This paper goes into detail on Unicode exploitation with how it works and how to actually perform attacks against IIS servers that are vulnerable to this bug.
68fbbf6b12fa6d1da1c65f239128400e7232673eba42d725b52a0e5200e2b6df
AMD remote exploit that uses the amq binary.
f9d117869790e067d3a895a26af38832f3a03ce421b1cd1c1c538d7cc397b5af
Bind 8.2 8.2.1 8.2.2 8.2.2-PX remote root exploit for Slackware 4.0 and Redhat 6.2. Exploits the infoleak bug to generate a DNS tsig exploit packet. The uses an assembly routine to bypass tightly configured firewall systems (with only 53 tcp/udp port open).
07e26538f419d09ee9e0fc5519733ba25fb27bc9ccf20586e861c82bcc2d9146
7350cowboy.c is supposedly a PHP/3.0.12, 3.0.15, and 3.0.16 with apache 1.3.12 remote format string exploit for FreeBSD 3.4, Slackware Linux 4.0, and 7.0. Very similar to http://packetstormsecurity.org/0010-exploits/phploit.c.
e940a4a8984ee2cd304f252e58a8dff2073d5977d73bfb168d98d7d54ca42f0f
Defcon 10 Presentation: SAFE-ASecurityBlueprintforEnterpriseNetworks in PDF format
cd609d1d56b3d851a8e78315b42d6e9ea0720e5ac9bdd7caa068a439becfc0cc
Defcon 10 Presentation: SAFE-WirelessLANSecurityinDepth in PDF format
acaf8066dfdb4a0a4e82e92b6ecd73b59902da11d57906474cde3f87d7477064
Defcon 10 Presentation: SecurityBestPracticesforCiscoUnity3
656fa8ee0a912a61402b5d751f884f3317a74cfefe32ad06c7e4db79d44ec6d8
Defcon 10 Presentation: ServiceLevelManagement-BestPractices in PDF format
92819aa5b578ac17c060e7d0d566d24cf41b4da068567fce646fb4a4992f2b5e
Defcon 10 Presentation: UsingtheCiscoIOSFirewalltoAllowJavaAppletsFromKno in PDF format
c3a142d10c8ca3fdbb1d2e930aa06590a554433ec7a6a5ff6c317438cacf7b7a
Defcon 10 Presentation: CiscoPacketTelephonyCenter-ANovelApproachfortheMa in PDF format
8fc2f9cf3af25806fc61e3cc2f6aae3282bc8f9db7dd1b0e6397da06749a0904
Defcon 10 Presentation: CiscoSecureIntrusionDetectionSystemFrequentlyAskedQu in PDF format
0577d7d2dd0a8dc797a2b8e7b1c7f8f71d0d71b74180855216321d138f40fca4
Defcon 10 Presentation: CiscosPIXFirewallandStatefulFirewallSecurity in PDF format
54754cf9b58f45072f8e1afaaaad678d3068cd8a5ec94290eed8d9a2447b3da8
Defcon 10 Presentation: CiscoUnifiedVPNSuite in PDF format
7d7af23c163c7122958d09d6ac4d5441fdabee436f24930a95d71251517069b4
Defcon 10 Presentation: CiscoUnityDataandtheDirectory in PDF format
0ed981ee6f56020843dbe31ca7c5323ef05162a60cf1b117b6df8baebfe77ac8
Defcon 10 Presentation: CiscoUnityDataArchitectureandHowCiscoUnityWorks in PDF format
fdd46bc13dc1eace820102ad4888d65cb13f89fc929311b9880a833b35f23a91
Defcon 10 Presentation: CiscoVPNSolutionCenter2
5fa025c7778c981b1c537167a84fc0842e7aa89478f152486877e399d6540f29
Defcon 10 Presentation: ConfigurationManagement-BestPractices in PDF format
de9b1ec357a9d6894cbb00fd9068d7f61c373c5727ce3e64d52511d1448907ff
Defcon 10 Presentation: ConfiguringIPAccessLists in PDF format
0b1fca23bf03e6a69d0fba3a06e0251a37cc2fb546eef34067bc0b832f47f651
Defcon 10 Presentation: Context-BasedAccessControl-IntroductionandConfiguration in PDF format
07f3d45e8c6cd60479c694cdc012a39ccca3202f7eae86427145c9bb17229e05
Defcon 10 Presentation: DeployingCiscoUnityinDiverseMessagingEnvironments in PDF format
7184e580d418bc614f24a811fcf96d9688f11b18098f5c6451000134f0619e24
Defcon 10 Presentation: DisasterRecovery-BestPractices in PDF format
d1cf1f2d33ac3e450eaa14ff5aad36df44c5a3dca56e24dbe4110d6cf1ad7c81
Defcon 10 Presentation: GPRS in PDF format
50d9c9b9d2f9733e7100b1210b9306081cc0bdc21b4741e2a784445964f03ffb
Defcon 10 Presentation: HowNATWorks in PDF format
012fddb51ac6173b4768bead3579d97c6681c355a673f25ccdb15eba75bf85cd
Defcon 10 Presentation: HowVirtualPrivateNetworksWork in PDF format
d4e2850ad2d9102e4f77ffdbf391a51d875f0a33be19575f343c903bc4f519b6
Defcon 10 Presentation: ImprovingSecurityonCiscoRouters in PDF format
cdefa4914551dad92e8902c0503c7c2309b2eb12de2117c59dbe9bdb8114728f