
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' __ /'__` / __ /'__` 0 0 /_, ___ /_/_ ___ ,_/ / _ ___ 1 1 /_/ /' _ ` / /_/___ /'___ / /`'__ 0 0 / /
共637页/12733条记录 首页 上一页 [344] [345] [346] 347 [348] [349] [350] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved