exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 26 RSS Feed

Files from electronicsouls

First Active2001-04-05
Last Active2005-02-23
Posted Feb 23, 2005
Authored by electronicsouls, Deicide from ElectronicSouls

Prozilla versions and below format string exploit.

tags | exploit
SHA-256 | ce4f5605fb2d005b96931f346390bbafba7ca87d6d0324af7f7a06ab6b6dfac7
Posted Aug 11, 2004
Authored by electronicsouls, Ares | Site es.xor.ru

Tool for infecting statically linked ELF binaries.

SHA-256 | 8be869de86b6690ac0687ffc6128d8d400109360e4e989b834b8e9a671d893d0
Posted Aug 11, 2004
Authored by electronicsouls, Ares | Site es.xor.ru

White paper discussing a method of infecting statically linked ELF binaries.

SHA-256 | b1706a6a89aa5acf716ceada0b5da3383eeea00193479d24b7d0255abcd2e533
Posted Aug 11, 2004
Authored by electronicsouls, Ares | Site es.xor.ru

Exorcist is a tool that can be considered an anti-anti-ptrace utility that unlocks the ptrace_traceme guard of a binary.

SHA-256 | 196afaa678e5a8451af6b0aeebe04c81eb9e6697dad1f3fcd75c7fa9ed883329
Posted Sep 21, 2003
Authored by Brainstorm, electronicsouls, Ares

Silencer holds three different functionalities. It will deploy a backdoor in a listening service that an attacker must connect to, feed the magic word, and then portscan the machine to find the bindshell spawned, it has an Apache backdoor that allows a connection over HTTP to drop to a shell, and it also has a read sniffer built in that goes through the kernel read() process and then logs it to /tmp/.es.rox. The authors ask to be contacted if anyone finds any systems or kernels that this does not work on.

tags | web, shell, kernel
SHA-256 | 41eb4095cd39cb456d3f839ae2f1d1ccad55ea5d5d7cc64453d8653a4a0b9510
Posted Apr 27, 2003
Authored by electronicsouls, Lunar Fault

(N)compress 4.2.4 local root exploit.

tags | local, root
SHA-256 | 8ad5fecf9ab689d4c57252919836ecd38d23f16efdaea8755879e04bdd2451c3
Posted Apr 24, 2003
Authored by electronicsouls, Ares

Flooding and sniffing robot for the IRC that attacks with spoof IGMP packets.

tags | spoof
SHA-256 | c9511dfcec990896079ce0509d8e7a92f5cf2d5ffb168064ff03db42d335fcdc
Posted Apr 24, 2003
Authored by electronicsouls, Area

Full low level (without libc) AT+T port scanner written for the article "Advanced AT+T asm tutorial. Part 1".

SHA-256 | b351a9da40051ae17249d3db2ddf289d051cdd7d92fc3d6c2836ab9d5b54a53d
Posted Apr 24, 2003
Authored by electronicsouls, Ares

Demo Permutate Engine for Linux that supports a few permutatable instructions: xor,sub,test,or,mov.

systems | linux
SHA-256 | be15fb2bca26a61637e15f8fde38dd123b6a33c3b416fc9a541a0d9f8ac3d003
Posted Apr 24, 2003
Authored by electronicsouls, Ares

0x4553_Executor is a memory executor that allows a user to load code from file to memory and execute it.

SHA-256 | ee6f412dcf6e5016ccb3bd30d093edd27679edf336bc268f7b36e79104c28552
Posted Apr 22, 2003
Authored by electronicsouls, Ares

0x4553_Crypt0r is a base engine for encrypting ELF binaries. Uses simple bit rotation and allows for the ability to add your own algorithm.

SHA-256 | 36f1bbb88e87fdfc2043f0e77d68dc9bb9e22057400152254667ed960fdbad93
Posted Apr 16, 2003
Authored by electronicsouls

This utility will search in a binary or core dump for a user supplied string and return the exact location in memory.

SHA-256 | 04004d4e5e5743978d087451e5eb2c0f3d8e7662be4e402f57cebb2c01305e4d
Posted Apr 15, 2003
Authored by Brainstorm, electronicsouls

This ELF infector appends two executables together. The payload inside this parasite opens a bind shell on the infected machine as the user who executed it.

tags | shell
SHA-256 | f4f9282628fac3918df1ccfb4c92839b7ee9fbfe284516b282d78e48ae663acb
Posted Apr 15, 2003
Authored by Brainstorm, electronicsouls

This utility is a basic terminal sniffer.

SHA-256 | 342b6b2e3101a53ec1e745340e78e6782a5ce0141ba04347c60ffadf34173299
Posted Apr 15, 2003
Authored by Brainstorm, electronicsouls

Exploit for NetMerchant that allows for remote command execution.

tags | remote
SHA-256 | e30fda7b60a08dc3612148a6ccee162a260d3ab4e8710e2ff20fee58a2b5224d
Posted Dec 24, 2002
Authored by electronicsouls, Brain Storm

ES-Malaria is a ptrace() injector.

tags | tool, rootkit
systems | unix
SHA-256 | 36d3fb1c48fc05a1b0e75c268e9fa73707421773ed806f8f0cb015c874a49a1e
Posted Nov 27, 2002
Authored by electronicsouls, Brain Storm, Resistor | Site es.xor.ru

4553 - Invader v2.1.1 is source code which can append parasitic executable code to any ELF binary which causes it it to send a shell to a remote host. Uses TCP port 21317 by default.

tags | tool, remote, shell, tcp, rootkit
systems | unix
SHA-256 | 0c6a10e80235d530fd829513fd77b7d0d73a2293de197e444ed142bb554b173d
Posted Sep 19, 2002
Authored by electronicsouls

Cisco VPN 5000 Linux client version 5.1.5 local root exploit that uses the close_tunnel binary.

tags | exploit, local, root
systems | cisco, linux
SHA-256 | ace076932d0664c2056944cff5c03f7c2d82699188fdeea7f90ecefb6ae7e279
Posted Aug 21, 2002
Authored by electronicsouls, Burn-X | Site es.xor.ru

Simple Bof Coder for Linux and BSD constructs proof of concept buffer overflow code by asking several questions about the vulnerability. Written in perl, generates C source.

tags | overflow, perl, proof of concept
systems | linux, unix, bsd
SHA-256 | 61ad4e418307159c7adf3bc1cd3b9c61ce9120f4bd277c4b51fceecc722e9cf8
Posted Aug 18, 2002
Authored by electronicsouls, -BuRn-X | Site es.xor.ru

IMAP4rev1 remote exploit written for RedHat and Slackware Linux.

tags | exploit, remote
systems | linux, redhat, slackware
SHA-256 | 2c63190c95346036004d1bdcbbad7a402887fbc9ffaf0b93ecabd53a5ce269c6
Posted Jul 10, 2002
Authored by electronicsouls, Burn-X, 0x90 | Site es.xor.ru

Local buffer overflow exploit for KDE's artsd v2.x and 3.x.

tags | exploit, overflow, local
SHA-256 | c4ee9b2be56eb009a8530167e522b3e52eb220e1569d1a0b77a0f7358526114c
Posted Jul 6, 2002
Authored by Iceburg, electronicsouls | Site es.xor.ru

Badblue webserver v1.5 for Windows remote directory traversal exploit.

tags | exploit, remote
systems | windows
SHA-256 | a54d11c4fc9cf04a8c8071a4aec7f365e1cae05097b86eecfeb8f67e5513a8f8
Posted Jul 6, 2002
Authored by electronicsouls, CraigTM | Site es.xor.ru

Wu-ftpd 2.6.[0/1] remote heap overflow written in Java. Provides a remote shell. Includes targets for RedHat 7.0 and wu-2.6.0/1 from www.wu-ftpd.org.

tags | exploit, java, remote, overflow, shell
systems | linux, redhat
SHA-256 | 57929d95896c2d40e1e0a264c95b5e575151758f19e071e54f3d2c1e88fd64df
Posted Jul 6, 2002
Authored by electronicsouls, ghQst | Site es.xor.ru

Psreal.c for Linux kernel 2.4.x finds processes hidden even if a LKM is used.

tags | kernel
systems | linux
SHA-256 | 907abc05ba6db4ba3e3da65a20995507c4791b01b80ce282d259be8edd58aabc
Posted Nov 14, 2001
Authored by Brainstorm, electronicsouls | Site es.xor.ru

Hp-ux-bdf.c is a local root buffer overflow exploit for HP-UX's /usr/bin/bdf.

tags | exploit, overflow, local, root
systems | hpux
SHA-256 | 0e8e2833f271db51967945879c37ea8b040d8a327992db7a84525fd4e618c1ce
Page 1 of 2

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    0 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By