what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files from venomous

Email addressvenomous at rdcrew.com.ar
First Active1999-08-17
Last Active2002-06-13
rdC-cfingerd.tar.gz
Posted Jun 13, 2002
Authored by venomous | Site rdcrew.com.ar

Cfingerd prior to v1.4.3 remote root exploit for linux/x86. Exploits a format string vulnerability in the syslog() call. Ported to Cygwin by Luigi Grandini

tags | exploit, remote, x86, root
systems | linux
SHA-256 | 001eab558ecb8deaea5ecfd0cb633b3f88ddc7ca656b976fb86de7009f824ec4
rdC-cr2abuse.tgz
Posted Sep 11, 2001
Authored by venomous | Site rdcrew.com.ar

A code red mass fix/abuse tool.

tags | exploit
SHA-256 | 440b46e44ac239053727c665adfcf7a7c038fef3ee72cbc011b1cc58bba8decb
rdC-sf.1.0.tgz
Posted May 30, 2001
Authored by venomous | Site rdcrew.com.ar

SF (securefiles) is a local intrusion detection system (IDS) which will get the hashes for the specified files and create a database which is then then it is encrypted with AES. The executable checks itself, and a phrase is displayed (we select it on the installation) every time the program run successfully.

tags | tool, local, intrusion detection
systems | unix
SHA-256 | 3149931855b0aa87c4b6852889675d677b6c52f94dc9e41de421798f404d911a
rdC-cfingerd.c
Posted May 8, 2001
Authored by venomous | Site rdcrew.com.ar

Cfingerd prior to v1.4.3 remote root exploit for linux/x86. Exploits a format string vulnerability in the syslog() call.

tags | exploit, remote, x86, root
systems | linux
SHA-256 | d8bf8ec5db51a03a2a06971d1a62f5b817394a89a0963c7f4adf17a3b5bfdc71
apachebd.tgz
Posted Mar 19, 2001
Authored by venomous

Apache backdoor - Backdoors apache 1.3.17 / 1.3.19 to spawn a root shell when a certain page is requested.

tags | tool, shell, root, rootkit
systems | unix
SHA-256 | e698c564d4808ff114e58bf39b34e7af99192e7dd9bcc390a7b4266e71965926
rdC270201.adv.en
Posted Mar 3, 2001
Authored by venomous | Site rdcrew.com.ar

PHP-Nuke v4.4.1a contains remote vulnerabilities because arbitrary information can be passed to MySQL via the saveuser() function and several others. It's possible for the attacker to change the e-mail address of one of the users and ask for the password to be sent to the e-mail address that the attacker have provided. Exploit URL included.

tags | exploit, remote, arbitrary, php, vulnerability
SHA-256 | f3655876593a5a07c6c44ecd5198383aba17f78fc2b0cb266d390629ca65c07b
rdCpaper-fb.text
Posted Dec 24, 2000
Authored by venomous | Site rdcrew.com.ar

How to exploit format string vulnerabilities - In Spanish.

tags | paper, vulnerability
systems | unix
SHA-256 | d30ae54998bb2cc00f334b5bae58862608dc3f8d9da7dce9df01a7975c7a1cc0
rdC-LPRng.c
Posted Dec 15, 2000
Authored by venomous | Site rdcrew.com.ar

LPRng v3.6.24 and below remote root exploit for Linux/x86 which exploits the syslog() format string vulnerability. Tested against the default install of Redhat 7.0 (LPRng-3.6.24-1) and LPRng3.6.22-1 installed on Slackware 7.0.

tags | exploit, remote, x86, root
systems | linux, redhat, slackware
SHA-256 | 711ec9e53d55297ca043c724b126975613590c27a195978efaf80054e1390558
sf-0.1b.tgz
Posted Aug 29, 2000
Authored by venomous | Site rdcrew.com.ar

Secure Files 0.1b is a security tool that checks system integrity by comparing the MD5 checksums of flagged files against their earlier recorded checksums.

tags | tool, intrusion detection
systems | unix
SHA-256 | caad669b0b465c73e0613d69b59ad4a8753e02d3a078318bc637439fcf97fe34
overflow.txt
Posted Jul 31, 2000
Authored by venomous | Site rdcrew.com.ar

overflow.txt is a paper written in Spanish which explains buffer overflows and includes sample code.

tags | paper, overflow
SHA-256 | 9f17d1e1309b6e4f54da9b694512de4fd015917ebdd3d4700e11a02c2f009890
ftpdse.c
Posted Jul 27, 2000
Authored by venomous | Site rdcrew.com.ar

Ftpdse scans a list of IP addresses for FTP servers, logs the version, and can optionally see if site exec accepts format strings.

tags | tool, scanner
systems | unix
SHA-256 | 2203a1227b7895400cdfbf6ab6e306613fc5af3eea72148088c3760eb25d6eaf
vnsl.tgz
Posted Dec 31, 1999
Authored by venomous

vnsl (vENOMOUS Scripting Language version 0.1b) can be used to script connections to daemons and backdoors.

tags | tool
systems | unix
SHA-256 | 2ed8380b373a9e5cfa497c3e67cad65bd64226d22a3b4260b158ea294aa27b71
ftpscan.c
Posted Aug 17, 1999
Authored by venomous

ftpscan v1.0 will open a specific file [-f file], get the IPs from it, then, check if FTP port [ -p 21 ] is open and log the version. If you specify the [ -o ] flag it will try to log into the FTP server and execute the LIST command [recursive] (useful for checking for existence of world writeable directories).

tags | tool, scanner
systems | unix
SHA-256 | cb276b9dcf748023e04975903a2173836b8ffd09a27fa979c110101e3ea26909
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close