exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files from Lympex

Email addresslympex at gmail.com
First Active2005-08-26
Last Active2008-01-25
PExtractor_v0.18b_binary_and_src.rar
Posted Jan 25, 2008
Authored by Lympex | Site l-bytes.tk

PExtractor is a forensics tool that can extract all files from an executable file created by a joiner or similar.

tags | tool, forensics
SHA-256 | d56062cf1ab0f5323aba9e3a81dd0852581f7c1b341823615c4690370255642a
FlashFXP.Account.Spy.1.5.c
Posted Apr 17, 2007
Authored by Lympex | Site l-bytes.tk

FlashFXP Account Spy 1.5 - Utility to capture login credentials of FlashFXP.

tags | tool, sniffer
SHA-256 | 0b06a8ba5caf53a8edbfb021db532e04486671fe7835b9c6c4e5f9737aeb2121
D-Link.Wireless.Access-Point.c
Posted Jun 11, 2006
Authored by Lympex

exploit for D-Link DWL-2100ap which discloses the configuration file to remote users.

tags | exploit, remote
SHA-256 | 9964f14447ea2955f5b7016a84c062307bcc7b43558f3ff7cb4b7aeea4f671f5
ArGoSoft-1.4.3.5-DoS.cpp
Posted Mar 2, 2006
Authored by Lympex

ArGoSoft FTP server versions 1.4.3.5 and below remote denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | 37840dc5e7614f6dacb3b057a5b527ff414a8f2e14adad675f4f68481ade620c
FlashFXP.tgz
Posted Feb 25, 2006
Authored by Lympex | Site l-bytes.tk

FlashFXP Account Spy 1.0 - Utility to capture login credentials of FlashFXP.

tags | tool, sniffer
SHA-256 | b7248c65601bfbcd18068bab72b7d870ad0984e6076a9a7d16c714cbfbfe6ccb
Microsoft.IIS.Malformed.URI.cpp
Posted Dec 28, 2005
Authored by Lympex | Site l-bytes.tk

Microsoft IIS 5.1 malformed URI denial of service exploit.

tags | exploit, denial of service
SHA-256 | 837498a4d744d992373c5ed655af6324ffb4059f266d8a1030be1af897c8de58
cpanel-9x_RCE.c
Posted Sep 1, 2005
Authored by Lympex | Site l-bytes.ne

Exploit for cPanel versions below and equal to 9x that takes advantage of a remote command execution vulnerability.

tags | exploit, remote
SHA-256 | 6e74cd53627a40348b129b2f8f7c66f2eb17564e01d5469e32a0bb3e9bcee9c5
HP_OV_NNM_RCE.c
Posted Aug 31, 2005
Authored by Lympex | Site l-bytes.net

Remote command execution exploit for HP OpenView Network Node Manager versions 6.2, 6.4, 7.01, and 7.50.

tags | exploit, remote
SHA-256 | 35f6fb2bbbf9a319cca337f6e91aa2660874027de25e497f6c79ccace01bedc0
Evil.Shell.Backdoor_1.0.5.c
Posted Aug 26, 2005
Authored by Lympex | Site l-bytes.tk

Password protected windows bind/reverse shell backdoor written in Visual C++ Archive password is set to p4ssw0rd. Use at your own risk.

tags | shell, trojan
systems | windows
SHA-256 | 0475009407cb1326228f33e0edd9b896
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close