Project aurora is lamagra's non-blind LAN spoofing project. It can be used to create TCP connections from a non-existing box or another box in the network. The biggest problem while spoofing was guessing the sequence numbers to acknowledge and that the other box always sends back a reset when it receives a SYN|ACK. This used to be solved by abusing small bugs in the tcpip stack.
3468997662e967b3bb4c11bacb27971f09a1cd20742f8a53d195e8f32028fcc6
fs-spider is a multi-threaded bad permissions finder (user defined). It
ea68f5abf6cbd21c366e7f35e65fb23ac152291db0553eeb4e10dfb206e2ff1a
This shellcode creates a connection to a host/port and starts a shell. This should be more anti-IDS then the others and it can go through a firewall.
d50e538d758dd930f5ec6b120b1229f2cdae67049c11ce1d22075a1a803c46f2
An overview and Analysis of the LOVE-LETTER-FOR-YOU virus/worm.
91e72ac403333b1d6fa854a57c316306f67a39f3f33d59b7d9fe29d968376dcd
dopewars 1.4.4 exploit, it's been fixed now ( thanks to my patch :-) ). It dates back to oktober 1999. But i used some cool methods in it.
f7b77db072d1405a450204a66ded9b44f5d8fe5c91b142d9376c984870b4f68f
safe_exec.c - execute programs in a secure environment with a specific uid/gid/user and you can specify a program to be executed before the chroot.
a237a905c377b8cdf4065c45fb6568e482cec4b7ed56166967add7160a81033b
sc.tgz is a bunch of linux shellcodes. x86: shellexecuting, portbinding, encrypted (to avoid IDS detection), cdrom ejecting, writing (append "lamagra was here" to /etc/motd) , reading (read 255 chars and execute). tools: a tool that "creates" shellcode from the _start of a program, a list of useful syscalls + arguments. m68k: reading, shellexecuting.
7a65245816d3ac1c54c5513145d58b318536f68db9ba2d683cf9ba7142068296
Ftpcat v1.1 is a simple program that allows users to upload and download files and dirlistings from a ftpserver.
fb4cdaf7774b5c57f34de3ab859a90286c9dcfb1cab3f2e69932ec0b153bf646
Ftpcat v1.0 is a simple program, that allows users to upload and download files and dirlistings from a ftpserver.
c25dbf4b49615bb7763c489be8f641f1cfb5f0b0bde244b4a19f9211c7a81b11
A little article on m68k buffer overflows + shellcode.
016422af06a4b1b382cf3adddd84f9422c208462d1ded6d338ac8ba2a3b63718
Proftpd (<= pre6) linux ppc remote exploit.
6794b66bd9b67beb831092c9ee6bb6d6a88f66d33536244eea1007cad32cadba
rpc.amd remote exploit with spoofed source address.
329325fa62c5fbb59239de4158cdfa9412f4a122b2491697f843abe351bd7e4c