Linux/x86_x64 – execve(/bin/sh) – 26 bytes

Linux/x86_x64 – execve(/bin/sh) – 26 bytes

5个月前 (11-17) 浏览: 0 评论: 0

/*--------------------------------------------------------------------------------------------------- Linux/x86_x64 - execve(/bin/sh) - 26 bytes Ajith Kp [ @ajithkp560 ] [ http://www.terminalcoders.bl

Linux/x86 – execve(/bin/bash) – 31 bytes

Linux/x86 – execve(/bin/bash) – 31 bytes

5个月前 (11-17) 浏览: 0 评论: 0

/*--------------------------------------------------------------------------------------------------- Linux/x86 - execve(/bin/bash) - 31 bytes Ajith Kp [ @ajithkp560 ] [ http://www.terminalcoders.blog

win32/xp sp3 Restart computer – 57 Bytes

win32/xp sp3 Restart computer – 57 Bytes

5个月前 (11-17) 浏览: 1 评论: 0

/* #[+] Author: TUNISIAN CYBER #[+] Title: Shellcode: win32/xp sp3 Restart computer #[+] Date: 16-04-2015 #[+] Type: Local Exploits #[+] Tested on: WinXp 32bit SP3 #[+] Friendly Sites: sec4ever.com #[

Linux/x86 Reverse TCP Bind Shellcode (92 bytes)

Linux/x86 Reverse TCP Bind Shellcode (92 bytes)

5个月前 (11-17) 浏览: 0 评论: 0

/* Title   : reversetcpbindshell  (92 bytes) Date    : 16 May 2013 Author  : Russell Willis Testd on: Linux/x86 (SMP Debian 3.2.41-2 i686)     $ objdump -D reversetcpbindshell -M intel    reversetcpbi

切换注册

登录

忘记密码 ?

您也可以使用第三方帐号快捷登录

切换登录

注册

扫一扫二维码分享