Linux exploit for w3-auth authentication module from mini-sql package.
77c6fbba1d688a2dfe7705ee48d1a1110575cc153310572836ed7f7e75aed9f7
IE 5.0 vulnerability allows reading local and remote text files using "download behavior".
9c5b7796afb25afd1040621f831f7be4ec6b5c7e8506d7372f58c92c1b086fd8
Remote buffer overflow in ftpd under AIX 4.3.2 running on an RS6000.
ab25d3859b9281678d4180181543c1f449090ff51c3881d1cf30f6005544d376
decfingerd 0.7: The Deception Finger Daemon. This program will take place of the original finger service, providing totally false information to clients. This can be useful to catch people trying to crack your server, or to just really confuse them. You can define output for individual users, empty requests, and forward requests to another system. Tested on: Linux 2.2.7 -- GCC 2.7.2.3, Solaris 2.7 -- EGCS 1.1.1, OpenBSD 2.5 -- GCC 2.8.1.
2f0703745ed109808ec2722a88bd0d120af0c3d11b4423d1453b61c8462f9e91
The Ultimate Beginners Guide to Phreaking,
620565028cfad78ee4f157cb0e4745f1050b5e335244924f1e54b88847f48036
This win95/98 program allows you, if you know the username of your target at Singapores biggest provider, Singnet. It will pull their monthly statistics which include, the phone number he called from, all his logins & logouts etc. Singhack exploits a bug which is in one of Singnets perl script which they havent fix it yet.
ca431c0652a0d4e039e81b7003358a59b4f62df4401c33dce60acc512daacf2d
The top commercial vulnerability scanners have little to no security surrounding their licensing, making them excellent script kiddie tools. These scanners are actively being used by the underground against targets. Simple Nomad
8680c911d931fe25da053d0e8b1565ac46ec28b085e29ad7f6e67d76b651e323