Microsoft Windows RPC Locator Service remote exploit. Binds cmd.exe to port 5151. Tested again Windows 2000 SP3 and Windows NT 4 SP6a.
654f116fb6620b674164863b06d4a070270b438112d36c49f7ee83e5dbc6bbf2
Mass domain name resolver that takes a file full of IP addresses as input.
1e7ebd83d4d2836ad207b8a6a69f7c1349b1863e7d37f837079afbcd63fb7cc9
Local root exploit for ptrace/kmod that exploits a race condition which creates a kernel thread in an insecure manner. Works under the 2.2.x and 2.4.x series of kernels.
72ae0bfa8eb81293a2396206e7ad00cfda70b30e0f942d08be44beb20808ba6e
A small utility that allows you to kill zombie processes on x86 Linux.
a2a77ba73f71c96c56aca603232fa0dd92eeb9a87f9c1116df3870f77bfabbd3
Solaris Sparc shellcode that writes netric was here.
e3af7d99040def573ba17626a6c290811b8d7652264094ec8340fdf45dac57c5
Solaris Sparc shellcode that sets the effective uid to 0 and executes a shell.
b4f74f95b8bd45fe94c359024720079f6ee3e0151ca7a8a1f62db7483e21af68
Recluse 0.1 - A web spidering utility written in Perl that takes a host as input along with a document path.
bce2ab1997ba9c18e5fde1e6438685c5f141e02ff3e5b9d6b004bb8c6c3a71cb
Printer fun is a little utility that allows a remote user to change the "ready message" on printers that support PJL commands. Tested against the HP 4000/4100.
1597a3c0f6c607bd942fd6b507789c22fe0be4e8e9f9a0927f03e25bb26e9fe4
Core grep is a utility that works like grep but was designed to be used against core files.
d20e5c8dc13d0cce1e98db9f2a8559cb03f62d5dee59b44f124f195121335d7e
This utility extracts files from the ramdisk image located in the Alcatel speedtouch home/pro modems. The format of these files had to be reverse engineered.
c1c1002c5d2c54b1cc1a2ba161090170ff969c24ad9f83f1c724d17f6e9ee304
fuckptrace is a Linux kernel module used for bypassing anti-ptrace protection used against the reverse engineering process.
4ae4703493e86a63a0d13935e9e14568b86026565924f9ba7e6b114fcc7646ee
nfbypass is a Linux kernel module for the 2.4.x series which, when inserted, will bypass netfilter rules.
c92278ac9f69f9e3fce669b4bdaf7609692c9cd2074111ab285fc98a64dc7c63
Remote exploit for Webcart v8.4 that will spawn a bash shell with the webserver uid.
9f3b471eb2039d0f0de8bb0d68e591d5438e2f29acfb6467664919a7a3b3517a
Hassan Consulting Shopping Cart Version 1.x remote exploit that will spawn a bash shell with the webserver uid.
dea6448742f595a7fb941c5c76e95b1b84e045870de595c28a05c9048dcfd2fa