nginx version 1.4.0 remote code execution exploit that leverages a new attack technique called BROP (Blind ROP).
8352b0f536d1d2db731dbea6ffe0990452b85c17e1de3830432937e8c4173ec3
This is a ROP exploit variant of the perf_swevent_init local root exploit for the Linux kernel versions prior to 3.8.9 for x86_64.
f2e2d43cd1b1f6062d1700da019b5cc1e08dbf07427dcb52fc47281b57ddf45f
perf_swevent_init local root exploit for the Linux kernel versions prior to 3.8.9 for x86_64. Based off of sd's exploit.
59caf806b1911994747249031fa80d9f7f763d3edc8c72e2689c9b4185164b11
Remote Pine exploit for versions 4.56 and below. Makes use of a vulnerability discussed here.Binds a shell to port 6682. Written for Slackware 8.0, 8.1, and 9.0 and works for RedHat as well.
e851c723d21209a6b26900e885356e35a071b04eb77c23187facc15b5835af99
Local exploit for sendmail 8.11.6 which takes advantage of the vulnerable prescan() function which allows users to input 0xff to skip the length check of the buffer. Includes targets for Slackware 8.0, Redhat 7.2, and Redhat 7.3.
6c7b5fd249e10c235502380844b5482f60d098427bce8782f3b77db91c26779f
Remote exploit for rsync version 2.5.1 and below run on Linux. This exploit makes use of a simple frame pointer overflow.
6d22b5088d7fc52eb994bcfe37975d15f67800c96849738dce0efa68d5b1fe86
Linux Traceroute v1.4a5 and below local root exploit which takes advantage of a malloc chunk vulnerability. Uses gdb to find offsets.
2b8d9dac84e0f7dd993e19acd912184417a595f94fb1481ffc67eaa6c492e43e
Sortelnetd is a working telnetd 0.17 exploit (even remote if you are careful enough). alignment is critical. Includes a demo of how to find offsets and use against localhost.
6e643b30e9635a5e3b22d1113b59356de6894ddf8033ed508db6d01f8a7808f3