This Perl script listens on TCP port 443 and responds with completely bogus SSL heartbeat responses, unless it detects the start of a byte pattern similar to that used in Jared Stafford's (jspenguin@jspenguin.org) demo for CVE-2014-0160 'Heartbleed'. Run as root for the privileged port. Outputs IPs of suspected heartbleed scan to the console. Rickrolls scanner in the hex dump.
796ad9cc3fad4c720764e5e9bf2d2d16466658b294a8ea3c9c7312235cba21cd
Simple perl script that checks for duplicate files in a directory based upon md5 checksums.
ee148a4d01605255a7b2db70af1471e57ba67077a53f4d273ec105e5a31d01b7
Remote root exploit for Wu-ftpd 2.6.0 from the ports collection running on FreeBSD v3.3, 3.4 and 4.0.
b33a52130ecae7c08a7f0c4dcb7e6ef28378351b56b083cae7ad55d2438dc515
GNITvse rc1: GNIT Vulnerability Scanning Engine Release Candidate One - (for WIN2K and NT systems). Performs a port scan, and based on those findings, calls other functions. Checks for MANY windows based vulnerabilities, and grabs banners.
1f337843a9ce01d908ccead72c80e7d43812269e422e2807368214bcf2e7c725