exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files from BigHawk

First Active2000-05-14
Last Active2006-08-27
hoagie_php_sscanf.txt
Posted Aug 27, 2006
Authored by BigHawk, Andi, Heintz, Greuff | Site void.at

PHP versions 4.4.3 / 5.1.4 and below local buffer overflow exploit. Yields webserver uid.

tags | exploit, overflow, local, php
SHA-256 | 76d2a73f8fb3743433f837c194707701127c12b5166a020c2396aef7f6d354a4
aesop-0.5.tar.gz
Posted Apr 4, 2002
Authored by BigHawk | Site kryptology.org

Aesop is a TCP-proxy which supports many advanced and powerful features. It's designed to be secure, fast and reliable. Aesop makes use of strong cryptography (RC4) for all its data-transmission up to the end-link. Another powerful feature of Aesop is that Aesop proxies can be transparently stacked into a secure chain. Aesop is implemented using multiplexing and is therefor fast and lightweight.

Changes: Protocol security improvements - Encrypted control headers, Signed DH between each hop, and better anonymity. Completely changed route file syntax. Added a configuration file parser for aesopd and aesoptunnel. Added logging capabilities.
tags | tcp
systems | unix
SHA-256 | 91b261338c08b17b7609b58bd07b4fca585613efc1c1e05217ce4aff3871a430
aesop-0.4.tar.gz
Posted Jan 12, 2002
Authored by BigHawk | Site kryptology.org

Aesop is a TCP-proxy which supports many advanced and powerful features. It's designed to be secure, fast and reliable. Aesop makes use of strong cryptography (RC4) for all its data-transmission up to the end-link. Another powerful feature of Aesop is that Aesop proxies can be transparently stacked into a secure chain. Aesop is implemented using multiplexing and is therefor fast and lightweight.

Changes: Added libaesop (--enable-libaesop) (supported on Linux, *BSD and Solaris), which provides an LD_PRELOAD wrapper around connect() to automatically redirect connections to go over an aesop proxy. Added advisory and mandatory source port specification. Added support for AIX, QNX and MacOS-X.
tags | tcp
systems | unix
SHA-256 | 506bf2fa186327dec76049ba0d5a8cf7dadc72d8d2ac02a3f29f8a31729d0276
aesop-0.3.tar.gz
Posted Dec 26, 2001
Authored by BigHawk | Site kryptology.org

Aesop is a TCP-proxy which supports many advanced and powerful features. It's designed to be secure, fast and reliable. Aesop makes use of strong cryptography (RC4) for all its data-transmission up to the end-link. Another powerful feature of Aesop is that Aesop proxies can be transparently stacked into a secure chain. Aesop is implemented using multiplexing and is therefor fast and lightweight.

Changes: Added IPV6 support, more portable, fixed makefiles, added debugging, and fixed bugs.
tags | tcp
systems | unix
SHA-256 | d5ad647ce2d30f7b5f15fb6162d4d7bb8a79761c151ac939a4267d4d7952d017
aesop-0.2.tar.gz
Posted Dec 17, 2001
Authored by BigHawk | Site kryptology.org

Aesop is a TCP-proxy which supports many advanced and powerful features. It's designed to be secure, fast and reliable. Aesop makes use of strong cryptography (RC4) for all its data-transmission up to the end-link. Another powerful feature of Aesop is that Aesop proxies can be transparently stacked into a secure chain. Aesop is implemented using multiplexing and is therefor fast and lightweight.

tags | tcp
systems | unix
SHA-256 | 53a5affcbee053a8aa4f119e67611f7bf7ddf3bb8ba371fe5f78fd96a6328850
squirtv1.2.tar.gz
Posted Apr 30, 2001
Authored by BigHawk

Squirt is a perl tool for finding and exploiting local buffer overflow vulnerabilities which is very configurable and platform independent. It is possible to exploit almost any local overflow on any system by providing the correct values as arguments (or brute forcing them), telling the program how the overflow must be triggered, and by eventually loading (system specific) desired shellcode.

Changes: Two new techniques - The Framepointer Overwrite and exploiting non-terminated adjacent memory spaces. Also includes some code cleanups.
tags | overflow, local, perl, vulnerability, shellcode
systems | unix
SHA-256 | bf9e57c3c70d663c57aca417a29bc642423b00a7ee76cc65d7e70844dafffcd3
squirt.tar.gz
Posted Feb 9, 2001
Authored by BigHawk

Squirt is a perl tool for finding and exploiting local buffer overflow vulnerabilities which is very configurable and platform independent. It is possible to exploit almost any local overflow on any system by providing the correct values as arguments (or brute forcing them), telling the program how the overflow must be triggered, and by eventually loading (system specific) desired shellcode.

tags | overflow, local, perl, vulnerability, shellcode
systems | unix
SHA-256 | 88278cfb3fbfb29856c07040e2ffd772e5316987021af405e4424e3215848f04
ipgenv2.tar.gz
Posted Oct 7, 2000
Authored by BigHawk

IP-Generator version two creates the long lists of IP addresses which are fed into todays security tools. Features the ability to create randomized lists, host resolving, and multithreading.

Changes: Better option handling, random IP creation, bug fixes and code cleanups.
tags | tool
systems | unix
SHA-256 | 2582d2648bb7ee404415b64d0a5ce935eba7ed2fd2e7b15c1560509f0513b9ab
ipgen.tgz
Posted Sep 28, 2000
Authored by BigHawk

IP-Generator is a program that can be used for the creation of long ip lists that are necessary for various utilities which require said listings.

tags | tool
systems | unix
SHA-256 | 54cabd7bfec1bbeb8519e72bf2ff1bae9bbad62a28443fa345ea7df358a26959
allmanage.pl-admin.txt
Posted May 15, 2000
Authored by BigHawk

New Vulnerability found in Allmanage. This one gives access to the main admin panel where you can set a lot of options and variables. Websites using Allmanage Website Administration Software 2.6 with the upload ability contain an easily exploited vulnerability wich gives you full add/del/change access in the user-account directories and you can change the files in the main directory of the CGI script.

tags | exploit, cgi, add administrator
SHA-256 | 0e8435060a9e6771f7386b3732f06e361de8d7c64759e6a4602769a0519d780f
allmanage.pl.txt
Posted May 14, 2000
Authored by BigHawk

Websites using Allmanage Website Administration Software 2.6 with the upload ability contain an easily exploited vulnerability wich gives you full add/del/change access in the user-account directories and you can change the files in the main directory of the CGI script.

tags | exploit, cgi
SHA-256 | 28da141276c6e2c819bc1648db253cc3e8c8bb66f3f25be3bda20c50b11dcfce
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close