exploit the possibilities
Showing 1 - 8 of 8 RSS Feed

Files from Gunzip

First Active2003-01-05
Last Active2003-11-08
webscan_0.1.0.tar.gz
Posted Nov 8, 2003
Authored by Gunzip | Site members.xoom.it

Webscan is a web site fuzzer that checks for remote vulnerabilities such as sql injection, cross site scripting, remote code execution, file disclosure, directory traversal, php includes, shell escapes, and insecure perl open() calls.

tags | remote, web, shell, perl, php, vulnerability, code execution, xss, sql injection, fuzzer
MD5 | f83438c6f3e10d4d87a6ee0820bebbba
xtokkax.c
Posted Aug 5, 2003
Authored by Gunzip

Linux and BSD x86 local exploit for xtokkaetama that gives egid of games.

tags | exploit, x86, local
systems | linux, bsd
MD5 | 7ef366cae1131fbaf39bf32d7b3d78f5
linux86-udpcode.c
Posted Jun 29, 2003
Authored by Gunzip | Site members.xoom.it

Linux x86 UDP shellcode. Reads from UDP port 13330 to retrieve other shellcode then executes it.

tags | x86, udp, shellcode
systems | linux
MD5 | 69dfb886894b63b8e8b6ec56e334da60
squidx.c
Posted Jun 21, 2003
Authored by Gunzip

Remote exploit for Squid V2.4.DEVEL4 and below on linux/x86.

tags | exploit, remote, x86
systems | linux
MD5 | 24d91d5829db84c6495bdd00d3c2d301
atftpdx.c
Posted Jun 11, 2003
Authored by Gunzip

Proof of concept remote root exploit for atftpd version 0.6. Makes use of the filename overflow found by Rick Patel. Tested against Debian 3.0.

tags | exploit, remote, overflow, root, proof of concept
systems | linux, debian
MD5 | 3b0c2689d61a4f537485d01ed45b9bbb
atftpd.patch
Posted Jun 11, 2003
Authored by Gunzip

Simple patch to fix the overflow found in atftpd by Rick Patel.

tags | overflow, patch
systems | unix
MD5 | 056d61425e87567ddcedc6188e7b99fa
katax.c
Posted May 13, 2003
Authored by Gunzip

Local root exploit for Leksbot binary KATAXWR that was accidentally packaged setuid. Tested against Debian Linux 3.0.

tags | exploit, local, root
systems | linux, debian
MD5 | 7fc6383cee7a290c0d224a52030c144a
oOps.c
Posted Jan 5, 2003
Authored by Gunzip

oOps.c grabs hardcoded strings from binary files. Shows rootkit passwords and other information that is encoded character at a time to avoid binary examination like the strings command. Tested on Linux.

systems | linux
MD5 | c16cd712e1571f6a4b3095de4011a13e
Page 1 of 1
Back1Next

File Archive:

July 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    15 Files
  • 2
    Jul 2nd
    19 Files
  • 3
    Jul 3rd
    12 Files
  • 4
    Jul 4th
    1 Files
  • 5
    Jul 5th
    2 Files
  • 6
    Jul 6th
    25 Files
  • 7
    Jul 7th
    35 Files
  • 8
    Jul 8th
    4 Files
  • 9
    Jul 9th
    9 Files
  • 10
    Jul 10th
    7 Files
  • 11
    Jul 11th
    4 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close