aH scans for open NetBIOS shares on a system and reports them to the user in an easy to use copy and paste format utilizing the net command. C++ source code and binary included.
6b6ec6734f6ea1fae45a630818c442c80c7db1c4bf275d75159dcff75fed94de
Remote CGI exploit written in Perl for Cpanel 5 Guestbook. Spawns a bash shell with the uid of the webserver. Windows version. Warning: Use this binary at your own risk.
6b94af34f927331d86b03d701534fcd53fc85dcaded9fca70821ecfdfa6e7123
Postnuke v0.723 has SQL injection and directory traversal vulnerabilities which allow an attacker to view directories and perform remote command execution.
c7174c9efaf63c50640a797daaf52e208c587ea7527c490209c5b8d8130f87bc
Win32hlp exploit for the :LINK overflow that traps a .CNT file with arbitrary code that once downloaded will execute without a user being prompted for verification. Tested against Windows 2000 PRO/SERVER SP0/SP1/SP2.
4a9d7740766726256679babfae4710b20451e06922ced940aa5e2331fab55f08
Local exploit for Unreal IRC daemon 3.2.
e50479b8ae3686d516f7edd3b95bdd081d79cb14541fca5c08905c7229d76008
Local exploit to get gid of games for toppler.
dafe4a741510221ea6c66764660c6cb121ba22750610c8274faa4a3558e27179
Polymorphic Shellcode Generator - In Spanish. This tool was written to mask the final function of shellcode in exploits. Tested on Linux, FreeBSD, OpenBSD, and NetBSD.
8791ddbd0def68d52be402a2277d183d94f283e1ed7ac8aa7b826d5f00110219
A simple ELF binary encryption tool for Linux that encrypts the .text part of an ELF file with the password being given as an argument.
1777c3839840816aef4069dcfdb183463ba353c5bb7c384b9bbfea62bcde1611
ISS Security Advisory - A remote root vulnerability has been discovered in Sendmail v5.79 to 8.12.7 in the crackaddr() function which is used to parse headers. This vulnerability is especially dangerous because the exploit can be delivered within an email message and the attacker doesn't need any specific knowledge of the target to launch a successful attack.
a777b9ea2ee630fe2497afce3a91ff81fed5df586e37de4d937c084f3d483e7f
ISS X-Force has discovered a remotely exploitable buffer overflow condition in Snort. Snort is an open source intrusion detection system. A buffer overflow flaw exists in Snort RPC preprocessing code that is vulnerable to attack.
bc99632cf2915e3fd09192db51188d45a561de0df9f9c62671d14df80a1747b9
Red Hat Security Advisory RHSA-2003:039-06 - The Internet Message (IM) Package that comes with Red Hat Linux has a vulnerability in the way two IM utilities create temporary files. Anticipating the names used to create files and directories stored in /tmp, it may be possible for a local attacker to corrupt or modify data as another user. Vulnerable versions include 7.0, 7.1, 7.2, 7.3, and 8.0.
f250f8b7b71beb5e702504e96b737e52c22d1cfc94d031287d32f452c11d8287
PHP Nuke 6.0 is vulnerable to multiple SQL injection attacks that will allow an attacker to access member lists, show users by user ID, show moderators, show administrators, privilege escalation, and more.
fe41573d8793ef04be219cd767b52d76999813cb7aff1ed34330fd4dc79bbdee
Security Corporation Security Advisory [SCSA-009]: PHP ping, a utility that allows an end user to ping a remote machine, has a vulnerability which allows remote attackers to execute commands remotely and could lead to compromise of some, if not all, the operating system.
031b912addcb3c18b62ac88374185cd3296050827930d08e79d32eef7c10ea8c
Forum Web Server v1.60 has multiple vulnerabilities including a directory traversal that can be used to get usernames and passwords for the server and a cross site scripting vulnerability during message replies.
c66b4e90a5ebfd225573a6e8e31055827254f3feadb7378c9169997431bc15e7
Linux x86 shellcode that plays /tmp/wav.
fb85d75711fadc267300b543395f49fba747f72fadfbbf8a0d7b72ba000d8dfd
Linux x86 shell code that flushes iptables.
f41d98b684a98ae4ddb6475aa4b3d8dcdc3580000bb8b4a4687c7e68ac12e4f8
BSD x86 194 byte forking portbind shellcode.
679460791b82bc71cc358ebb7838a48a15a4b36b0568f604d4ecd681342df6cc
Linux x86 200 byte forking portbind shellcode.
8596f6bc924b6a977ba4454ed405e1eae9f64cab5c9f56b54386872551a9c83e
BSD x86 124 byte connect back shellcode.
5c802bdef5259c9a4b2a1f2cce119173bc88d78f7568286a371993d88972fcd1
Linux x86 131 byte connect back shellcode.
2f7b6f86b4a4d840961d8bbb4ba116066ddd329e45325fc389c858403fdb8850
Exploit for the file(1) buffer overflow vulnerability found by iDEFENSE. When file is run upon this binary, a shell is bound to port 2003.
3cd39a300697230bb93932f5c217630f5baeee36b12e0e1b50ced39e0099e3be
iDEFENSE Security Advisory 03.04.03 - file(1) contains a buffer overflow vulnerability that can be leveraged by an attacker to execute arbitrary code under the privileges of another user.
b0bc52c03d39e07f508e5f796b1f47a96576b5962cd0d7585205e0f561787ed7
Mr-Lynd0 is a log cleaner and an instrument to hide user or to change user and host. cleans ip user and host in log files /var/log/ and hides yourself in a linux box editing wtmp and utmp. Version 1.2 released with bugfixes.
e21cfc158bbcfbd10d0c81401e527a555d73d32e71dd8746414c960227f7d356
Red Hat Security Advisory RHSA-2003:042-07 - SquirrelMail, a PHP based webmail package, has two cross-site scripting vulnerabilities. Version 1.2.10 and earlier are affected.
5290697c046ca7ec78baf41ebf073cb373b331b0808fdeae53d39737fe3ca223
Shopfactory e-commerce application, which is used by over 40,000 Internet sites, allows alteration of order details. Data relational to end user input is stored in cookies, including the price of the items someone may be buying, which in turn allows them to alter the prices they pay. Versions affected: 5.8 and below.
25afdbad685f47b8762bafb6307e4c2348efc20108303d1e37397ab66181e0ac