Jill.c (fixed version) is a remote exploit for the IIS 5.0 / Windows 2000 remote .printer overflow. Spawns a reverse cmd shell.
4eaf53b6615baedb4fac1be5c4beb5aa4c9708ae0370a0dd8b34bf8080a4ddbb
Utility to send a trojan to any unpatched IIS 4.0 system by exploiting a buffer overflow. (Without SP6). Archive password is set to p4ssw0rd. Use at your own risk.
8abefcb4d3a8d21e73681f483d24cf77218d8acc3a3b8a414dcf13843aaca94f
There is a Local/Remote DoS Attack in Serv-U FTP-Server v2.5a. Source / Binary available here.
d83888fc7f71eee75b5beae3a3c7641437bf142bd15113b4fdd74e42c083547c
NT binary and asm source code to Interscan VirusWall 3.23/3.3 remote exploit.
1b62a8c33c4d1c05184875b6f3fd34327a57c57d3760438ef880074fface137e
Byte patch to fix the VirusWall smtp gateway vulnerability.
d5d871078c9f1dca5e89c59ce5251e506988307f440f70fa822f711324df30e4
A buffer overflow exists on the VirusWall smtp gateway - by sending a long HELO command you can overflow the buffer and execute arbitrary code. Example code has been written which will spawn a command prompt on a port you specify.
a4677ab68f3e57a72fc946090b8d39db510d3f964a1b655de1b57ce48936c7a5
.asm source code for the Windows NT RealServer buffer overflow.
658bb877524b8a30f841797996442f51c3e1b94e71d8dfcd6a3668f4b67b98bf
A buffer overflow exists in the web authentication on the Windows NT RealServer administrator port. By sending a long user/password pair you can overflow the buffer and execute arbitrary code. This exploit will spawn a command prompt on port 6968 and has been tested extensively.
0c5dc93d3c04752e283b98ee76d01c69bd18d707ed9649d3fcdcb37f9ce84f39