VoIPER is a VoIP security testing toolkit incorporating several VoIP fuzzers and auxiliary tools to assist the auditor. It can currently generate over 200,000 SIP tests and H.323/IAX modules are in development.
61584b71e6024bab0481eed3fcbb25f14093e26c73b0f33995d9a57693310ece
iaxscan is a Python based scanner for detecting live IAX/2 hosts and then enumerating (by bruteforce) users on those hosts. It does so, in an obvious fashion, by sending valid IAX/2 requests and monitoring responses.
1f293ca923f0b309d7117438dd3726662dcb041a64975f0b23a14c0edba46c03
VoIPER is a VoIP security testing toolkit incorporating several VoIP fuzzers and auxiliary tools to assist the auditor. It can currently generate over 200,000 SIP tests and H.323/IAX modules are in development.
395730c606716956bfb37848a1a3d0f336a82fb23b48d41b02b0a76641209299
Exploit that demonstrates a format string vulnerability in Firefly Media Server versions 0.2.4 and below.
bf82baac7982d36b91e817695b760d0fc94ece66b95c7309f6206425f4e68403
Firefly Media Server versions 0.2.4 and below suffer from a vsnprintf() related format string vulnerability.
f9246e2baf4427586aed6f665ec1c4134b3863df9964a44d344c60fa44e944bc
Exploit that demonstrates a null pointer reference in Firefly Media Server versions 0.2.4 and below due an unchecked header variable increment.
385f477531ca28b4f3d7f731e0b3ac9cd7286da8ea87e5472fadd410f23f34ef
Firefly Media Server versions 0.2.4 and below suffer from a remote denial of service condition due to a null pointer dereference during an unchecked increment of the header variable.
0206b1a22927bbfff866682b2ead6ac8db8c5351d6920a4c1aa60d20a25249b1
Exploit that demonstrates a null pointer reference in Firefly Media Server versions 0.2.4 and below due to a missing :.
8fdd1376f9b1252ba0b9496599d352081de38ed7db0040c48318b7a16b5e2d7b
Firefly Media Server versions 0.2.4 and below suffer from a remote denial of service condition due to a null pointer dereference when a : is missing.
5f78689d5e4820b41b940df3cbac8f2a43c3cab229c125808123c9334f0c9ff1
kmail 1.9.1 table/frameset DOS proof of concept.
667d336a0c82cde8a65570b60b3fb5af3cdfd0c23f4d0d6a7ba48819800ca3ec
Opera 9 IRC client denial of service exploit.
6acafca1ba736fa6a2c216ae482a6df565e5a5a60d44bf4dba80187a12ca6a33