首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
linux/x86 send "visit inj3ct0r.com" to all konsole XOR encoded 99 bytes
  日期:2010-07-06 09:42:34 点击:86 评论:0
/*1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=00 _ __ __ __ 11 /' __ /'__` / __ /'__` 00 /_, ___ /_/_ ___ ,_/ / _ ___ 11 /_/ /' _ ` / /_/___ /'___ / /`'__ 00 / /
linux/x86 lynx polymorphic shellcode 84 bytes
  日期:2010-07-06 09:36:37 点击:37 评论:0
/*1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=00 _ __ __ __ 11 /' __ /'__` / __ /'__` 00 /_, ___ /_/_ ___ ,_/ / _ ___ 11 /_/ /' _ ` / /_/___ /'___ / /`'__ 00 / /
Sun Java Web Sever 7.0 u7 Admin Interface DoS
  日期:2010-07-06 09:29:01 点击:42 评论:0
# Sun Java Web Sever 7.0 u7 Admin Interface DOS # Software Package sjsws-7_0u7-windows-i586.zip 4fb8d1fb700d5649234a2891a4ecedea # While attempting to verify http://www.exploit-db.com/exploits/14194/ (which was not verified), # I stumbled across sem
125 bind port to 6678 XOR encoded polymorphic linux shellcode
  日期:2010-07-06 09:28:15 点击:39 评论:0
/* Title : bind port to 6678 XOR encoded polymorphic linux shellcode . Name : 125 bind port to 6678 XOR encoded polymorphic linux shellcode . Date : Tue Jul 6 01:52:33 WIT 2010 Author : gunslinger_ yudha.gunslinger[at]gmail.com Web : http://devilzc0
91 bytes nc -lp 31337 -e /bin//sh polymorphic linux shellcode
  日期:2010-07-06 09:27:44 点击:57 评论:0
/* Title : nc -lp 31337 -e /bin//sh polymorphic linux shellcode . Name : 91 bytes nc -lp 31337 -e /bin//sh polymorphic linux shellcode . Date : Mon Jul 5 16:58:50 WIT 2010 Author : gunslinger_ yudha.gunslinger[at]gmail.com Web : http://devilzc0de.or
UFO: Alien Invasion v2.2.1 BoF Exploit (Win7 ASLR and DEP Bypass
  日期:2010-07-06 09:26:54 点击:49 评论:0
#!/usr/bin/python # # Exploit Title:UFO: Alien Invasion v2.2.1 BoF Exploit (Win7 ASLR and DEP Bypass) # Date:July 5, 2010 # Author:Node # Software Link: http://sourceforge.net/projects/ufoai/files/UFO_AI%202.x/2.2.1/ufoai-2.2.1-win32.exe/download #
Safari JS JITed shellcode - exec calc (ASLR/DEP bypass)
  日期:2010-07-06 09:25:36 点击:102 评论:0
!-- JIT-SPRAY for Safari 4.0.5 - 5.0.0 JavaScript JIT SHELLCODE and spray for ASLR / DEP bypass (Win x32) By Alexey Sintsov from Digital Security Research Group Special for Hack In The Box 2010 Amsterdam PAYLOAD - exec calc Tested on Windows7 and Wi
111 bytes echo 0 > /proc/sys/kernel/randomize_va_space SUB encoded linux shellco
  日期:2010-07-06 09:24:14 点击:144 评论:0
/* Author : gunslinger_ yudha.gunslinger[at]gmail.com Web : http://devilzc0de.org blog : http://gunslingerc0de.wordpress.com tested on : linux debian special thanks to : r0073r (inj3ct0r.com), d3hydr8 (darkc0de.com), ty miller (projectshellcode.com)
62 bytes setreuid(0,0) execve("/bin/sh",NULL,NULL) XOR Encoded Linux Shellcode
  日期:2010-07-06 09:23:21 点击:44 评论:0
/* Author : gunslinger_ yudha.gunslinger[at]gmail.com Web : http://devilzc0de.org blog : http://gunslingerc0de.wordpress.com tested on : linux debian special thanks to : r0073r (inj3ct0r.com), d3hydr8 (darkc0de.com), ty miller (projectshellcode.com)
161 bytes Drop suid shell root in /tmp/.hiddenshell Linux Polymorphic Shellcode
  日期:2010-07-06 09:22:36 点击:87 评论:0
/* Author : gunslinger_ yudha.gunslinger[at]gmail.com Web : http://devilzc0de.org blog : http://gunslingerc0de.wordpress.com tested on : linux debian special thanks to : r0073r (inj3ct0r.com), d3hydr8 (darkc0de.com), ty miller (projectshellcode.com)
97 bytes Linx x86 bind shell port 64533
  日期:2010-07-06 09:21:24 点击:58 评论:0
#include stdio.h #include string.h /* 1 ############################################################### 1 0 I'm Magnefikko member from Inj3ct0r Team Promhyl Studies Team 1 1 ############################################################### 0 0-=-=-=-=
SasCam 2.7 ActiveX Head Buffer Overflow
  日期:2010-07-06 09:20:35 点击:40 评论:0
# Exploit Title: SasCam 2.7 ActiveX Head Buffer Overflow # Date: July 4, 2010 # Author: Blake # Software Link:http://download.cnet.com/SasCam-Webcam-Server/3000-2348_4-10491197.html # Version: 2.7 # Tested on: Windows XP SP3 / IE6 and 7 html object
Linux buffer overflow tutorial II [indonesian]
  日期:2010-07-05 11:23:21 点击:162 评论:0
Linux Buffer Overflow TutorialEdisi : Kedua/*1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=00 _ __ __ __ 11 /' __ /'__` / __ /'__` 00 /_, ___ /_/_ ___ ,_/ / _ ___ 11 /_/ /' _ ` / /_/___ /'_
Linux buffer overflow tutorial [indonesian]
  日期:2010-07-05 11:21:55 点击:204 评论:0
Linux Buffer Overflow Tutorial Edisi : Pertama /* 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' __ /'__` / __ /'__` 0 0 /_, ___ /_/_ ___ ,_/ / _ ___ 1 1 /_/ /' _ ` / /_
OpenSSH attack detection DoS PoC
  日期:2010-07-05 11:19:57 点击:81 评论:0
#!/bin/bash## OpenSSH attack detection DoS PoC.# Thanks to Tavis Ormand# Greets to Inj3ct0r Cr3w## usage: script hostname# victim hostnamehostname=${1:-localhost}port=${2:-22}# where the fifo is created to communicate with netcatfifo=/tmp/nc.$# make
Registry OCX v1.5 ActiveX Buffer Overflow Exploit
  日期:2010-07-05 11:14:17 点击:31 评论:0
# Tested on: Windows XP SP3 IE6/7 html object classid='clsid:6D5B4E71-625F-11D2-B3AE-00A0C932C7DF' id='target'/object script language='vbscript' ' Registry OCX Remote Buffer Overflow ' Written by Blake buffer = String(2008, A) eip = unescape(%f3%30%
SasCam WebCam Server v2.6.5 ActiveX SEH Overwrite
  日期:2010-07-05 11:13:32 点击:36 评论:0
html object classid='clsid:0297D24A-F425-47EE-9F3B-A459BCE593E3' id='target'/object script language = 'vbscript' 'SEH Overwrite exploited by Blake 'Original EIP method by callAX 'Tested on XP SP3/IE7 in virtualbox '$ nc 192.168.1.155 4444 'Microsoft
Sun Java Web Sever 7.0 u7 Remote Exploit
  日期:2010-07-05 11:11:55 点击:88 评论:0
/* Sun Java Web Server Exploit * Tested on: * Sun Java Web Server 7.0 update 7 - XP SP3 * Ref: CVE-2010-0361 * This vulnerability was identified by Evgeny Legerov * * Author: Dominic Chell dmc@deadbeef.co.uk * Date: 23/01/2010 */ #include stdafx.h #
ASX to MP3 Converter v3.1.2.1 Local Buffer Overflow (SEH)
  日期:2010-07-05 11:11:14 点击:49 评论:0
# Exploit Title: ASX to MP3 Converter Version 3.1.2.1 (2010-03-30) Local Buffer Overflow (SEH) # Date: nhar essabt 3-7-10 # Author: MadjiX # Software Link: http://www.mini-stream.net/downloads/ASXtoMP3Converter.exe # Version: 3.1.2.1 (2010-03-30) #
Linux/ARM - Polymorphic execve("/bin/sh", ["/bin/sh"], NULL); - XOR 88 encoded -
  日期:2010-07-05 11:10:44 点击:49 评论:0
/* Title: Linux/ARM - Polymorphic execve(/bin/sh, [/bin/sh], NULL); - XOR 88 encoded - 78 bytes Date: 2010-06-28 Tested on: ARM926EJ-S rev 5 (v5l) Author: Jonathan Salwan Web: http://shell-storm.org | http://twitter.com/shell_storm ! Database of she
共637页/12733条记录 首页 上一页 [356] [357] [358] 359 [360] [361] [362] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved