This exploit abuses the KEY_ARG buffer overflow that exists in SSL enabled Apache web servers that are compiled with OpenSSL versions prior to 0.9.6e. The apache-ssl-bug.c exploit is based on the Slapper worm (bugtraq.c), which is based on a early version of the apache-open-ssl exploit.
436090b56a7078c33d435bf10253452623305a3c47e6e5c7f13c05a10118fd8d
This tool can be used to scan IIS servers for the unicode directory traversal vulnerability.
d68555136e1216e01f665bb28f94c34d9fa82ebd4c0629f79f500a373361d1c4
How to unlock a Samsung T300 cellphone
95e3fe277638e94a8ff970e63471d9ea5628adfcf47a6652752477cf74c79994
Airsnort is a tool for wireless lans which recovers encryption keys by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. Works on both 40 and 128 bit encryption. Many weaknesses in the WEP 802.11 protocol are discussed here. Once enough packets have been gathered, AirSnort can guess the encryption password in under a second. Tested on Linux kernel v2.4.
02648ab47da49b596792193fe7e0d3a838aeee6fa0dcd41260a727aa7dad7044
A vulnerability found in default Apache Tomcat 4.x installation can be used to remotely disclose the source of served JSP files. The Tomcat developers fixed this issue in the Tomcat versions 4.0.5 and 4.1.12, which are available here.
2fef92ed7d59d75004c3b7399e643001f93de8ce9846efd4fb65db9ad40f1db1
WinME/XP UPNP denial of service exploit.
dd4090e55c9cd11ffd0a2b06d91b810031268e8bfab0b2aaefc0812502458aef
Voices is a *nix program that hides files in mp3's.
fc0629ea31bd0a4ceb7516abc767ab86a6065df9e8dfee324d664be4247672f0
Vbulletin/calender.php remote command execution exploit.
696c47bb743d4c61635d2b53c61441cce1ff71882f95ce0d1f8c84b21ee7c0c4
Shellcode-v1.0.zip is a genetic win32 shellcode generator based mainly on kungfoo. You can generate a shellcode with the help of a GUI. Source and executable included.
7ceadbc837c0a293c10e87c625f4338c9ca2fa138a5049d58d67ace148db452d
Apache v2.0.42 - Apache is the most popular webserver on the Internet, and ranks well in terms of security, functionality, efficiency, and speed. Changelog available here.
67222ed486ef13b54ce49f1d08ef8804fdd9c1e23d4d9ad8627f066335e7b93b