One Byte Frame Pointer Overwrite Hardcoded Exploits - This paper describes how to exploit overflows which are off by only one byte. Includes sample code.
003c664e2339c4874046201145c181f17ebdd3ea4be562a3990168bb8426da4e
Apache OpenSSL v0.9.6d mass scanner. When a vulnerable server is found code is launched. Includes targets for Apache 1.3.6, 1.3.9, 1.3.12, 1.3.19, 1.3.20, 1.3.26, 1.3.23, and 1.3.14. Includes openssl-too-open binary.
aa1467984afb050f4cdbdb18e5960709046b1acf4e899c587a3bb5f32f81af72
Apache OpenSSL handshake exploit for Linux/x86, from a circulating Apache worm. Spawns a nobody shell on tcp port 30464. Includes targets for most recent distributions.
d556b921afa65987fbfce40ecaf730bfb6ad9fb761d32e4aaff71b95149502eb
FreeBSD Apache exploit based on apache-worm.c. Affects FreeBSD 4.5 Apache 1.3.20-24. Sends a nobody shell to TCP port 30464. This is a fixed version - Prior versions were broken.
f406bf2bf696f6639b1cc39d57ebe81efe602557b5527375dfa26c0efe708046
Apache chunked encoding mass scanner / defacer. When a vulnerable server is found code is launched.
e701383409bcc76b9426ac970d717b951451d645474790a4db482cd1cf64f15d