搜索资源列表
kill-bill.tar
- I. Introduction This code exploits a previously undisclosed vulnerability in the bit string decoding code in the Microsoft ASN.1 library. This vulnerability is not related to the bit string vulnerability described in eEye advisory AD20040210
fs44b0xbios
- arm7开发板fs44b0x原代码 说明: 1) 本项目在ADS1.2下编译,在SDT2.51的ADW中调试。编译时,请将整个fs44b0xbios目录拷贝到c:\\下 2) 现在只对39VF160烧入,对其他FLASH可自改,注意要修改BIOS的驻留地址,现地址为0X1F0000. 3) 对不同的RAM而言,修改SYSINIT.S里的参数.FS44B0Xbios运行地址为0XC7C0000,可在ADS中修改. 4) 波特率为57600 5) ip地址为 192.168.
bash-4.1_modify.tar
- 改写bash4.1的bashhist.c部分内容,完成审计的直接向远端的发送,信息丰富如下: PID=23244,PPID=23242,TIME=1348019885,TTY=/dev/pts/2,ORG=192.168.198.1,SRC=root,USER=root,DIR=/siem,CMD=ls -l-To rewrite bash4.1 the bashhist.c part to complete the audit sent directly to the remote, ri
interrupt
- interrupt application code * compile : * $/usr/local/arm/2.95.3/bin/arm-linux-gcc -o interrupt interrupt.c * $cp interrupt /tftpboot/examples * run in target: * #mount 192.168.1.180:/tftpboot/ /mnt/nfs * #cd /mnt/nfs/examples * #
tyybenchavrk
- IP地址自动切换内外网,切换IP地址为:192 168 2 209 192 168 1 209()
afgotithm-common-indirect
- IP地址一键自动切换内外网,IP地址为192 168 1 207 192 168 2 207()
rank
- IP地址自动切换内外网,切换IP地址为:192 168 2 209 192 168 1 209()
0496802
- IP地址自动切换内外网,切换IP地址为:192 168 2 208 192 168 1 208()