accept no compromises
Showing 1 - 16 of 16 RSS Feed

Files from CoKi

Email addresscoki at nosystem.com.ar
First Active2004-07-18
Last Active2005-08-06
nbSMTP_fsexp.c
Posted Aug 6, 2005
Authored by CoKi | Site nosystem.com.ar

nbSMTP version 0.99 remote format string exploit. Tested on Slackware Linux 9.0, 10.0, and 10.1.

tags | exploit, remote
systems | linux, slackware
MD5 | 7b03f489ef56c1c6f12b4ebe55f21c9e
mu-imap4d_fsexp.c
Posted Jul 28, 2005
Authored by CoKi | Site nosystem.com.ar

GNU Mailutils imap4d version 0.6 remote format string exploit. Tested on Slackware Linux versions 9.0, 10.0, and 10.1.

tags | exploit, remote
systems | linux, slackware
MD5 | da0de44e2242607117540ff5e260dca5
ngircd_fsexp.c
Posted Feb 3, 2005
Authored by CoKi | Site nosystem.com.ar

Remote root format string exploit for ngIRCd versions 0.8.2 and below.

tags | exploit, remote, root
MD5 | 563de766ee162bd858177621dfe86665
nsg-advisory-11.txt
Posted Feb 3, 2005
Authored by CoKi | Site nosystem.com.ar

No System Group Advisory #11 - A remote format string vulnerability allows for remote compromise in ngIRCd versions 0.8.2 and below.

tags | advisory, remote
MD5 | a8fcda008da7cfa17c3df0c805627757
ibod_bof.c
Posted Dec 31, 2004
Authored by CoKi | Site nosystem.com.ar

IBOD 1.5.0 and below local proof of concept buffer overflow exploit.

tags | exploit, overflow, local, proof of concept
MD5 | fbd27c4895e287d344b946fd54d9ae56
citadel_fsexp.c
Posted Dec 12, 2004
Authored by CoKi | Site nosystem.com.ar

Remote root exploit for Citadel/UX versions 6.27 and below that makes use of a format string vulnerability. Tested against Slackware 10.0.

tags | exploit, remote, root
systems | linux, slackware
MD5 | 90c58521cf1c000af9e84004d8bb79b4
nsg-advisory-09.txt
Posted Dec 12, 2004
Authored by CoKi | Site nosystem.com.ar

No System Group Advisory #09 - Citadel/UX versions 6.27 and below suffer from a format string vulnerability that allows for remote root exploitation.

tags | advisory, remote, root
MD5 | 60a10815d6eeddb0e3c5e76d0b7b19c6
nsg-advisory-08.txt
Posted Nov 20, 2004
Authored by CoKi | Site nosystem.com.ar

TipxD versions 1.1.1 and below suffer from a local format string vulnerability. Proof of concept local exploit included.

tags | exploit, local, proof of concept
MD5 | f59247ae7c9a0aee1868abb9434094bc
advisory-07-nsg.txt
Posted Oct 27, 2004
Authored by CoKi | Site nosystem.com.ar

Proof of concept exploit for Socat versions 1.4.0.2 and below that makes use of a format string vulnerability.

tags | exploit, proof of concept
MD5 | 8bb021b27d4f31ff6c9ba00a89a73505
flc_exp.c
Posted Sep 30, 2004
Authored by CoKi | Site nosystem.com.ar

Local exploit for flc versions 1.0.4 and below. Note that flc is not setuid by default and this is completely proof of concept. Tested on Slackware 10.0.

tags | exploit, local, proof of concept
systems | linux, slackware
MD5 | 6bde4a3aa0db275b740ec679ab535911
advisory-05-glFTPd.txt
Posted Sep 21, 2004
Authored by CoKi | Site nosystem.com.ar

The dupescan binary from glFTPd versions 2.00RC3 and below suffers from a stack overflow that can be exploited locally. Full exploit included.

tags | exploit, overflow
MD5 | 373e7c82d4e8791105b347c2dc1e2f45
citadel.advisory-04.txt
Posted Jul 29, 2004
Authored by CoKi | Site nosystem.com.ar

Citadel/UX versions 6.23 and below are vulnerable to a buffer overflow that occurs when more than 97 bytes are sent with the USER directive to port 504.

tags | exploit, overflow
MD5 | 19ca7f050f3b6e57f8fb51c2e642600d
wgetusr.c
Posted Jul 23, 2004
Authored by CoKi | Site nosystem.com.ar

Exploit that makes use of the mod_userdir vulnerability in various Apache 1.3 and 2.x servers. Ported to Windows by John Bissell.

tags | exploit
systems | windows
MD5 | f31b7dbf6a8e67ce8d301fa3f4d4e38b
getusr.c
Posted Jul 20, 2004
Authored by CoKi | Site nosystem.com.ar

Exploit that makes use of the mod_userdir vulnerability in various Apache 1.3 and 2.x servers.

tags | exploit
MD5 | 8662511387d1c9dfabc4db3091ec50b0
expnbrute.c
Posted Jul 18, 2004
Authored by CoKi | Site nosystem.com.ar

Utility that attempts to find whether or not users exist on an SMTP server using the EXPN command against a list of user names.

MD5 | d4c4244fbe3e55e1a4901c2c5014d49c
log_clean.c
Posted Jul 18, 2004
Authored by CoKi | Site nosystem.com.ar

Tool for cleaning WTMP, UTMP, and lastlog under Linux.

tags | tool, rootkit
systems | linux, unix
MD5 | 7ed732d507e01a048ef089c16897321e
Page 1 of 1
Back1Next

File Archive:

October 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    15 Files
  • 2
    Oct 2nd
    16 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    11 Files
  • 6
    Oct 6th
    6 Files
  • 7
    Oct 7th
    2 Files
  • 8
    Oct 8th
    1 Files
  • 9
    Oct 9th
    13 Files
  • 10
    Oct 10th
    16 Files
  • 11
    Oct 11th
    15 Files
  • 12
    Oct 12th
    23 Files
  • 13
    Oct 13th
    13 Files
  • 14
    Oct 14th
    12 Files
  • 15
    Oct 15th
    2 Files
  • 16
    Oct 16th
    5 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close