A java program to with allows one to experiment with various protocols.
54df769e7add98507c2c2dbf5d45b9b46f3fde0beb12d1dceb1dadf817642cfa
A complete guide to AOL Instant Messenger, from Livewire. Contains 6 exploits, information about password cracking, etc.
9fb081cfe0300979a2c37e33788e0f1a6e7aa47bc266874166b08b869057f252
Clarification of the CISCO/nmap problem where large amounts of ARP requests appear to fill the router's ARP table, resulting in DoS.
9b23321783964fe46cdf4e5e80a8afe1177a3c1ef246be6cdb7f3eafc7bcfc1a
How to get rid of those annoying advertisements on free web page providers. Courtesy of SmoG
55c4050a9da07b5a874645510767e3057a7e32bece9842f081dd88566495de85
synz.sh
9e18e928e005dfd6e82ff6ec359bfc9d368aff3f768dbc8f64428a2c991b32ba
very fast non blocking banner scanner (
3ec8cbd17e928edfe36c45b7248012d45d1228f3fa4cb77ea300decaf63b675c
linux tty hijacker (
87097b01aedfd6f276efef01382b9388b627efcc5bb7ea6eee1cbca91e67d484
Netbus Pro v2.10 Remote Administration Tool. Archive password is set to p4ssw0rd. Use at your own risk.
e224b29fd0045440387a87aeed8cd198a2da2d4c9639bd405d048866d80b0bbd
Exlpoit for remote DoS of Webtrends Enterprise reporting Server
018fe3bd40f23ab1f0efd016c8fe41552f85936cbe91cefceba52f47bfab1e33
The ultimate proftpd pre0-3 exploiting toolkit
744a9e078f0d17e13487f261d95d50303dcb564cc7275d248079a14966399d1d
Exploit code to utilize the LC_MESSAGES bug in Solaris 2.7 to gain root
352bd30ef796c4958de02ffaeadbeca014feb7c7ede41dae12e38b987443a906
Exploit code for heap overflow in telnet.exe that ships with windows 95
5dedbdbe68c121868b6c2f1e6101be7fef36bcbe396d3b960787039c7221d194
A spoof against blind TCP for linux 2.0.36/37 with exploit code
c76cc40542190ef17090ba2a60c587bb7f678dc3a80a83ed5c3b7dc8e83ecb26
Exploit code for kernel 2.2.10 and 2.0.36
44c28380c49be24ce432f00db06ad453bf278c1d858787199fb33c8a65770fb4
Remote root linux exploit (TROJAN)
133a0285ec6637f8929af8030efbc60ca4c7a35410cc08d234ff0a57688a43ca
Proftpd 1.2.0 remote root exploit for RedHat Linux 6.0
c334165938b304f612e33838cca054259e240a1f0f8e5c09ea662fdfb0cc61e1
A kernel-module for 2.2 kernels to hide itselft
61d9641912f696d8011067de775826046240b1be1efc3d5b8a58e078ac61023c
Local exploit for suid root programs linked to libtermcap < 2.0.8-15
65711105dd2ff2279662c844887f0508df573b4f59a02e0f9c84af0349b3791c
Exploit for libtermcap xterm/nxterm on Slackware 3.5 and 3.6
5b87df20882e8f4acce80796a287af1f0d295cbca0fa9bcd99845e167eddf538
FreeBSD local denial of service exploit
518c1b82076c16c71768eec77d25455eb48b142d96c19adf98c77c77a568ae77
Free BSD local root exploit for fts_print()
d9dedbdfe9f077a02f4574df57f8decc78b9ee47fb26f8e54554808cb8b04b5d
Exploit to send a large volume of IACs which eventually leads to a reboot of 3COM's HiperARC
dbbcf212057df1232edc1ee2a26005a071ab2569f332337a2f2664387ef59609
Exploit for denial of service against IIS version 4.0
93442be5757263d2851ad6073c708bd3203896fedefb241859680cc9caa180f7
Exploit code for ircd 2.10.x/ircnet
737267b386266f264f477f91b39d75caebbf94c635ee5ed669a5a3f83da050ac
Exploit code for a denial of service attack using DNS
54f6a05c7bd3633fc25136253fc301a126258887652dc3d2c1208e341ec62662