exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files from BigHawk

First Active2000-05-14
Last Active2006-08-27
hoagie_php_sscanf.txt
Posted Aug 27, 2006
Authored by BigHawk, Andi, Heintz, Greuff | Site void.at

PHP versions 4.4.3 / 5.1.4 and below local buffer overflow exploit. Yields webserver uid.

tags | exploit, overflow, local, php
SHA-256 | 76d2a73f8fb3743433f837c194707701127c12b5166a020c2396aef7f6d354a4
aesop-0.5.tar.gz
Posted Apr 4, 2002
Authored by BigHawk | Site kryptology.org

Aesop is a TCP-proxy which supports many advanced and powerful features. It's designed to be secure, fast and reliable. Aesop makes use of strong cryptography (RC4) for all its data-transmission up to the end-link. Another powerful feature of Aesop is that Aesop proxies can be transparently stacked into a secure chain. Aesop is implemented using multiplexing and is therefor fast and lightweight.

Changes: Protocol security improvements - Encrypted control headers, Signed DH between each hop, and better anonymity. Completely changed route file syntax. Added a configuration file parser for aesopd and aesoptunnel. Added logging capabilities.
tags | tcp
systems | unix
SHA-256 | 91b261338c08b17b7609b58bd07b4fca585613efc1c1e05217ce4aff3871a430
aesop-0.4.tar.gz
Posted Jan 12, 2002
Authored by BigHawk | Site kryptology.org

Aesop is a TCP-proxy which supports many advanced and powerful features. It's designed to be secure, fast and reliable. Aesop makes use of strong cryptography (RC4) for all its data-transmission up to the end-link. Another powerful feature of Aesop is that Aesop proxies can be transparently stacked into a secure chain. Aesop is implemented using multiplexing and is therefor fast and lightweight.

Changes: Added libaesop (--enable-libaesop) (supported on Linux, *BSD and Solaris), which provides an LD_PRELOAD wrapper around connect() to automatically redirect connections to go over an aesop proxy. Added advisory and mandatory source port specification. Added support for AIX, QNX and MacOS-X.
tags | tcp
systems | unix
SHA-256 | 506bf2fa186327dec76049ba0d5a8cf7dadc72d8d2ac02a3f29f8a31729d0276
aesop-0.3.tar.gz
Posted Dec 26, 2001
Authored by BigHawk | Site kryptology.org

Aesop is a TCP-proxy which supports many advanced and powerful features. It's designed to be secure, fast and reliable. Aesop makes use of strong cryptography (RC4) for all its data-transmission up to the end-link. Another powerful feature of Aesop is that Aesop proxies can be transparently stacked into a secure chain. Aesop is implemented using multiplexing and is therefor fast and lightweight.

Changes: Added IPV6 support, more portable, fixed makefiles, added debugging, and fixed bugs.
tags | tcp
systems | unix
SHA-256 | d5ad647ce2d30f7b5f15fb6162d4d7bb8a79761c151ac939a4267d4d7952d017
aesop-0.2.tar.gz
Posted Dec 17, 2001
Authored by BigHawk | Site kryptology.org

Aesop is a TCP-proxy which supports many advanced and powerful features. It's designed to be secure, fast and reliable. Aesop makes use of strong cryptography (RC4) for all its data-transmission up to the end-link. Another powerful feature of Aesop is that Aesop proxies can be transparently stacked into a secure chain. Aesop is implemented using multiplexing and is therefor fast and lightweight.

tags | tcp
systems | unix
SHA-256 | 53a5affcbee053a8aa4f119e67611f7bf7ddf3bb8ba371fe5f78fd96a6328850
squirtv1.2.tar.gz
Posted Apr 30, 2001
Authored by BigHawk

Squirt is a perl tool for finding and exploiting local buffer overflow vulnerabilities which is very configurable and platform independent. It is possible to exploit almost any local overflow on any system by providing the correct values as arguments (or brute forcing them), telling the program how the overflow must be triggered, and by eventually loading (system specific) desired shellcode.

Changes: Two new techniques - The Framepointer Overwrite and exploiting non-terminated adjacent memory spaces. Also includes some code cleanups.
tags | overflow, local, perl, vulnerability, shellcode
systems | unix
SHA-256 | bf9e57c3c70d663c57aca417a29bc642423b00a7ee76cc65d7e70844dafffcd3
squirt.tar.gz
Posted Feb 9, 2001
Authored by BigHawk

Squirt is a perl tool for finding and exploiting local buffer overflow vulnerabilities which is very configurable and platform independent. It is possible to exploit almost any local overflow on any system by providing the correct values as arguments (or brute forcing them), telling the program how the overflow must be triggered, and by eventually loading (system specific) desired shellcode.

tags | overflow, local, perl, vulnerability, shellcode
systems | unix
SHA-256 | 88278cfb3fbfb29856c07040e2ffd772e5316987021af405e4424e3215848f04
ipgenv2.tar.gz
Posted Oct 7, 2000
Authored by BigHawk

IP-Generator version two creates the long lists of IP addresses which are fed into todays security tools. Features the ability to create randomized lists, host resolving, and multithreading.

Changes: Better option handling, random IP creation, bug fixes and code cleanups.
tags | tool
systems | unix
SHA-256 | 2582d2648bb7ee404415b64d0a5ce935eba7ed2fd2e7b15c1560509f0513b9ab
ipgen.tgz
Posted Sep 28, 2000
Authored by BigHawk

IP-Generator is a program that can be used for the creation of long ip lists that are necessary for various utilities which require said listings.

tags | tool
systems | unix
SHA-256 | 54cabd7bfec1bbeb8519e72bf2ff1bae9bbad62a28443fa345ea7df358a26959
allmanage.pl-admin.txt
Posted May 15, 2000
Authored by BigHawk

New Vulnerability found in Allmanage. This one gives access to the main admin panel where you can set a lot of options and variables. Websites using Allmanage Website Administration Software 2.6 with the upload ability contain an easily exploited vulnerability wich gives you full add/del/change access in the user-account directories and you can change the files in the main directory of the CGI script.

tags | exploit, cgi, add administrator
SHA-256 | 0e8435060a9e6771f7386b3732f06e361de8d7c64759e6a4602769a0519d780f
allmanage.pl.txt
Posted May 14, 2000
Authored by BigHawk

Websites using Allmanage Website Administration Software 2.6 with the upload ability contain an easily exploited vulnerability wich gives you full add/del/change access in the user-account directories and you can change the files in the main directory of the CGI script.

tags | exploit, cgi
SHA-256 | 28da141276c6e2c819bc1648db253cc3e8c8bb66f3f25be3bda20c50b11dcfce
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close