<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://jal.tw/lib/exe/css.php?s=feed" type="text/css"?>
<rss version="2.0">
    <channel xmlns:g="http://base.google.com/ns/1.0">
        <title>脆笛酥的家 - freebsd</title>
        <description></description>
        <link>https://jal.tw/</link>
        <lastBuildDate>Wed, 08 Apr 2026 02:14:29 +0000</lastBuildDate>
        <generator>FeedCreator 1.8</generator>
        <image>
            <url>https://jal.tw/_media/wiki:dokuwiki.svg</url>
            <title>脆笛酥的家</title>
            <link>https://jal.tw/</link>
        </image>
        <item>
            <title>kevent</title>
            <link>https://jal.tw/freebsd:kevent?rev=1284962438&amp;do=diff</link>
            <description>kevent.c



/* 22.08.2009, babcia padlina
 * FreeBSD kevent() race condition exploit
 *
 * works only on multiprocessor systems
 * gcc -o padlina padlina.c -lpthread
 * -DPRISON_BREAK if you want to exit from jail
 *
 * with thanks to Pawel Pisarczyk for in-depth ia-32 architecture discussion
 */
 
#define _KERNEL
 
#include &lt;sys/types.h&gt;
#include &lt;stdio.h&gt;
#include &lt;unistd.h&gt;
#include &lt;sys/event.h&gt;
#include &lt;sys/timespec.h&gt;
#include &lt;pthread.h&gt;
#include &lt;fcntl.h&gt;
#include &lt;string.h&gt;
#include &lt;s…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 20 Sep 2010 06:00:38 +0000</pubDate>
        </item>
        <item>
            <title>mig-logcleaner</title>
            <link>https://jal.tw/freebsd:mig-logcleaner?rev=1284962192&amp;do=diff</link>
            <description>MIG logcleaner

MIG logcleaner by no1 (greyhats.za.net)

----------

This log cleaner removes logs from utmp, wtmp, utmpx, wtmpx, lastlog files.
Also removes 2 specified text strings out of every file in a specified directory.
Also lets you modify entries as you wish.
Also lets you add new entries.</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 20 Sep 2010 05:56:32 +0000</pubDate>
        </item>
        <item>
            <title>quickbsd</title>
            <link>https://jal.tw/freebsd:quickbsd?rev=1284961926&amp;do=diff</link>
            <description>討厭的程式



/*
 * This is a quick and very dirty exploit for the FreeBSD protosw vulnerability
 * defined here: 
 * http://security.freebsd.org/advisories/FreeBSD-SA-08:13.protosw.asc
 *
 * This will overwrite your credential structure in the kernel. This will 
 * affect more than just the exploit&#039;s process, which is why this doesn&#039;t
 * spawn a shell. When the exploit has finished, your login shell should
 * have euid=0. 
 *
 * Enjoy, and happy holidays!
 *  - Don &quot;north&quot; Bailey (don.bailey@gmail.c…</description>
            <author>anonymous@undisclosed.example.com (Anonymous)</author>
            <pubDate>Mon, 20 Sep 2010 05:52:06 +0000</pubDate>
        </item>
    </channel>
</rss>
