文件名称:book
介绍说明--下载内容均来自于网络,请自行研究使用
著名的缓冲区益出教程原代码,通俗
看完了你就可以利用缓冲区益出来写病毒
看完了你就可以利用缓冲区益出来写病毒
(系统自动生成,下载前可以参看下载内容)
下载文件列表
压缩包 : 87361042book.rar 列表 book\chapter7\Python.rar book\chapter7\ethereal-setup-0.10.5a.exe book\chapter7\pyOpenSSL.exe book\chapter7\warFTP1.6.rar book\chapter7\Python定位warFTP\500个A.py book\chapter7\Python定位warFTP\定位个位.py book\chapter7\Python定位warFTP\定位十位.py book\chapter7\Python定位warFTP\定位百位.py book\chapter7\Python定位warFTP\攻击.py book\chapter7\Python定位warFTP\检验定位点.py book\chapter7\Python定位CCProxy\CCProxy.py book\chapter7\Python定位CCProxy\个位.py book\chapter7\Python定位CCProxy\十位.py book\chapter7\Python定位CCProxy\千位.py book\chapter7\LSA\两个dll.rar book\chapter7\LSA\利用dll攻击.cpp book\chapter7\LSA\直接发包攻击.cpp book\chapter7\CCProxy定位\4085byte.cpp book\chapter7\CCProxy定位\CCProxy1.cpp book\chapter7\CCProxy定位\CCProxy2.cpp book\chapter7\CCProxy定位\CCProxy3.cpp book\chapter7\CCProxy定位\CCProxy4.cpp book\chapter7\CCProxy安装程序\ccproxysetup.exe book\chapter6\winhex11.zip book\chapter6\突破防火墙\复用cmd.cpp book\chapter6\用PEB获取地址\FindKernelByPEB.cpp book\chapter6\恢复堆链表\RecoverHeap.cpp book\chapter6\双管道通用程序\Pipe2AllVerCode.cpp book\chapter6\双管道通用程序\Pipe2AllVersionASM.cpp book\chapter6\yuange暴力搜索\SearchByYuange.cpp book\chapter6\SEH获得地址\FindKernelBySEH.cpp book\chapter6\HASH获得地址\BinduseHASH.cpp book\chapter6\C语言直接提取\GetShellCodeByC.c book\chapter5\直接替换法\DirectExchange.cpp book\chapter5\直接替换法\DirectExchangeCMD.cpp book\chapter5\直接替换法\exchangeDecode.cpp book\chapter5\直接替换法\over_exchange.cpp book\chapter5\拆分法\Add.cpp book\chapter5\拆分法\AddDecodeASM.cpp book\chapter5\拆分法\AddDecodeShellCode.cpp book\chapter5\拆分法\yuange.cpp book\chapter5\拆分法\yuangeDecode.cpp book\chapter5\微调法\decodeAndenShellCode2.cpp book\chapter5\异或*\AllCode.cpp book\chapter5\异或*\xor.cpp book\chapter5\异或*\xorAll.cpp book\chapter5\异或*\xorCMD.cpp book\chapter5\异或*\xorDecode.cpp book\chapter5\内存搜索法\Searchww08.cpp book\chapter5\内存搜索法\ServUtest.cpp book\chapter5\ollydbg工具\onlydbg110c.rar book\chapter5\Serv_U安装程序\ServU5000.rar book\chapter4\FindJmpEsp.cpp book\chapter4\kernel32.dll book\chapter4\获取默认溢出处理地址\getTopSEH.c book\chapter4\获取callesi地址\FindCallEsi.cpp book\chapter4\free\ShellCode.cpp book\chapter4\free\freeVul.cpp book\chapter4\MessageHeapOverFlow\Message.c book\chapter4\JMEGGDI\bmp\Thumbs.db book\chapter4\JMEGGDI\bmp\cn_xp(sp1).bmp book\chapter4\JMEGGDI\bmp\cn_xp(sp1).rar book\chapter4\IDA工具\ida4.5.rar book\chapter4\Allocate\heapvul1.c book\chapter4\Allocate\heapvul1Exp.c book\chapter4\Allocate\heapvul2.c book\chapter4\Allocate\heapvul3.c book\chapter4\Allocate\heapvul4.c book\chapter4\Allocate\heapvul5.c book\chapter4\Allocate\vul1Callesi.c book\chapter3\零管道后门\pipe0C.cpp book\chapter3\测试双管道ShellCode\testBindCode1.cpp book\chapter3\测试双管道ShellCode\testBindCode2.cpp book\chapter3\查找网络函数地址\GetBindAddr.cpp book\chapter3\反向后门\backC.cpp book\chapter3\双管道后门\pipe2ASM.cpp book\chapter3\双管道后门\pipe2C.cpp book\chapter3\单管道后门\pipe1.cpp book\chapter3\socket编程\客户端.cpp book\chapter3\socket编程\服务端.cpp book\chapter3\CreateProcess开窗口\CreateProcess.cpp book\chapter2\GetLoadSysAdd.cpp book\chapter2\自动查找函数地址\GetAddr.cpp book\chapter2\添加用户ShellCode\AddUserASM.cpp book\chapter2\添加用户ShellCode\AddUserC.c book\chapter2\添加用户ShellCode\NetUserAddC.cpp book\chapter2\开dos窗口ShellCode\cmd.cpp book\chapter2\开dos窗口ShellCode\cmdAsm1.cpp book\chapter2\开dos窗口ShellCode\cmdAsm2.cpp book\chapter2\开dos窗口ShellCode\cmdCode.cpp book\chapter2\开dos窗口ShellCode\cmdGetAddr.cpp book\chapter2\Windows对话框ShellCode\MessageASM.cpp book\chapter2\Windows对话框ShellCode\MessageBox.cpp book\chapter2\Windows对话框ShellCode\MessageCode.cpp book\chapter1\test\over.cpp book\chapter1\printer\PrinterCallEbx.c book\chapter1\printer\iis5hackByIsno.c book\chapter1\printer\printer.c book\chapter1\printer\printerJmpEbx.c book\chapter1\JMPESP2JMPEBX\轻松将jmp esp方式 改写为jmp ebx方式.doc book\chapter1\IdaIdq\idaidq.c book\chapter1\Foxmail\foxmail1.c book\chapter1\Foxmail\foxmail2.c book\chapter1\Foxmail\foxmail3.c book\chapter1\Foxmail\foxmail4.c book\chapter1\Foxmail\foxmail5.c book\chapter4\JMEGGDI\bmp book\chapter7\fusser book\chapter7\Python定位warFTP book\chapter7\Python定位CCProxy book\chapter7\LSA book\chapter7\CCProxy定位 book\chapter7\CCProxy安装程序 book\chapter6\突破防火墙 book\chapter6\用PEB获取地址 book\chapter6\恢复堆链表 book\chapter6\双管道通用程序 book\chapter6\yuange暴力搜索 book\chapter6\SEH获得地址 book\chapter6\HASH获得地址 book\chapter6\C语言直接提取 book\chapter5\直接替换法 book\chapter5\拆分法 book\chapter5\微调法 book\chapter5\异或* book\chapter5\内存搜索法 book\chapter5\ollydbg工具 book\chapter5\Serv_U安装程序 book\chapter4\获取默认溢出处理地址 book\chapter4\获取callesi地址 book\chapter4\free book\chapter4\MessageHeapOverFlow book\chapter4\JMEGGDI book\chapter4\IDA工具 book\chapter4\Allocate book\chapter3\零管道后门 book\chapter3\测试双管道ShellCode book\chapter3\查找网络函数地址 book\chapter3\反向后门 book\chapter3\双管道后门 book\chapter3\单管道后门 book\chapter3\socket编程 book\chapter3\CreateProcess开窗口 book\chapter2\自动查找函数地址 book\chapter2\添加用户ShellCode book\chapter2\开dos窗口ShellCode book\chapter2\Windows对话框ShellCode book\chapter1\test book\chapter1\printer book\chapter1\JMPESP2JMPEBX book\chapter1\IdaIdq book\chapter1\Foxmail book\chapter7 book\chapter6 book\chapter5 book\chapter4 book\chapter3 book\chapter2 book\chapter1 book