Code that executes /bin/sh.
11e293324484a29a36787255c819b460d7830e2359d8331471dfd2121836cde0
Code that attempts to restore root privileges.
5003f212fcd49a9b5b28e29825d3e9d16357bd5435a2f33fd2e63e05acc535de
Network server code that creates a listening TCP socket on port 65535 and executes /bin/sh.
5c33126a97310122075e5c934031c3ed15df533b9d0ebfb96f8e77ddd038ce0f
Network server code that creates a listening TCP socket on port 65535.
acd1d81c06f35d9d09b67d8d71987e83ddd6d83bb82c05f95aca65db052e5646
WIDZ version 1.8 is an IDS system for 802.11 that guards access points and monitors local frequencies for potentially malevolent activity. It detects scans, association floods, and bogus or rogue APs. It can easily be integrated with SNORT or RealSecure.
7eaaaa7ef04553766dafd60b7eabb6d62e07109fd991ce91186616fb307e0c95
Atstake Security Advisory A091103-1 - The Asterisk software PBX is vulnerable to a SQL injection attack if a user is able to supply malformed CallerID data.
5e15bb2ff6724c97a49a179d9a726211e776427e671df463171f1f56c220d1b7
4D WebSTAR FTP server suite version 5.3.1 remote exploit that binds a shell to port 6969 as the uid running the server. This exploit makes use of the pre-authentication buffer overflow that exists in the login mechanism of the WebSTAR FTP service.
01bd8e388df9d06a72dc6ebd9d02e2c90f9818694359d81010f1bde7d75c1d8e
Secunia Research Advisory - Multiple remotely exploitable vulnerabilities have been discovered in Microsoft Internet Explorer, including cross site scripting problems, exposure of sensitive information, and system access. Vulnerable versions are 5.01, 5.5, and 6.
4e79f2cf181ab7bc26673e30bb7e89b6032c9f17fa3926229fc65644418bf5f5
Debian Security Advisory DSA 379-1 - Several security related problems have been discovered in the sane-backends package that allows a remote attacker to cause a denial of service.
14a8b86eb3fe69526f71c2cb0d208516e1418ab00a1d3f518b0deb76cd6e4dd8
Secunia Research Advisory - A vulnerability in MySQL version 4.0.14 and below, due to a boundary error when checking passwords before hashing and storing them in the User table, can be exploited by malicious users to escalate their privileges via supplying a value longer than 16 characters using set password.
b38050cc8622e8b30bee6fe74ad079fbb83abe828e36d3b629f1c530345f520d
Elf Shell v0.51b3-portable is an automated reverse engineering tool with read/write capability for the ELF format. Sophisticated output with cross references using .got, .ctors, .dtors, .symtab, .dynsym, .dynamic, .rel.* and many other with an integrated hexdump. Designed for Linux. All calls encapsulated in libelfsh.a, so the elfsh API is really reusable.
ecffe100d0da12235cfe464726313491409739493030f3fbdb3a28696b23447f
myPHPNuke version 1.8.8_7 performs improper variable sanitizing that will inadvertently allow a remote attacker to upload files from another site to the current site.
3a1d3adb28ded0cb43ab4856777f220e3e957aa1f45290d28d02a1d2cd088a90
NSFOCUS Security Advisory SA2003-06 - The NSFOCUS Security Team has found a remotely exploitable buffer overflow vulnerability in the RPC DCOM interface of Microsoft Windows. Exploiting the vulnerability remote attackers could gain local system privileges.
70585563c17300b64273505b039efe0d297c03ce9b48ffb8fa7ca381475a6841
Firestorm is an extremely high performance network intrusion detection system (NIDS). Right now it is just a sensor but there are plans are to include real support for analysis, reporting, remote console, and on-the-fly sensor configuration. It is fully pluggable and hence extremely flexible.
3aaf79dcab1b9806b47265e63f3274ed5455c090ff50c6eb8fe2bcecefdec3d0
CERT Advisory CA-2003-23 - The Microsoft RPCSS service has two buffer overflows that can result in remote code execution and is vulnerable to a denial of service attack as well.
08f608806da03bf13300ae37d04e18b8c5ce0fb2d050af75589357405066c043
iDEFENSE Security Advisory 09.10.03: The PINE mail client has two vulnerabilities that can be exploited by specially crafted e-mails being opened. The first lies in a buffer overflow that exists in the parsing of the message/body type attribute name/value pairs while the second exists via an integer overflow during the parsing of e-mail headers.
75236386e59a2fe6120fdbcd69391ed773a4ad2c6190cefc9eccf5d67e15bce5
eEye Digital Security has discovered a critical remote vulnerability in the way Microsoft Windows handles certain RPC requests. A vulnerability exists within the DCOM (Distributed Component Object Model) RPC interface. Sending a malformed request packet, it is possible to overwrite various heap structures and allow the execution of arbitrary code. Note: this vulnerability differs from the vulnerability publicized in Microsoft Bulletin MS03-026.
f689147bd2508bf3e6d1fbd617e83c294c0b6a73992a8551f67234a00531c929
A vulnerability lies in the Roger Wilco client where it trusts the data length specified in a packet without validation and can allow the program to allocate an insufficiently sized buffer. Versions affected: Graphical server 1.4.1.6 and below, Dedicated server for Win32 0.30a and below and Linux/BSD 0.27 and below.
deff21d4849d1e9951b10fb183f5b0b9f242bf1b7a7c77fa8c3f4dae20339197
RealOne Player 9 exploit for Unix/Linux that escalates privileges to the person using the utility by taking advantage of group write permissions on user configuration files.
a67aea9bdace7eee5565929ef499259903de9f4e7f7f1daf7852e5af5e5e6f4f
Complete moron at Defcon 11 performing the Magnum look.
f26beeae5b42adc59882e5ac7ffd6ae75ad7e815d641eb75a9cdcf8c3df5a878
libShellCode is a library that can be included when writing linux/i386 exploits by providing functions that generate shellcode with user given parameters during runtime.
5b326563a47d6b38dab16822844291b3202ab83dac784bf2e4a5eff9e9fff6f2
White paper discussing OS X (Darwin) shellcode assembly on the PowerPC 32bit architecture. It covers design considerations, system calls, eliminating NULL bytes, self modifying shellcode, and more.
302b93e116bcad5ce5620bf7d78e7d092c3331db1765871a148a0c9761f6e8c4
White paper discussing stack overflows, ways to exploit them, and SIMPLESEM.
85ddc994e6b7cdd09d72c7e1a271c91908d9ccbd87b5a1ba218dbac260ff56ed
An easy PowerPC shellcode generation program to extract the hex shellcode from an ASM program that has been assembled but not linked. Tested on programs assembled using the GAS (GNU Assembler) on OSX 10.2.6.
18f5f5d7bee35e7ae86717c77d8e308f29d7009587d29023536db62ca57c3053
Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers. Screenshot available here.
947cd4d2309022e7deba9d345f05022412063591c1fdb4e1e6bcfa4a90b67aaf