exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files from Delikon

Email addressich at delikon.de
First Active2002-08-23
Last Active2004-10-01
zinfexploit.c
Posted Oct 1, 2004
Authored by Delikon, Luigi Auriemma | Site delikon.de

Remote exploit for Zinf 2.2.1 on Win32 that downloads and executes a file.

tags | exploit, remote
systems | windows
SHA-256 | e80d2409b6e269d59edd99db2b19a5529b757d7eb1f822c75d015ee3aba48dbb
UPolyXv0.3.rar
Posted Sep 17, 2004
Authored by Delikon | Site delikon.de

UPolyX version 0.3 is a simple polymorphic open-source UPX scrambler. Comes with VC6 source code.

SHA-256 | 76f803c4a241d2b65788305267750d8bb9e1ae284387570a49288f288b7670e9
BJDExploit.rar
Posted Sep 10, 2004
Authored by Delikon | Site delikon.de

Buffer overflow exploit for BlackJumboDog FTP server version 3.6.1 that opens up port 7777 allowing for an executable upload.

tags | exploit, overflow
SHA-256 | d0a6cb671c15fdedc7d54c9417ea2d03b420c6181c6f36fa5782a5866cab377d
upload-exec-shellcode.c
Posted May 11, 2004
Authored by Delikon | Site delikon.de

459 byte upload and execute shellcode for Windows 2000 and XP.

tags | shellcode
systems | windows
SHA-256 | da0aa57a7273af5d6889c71b75bd70f0af07e0c0de19376285710e1118a837f1
win32-shellcoding-tutorial.zip
Posted Dec 15, 2003
Authored by Delikon | Site delikon.de

A simple tutorial on Windows Shellcoding - Shows how to write shellcode in asm that spawns a cmd shell. Includes tools to encode the asm code to avoid NULL bytes, and to generate the typical C shellcode. In Powerpoint and PDF format.

tags | paper, shell, shellcode
systems | windows
SHA-256 | d612a88f1dba4e28d11743cd0d9579d520bc1ffcfcc355aa2d650faad3da1111
SFPDisable.zip
Posted Oct 14, 2003
Authored by Delikon | Site delikon.de

SFPDisable is a utility that disable Microsoft Windows' File Protection by patching sfc.dll under Windows 2000 and sfc_os.dll in Windows XP. This allows a remote attacker to delete, manipulate, and backdoor any file on the system without Windows noticing upon reboot.

tags | remote
systems | windows
SHA-256 | 24605e3feea0bdf775d9c1ce2ac24e839a5e8effde6a87883b62062b173e2fca
shellcode-v2.0.zip
Posted Apr 21, 2003
Authored by Delikon | Site delikon.de

Shellcode-v2.0 is a genetic win32 shellcode generator based mainly on kungfoo. You can generate a shellcode with the help of a GUI. Source and executable included.

Changes: The shellcode will be XOR-encoded to avoid NULLS.
tags | shellcode
systems | windows
SHA-256 | bf21bbcff72608584169174404116a665444ac4b9bdc106694a2fe9770f56f35
hl-headnut.c
Posted Apr 10, 2003
Authored by Delikon | Site delikon.de

Denial of service exploit against Half-life servers. After sending 3 specially formed packets the server is unresponsive and there is 100% CPU utilization. Tested against versions 3.1.1.0 under Suse Linux 7.3 and Windows 2000.

tags | exploit, denial of service
systems | linux, windows, suse
SHA-256 | f6925a6a151cb89c26585acb1aea48df880c09ff4bfd634972dca9999ce666cd
shellcode-v1.0.zip
Posted Sep 25, 2002
Authored by Delikon | Site delikon.de

Shellcode-v1.0.zip is a genetic win32 shellcode generator based mainly on kungfoo. You can generate a shellcode with the help of a GUI. Source and executable included.

tags | shellcode
systems | windows
SHA-256 | 7ceadbc837c0a293c10e87c625f4338c9ca2fa138a5049d58d67ace148db452d
fmt.tar.gz
Posted Aug 23, 2002
Authored by Delikon | Site delikon.de

Fmt.tar.gz contains tutorials in English and German on exploiting local format string vulnerabilities. This is a summary of tutorials from http://community.core-sdi.com/~juliano and includes sample code.

tags | paper, web, local, vulnerability
systems | unix
SHA-256 | d8734dad39eae6eac7936a0b8293ae59adf0e02e8af61b742dc02ed9c0a777dc
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close