exploit the possibilities
Showing 1 - 11 of 11 RSS Feed

Files Date: 2003-01-05

oOps.c
Posted Jan 5, 2003
Authored by Gunzip

oOps.c grabs hardcoded strings from binary files. Shows rootkit passwords and other information that is encoded character at a time to avoid binary examination like the strings command. Tested on Linux.

systems | linux
MD5 | c16cd712e1571f6a4b3095de4011a13e
talkspoof.tar.gz
Posted Jan 5, 2003

Talkd spoofer for NetBSD. C source.

systems | netbsd, unix
MD5 | f9bc560019b3cd677fa30000ebbcc858
sparc.c
Posted Jan 5, 2003
Authored by teso, scut

Remote root exploit for Solaris Napalm heap overflow - SPARC version. Tested against SunOS 5.6, 5.7, 5.8, and 5.9. Attempts to add a root shell to inetd.conf.

tags | remote, overflow, shell, root
systems | solaris
MD5 | 34c08bb66b18e41b75d2c0287149d5ad
oat-source-1.3.0.zip
Posted Jan 5, 2003
Authored by Patrik Karlsson | Site cqure.net

OAT v1.3.0 is a set of tools which can be used to audit Oracle databases running on the Microsoft Windows platform. The Tools are Java based and were tested on both Windows and Linux. They should hopefully also run on any other Java platform.

Changes: Added support for manually specifying remote os when running (O)racle (S)ystem (E)exec. Bugfixes.
tags | java
systems | linux, windows, unix
MD5 | 48614184126e5cf6766faa4b17f95377
guileproxy.tar.gz
Posted Jan 5, 2003

Guilecool proxy scanner and checker C source. In Italian.

tags | web
MD5 | 332797d09ee2a0d06de04ef90edc66e9
aix433noflag.c
Posted Jan 5, 2003
Authored by George Dissios | Site frapes.org

Aix433noflag.c exploits a weakness in a function in the AIX kernel which handles the in/outgoing network connection. Setting no flags in the TCP header, causes a 100% CPU usage (DoS). Tested On IBM RS6000/SMP-M80/4) on AIX 4.3.3.

tags | denial of service, kernel, tcp
systems | aix
MD5 | 92444fe853b1ba356167ea90e3a9bf2d
gupt2.zip
Posted Jan 5, 2003
Authored by Ayan Chakrabarti | Site gupt.sourceforge.net

Guptachar is a remote administration tool which works as a web server - it can be controlled with just a web browser. It has an inbuilt keylogger and an IRCBOT feature. It's tiny with the server executable being less than 50kb in size. Comes free with sources. Archive password is set to p4ssw0rd. Use at your own risk.

tags | remote, web, trojan
MD5 | ca13ad83b042842552df06050a052cbf
efstrip.c
Posted Jan 5, 2003
Authored by Hi_Tech_Asslemon

Efstrip is an exploit for the efstool vulnerability. Unlike other exploits for this vulnerability, Efstrip is robust, doesn't need a wide range of attack options, and doesn't need brute forcing. It actually ./works.

tags | exploit
MD5 | 98075b5b8ff7957d017481f1985b1428
Nikto Web Scanner 1.23
Posted Jan 5, 2003
Authored by Sullo | Site cirt.net

Nikto 1.23 is a PERL, open source web server scanner which supports SSL. Nikto checks for (and if possible attempts to exploit) over 2000 remote web server vulnerabilities and misconfigurations. It also looks for outdated software and modules, warns of any version specific problems, supports scans through proxies (with authentication), host Basic authentication and more. Data is kept in CSV format databases for easy maintenance, and supports the ability to automatically update local databases with current versions on the Nikto web site.

Changes: Now has Apache username guessing, static auth cookies, static base directories, proxy id/password prompting and bug fixes.
tags | remote, web, local, cgi, perl, vulnerability
systems | unix
MD5 | 59b561c2e086167c4469bd21e3e44bff
file.c
Posted Jan 5, 2003
Authored by George Dissios | Site frapes.org

OpenBSD and NetBSD LKM which hides files by patching getdirentries().

tags | tool, rootkit
systems | netbsd, unix, openbsd
MD5 | 770290c363c15e13d3eb89a80e65aa4e
s8forum.txt
Posted Jan 5, 2003
Authored by Nasser.M.Sh

The S8forum v3.0 allows remote users to execute commands on the webserver. Includes exploit instructions and patch included.

tags | exploit, remote
MD5 | fb79079160eb35543d7b60bb52b21463
Page 1 of 1
Back1Next

File Archive:

March 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    15 Files
  • 2
    Mar 2nd
    5 Files
  • 3
    Mar 3rd
    3 Files
  • 4
    Mar 4th
    25 Files
  • 5
    Mar 5th
    20 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    12 Files
  • 9
    Mar 9th
    3 Files
  • 10
    Mar 10th
    4 Files
  • 11
    Mar 11th
    23 Files
  • 12
    Mar 12th
    12 Files
  • 13
    Mar 13th
    12 Files
  • 14
    Mar 14th
    19 Files
  • 15
    Mar 15th
    12 Files
  • 16
    Mar 16th
    3 Files
  • 17
    Mar 17th
    1 Files
  • 18
    Mar 18th
    15 Files
  • 19
    Mar 19th
    22 Files
  • 20
    Mar 20th
    14 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    8 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close