ignore security and it'll go away
Showing 1 - 8 of 8 RSS Feed


Posted Jan 11, 2002
Authored by Phrail

Unifuck 2.0 - An IIS Unicode/Decode exploit with full proxy support. Includes perl mods to run it.

tags | exploit, perl
MD5 | 141277f2955ee8ebe967611a716ce835
Posted Oct 30, 2001

Ptrace24.c is a local root exploit for linux kernels prior to 2.4.9. Works on openwall patched kernels. Uses the su, newgrp, or screen +s binaries. Originally by Nergal. Improved by sd.

tags | exploit, kernel, local, root
systems | linux
MD5 | 0b6d461adc20cb12fef2920d329f920f
Posted Oct 30, 2001
Authored by sd

Sendmail 8.11.5 and below local root exploit.

tags | exploit, local, root
MD5 | 4a6837286d952f1c05cba8c6fb7c9741
Posted Oct 26, 2001
Authored by Sectorx

Automated rwhoisd v1.5.x remote exploit for Linux, FreeBSD, and BSDi.

tags | exploit, remote
systems | linux, freebsd
MD5 | 85a4044b6c2d041ea9e9638fd4446c40
Posted Oct 26, 2001
Authored by CowPower

RWhoisd by NSI remote format string exploit affecting v1.5.x. Overflows the -soa directive.

tags | exploit, remote, overflow
MD5 | 0f02e4b894906177bbf4534a593a36ac
Posted Oct 25, 2001
Authored by Andreas | Site defcom.com

Proof-of-concept exploit for Oracle9iAS Web Cache/ Creates the file c:\defcom.iyd. See def-2001-30.txt for more info.

tags | exploit, web
MD5 | 6cc2f8598af0db6d419d680e0230d74a
Posted Oct 20, 2001
Authored by Zen-Parse

Proof of concept netkit-0.17-7 local root exploit. Exploits buffer overflow in the AYT handling of in.telnetd, due to bad logic in the handling of snprintf().

tags | exploit, overflow, local, root, proof of concept
MD5 | 5925939d4d0992779fc6249366dcb734
Posted Oct 17, 2001
Authored by Snyggast

Samba prior to v2.0.8 local root exploit. Tested against Red Hat 5.1 - 7.0.

tags | exploit, local, root
systems | linux, redhat
MD5 | ad358ce3a84fb692ba4967e615fa5c8a
Page 1 of 1

Top Authors In Last 30 Days

Recent News

News RSS Feed
New Magniber Ransomware Targets South Korea, Asia Pacific
Posted Oct 21, 2017

tags | headline, malware, china, fraud, korea
Hackers Race To Use Flash Exploit Before Vulnerable Systems Are Patched
Posted Oct 21, 2017

tags | headline, hacker, malware, flaw, cyberwar, adobe
Bitcoin Boom Prompts Growth Of Coin-Mining Malware
Posted Oct 21, 2017

tags | headline, malware, bank, fraud
How To Social Engineer Yourself Into High Security Facilities
Posted Oct 21, 2017

tags | headline, fraud, social
Phishers Getting Smarter By Making Use Of User Location
Posted Oct 20, 2017

tags | headline, malware, cybercrime, fraud, phish
OSX Malware Spread Via Compromised Software Downloads
Posted Oct 20, 2017

tags | headline, malware, apple
Canadian Spooks Release Their Own Malware Detection Tool
Posted Oct 20, 2017

tags | headline, government, malware, canada, spyware
Judge: MalwareTech Is No Longer Under Curfew, GPS Monitoring
Posted Oct 20, 2017

tags | headline, hacker, government, malware, usa, conference
Microsoft Mocks Google For Failed Security Fix Deployment Methodology
Posted Oct 19, 2017

tags | headline, microsoft, flaw, google, chrome
Malicious Mineraft Apps In Google Play Enslave Your Device To A Botnet
Posted Oct 19, 2017

tags | headline, malware, microsoft, phone, botnet, google
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Security Services
Hosting By