/* Shellcode Length: 39 bytes */ /* sets PEB->BeingDebugged to 0 */ /* IsDebuggerPresent()/BeingDebugged bypass */ /* by ex-pb @ screw_you@web.de */ /* greets: xgx and all i forgot */ #include <stdio.h> #include <windows.h> char ShellCode[] = "\xEB" "\x0F\x58\x80\x30\x95\x40\x81\x38\x68\x61\x63\x6B\x75\xF4\xEB\x05\xE8\xEC\xFF\xFF" "\xFF\xF1\x34\xA5\x95\x95\x95\xAB\x53\xD5\x97\x95\x56\x68\x61\x63\x6B\xCD"; int main() { printf("Shellcode length: %d\n", strlen(ShellCode)); return 0; }
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论