lol脚本视频演示一键流控

发布时间:2020-11-14 来源:脚本之家 点击:

常见的有:1利用Autodesk公司提供的Aaplay.VBX控件,可方便实现,但正版Aaplay.VBX很难见到,且在VB4.0以上版本中,已不再支持VBX控件而改用OCX记录客户机操作的VBS脚本
onerrorresumenext
strComputer="."
SetobjWMIService=GetObject("winmgmts:\"&strComputer&"\root\cimv2")
SetIPConfigSet=objWMIService.ExecQuery_
("SelectIPAddressfromWin32_NetworkAdapterConfigurationwhereIPEnabled=TRUE")
ForEachIPConfiginIPConfigSet
IfNotIsNull(IPConfig.IPAddress)Then
Fori=LBound(IPConfig.IPAddress)toUBound(IPConfig.IPAddress)
a=IPConfig.IPAddress(i)
Next
EndIf
Next

strComputer="."
SetobjWMIService=GetObject("winmgmts:"_
&"{impersonationLevel=impersonate}!\"&strComputer&"\root\cimv2")
SetcolMonitoredProcesses=objWMIService._
ExecNotificationQuery("select*from__instancecreationevent"_
&"within1whereTargetInstanceisa'Win32_Process'")


i=0


DoWhilei=0
SetobjLatestProcess=colMonitoredProcesses.NextEvent
b=objLatestProcess.TargetInstance.CommandLine

setfso=createobject("scripting.filesystemobject")
setfile1=fso.opentextfile("\\192.168.0.87\ourway$\ourway.htm",8,true)
file1.writelinenow()&"---"&a&"---"&b&"<hr>"
file1.close

Loop

shell脚本详解

oShellLink.WindowStyle=1

  下面的例子成功地改变了屏幕保护,全部源代码如下:

'得到windows目录

PrivateDeclareFunctionGetWindowsDirectoryLib"kernel32"Alias"GetWindowsDirectoryA"(ByVallpBufferAsString,ByValnSizeAsLong)AsLong

'修改system.ini
PrivateDeclareFunctionWritePrivateProfileStringLib"kernel32"Alias"WritePrivateProfileStringA"(ByVallpApplicationNameAsString,ByVallpKeyNameAsAny,ByVallpStringAsAny,ByVallplFileNameAsString)AsLong

'得到system目录
PrivateDeclareFunctionGetSystemDirectoryLib"kernel32"Alias"GetSystemDirectoryA"(ByVallpBufferAsString,ByValnSizeAsLong)AsLong

'设置屏幕保护
PrivateConstSPI_SETSCREENSAVETIMEOUT=15
PrivateConstSPI_SETSCREENSAVEACTIVE=17
PrivateConstSPIF_UPDATEINIFILE=&H1
PrivateConstSPIF_SENDWININICHANGE=&H2

PrivateDeclareFunctionSystemParametersInfoLib"user32"Alias"SystemParametersInfoA"(ByValuActionAsLong,ByValuParamAsLong,ByVallpvParamAsLong,ByValfuWinIniAsLong)AsLong

'启动屏幕保护
PrivateDeclareFunctionSendMessageLib"user32"Alias"SendMessageA"(ByValhwndAsLong,ByValwMsgAsLong,ByValwParamAsLong,lParamAsAny)AsLong

PrivateConstWM_SYSCOMMAND=&H112
PrivateConstSC_SCREENSAVE=&HF140

PrivateSubForm_Load()
 '得到system目录
 DimsSaveAsString,RetAsLong
 sSave=Space(255)
 Ret=GetSystemDirectory(sSave,255)
 sSave=Left$(sSave,Ret)
 '把屏保复制到系统目录
 FileCopyApp.Path&"\工程1.scr",sSave&"\工程1.SCR"
 '得到windows目录
 DimPathAsString,strSaveAsString
 strSave=String(250,Chr$(0))
 Path=Left$(strSave,GetWindowsDirectory(strSave,Len(strSave)))
 '修改system.ini
 DimrAsLong
 DiminiPathAsString
 iniPath$=Path "\system.ini"
 r=WritePrivateProfileString("boot","SCRNSAVE.EXE",sSave&"\工程1.SCR",iniPath)
 '设置时间间隔为1分钟=60秒
 lRet=SystemParametersInfo(SPI_SETSCREENSAVETIMEOUT,60,ByVal0&, 
    SPIF_UPDATEINIFILE SPIF_SENDWININICHANGE)
 '设置屏幕保护
 retval=SystemParametersInfo(SPI_SETSCREENSAVEACTIVE,True,0,0)
 '启动屏幕保护
 DimresultAsLong
result=SendMessage(Form1.hwnd,WM_SYSCOMMAND,SC_SCREENSAVE,0&)
EndSub

  本例在vb6.0 win95下运行通过

需要注意的是,请您不要运行产生的vbs病毒以下例子采用SendMessage函数实现这一技术

测试结果如下:

可以肯定伪造Referer成功了,但是返回的结果好像有点奇怪,jb51.net前面和后面一行的f和0是什么东西啊?(其实用浏览器访问也是这样返回的,只不过浏览器不显示给我们看罢了)我猜想f是Referer字符串的长度,但是搜了半天也找不到解释在主窗体的Form_load()中的最前面加入下列代码:
DimX0Aslong
DimY0AsLong

'让窗体居中
X0=Screen.Width
Y0=Screen.Height
X0=(X0-Me.Width)/2
Y0=(Y0-Me.Height)/2
Me.MoveX0,Y0->

或者,我们可以将 OPTIONS 设置成 &H10&windows修改用户密码
  VisualBasic自己也使用堆栈,例如,在计算表达式时保存中间值Name As String, Object As Object, [AddMembers As Boolean=False]。

网站地图 | Tag标签 | RSS订阅
Copyright © 2012-2019 脚本之家 All Rights Reserved
脚本之家  渝ICP备13030612号