MS11-083 denial of service proof of concept exploit. It attempts to trigger the ICMP refCount overflow in TCP/IP stack of Win7/Vista/Win2k8 hosts. This requires sending 2^32 UDP packets to a host on a closed port, or 4,294,967,296 packets. A dereference function must be called that is not triggered via UDP but ICMP echo packets. This exploit creates 250 threads and floods a host with UDP packets and then attempts to trigger the de-ref using ping.
8599b0b1ac07fed75a167b44758ada7368eb687ba515c6c1f6c4ea9d3e84cbf4
WindowsXP/2003 IGMPv3 remote denial of service tool.
be7cc91b36ec0c2ca9181790db3d953908692060136a1a8c6f91495687a5388e
The original winnuke. |Causes any unprotected
c57a6aa7e8708028f99bbcf2cd233ac77466934cf2273606cb959bd2e7b250f8
Exploits ported to Windows with the Cygnus compiler. Includes fuck_them.exe, gdm-exploit.exe, inndx.exe, orgams.exe, portn.exe, rwhokill.exe, tentacle.exe, wingatecrash.exe, and winnuke.exe.
faac7f196fb783d71bf9db8df1fdd3a59d1b4de1279c15ed2ee2681c97906271
killwin.c - winnuke idea, modifcation for me ONLY - napster
24f05493ff734720c99c65884c58e431fc48c6270d9cc663bcf92c323b6100f7
Second issue of the Confidence Remains High - Lots of news from the underground. Includes solaris exploits, scanning for and exploiting php.cgi, Hiding From Who, Sendmail 8.8.4 / 8.8.5 LOCAL Exploit, Ident Scanner (ident-scan.c), Windoze NT / 95 Killer : winnuke.c, Federal Bugging Frequencies, 911 Autodialler Script, Cellular Calls Without Cloning, Getting Your Exploits Onto Systems, Fakemailing Techniques, Pascal Credit Card Generator Source, in.courierd : backdoor on port 530, so1o Gets Busted by CERT, IRiX WWW Server Bugs, and Hacking Not-So-Electrical Items.
24bd87efab7f86cf7db4471a62d21f17d4c284bee23cb0ffe064fce4f018c517
Multi-platform DoS attack which integrates bonk, jolt, land, nestea, newtear, syndrop, teardrop, and winnuke all into one exploit.
0cf3f3c2d52e1351cfbfa7c183447b2a2e42c7895c8e134fe3956d4d511f40a1
The NetGuard package consists of two small programs (TCPguard and UDPguard) that detect TCP and UDP connections/packets. Using route's libnet, netguard is able to kill connections, detects half-open TCP connections, LAND attcks, WINNUKE attacks, HPING packets, QUESO probes, SYN-floods, PORTD scans, and more.
7abdff3009b5774bd13eed1efc3aa6c8beb59fdd0ae1e6b1da2646dd20a8fb31