Prozilla versions 1.3.7.3 and below format string exploit.
ce4f5605fb2d005b96931f346390bbafba7ca87d6d0324af7f7a06ab6b6dfac7
Tool for infecting statically linked ELF binaries.
8be869de86b6690ac0687ffc6128d8d400109360e4e989b834b8e9a671d893d0
White paper discussing a method of infecting statically linked ELF binaries.
b1706a6a89aa5acf716ceada0b5da3383eeea00193479d24b7d0255abcd2e533
Exorcist is a tool that can be considered an anti-anti-ptrace utility that unlocks the ptrace_traceme guard of a binary.
196afaa678e5a8451af6b0aeebe04c81eb9e6697dad1f3fcd75c7fa9ed883329
Silencer holds three different functionalities. It will deploy a backdoor in a listening service that an attacker must connect to, feed the magic word, and then portscan the machine to find the bindshell spawned, it has an Apache backdoor that allows a connection over HTTP to drop to a shell, and it also has a read sniffer built in that goes through the kernel read() process and then logs it to /tmp/.es.rox. The authors ask to be contacted if anyone finds any systems or kernels that this does not work on.
41eb4095cd39cb456d3f839ae2f1d1ccad55ea5d5d7cc64453d8653a4a0b9510
(N)compress 4.2.4 local root exploit.
8ad5fecf9ab689d4c57252919836ecd38d23f16efdaea8755879e04bdd2451c3
Flooding and sniffing robot for the IRC that attacks with spoof IGMP packets.
c9511dfcec990896079ce0509d8e7a92f5cf2d5ffb168064ff03db42d335fcdc
Full low level (without libc) AT+T port scanner written for the article "Advanced AT+T asm tutorial. Part 1".
b351a9da40051ae17249d3db2ddf289d051cdd7d92fc3d6c2836ab9d5b54a53d
Demo Permutate Engine for Linux that supports a few permutatable instructions: xor,sub,test,or,mov.
be15fb2bca26a61637e15f8fde38dd123b6a33c3b416fc9a541a0d9f8ac3d003
0x4553_Executor is a memory executor that allows a user to load code from file to memory and execute it.
ee6f412dcf6e5016ccb3bd30d093edd27679edf336bc268f7b36e79104c28552
0x4553_Crypt0r is a base engine for encrypting ELF binaries. Uses simple bit rotation and allows for the ability to add your own algorithm.
36f1bbb88e87fdfc2043f0e77d68dc9bb9e22057400152254667ed960fdbad93
This utility will search in a binary or core dump for a user supplied string and return the exact location in memory.
04004d4e5e5743978d087451e5eb2c0f3d8e7662be4e402f57cebb2c01305e4d
This ELF infector appends two executables together. The payload inside this parasite opens a bind shell on the infected machine as the user who executed it.
f4f9282628fac3918df1ccfb4c92839b7ee9fbfe284516b282d78e48ae663acb
This utility is a basic terminal sniffer.
342b6b2e3101a53ec1e745340e78e6782a5ce0141ba04347c60ffadf34173299
Exploit for NetMerchant that allows for remote command execution.
e30fda7b60a08dc3612148a6ccee162a260d3ab4e8710e2ff20fee58a2b5224d
ES-Malaria is a ptrace() injector.
36d3fb1c48fc05a1b0e75c268e9fa73707421773ed806f8f0cb015c874a49a1e
4553 - Invader v2.1.1 is source code which can append parasitic executable code to any ELF binary which causes it it to send a shell to a remote host. Uses TCP port 21317 by default.
0c6a10e80235d530fd829513fd77b7d0d73a2293de197e444ed142bb554b173d
Cisco VPN 5000 Linux client version 5.1.5 local root exploit that uses the close_tunnel binary.
ace076932d0664c2056944cff5c03f7c2d82699188fdeea7f90ecefb6ae7e279
Simple Bof Coder for Linux and BSD constructs proof of concept buffer overflow code by asking several questions about the vulnerability. Written in perl, generates C source.
61ad4e418307159c7adf3bc1cd3b9c61ce9120f4bd277c4b51fceecc722e9cf8
IMAP4rev1 remote exploit written for RedHat and Slackware Linux.
2c63190c95346036004d1bdcbbad7a402887fbc9ffaf0b93ecabd53a5ce269c6
Local buffer overflow exploit for KDE's artsd v2.x and 3.x.
c4ee9b2be56eb009a8530167e522b3e52eb220e1569d1a0b77a0f7358526114c
Badblue webserver v1.5 for Windows remote directory traversal exploit.
a54d11c4fc9cf04a8c8071a4aec7f365e1cae05097b86eecfeb8f67e5513a8f8
Wu-ftpd 2.6.[0/1] remote heap overflow written in Java. Provides a remote shell. Includes targets for RedHat 7.0 and wu-2.6.0/1 from www.wu-ftpd.org.
57929d95896c2d40e1e0a264c95b5e575151758f19e071e54f3d2c1e88fd64df
Psreal.c for Linux kernel 2.4.x finds processes hidden even if a LKM is used.
907abc05ba6db4ba3e3da65a20995507c4791b01b80ce282d259be8edd58aabc
Hp-ux-bdf.c is a local root buffer overflow exploit for HP-UX's /usr/bin/bdf.
0e8e2833f271db51967945879c37ea8b040d8a327992db7a84525fd4e618c1ce