on a positive note nortons heuristic scaning picks up the jpeg that k-otik's code produces as bloodhound.exploit. rather generic but flags it none the less. i dont believe shell code can be morphed...
Search:Type: Posts; User: Tedob1; Keyword(s): Search: Search took 0.36 seconds.
Results 1 to 1 of 1
|
|