what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files from Charles Stevenson

Email addresscore at bokeoa.com
First Active2001-01-27
Last Active2005-11-08
writehello-core.c
Posted Nov 8, 2005
Authored by Charles Stevenson | Site bokeoa.com

write(0,"Hello core!\n",12); shellcode for Linux x86. writehello-core.s is appended.

tags | x86, shellcode
systems | linux
SHA-256 | 41fd3af95203826a26802304166e8c49b0a8f32ba4bc6763401241d7c8b03ebf
readnchmod-core.c
Posted Nov 8, 2005
Authored by Charles Stevenson | Site bokeoa.com

read and chmod shellcode for Linux x86. readnchmod-core.s is appended.

tags | x86, shellcode
systems | linux
SHA-256 | 5cd6262dd473ef3cfd822593dd79d775204a412f232377a407335a80515dd956
h3ll-core.c
Posted Nov 8, 2005
Authored by Charles Stevenson | Site bokeoa.com

if(read(fd,buf,512)<=2) _exit(1) else buf(); shellcode for Linux x86. h3ll-core.s is appended.

tags | x86, shellcode
systems | linux
SHA-256 | d3520474d0b54fff6d65387a6361d6638be7d0e9f057c1a62cb7801571603558
exit-core.c
Posted Nov 8, 2005
Authored by Charles Stevenson | Site bokeoa.com

_exit(1); shellcode for Linux x86.

tags | x86, shellcode
systems | linux
SHA-256 | ba689a9bd5eb2cf68686500b209ee31348604a6d736dc138f474e6e70bf88b53
dup2_loop-core.c
Posted Nov 8, 2005
Authored by Charles Stevenson | Site bokeoa.com

dup2(0,0); dup2(0,1); dup2(0,2); shellcode for Linux x86. dup2_loop-core.s is appended.

tags | x86, shellcode
systems | linux
SHA-256 | b4cc8feaf73d1c1548958a27f11126de31bfc8a7af149ae4c738f23de3915083
linux-mipsel-execve-core.c
Posted Nov 8, 2005
Authored by Charles Stevenson | Site bokeoa.com

56 bytes execve /bin/sh shellcode for Linux MIPS running in little-endian mode. linux-mipsel-execve-core.s is appended.

tags | shellcode
systems | linux
SHA-256 | 892a894f4ab144a5b2015aaa606544ed7f3ec962cc1146fdbf4a0f17aee9cc28
readnexecppc-core.c
Posted Nov 8, 2005
Authored by Charles Stevenson | Site bokeoa.com

read(0,stack,1028); stack(); shellcode for Linux PPC. readnexecppc-core.s appended.

tags | shellcode, ppc
systems | linux
SHA-256 | d0b4499072948b6491f643ea4ced7fa7145948d309b2bbfe20f29161e8bd9115
execve-core.c
Posted Nov 8, 2005
Authored by Charles Stevenson | Site bokeoa.com

execve /bin/sh shellcode for Linux PPC. execve-core.s is appended.

tags | shellcode, ppc
systems | linux
SHA-256 | e4820ba2d6164b87e8b80dd60e8b6f7fb00ec0069aeb21349b4dc1a0069f00cd
connect-core5.c
Posted Nov 8, 2005
Authored by Charles Stevenson | Site bokeoa.com

Linux/ppc shellcode which connects /bin/sh to a host. connect-core5.s is appended.

tags | shellcode, ppc
systems | linux
SHA-256 | ff836d3fdda9ddcc1157a20752d7f94cb9c0518549ed0ff11dc9dc5f996f11bf
x_dtsuids.pl.txt
Posted Nov 8, 2005
Authored by Charles Stevenson

Solaris 10 DtPrintinfo/Session exploit for x86.

tags | exploit, x86
systems | solaris
SHA-256 | fcc0583f608dfa2ff466ab8443bc545a183459bdd2c5ce5d9e65723a7cbcc153
x_osh2-9byte.pl.txt
Posted Aug 24, 2005
Authored by Charles Stevenson

Operator Shell (osh) 1.7-12 local root exploit. New version of an old exploit. This version has the shellcode trimmed down to 9 bytes thanks to Andrewg.

tags | exploit, shell, local, root, shellcode
SHA-256 | 93c7051b9b8e5fc758a98373d2984054e773f1047fd7a891921e608d15228270
x_osh2.pl.txt
Posted Aug 17, 2005
Authored by Charles Stevenson

Operator Shell (osh) 1.7-12 local root exploit. New version of an old exploit.

tags | exploit, shell, local, root
SHA-256 | 4ddcb37c6addfe9669637e9768105bf89fb404c3737bcff22f8e1019069720c9
x_osh.pl
Posted Feb 6, 2005
Authored by Charles Stevenson

Operator Shell (osh) 1.7-12 local root exploit.

tags | exploit, shell, local, root
SHA-256 | fe3a929faff57858b299fc1c0d1660e3387d19c65452c581dd20e06aa4b548d6
debian-uucp.tar.gz
Posted Jan 22, 2002
Authored by Charles Stevenson

Debian uucp v1.06.1 local uid=utmp or root exploit. Trojans uucp and uux, attempting to get a root shell. Based on an exploit by zen-parse. Tested on Debian PowerPC Unstable.

tags | exploit, shell, local, root, trojan
systems | linux, debian
SHA-256 | c9cbbdcce388932c2f4626a8b3f784ee30cadbd876fa9fedf737a7fee68ad530
sudo-xpl.sh
Posted Jan 17, 2002
Authored by Charles Stevenson

Local root exploit for sudo + postfix. Exploits sudo prior to sudo-1.6.4.1. Tested on debian powerpc unstable.

tags | exploit, local, root
systems | linux, debian
SHA-256 | 56c4a7509e2a9ce7833c6d4cb82396da0284a904354b620cfe74d1de0f8ee533
pileup-xpl.c
Posted Jul 29, 2001
Authored by Charles Stevenson

/usr/bin/pileup local root exploit. Tested against Debian 2.2.

tags | exploit, local, root
systems | linux, debian
SHA-256 | 91ffd9b5c600d6641fc76b93d1585a6c5bdb92d4d9d1ce2ffd0e8c74e173e9b9
lmail-xpl.c
Posted Jul 12, 2001
Authored by Charles Stevenson

lmail local root exploit. Simply run it with the file you want to create/overwrite and the data you wish to place in the file.

tags | exploit, local, root
SHA-256 | ff21e217a7ee6a988dfe12d26ee5f7bdafde7ca74bec3f4eee9cbaa42d1ea328
glibc-resolve-tr.sh
Posted Jan 27, 2001
Authored by Charles Stevenson

Glibc prior to v2.1.9x allows local users to read any file. This shell script exploits this bug using the Openssh-2.3.0p1 binary. Tested against Debian 2.3 and Redhat 7.0.

tags | exploit, shell, local
systems | linux, redhat, debian
SHA-256 | 2d457aea08bb212a673eba42f38cd71b80a69cfa337478e974be158a3d4ea4f9
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close