MemCheck Driver Memory Tool The MemCheck code is designed to provide Windows NT/2K/XP driver developers with a tool to help in the detection of the following memory handling issues: Buffer overrun Buffer corruption Buffer use after Buffer release Double Buffer releases
工具分類:攻擊程序 運行平臺:Windows 工具大小:7577 Bytes 文件MD5 :28f6d5f4d818438522a3d0dc8a3fa46b 工具來源:securiteam.com // GDI+ Buffer overrun exploit by FoToZ // NB: the headers here are only sample headers taken from a .JPG file, // with the FF FE 00 01 inserted in header1. // Sample shellcode is provided // You can put approx. 2500 bytes of shellcode...who needs that much anyway // Tested on an unpatched WinXP SP1
This scheme is initiated by Ziv and Lempel [1]. A slightly modified version is described by Storer and Szymanski [2]. An implementation using a binary tree is proposed by Bell [3]. The algorithm is quite simple: Keep a ring Buffer, which initially contains "space" characters only. Read several letters from the file to the Buffer. Then search the Buffer for the longest string that matches the letters just read, and send its length and position in the Buffer.
This code implements the basic functions for an I2C slave device using the SSP module. All I2C functions are handled in an ISR. Bytes written to the slave are stored in a Buffer. After a number of bytes have been written, the master device can then read the bytes back from the Buffer.
This version of the code is compatible only with the AT89C2051 due to the
location of the data Buffer and stack in RAM. The code may be modified to
work with the AT89C1051 by relocating or resizing the Buffer and stack to
fit into the smaller amount of RAM available in the AT89C1051.