CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - remote
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - remote - List
[
Exploit
]
snmp remote root exploit.rar
DL : 0
Date
: 2026-01-02
Size
: 1.67kb
User
:
[
Exploit
]
socks5 remote exploit.rar
DL : 0
Date
: 2026-01-02
Size
: 2.02kb
User
:
[
Exploit
]
socks5 remote exploit
DL : 0
socks5 remote exploit/ linux x86易受到的攻击 linux:* socks5-v1.0r10 (compiled on a turbolinux 4.0.5) => 0* socks5-v1.0r9 (compiled on a turbolinux 4.0.5) => 0* socks5-v1.0r8 (compiled on a turbolinux 4.0.5) => 0* socks5-v1.0r10 (compiled on a redhat 6.0) => 400* socks5-s5watch-1.0r9-2 (redhat-contrib) => no?* socks5-0.17-1 (redhat 4.2) => no* socks5-1.0r10-5 (redhat-contrib) => no??* socks5-server-1.0r6-8TL (TurboContrib) => no??用法:* $ ./1080r
[offset]该代码本人是本人千辛万苦利用俄汉翻译软件从俄罗斯网站上找到的,还没有来得及实用,就发上来,与大家共研。有问题请Email:jzzq8081@sina.com-socks5 remote exploit/ linux x86 is easy attack linux:* socks5-v1.0r10 which receives (compiled on a turbolinux 4.0.5) = 0* socks5-v1.0r9 (compiled on a turbolinux 4.0.5) = 0* socks5-v1.0r8 (compiled on a turbolinux 4.0.5) = 0* socks5-v1.0r10 (compiled on a redhat 6.0) = 400* socks5-s5watch-1.0r9-2 (redhat-contrib) = no? * socks5-0.17-1 (redhat 4.2) = no* socks5-1.0r10-5 (redhat-contrib) = no? ? * socks5-server-1.0r6-8TL (TurboContrib) = no? ? Usage: * $. /1080r [ offset ] this code myself am myself untold hardships use the Russia Chinese translation software to find from the Russian website, but also is not with enough time practical, sends, altogether grinds with everybody. Has the question to invite Email:jzzq8081@sina.com
Date
: 2008-10-13
Size
: 2.29kb
User
:
姜振
[
Exploit
]
snmp remote root exploit
DL : 0
snmp remote root exploit BSD/OS 4.2 (查看系统是否有SNMP弱口令的主机或各种路由器-snmp remote root exploit BSD/OS 4.2 (examination system whether does have the SNMP weak password the main engine or each kind of router
Date
: 2008-10-13
Size
: 1.94kb
User
:
姜振
[
Exploit
]
oob
DL : 0
一个攻击远端电脑蓝屏的代码-an attack remote computer code blue
Date
: 2008-10-13
Size
: 16.1kb
User
:
丹尼尔
[
Exploit
]
restart
DL : 0
检测远程机器是否有冲击波的漏洞-detect whether remote machines shock the loopholes
Date
: 2008-10-13
Size
: 8.63kb
User
:
吕航
[
Exploit
]
ultravnc-101-src
DL : 0
著名的远程控制软件UltraVNC,开源社区作品,支持反向连接。 官方网站:http://ultravnc.sourceforge.net -famous UltraVNC remote control software, the open source community works to support reverse link. Official website : http://ultravnc.sourceforge.net
Date
: 2008-10-13
Size
: 2.03mb
User
:
徐磊
[
Exploit
]
kill-bill.tar
DL : 0
I. Introduction This code exploits a previously undisclosed vulnerability in the bit string decoding code in the Microsoft ASN.1 library. This vulnerability is not related to the bit string vulnerability described in eEye advisory AD20040210-2. Both vulnerabilities were fixed in the MS04-007 patch. II. Screenshots $ ./kill-bill.pl . kill-bill : Microsoft ASN.1 remote exploit for CAN-2003-0818 (MS04-007) by Solar Eclipse <solareclipse@phreedom.org> Usage: kill-bill -p <port> -s <service> host Services: iis IIS HTTP server (port 80) iis-ssl IIS HTTP server with SSL (port 443) exchange Microsoft Exchange SMTP server (port 25) smb-nbt SMB over NetBIOS (port 139) smb SMB (port 445) If a service is running on its default port you don t have to specify both the service and the port. Examples: kill-bill -s iis 192.168.0.1 kill-bill -p 80 192.168.0.1 kill-bill -p 1234 -s smb 192.168.0.1 -I. Introduction This code exploits a previously undisclosed vulnerability in decoding the bit string code in the Microsoft ASN.1 library. This vulnerability is not related to the bit string vulnerability described in eEye advisory AD20040210-2. Both vulnerabilities were fixed in the MS04 -007 patch. II. Screenshots $. / kill-bill.pl. kill-bill : Microsoft ASN.1 remote exploit for CAN-2003 - 0818 (MS04-007) by Solar Eclipse
Date
: 2008-10-13
Size
: 12.85kb
User
:
JANE
[
Exploit
]
DSR-ducky
DL : 0
Remote yahoo Messenger V5.5 exploiter on Windows XP
Date
: 2008-10-13
Size
: 3.14kb
User
:
尹天
[
Exploit
]
进程守护软件
DL : 0
护软件启动时自动启动设定的进程,进程退出后,守护软件会自动重新启动,可以设定telnet远程登录的用户名和密码,可以通过telnet控制守护软件-security software activated automatically activated when setting process, following the withdrawal process, to guard the software will automatically restart, set telnet remote login user name and password, can be controlled through telnet software guardian
Date
: 2008-10-13
Size
: 86.41kb
User
:
张峰
[
Exploit
]
pcshare20060514
DL : 0
远程控制代码..TCP/IP协议...IO重叠模式.可实现文件,注册表,屏幕的操作-remote control code ..TCP / IP protocol ... IO overlapping pattern. Documents can be realized, Register, the operation of the screen
Date
: 2008-10-13
Size
: 4.16mb
User
:
tt
[
Exploit
]
tibco
DL : 0
tibco远程缓冲区溢出漏洞利用代码,适用各操作系统,本程序为win32平台下的-tibco Remote Buffer Overflow Vulnerability use code, the application of the operating system, The procedures for the win32 platform
Date
: 2008-10-13
Size
: 5.23kb
User
:
李网
[
Exploit
]
miniasylum-1_1
DL : 0
MiniAsylum 1.1 一个小型木马,服务器端只有5K,功能也相对要少一点,只有上传和远程执行程序功能,不过这就够了,这个木马最大的特点的可以通过代理来访问服务器端。 默认设置 端口:23432 自启动程序:c:\\windows\\wincmp32.exe [System.ini] shell=explorer.exe wincmp32.exe -MiniAsylum a small 1.1 Trojan, the server-only 5K. function relative to small, remote and only upload function implementation procedures, but this is adequate, The Trojan greatest feature of the agent can access the server. Default port : 23432 since the commencement of the proceedings : c : \\ windows \\ wincmp32.exe [System.ini] shell = e xplorer.exe wincmp32.exe
Date
: 2008-10-13
Size
: 26.54kb
User
:
21121212
[
Exploit
]
mmtd1.1
DL : 0
一个木马代码 功能比较全面 1.文件管理:模枋 Windows 资源管理器,可以对文件进行:复制、粘贴、删除,重命名、远程运行等,可以上传下载文件或文件夹,操作简单易用。 2.远程控制命令:查看远程系统信息、剪切板查看、进程管理、窗口管理、外设控制、服务管理、共享管理、代理服务、MS-Dos模拟、其它控制! 3.捕获屏幕:不但可以连继的捕获远程电脑屏幕,还能把本地的鼠标及键盘传动作送到远程实现实时控制功能! 4.注册表模拟器:远程注册表操作就像操作本地注册表一样方便!-a Trojan horse code a more comprehensive function. Document management : Die Fang Windows Explorer, on documents : copy, paste, delete, rename, long-distance running, and can upload or download files folder, easy and simple operation. 2. Remote control commands : View remote system information, Shear panel View, process management, window management, control of peripherals, service management, Sharing management, agency services, MS - Dos simulation and other control! 3. Capture screen : not only can not even following the capture remote computer screen, also to bring to the local traditional keyboard and mouse movements to achieve real-time remote control function! 4. Register Simulator : remote operation of the registry to operate like local registry as easy!
Date
: 2008-10-13
Size
: 1.88mb
User
:
校风
[
Exploit
]
WindowsANIZeroDayAnimated_Cursor_Exploit
DL : 0
Windows Animated Cursor Handling Exploit (0day) Works on fully patched Windows Vista I think it is first real remote code execution exploit on vista =) Tested on: Windows Vista Enterprise Version 6.0 (Build 6000) (default installation and UAC enabled) Windows Vista Ultimate Version 6.0 (Build 6000) (default installation and UAC enabled) Windows XP SP2 (It also must to work on all nt based windows but not tested) Author: jamikazu Mail: jamikazu@gmail.com Bug discovered by determina (http://www.determina.com) Credit: milw0rm,metasploit, SkyLined, http://doctus.net/ invokes calc.exe if successful -Windows Animated Cursor Handling Exploit (0day) Works on fully patched Windows Vista I th ink it is first real remote code execution explo it on vista =) Tested on : Windows Vista Enterprise Version 6.0 (Build 60 00) (default installation and UAC enabled) Win dows Vista Ultimate Version 6.0 (Build 6000) (d efault installation and UAC enabled) X-Windows P SP2 (It also must to work on all nt based windows but not tested) Author : jamikazu Mail : jamikazu@gmail.com Bug discovered by determi na (http://www.determina.com) Credit : milw0rm, metasploit, SkyLined, http : / / doctus.net / invokes calc.exe if successful
Date
: 2008-10-13
Size
: 1.58kb
User
:
lee
[
Exploit
]
DirWatcherMFC
DL : 0
监视文件DirWatcher watches the file system and listens for file system change notifications and raises events when a directory, or file in a directory changes. DirWatcher can be used to watch directories on the local computer, a network drive, or a remote computer. DirWatcher uses the ReadDirectoryChangesW Win32 API. -surveillance documents DirWatcher watches the file system an d listens for file system change notifications and raises events when a directory, or file in a directory changes. DirWatcher can b e used to watch directories on the local compute r, a network drive, or a remote computer. DirWatcher uses the ReadD irectoryChangesW Win32 API.
Date
: 2008-10-13
Size
: 7.8kb
User
:
陈文炜
[
Exploit
]
DirWatcherDemoKit
DL : 0
DirWatcher watches the file system and listens for file system change notifications and raises events when a directory, or file in a directory changes. DirWatcher can be used to watch directories on the local computer, a network drive, or a remote computer. -DirWatcher watches the file system and Van tens for file system change notifications and r prize events when a directory, or file in a directory changes. DirWatcher can b e used to watch directories on the local compute r, a network drive, or a remote computer.
Date
: 2008-10-13
Size
: 239.72kb
User
:
陈文炜
[
Exploit
]
snmp remote root exploit
DL : 0
snmp remote root exploit BSD/OS 4.2 (查看系统是否有SNMP弱口令的主机或各种路由器-snmp remote root exploit BSD/OS 4.2 (examination system whether does have the SNMP weak password the main engine or each kind of router
Date
: 2026-01-02
Size
: 2kb
User
:
姜振
[
Exploit
]
Detect-remote-host
DL : 0
探测远程主机操作系统指纹的全新技术,供大家参考-Detect remote host operating system fingerprint of the new technology, for your reference
Date
: 2026-01-02
Size
: 19kb
User
:
zoyong
[
Exploit
]
D-Link-DSL-2740R---Unauthenticated-Remote-DNS-Cha
DL : 0
D-Link DSL-2740R - Unauthenticated Remote DNS Change Exploit
Date
: 2026-01-02
Size
: 1kb
User
:
elis
«
1
2
»
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.