搜索资源列表
x_hpux_11i_nls_ping.c
- The same vulnerability to x_hp-ux11i_nls_ct.c,but exploit ping command to get root shell.
findretloc
- 一个自动查找retloc的小脚本,主要在于可以提取其中的findretloc函数使exploit更加智能化,具体使用参看源代码.灵感来自coresecurity paper和dvdman的exploit.
Linuxkernel_research_and_explot
- 研究Linuxkernel exploit的必要性。读后可以解决许多实际问题,写出exploit级别的knerl
vmsplice_exploit.c
- Linux vmsplice Local Root Exploit Code, ef. Linux 2.6.17 - 2.6.24.1
Xmameccode
- Xmame is a console game for linux. This exploit gain root
hardware.tar.gz
- 韦东山的嵌入式完全开发手册的硬件实验代码,光盘资料,无任何修改。使用时改扩展名为bz2.,Wei Dongshan embedded Guide to fully exploit the hardware test code, CD-ROM, without any changes. When used to change the extension bz2.
drivers_and_test.tar
- 韦东山的嵌入式完全开发手册的硬件相关实验代码,光盘资料,无任何修改。使用时改扩展名为bz2.-Wei Dongshan embedded Guide to fully exploit the hardware-related experimental code, CD-ROM, without any changes. When used to change the extension bz2.
Buffer_Overflows_b
- 顶尖高手对缓冲区溢出的详细,绝对值得一看。压缩包为zip格式的,试试吧。- Nowadays there are many buffer overflow exploit codes. The early buffer overflow exploit codes only spawn a shell ( execute /bin/sh ). However, nowadays some of the buffer overflow exploit codes have very nic
mpg123-pre0.59s-mmx-gcc4.0.tar
- mpg123是一款使用于Linux和Unix操作系统下的MP3播放程序。mpg123在处理MPEG 2.0的3层文件时,layer3.c的III_i_stereo()函数中存在缓冲区溢出漏洞,攻击者可能利用此漏洞执行任意指令。提供这个源码给病毒,*爱好者们研究。 -mpg123 is a used in Linux and Unix operating systems of the MP3 player. mpg123 in dealing with MPEG 2.0 layer 3 fi
Learning-Perl---For-Exploit-Coding
- Learning Perl - For Exploit Coding
70137.pl
- Bash exploit for shell shock vulnerable
BlackBase
- linux exploit local root 2015
xor-neon
- Pull in the reference implementations while instructing GCC (through -ftree-vectorize) to attempt to exploit implicit parallelism and emit NEON instructions.
39686
- exploit sample/fron exploit-db for linux
i2c总线协议(英文版)
- In consumer electronics, telecommunications and industrial electronics, there are often many similarities between seemingly unrelated designs. For example, nearly every system includes: · Some intelligent control, usually a single-chip microcont
A_Guide_to_Kernel_Exploitation.pdf.tar
- The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers.
4.14.7centos7&ubuntu16.04文件读取漏洞
- 基于4.14.7内核的centos7和ubuntu16.04文件读取漏洞exploit。编译之后通过本地执行来利用漏洞。(Centos7 and ubuntu16.04 file read vulnerability exploit based on 4.14.7 kernel. After compilation, we exploit the vulnerability through local execution.)
近三年的漏洞复现与防范(修改)
- POC: POC,Proof ofConcept,中文意思是“观点证明”。这个短语会在漏洞报告中使用,漏洞报告中的POC则是一段说明或者一个攻击的样例,使得读者能够确认这个漏洞是真实存在的。 EXP: EXP,Exploit,中文意思是“漏洞利用”。意思是一段对漏洞如何利用的详细说明或者一个演示的漏洞攻击代码,可以使得读者完全了解漏洞的机理以及利用的方法。 漏洞概述: 2018年2月1日,Adobe官方发布安全通报(APSA18-01),声明Adobe Flash 28.0.0.1