exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files from Lympex

Email addresslympex at gmail.com
First Active2005-08-26
Last Active2008-01-25
PExtractor_v0.18b_binary_and_src.rar
Posted Jan 25, 2008
Authored by Lympex | Site l-bytes.tk

PExtractor is a forensics tool that can extract all files from an executable file created by a joiner or similar.

tags | tool, forensics
SHA-256 | d56062cf1ab0f5323aba9e3a81dd0852581f7c1b341823615c4690370255642a
FlashFXP.Account.Spy.1.5.c
Posted Apr 17, 2007
Authored by Lympex | Site l-bytes.tk

FlashFXP Account Spy 1.5 - Utility to capture login credentials of FlashFXP.

tags | tool, sniffer
SHA-256 | 0b06a8ba5caf53a8edbfb021db532e04486671fe7835b9c6c4e5f9737aeb2121
D-Link.Wireless.Access-Point.c
Posted Jun 11, 2006
Authored by Lympex

exploit for D-Link DWL-2100ap which discloses the configuration file to remote users.

tags | exploit, remote
SHA-256 | 9964f14447ea2955f5b7016a84c062307bcc7b43558f3ff7cb4b7aeea4f671f5
ArGoSoft-1.4.3.5-DoS.cpp
Posted Mar 2, 2006
Authored by Lympex

ArGoSoft FTP server versions 1.4.3.5 and below remote denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | 37840dc5e7614f6dacb3b057a5b527ff414a8f2e14adad675f4f68481ade620c
FlashFXP.tgz
Posted Feb 25, 2006
Authored by Lympex | Site l-bytes.tk

FlashFXP Account Spy 1.0 - Utility to capture login credentials of FlashFXP.

tags | tool, sniffer
SHA-256 | b7248c65601bfbcd18068bab72b7d870ad0984e6076a9a7d16c714cbfbfe6ccb
Microsoft.IIS.Malformed.URI.cpp
Posted Dec 28, 2005
Authored by Lympex | Site l-bytes.tk

Microsoft IIS 5.1 malformed URI denial of service exploit.

tags | exploit, denial of service
SHA-256 | 837498a4d744d992373c5ed655af6324ffb4059f266d8a1030be1af897c8de58
cpanel-9x_RCE.c
Posted Sep 1, 2005
Authored by Lympex | Site l-bytes.ne

Exploit for cPanel versions below and equal to 9x that takes advantage of a remote command execution vulnerability.

tags | exploit, remote
SHA-256 | 6e74cd53627a40348b129b2f8f7c66f2eb17564e01d5469e32a0bb3e9bcee9c5
HP_OV_NNM_RCE.c
Posted Aug 31, 2005
Authored by Lympex | Site l-bytes.net

Remote command execution exploit for HP OpenView Network Node Manager versions 6.2, 6.4, 7.01, and 7.50.

tags | exploit, remote
SHA-256 | 35f6fb2bbbf9a319cca337f6e91aa2660874027de25e497f6c79ccace01bedc0
Evil.Shell.Backdoor_1.0.5.c
Posted Aug 26, 2005
Authored by Lympex | Site l-bytes.tk

Password protected windows bind/reverse shell backdoor written in Visual C++ Archive password is set to p4ssw0rd. Use at your own risk.

tags | shell, trojan
systems | windows
SHA-256 | 0475009407cb1326228f33e0edd9b896
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close