Virtuozzo from Parallels suffers from cross site request forgery vulnerabilities.
fecc08d75ae7ba875e668dc7dabf3479
pdflib, a library used for generating PDFs on the fly, suffers from multiple buffer overflow vulnerabilities due to the use of strcpy().
5b5319a4404f4f00c7533d2437c848fa
gwcheck is a simple program that checks if a host in an ethernet network is a gateway to Internet.
3699f58b2676bf33886816024d7eda4d
This script can be used to steal G-Mail's keychained password by injecting javascript into Safari. When executed it opens G-Mail's login page, reads the saved password and sends it to a logging server by creating an hidden iframe into G-Mail's page.
f25867c70c9f1546c6cf772d9272279f
This script can be used to steal G-Mail's keychained password by injecting javascript into Safari. When executed it opens G-Mail's login page, reads the saved password and prompts it into an alert box.
be54b1b330d258fc5c3ba6851cf17ef2
cotv 2.0 suffers from a client-side denial of service vulnerability due to a lack of validation. Demonstration exploit included.
09fcabf3a5299f63313c1f1e27df059b
The D-LINK DWL-2000AP+ with firmware version 2.11 is prone to two remote denial of service vulnerabilities because it fails to handle arp flooding.
4d569a21008153d7ab5140e0519efb08
easy notes manager (eNM) version 0.0.1 is affected by multiple SQL injection issues. POC included that demonstrates how to bypass authentication.
4c602907941ded3261092a9e6f0dea6a
TRIPP is a utility to rewrite incoming and outgoing IP packets. Since it can rewrite both headers and payload, it can be used to configure the tcp/ip stack behavior in order to perform various tasks mainly intended for network tests, simulations and development.
717ec4d99fcbd164580ee2fb981677d5
Small whitepaper discussing how to use payload rewriting to exploit remote buffer overflow vulnerabilities.
d3a8336923bfe394553ef99315a13d8a
TRIPP is a utility to rewrite incoming and outgoing IP packets. Since it can rewrite both headers and payload, it can be used to configure the tcp/ip stack behavior in order to perform various tasks mainly intended for network tests, simulations and development.
64fb10b1def8f0e6d9586a1c40c968a4
A paper discussing passive OS fingerprinting and spoofing OpenBSD pf "os" rulesets.
76d3abde5584b498d8c1a5bcc06a4495
proof-of-concept tool for performing passive OS fingerprint spoofing to bypass OpenBSD pf firewall rules.
4dda8dd683b1a851a409f5d18f7001da
TRIPP is a utility to rewrite outgoing IP packets. Since it can rewrite both header and payload data, it combines functionality found in iptables as well as netsed. This can be useful for performing replay attacks, altering your own OS fingerprint, or for bypassing remote firewalls.
46a025bada982f424d31560a4ee3c0f2