This program uses multithreading to scan a range of IP addresses (IPv4) to find telnet/ssh and web servers. It then brute forces credentials against the host and upon success, will detect the type of host and execute commands.
387243e74e389e70607dc921917a7ce98e0479096f1955bb53e8173123c4e264
MoroccoTel boxes suffer from an issue where there is a default password that can be used on the telnet server.
15212df8a3a8d8b6ba16ec77025ef5e22d8dacfee6fd2ff769977b33b5b5fd46
The Huawei MT880 device suffers from cross site request forgery vulnerabilities.
3fe868872064c2e25216cee4105b2a6578bb14b43e96704b0e53f9d50b06bc5e
w3af User Guide written in French.
31ac0479b71516c0063f3c2cecabe1e9b612eeeb99fc80951064da52881eb53e
JA-SNMP-Reader is a simple Windows executable that reads values from an OID of a given SNMP Agent.
f79868f69d225f4308f36d526a18a2d328f8c100707c806272d882961a3d5feb
JASniff is a small handy graphical Windows TCP/UDP/ICMP packet sniffer. This tool will be embedded in the MSF-XB exploits development platform soon.Full source and a binary is included.
6b72a88cfe89a5313587d5fba7cc23c2b8067328f13b9efe6198926a12e185e5
Microsoft Visual Basic Active-X Controls buffer overflow proof of concept exploit that leverages mscomct2.ocx.
9e908a95caf95ef805674d900baaa9e609f55f84e306674f7900dde2246a3c2a
Microsoft XML Core Services DTD cross-domain scripting proof of concept exploit that makes use of the vulnerability noted in MS08-069.
9c41a205f45e8e6c54228661f76071d9b7c78bfe03fea9f194e637bee0017cd3
MSF eXploit Builder is a Windows GUI to build Metasploit Framework exploit modules. It will help you to edit/modify/create/test exploit modules for the Metasploit Framework. Full source release. It includes a built-in fuzzer, a win32 debugger, and a lot of tools used in the process of exploit development.
4a382efc58c637872c644539f8f88fe0989f10424df3f81dc14c702a0e2f6770
The e107 My_Gallery plugin version 2.3 suffers from an arbitrary file download vulnerability.
2ef4312d97e534f6c07bbe36d7a3a2078377c54b2fcec8d9d17470dfdfafce4b
BTScan is a bluetooth scanner for Windows. It scans for the accessible bluetooth devices, retrieves the list of available services on these devices, and allow file uploads via bluetooth.
a3d23cec0cde56fb35df911c10b0ea27986a486ebdeae3a5af3d752f72d91746
Whitepaper discussing how to speed up the exploit development process as presented at VNSECON07.
ffe923e8398e85378151a0b921bace4d2172ba42ed6499ef888c1bdb1b15a5b4
The .wdp project file handling in PCSoft WinDEV suffers from a buffer overflow vulnerability.
9d2bdf9add4eb15757bc1637472308670613d3fab5d8e657520e87cc0a59fc48
XM Easy Personal FTP server version 5.0.1 remote overflow proof of concept exploit.
e871e58abd0876e23cb061e1576a4237670b226ee100db0208fcfe9af59e80f5
Remote exploit for ArGoSoft FTP server versions 1.4.3.5 and below that makes use of a remote heap overflow in the DELE command.
7254d5e1a22aa5a9bedc2e13bb70cc4b7c74c92e5c1eac37b5611a7eb4360abd
BulletProof FTP server version 2.4.0.31 local privilege escalation exploit that provides a shell with SYSTEM privileges.
bf0d2a596e4873cd8286ec7287c3700d618e721578db84e1ee1695e7faedd485
Vulnerabilities that allow an attacker to inject malicious PHP code exist in the phpBB2 forum using the Cash_Mod module.
624d762e4f5dae8b18a82ee5892ea42e4e0889fbe304466a9772639cf8109294