Twenty Year Anniversary
Showing 1 - 9 of 9 RSS Feed

Files from Nemes||y

Email addressdragon at shellnow.it
First Active2001-03-16
Last Active2002-06-23
DDK-IIS.c
Posted Jun 23, 2002
Authored by Nemes||y

Microsoft IIS 4(NT4) and - IIS 5(Windows 2k) .asp buffer overflow exploit. Includes targets for IIS5 Chinese SP0, SP1, and SP2 and English SP2. Binds a shell to port 7788. Includes brute force mode.

tags | exploit, overflow, shell, asp
systems | windows, 2k
MD5 | 03a1c65a246a327cf828b36ff5768131
maj1944-xpl.pl
Posted Sep 28, 2001
Authored by Nemes||y

Majordomo v1.94.4 local exploit in perl. Binds a shell to port 1234 with uid=Majordomo.

tags | exploit, shell, local, perl
MD5 | 93542c2ce8283244257ff38ed13f553c
qpopper.pl
Posted Sep 3, 2001
Authored by Nemes||y

Qualcomm's Qpopper mail server POP3 authentication when used with PAM that gives remote users information about whether user accounts exist or not. This perl script has been tested with Qpopper v4.0.1 on Redhat 7.x.

tags | exploit, remote, perl
systems | linux, redhat
MD5 | b84cd17517203b65b5ed2cd4fe7002e7
sol8_mailx.c
Posted May 8, 2001
Authored by Nemes||y

/usr/bin/mailx local buffer overflow exploit. Gives gid=mail shell. Tested against Solaris 8.

tags | exploit, overflow, shell, local
systems | solaris
MD5 | 520e42332e0f23e523bc15a68ef0be5b
TalkBackcgi-exp.pl
Posted Apr 24, 2001
Authored by Nemes||y

TalkBack.cgi directory traversal remote exploit.

tags | exploit, remote, cgi
MD5 | c1d3da4612b5f821a80c9c8926ac7f7a
vim_exp.pl
Posted Apr 9, 2001
Authored by Nemes||y

Vim 5.7 local exploit - This perl script creates a text file which when edited in vim executes an arbitrary file on the local system as the user running vim.

tags | exploit, arbitrary, local, perl
MD5 | 6c239c910da655b40156601960be3d88
ssh_dos.pl
Posted Apr 7, 2001
Authored by Nemes||y

Windows SSHD remote denial of service exploit - Written in perl, affects SSH Communications Security SSH 2.4 for Microsoft Windows 95,98,NT4,2000.

tags | exploit, remote, denial of service, perl
systems | windows, 9x
MD5 | 1ec017d8169dcc2a2e97182f0e3dbf6f
bind_scan.pl
Posted Mar 27, 2001
Authored by Nemes||y

Bind Scan is a perl script which scans for vulnerable BIND servers. Uses dig to get information.

tags | tool, scanner, perl
systems | unix
MD5 | dc636fc6aef159698372708090a6b958
openssh-2.2.0-exp.tgz
Posted Mar 16, 2001
Authored by Nemes||y

OpenSSH-2.2.0 remote exploit - Includes a wrapper to brute force the offset.

tags | exploit, remote
MD5 | a975d944823b58f0e067a2c6cca0ae53
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

May 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    15 Files
  • 2
    May 2nd
    17 Files
  • 3
    May 3rd
    30 Files
  • 4
    May 4th
    29 Files
  • 5
    May 5th
    2 Files
  • 6
    May 6th
    3 Files
  • 7
    May 7th
    13 Files
  • 8
    May 8th
    27 Files
  • 9
    May 9th
    17 Files
  • 10
    May 10th
    15 Files
  • 11
    May 11th
    8 Files
  • 12
    May 12th
    2 Files
  • 13
    May 13th
    8 Files
  • 14
    May 14th
    7 Files
  • 15
    May 15th
    43 Files
  • 16
    May 16th
    19 Files
  • 17
    May 17th
    16 Files
  • 18
    May 18th
    15 Files
  • 19
    May 19th
    3 Files
  • 20
    May 20th
    6 Files
  • 21
    May 21st
    1 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close