Email address | private |
---|---|
First Active | 2003-07-06 |
Last Active | 2012-03-04 |
Simple Fuzz is a simple fuzzer. It has two network modes of operation, an output mode for developing command line fuzzing scripts, as well as taking fuzzing strings from literals and building strings from sequences. It is built to fill a need - the need for a quickly configurable black box testing utility that does not require intimate knowledge of the inner workings of C or require specialized software rigs. The aim is to just provide a simple interface, clear inputs/outputs, and reusability.
a65bb4d048c713dd9ecc4b42b98cc124516fd5c1df19deddfc664476aad7caac
Nginx version 0.6.38 heap corruption exploit.
f0e708878e2c5a4352a3ea3e827b14424c654e6bad3d69ea431626585786de0b
Simple Fuzzer is a simple fuzzer. It has two network modes of operation, an output mode for developing command line fuzzing scripts, as well as taking fuzzing strings from literals and building strings from sequences. It is built to fill a need - the need for a quickly configurable black box testing utility that does not require intimate knowledge of the inner workings of C or require specialized software rigs. The aim is to just provide a simple interface, clear inputs/outputs, and reusability.
7fcf7aee05ab2a2049ef8d39184286e639df7b34f15f5b6e43a24ec87d86dc8a
CoreHTTP versions 0.5.3.1 and below suffer from a remote command execution vulnerability.
3c2bca2cfde516a13c2987315e8c27791221f4c84adae867779481e05a5bd998
This Metasploit module exploits a remote command execution vulnerability in corehttp versions 0.5.3.1 and earlier. It requires that you know the name of a cgi file on the server. NOTE: If you want to do something more than remote shell, you'll have to change CGICMD.
f31dc0038a72a13e6598040ea8df55829bf9b87af889ef2f3d93f21265eb37bf
ppscan is yet another portscanner. However, it can scan an entire Class C subnet for a range of ports not only using tcp-syn/tcp-connect but also by tunneling through HTTP proxies (either HTTP GET or HTTP CONNECT), or using FTP servers which allow arbitrary connections via PORT bounce method. It is multi-threaded, so it can blaze through connection attempts.
662c1cf506bf0d8bb74216f8ea2f0047e7c33238eb1860284b5d9c9fbb2ccc27
This is a simple head utility that outputs in hexadecimal format. Characters that are non-printable are replaced with the "." character.
0c5080928e90b08d6d6768e9822e4f8abf096c4a3266af155b8e438d2ed706fb
Simple Fuzz is a simple fuzzer. It has two network modes of operation, an output mode for developing command line fuzzing scripts, as well as taking fuzzing strings from literals and building strings from sequences. It is built to fill a need - the need for a quickly configurable black box testing utility that does not require intimate knowledge of the inner workings of C or require specialized software rigs. The aim is to just provide a simple interface, clear inputs/outputs, and reusability.
e244dc374f84c63b7a6cfac17c78eed576e3b6cb4d0a536d0a32bb866d67896b
NetPipe is a redirector. It takes a socket in on one port, and reconnects that data out on the second port. It is multi-threaded, and supports UDP, TCP, and ICMP. It is a fully functioning socket redirector, the aim of which is to open ports on a firewall without needing the access to manipulate firewall ACLs.
00c3ddf079b87394db62e8ac080a815aeef0cee809dd45163241b1992ea98f74