Location:
Search - overflow
Search list
Description: Windows XP explorer.exe desktop.ini buffer overflow exploit
Platform: |
Size: 1674 |
Author: 尹天 |
Hits:
Description: 一份在unix环境下变成的文档,内容有关内存溢出处理方面,有对应实例,适合高级编程人员-in a unix environment into the document, the contents of the memory overflow processing, a corresponding example, Programming for senior officers
Platform: |
Size: 316899 |
Author: 李军 |
Hits:
Description: Frontpage fp30reg.dll Overflow.Binds persistent command shell on port 9999 Tested on Windows 2000 Professional SP3 English version (fp30reg.dll ver 4.0.2.5526)
Platform: |
Size: 4064 |
Author: jjyy |
Hits:
Description: Windows XP explorer.exe desktop.ini buffer overflow exploit
Platform: |
Size: 1024 |
Author: |
Hits:
Description: Frontpage fp30reg.dll Overflow.Binds persistent command shell on port 9999 Tested on Windows 2000 Professional SP3 English version (fp30reg.dll ver 4.0.2.5526)
Platform: |
Size: 4096 |
Author: |
Hits:
Description: winrar漏洞测试代码,适用于winrar3.4版本。好像这种东西比较危险-WinRAR loopholes test code applicable to winrar3.4 version. Like this stuff is dangerous
Platform: |
Size: 1024 |
Author: fun |
Hits:
Description: This firmware translates a PS/2 mouse to a USB mouse. The translator
firmware is entirely interrupt driven (with the exception of sending the
data via USB to the host.) An interrupt is generated when the PS/2 start
bit is received, at which time the firmware will begin its receive routine.
In addition to this interrupt, every 168ms a timer overflow interrupts the
main program and implements one state of the mouse state machine. This
state machine handles sending bytes to and translating bytes received from
the PS/2 mouse automatically. All of this is done in the background while
the main program runs in the foreground. The only operation that the main
program implements is sending mouse data to the PC via USB.
-This firmware translates a PS/2 mouse to a USB mouse. The translator firmware is entirely interrupt driven (with the exception of sending the data via USB to the host.) An interrupt is generated when the PS/2 start bit is received, at which time the firmware will begin its receive routine. In addition to this interrupt, every 168ms a timer overflow interrupts the main program and implements one state of the mouse state machine. This state machine handles sending bytes to and translating bytes received from the PS/2 mouse automatically. All of this is done in the background while the main program runs in the foreground. The only operation that the main program implements is sending mouse data to the PC via USB.
Platform: |
Size: 119808 |
Author: 谢 |
Hits:
Description: 一份在unix环境下变成的文档,内容有关内存溢出处理方面,有对应实例,适合高级编程人员-in a unix environment into the document, the contents of the memory overflow processing, a corresponding example, Programming for senior officers
Platform: |
Size: 316416 |
Author: 李军 |
Hits:
Description: 经典缓冲区溢出攻击代码,含有文档。《深入理解计算机系统》一书中提供的例子,我进行了分析和试验,并将试验的结果和心得记录在文档中。欢迎下载-Classic buffer overflow attack code, containing the document.
Platform: |
Size: 35840 |
Author: masheng |
Hits:
Description: 求系统的计算最小数,以便让计算人员明确计算机大数吃小数的精度损失-Seek the smallest number of computing systems in order to allow the calculation of large numbers of computer personnel clear decimal precision loss eating
Platform: |
Size: 14336 |
Author: 张鹏飞 |
Hits:
Description: (黑客丛书)溢出的艺术。
软件破解及攻击类-(Hackers Books) The Art of overflow. Software crack and attack type
Platform: |
Size: 1058816 |
Author: suibianhuang |
Hits:
Description: 简单的堆栈溢出,可实现程序的切换,希望对初学者有帮助-A simple stack overflow, the switching process can be realized, and they hope to help beginners
Platform: |
Size: 16384 |
Author: zhao |
Hits:
Description: WinRAR 3.x LHA Buffer Overflow Exploit
Platform: |
Size: 5120 |
Author: |
Hits:
Description: 这个一个介绍了堆溢出的文档,RPC漏洞-堆溢出被冲击波病毒利用,用来入侵系统.-The introduction of a heap overflow documents, RPC vulnerabilities- heap overflow has been the use of shock wave virus to invade the system.
Platform: |
Size: 29696 |
Author: 孔文辉 |
Hits:
Description: 本代码演示了缓冲区溢出的攻击与防范,VC-This code demonstrates the buffer overflow attacks and to guard against, VC
Platform: |
Size: 47104 |
Author: zhang |
Hits:
Description: 缓冲区溢出,对网络攻击程序,应该使用入侵检测工具坚持是否真的实现了攻击目的-Buffer overflow attacks on the network procedures, the use of intrusion detection tools should adhere to really achieve the purpose of the attack
Platform: |
Size: 1024 |
Author: 莫松成 |
Hits:
Description: 主要是css应用,图片透明覆盖,宽度调节,overflow、position:等应用-Mainly css applications, picture transparent cover, adjust the width, overflow, position: applications
Platform: |
Size: 17408 |
Author: 文彬 |
Hits:
Description: 介绍缓冲区溢出的较好的学习书籍,非常适合想了解这方面原理的同学-an introduction of buffer-overflow
Platform: |
Size: 94208 |
Author: 理由 |
Hits:
Description: 实现缓冲溢出的java源代码,解压缩后可以使用!~-The realization of a buffer overflow
Platform: |
Size: 13312 |
Author: csh |
Hits:
Description: 一组溢出工具源代码,包括ms05029,05039,webdav,IIS的溢出代码-A set of tools for source code spill, including ms05029, 05039, webdav, IIS overflow code
Platform: |
Size: 15360 |
Author: d |
Hits:
« 12
3
4
5
6
7
8
9
10
...
50
»