Contest Windows binary of arcs.
5ee44ad0ae249826411eb70fae8ebd129dd9892e9c0eea2169267c0e5938b19b
WU-FTPD 2.6.2 Freezer exploit that causes a denial of service condition when a valid login can be supplied.
d57268686dfb20a4d79703d2f4cddddcc0beb590b3039fcef7b38a2089a03dad
A.R.C.S., or the Angelo Rosiello and Roberto Carrrozzo Stream 256 bit cipher, is an algorithm registered with the S.I.A.E. that the authors have allowed this site sole rights to host and distribute. The algorithm's theory utilizes Vernam's cipher, respecting Shannon's principles, and is based on MD5. The authors hope that someone will try to break this cipher and welcome all attempts and added research. Be forewarned, commercial use of this algorithm is forbidden without the Authors' consent. If you successfully crack this file that was encrypted with A.R.C.S., Packet Storm will send you a free t-shirt with the classic shellcode on the front of it. Supplies are limited, but we are not extremely worried. Thanks to all that help further the research and development of strong crypto.
6436c9950463b20a49248c7880067dabc09f043214835d7de2a41f3a947cb7ec
Liquidwar 5.4.5 local exploit that has been tested on Slackware Linux 9.0.0 and Gentoo Linux 1.4.
6038ccaf0089d0c6b1b982024c5d6232813a117568c7c20900bb183dcfc26458
White paper discussing stack overflows, ways to exploit them, and SIMPLESEM.
85ddc994e6b7cdd09d72c7e1a271c91908d9ccbd87b5a1ba218dbac260ff56ed
ImageMagick, the popular image viewer bundled with various distributions of Linux and sometimes used as the defacto image viewer in mail clients, has a vulnerability that can lead to arbitrary code execution with the privileges of the user running the program.
5a4292f4fc03c31a1515095fe313548698146bb7a2b590e49fd261404826ab6e
Access utility via TCP that works much like telnetd. Supports MD5 authentication, gives a full tty, and logs everything.
7173515f75b93734bc4de681cf38a90849aee75317c57d97395435a22d3227ab
RPM Finder Project version 1.2 is a utility that works much like the rpmfind.net site. It supports RedHat and Mandrake Linux.
6459a4c851ab66b8349b4e3c4a5708961d44bcb8b8619a9b9ba72fa620066729
RPM Finder Project version 1.0 is a utility that works much like the rpmfind.net site. It currently only supports RedHat but will support Mandrake and Suse in its future releases.
d9c5fb359c7e6f5c54e12b8ab53f4c8ef840ca39788e0fc250de49320730453b
bnc version 2.6.2 and below suffers from a denial of service vulnerability. Armed with a valid login and password, a remote user can kill the daemon.
df9ba77e9a022c665d0476f11eddc0d54a32d3a4c2c210cd53987e9a5bed8326
A simple denial of service exists in the Pi3 webserver that allows a remote attacker to crash the daemon by feeding it a GET request with 354+ forward slashes after it.
d0d216a28eaf4658a4d2b9ad6dbe5182010977d617055973a17d6620ae03dea4
Linux x86 shellcode (48 bytes) which does setreuid(0,0); execve("/bin/bash", NULL); exit(0);
9b5c6592a60521c7b883d20faff2a3b2f672c2706732bafb65e60fe26cd543f8
Local root exploit for a stack overflow discovered in the linux-atm binary /usr/local/sbin/les.
f1c32981886e6334e7424c657577e8ff9d0eb02412a12110472003cb93a561e8
This paper illustrates how to control server with the UDP protocol. It covers UDP basics, how to spoof datagrams, and gives full source code with explanations. This paper can be used in conjunction with the udp-remote-final.tar.gz package.
3416eee186ecb4a1c7798816bcd5868bc05378accefdc3c5557d1a4fbc71a12a
This utility demonstrates a simple udp backdoor which allows for remote program execution on a Unix server.
5b82b2a9f56e51c23e56fff0a2aa422ce7a192f5ef6f22bf47155bb1b3689957