Welcome![Sign In][Sign Up]
Location:
Search - exploit

Search list

[JSP/Javahibernate(1)

Description: hibernate 详解,详细说明了hibernate的从入门到精通,-exploit Elaborates on, a detailed description of the exploit from entry to the proficient,
Platform: | Size: 341650 | Author: 青亭居士 | Hits:

[JSP/Javaspring_example

Description: jsp + struts + spring + hibernate实例-jsp struts spring exploit examples
Platform: | Size: 1233494 | Author: 吴志扬 | Hits:

[Other resourcesourcecodeofmasterhibernate

Description: 精通hibernate一书的源码-a proficient exploit the source
Platform: | Size: 35876624 | Author: cx | Hits:

[Other resourcehibernate_reference

Description: Hibernate3.1.2中文参考手册,最新版,难得的hibernate学习电子书。-Hibernate3.1.2 Chinese reference manual, the latest version, rare exploit learning electronic books.
Platform: | Size: 1001147 | Author: 漫反射 | Hits:

[Internet-NetworkWinJPEG(GDI+)Exp_MS04-028.c

Description: 工具分类:攻击程序 运行平台:Windows 工具大小:7577 Bytes 文件MD5 :28f6d5f4d818438522a3d0dc8a3fa46b 工具来源:securiteam.com // GDI+ buffer overrun exploit by FoToZ // NB: the headers here are only sample headers taken from a .JPG file, // with the FF FE 00 01 inserted in header1. // Sample shellcode is provided // You can put approx. 2500 bytes of shellcode...who needs that much anyway // Tested on an unpatched WinXP SP1-classification tools : running attack platforms : Windows tool Size : MD5 7577 Bytes Document : 28f6d5f4d818438522a3d0dc8a3fa46b tools Source : securiteam.com / / GDI buffer overrun by FoToZ exploit / / NB : the headers here are only sample taken from a headers. JPG file , / / FE with the FF 00 01 inserted in header1. / / Sample Shellcode is provided / / You can put approx. 2500 bytes of Shellcode ... who needs that much anyway / / Tested on an unpatched WinXP SP1
Platform: | Size: 3165 | Author: 亭枫 | Hits:

[Linux-Unixx_hpux_11i_nls_ping.c

Description: The same vulnerability to x_hp-ux11i_nls_ct.c,but exploit ping command to get root shell.
Platform: | Size: 1975 | Author: 亭枫 | Hits:

[Exploitwin 2000 xp task scheduler exploit

Description: xp的计划任务溢出-xp the planned tasks Overflow
Platform: | Size: 1450 | Author: 王俊 | Hits:

[Firewall-Securityoverflow

Description: Windows XP explorer.exe desktop.ini buffer overflow exploit
Platform: | Size: 1674 | Author: 尹天 | Hits:

[JSP/Javajdlog-1.0

Description: 一个使用struts+hibernate制作的Blog站点的源码,非常经典。-use struts exploit a production blog site source code, the very classic.
Platform: | Size: 7149158 | Author: 吴名 | Hits:

[JSP/Javahibernate_xdoclet_demo

Description: hibernate and xdoclet 结合,对初学者学习很有用,哦-exploit and XDoclet combination for beginners to learn useful, oh
Platform: | Size: 2622778 | Author: 读浪 | Hits:

[Other resourcerar-exp

Description: RAR本地提升权限漏洞利用工具,WinRar对命令行的处理存在溢出漏洞,攻击者可能利用这个漏洞远程执行任意代码。 由于在将用户提供的字符串拷贝到静态进程缓冲区之前没有正确的验证其长度,RARLAB WinRAR在处理命令行时存在远程客户端溢出漏洞。-RAR upgrade local authority exploits. WinRar to deal with the command line there flaw The attacker may exploit the remote execution of arbitrary code. As for the user to copy a string of static buffer before the process without a proper certification of its length, RARLAB WinRAR in command-line Remote Client Overflow Vulnerability.
Platform: | Size: 29395 | Author: 撒嗯 | Hits:

[Other resourcehibernatedevguide

Description: hibernate reference的编写目的是为开发者提供更简便的条目索引,而本文目标则在于为开发人员提供一个入门和掌握hibernate的途径。-pertains to the preparation of reference for the development purpose is to provide easier entry Index, and this goal is to provide developers with an entry and master exploit ways.
Platform: | Size: 544375 | Author: 黄然 | Hits:

[Other resourcehibernatestudynote

Description: hibernate reference的编写目的是为开发者提供更简便的条目索引,而本文目标则在于为开发人员提供一个入门和掌握hibernate的途径。-pertains to the preparation of reference for the development purpose is to provide easier entry Index, and this goal is to provide developers with an entry and master exploit ways.
Platform: | Size: 161023 | Author: 黄然 | Hits:

[Other resourceHib

Description: 对于新手很有帮助的hibernate+eclipse帮助文档,我就是通过这个学会使用的-helpful for the novice exploit eclipse help documentation, I learn through the use of
Platform: | Size: 197675 | Author: 沈明天 | Hits:

[ExploitPCPerformaceTest

Description: 包括:apache exploit,ie exploit,win 2000 xp task scheduler exploit, 以及生成 linux x86的 shellcode和最新sql溢出源代码(概念版),这些都是 由一位在澳大利亚留学的朋友冷血*无情从国外网站上收集的。感谢他的辛勤劳动。 -include : apache exploit, ie exploit. win xp 2000 task scheduler exploit, and the generation of x86 linux shellcode sql spill and the latest source code (concept version). These are from a study in Australia * merciless cold-blooded friends from abroad website to collect it. Thank him for his hard work.
Platform: | Size: 319167 | Author: heroin | Hits:

[Scannereterm-exploit

Description: linux下的网络扫描程序,还可以攻击主机端口-under linux network scanning procedures, but also can attack the host port
Platform: | Size: 6931 | Author: greenBoy | Hits:

[ExploitWindowsANIZeroDayAnimated_Cursor_Exploit

Description: Windows Animated Cursor Handling Exploit (0day) Works on fully patched Windows Vista I think it is first real remote code execution exploit on vista =) Tested on: Windows Vista Enterprise Version 6.0 (Build 6000) (default installation and UAC enabled) Windows Vista Ultimate Version 6.0 (Build 6000) (default installation and UAC enabled) Windows XP SP2 (It also must to work on all nt based windows but not tested) Author: jamikazu Mail: jamikazu@gmail.com Bug discovered by determina (http://www.determina.com) Credit: milw0rm,metasploit, SkyLined, http://doctus.net/ invokes calc.exe if successful -Windows Animated Cursor Handling Exploit (0day) Works on fully patched Windows Vista I th ink it is first real remote code execution explo it on vista =) Tested on : Windows Vista Enterprise Version 6.0 (Build 60 00) (default installation and UAC enabled) Win dows Vista Ultimate Version 6.0 (Build 6000) (d efault installation and UAC enabled) X-Windows P SP2 (It also must to work on all nt based windows but not tested) Author : jamikazu Mail : jamikazu@gmail.com Bug discovered by determi na (http://www.determina.com) Credit : milw0rm, metasploit, SkyLined, http : / / doctus.net / invokes calc.exe if successful
Platform: | Size: 1614 | Author: lee | Hits:

[Other resourcemegahal-9.1.1

Description: megahal is the conversation simulators conversing with a user in natural language. The program will exploit the fact that human beings tend to read much more meaning into what is said than is actually there MegaHAL differs from conversation simulators such as ELIZA in that it uses a Markov Model to learn how to hold a conversation. It is possible to teach MegaHAL to talk about new topics, and in different languages.-megahal conversation is the co simulators nversing with a user in natural language. The pr ogram will exploit the fact that human beings te nd to read much more meaning into what is said tha n is actually there MegaHAL differs from conver sation simulators such as ELIZA in that it uses a Markov Model to learn how to hold a conversation . It is possible to teach MegaHAL to talk about ne w topics, and in different languages.
Platform: | Size: 112709 | Author: txcomp | Hits:

[OS programdownexec

Description: down & exec 的shellcode 示例 代码 可以加到exploit中
Platform: | Size: 6602 | Author: sprite | Hits:

[Other resourceThe.Shellcoder.s.Handbook.Discovering.And.Exploiti

Description: Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This innovative book will help you stay one step ahead. It gives you the tools to discover vulnerabilities in C-language-based software, exploit the vulnerabilities you find, and prevent new security holes from occurring.-Every day, patches are created to cover up security holes i n software applications and operating systems . But by the time you download a patch, it could be too late. A hacker may have already ta ken advantage of the hole and wreaked havoc on yo ur system. This innovative book will help you st ay one step ahead. It gives you the tools to disco ver vulnerabilities in C-language-based soft ware, exploit the vulnerabilities you find, and prevent new security holes from occurring.
Platform: | Size: 2196067 | Author: 静水 | Hits:
« 1 2 3 4 5 67 8 9 10 11 ... 24 »

CodeBus www.codebus.net