搜索资源列表
kill-bill.tar
- I. Introduction This code exploits a previously undisclosed vulnerability in the bit string decoding code in the Microsoft ASN.1 library. This vulnerability is not related to the bit string vulnerability described in eEye advisory AD20040210
vnx4
- vnc本地口令破解C源代码 默认情况下VNC服务端的密码是放在注册表中的,本工具只针对这种情况。首先用ASP读出注册表中的加密密码,然后用破解工具破解。我给出大家一个读取VNC密码的ASP脚本,默认情况下VNC密码存放在HKCU\\Software\\ORL\\WinVNC3\\Password Set WshShell = server.CreateObject(\"Wscr ipt.Shell\") bkey=WSHShell.RegRead(\"HKCU\\Software\\ORL\
Winpcapsendpacket
- 利用Winpcap开发包设计的P数据包发送的源代码-use Winpcap development kits designed P data packets sent by the source code
WindowsANIZeroDayAnimated_Cursor_Exploit
- Windows Animated Cursor Handling Exploit (0day) Works on fully patched Windows Vista I think it is first real remote code execution exploit on vista =) Tested on: Windows Vista Enterprise Version 6.0 (Build 6000) (default installation a