exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 53 RSS Feed

Files

Web Shell Backdoor 1.1
Posted Jul 4, 2013
Authored by M.R.S.CO

This is a simple PHP web shell backdoor.

tags | tool, web, shell, php, rootkit
systems | unix
SHA-256 | aaad39e328e8da519232f1d7feb60cfd3c991f2aa486739cdba8df7d746a8994

Related Files

HPing3 Cheatsheet
Posted Jan 3, 2011
Authored by Alejandro Ramos

This is a simple hping3 cheatsheet.

tags | paper
SHA-256 | 4f16370618a571e79dec6749a74f7fea65adfce757efd40758cd3cabecd27131
Fritz!Box Bruteforcing Utility
Posted Dec 5, 2010
Authored by brixton

This is a simple shellscript to bruteforce attack Fritz!Box.

tags | cracker
SHA-256 | b875368cd36b21097b1848e3b3f86cc8df00b3170437851f7c9786e9279d84ef
MD5 Decrypter PHP Script
Posted Nov 28, 2010
Authored by Bob Smith

This is a simple php script that takes a set of MD5 sums and checks them against md5-decrypter.com and md5decryption.com.

tags | encryption, php
SHA-256 | 7357299298193cb34d03faec7fb2a8d6f64eadd69933f494f1a98e70606e3a9d
Firefox Memory Corruption
Posted Oct 29, 2010

This is a simplified memory corruption proof of concept exploit for Firefox.

tags | exploit, proof of concept
advisories | CVE-2010-3765
SHA-256 | 84f1b73f392b7d5cac24e6fbbd2c87adfae94e7b77462a12739e5959d7c4e4e3
Facebook Bruteforcing Script 1.0
Posted Jul 28, 2010
Authored by gunslinger | Site gunslingerc0de.wordpress.com

This is a simple Facebook bruteforcing script that makes use of the Python Mechanize module and a wordlist.

tags | cracker, python
SHA-256 | 0ca36c97c9d96b5b5bc5d03574a420ab3e18f9fd869d9167d4517662c938c229
Simple Perl Keylogger For Windows
Posted Jul 2, 2010
Authored by MDH3LL

This is a simple perl keylogger for Windows. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan, perl
systems | windows
SHA-256 | 76d6846f0f060503c1b592ab6ef88766d6f3b09cd933aeddaee0d6e8adba9a4e
Perl Pipe Exploitation Testing Tool
Posted Jun 23, 2010
Authored by Marshall Whittaker

This is a simple script that attempts to check if a CGI script suffers from an input validation command execution vulnerability.

tags | tool, cgi, scanner
systems | unix
SHA-256 | ee39234eb7bfde6be7b06a471b85c22615c756334e75f9853f44970c002c335b
Gmail Checker Script
Posted Jun 8, 2010
Authored by gunslinger | Site gunslingerc0de.wordpress.com

This is a simple Gmail account checker.

systems | unix
SHA-256 | de9fd56594a985798b628c8648e2ffb5e2d258d6031c2e6ab05c4609883107d9
Minishare 1.4.1 Buffer Overflow
Posted Nov 26, 2009
Authored by acaro | Site metasploit.com

This is a simple buffer overflow for the minishare web server. This flaw affects all versions prior to 1.4.2. This is a plain stack overflow that requires a "jmp esp" to reach the payload, making this difficult to target many platforms at once. This Metasploit module has been successfully tested against 1.4.1. Version 1.3.4 and below do not seem to be vulnerable.

tags | exploit, web, overflow
advisories | CVE-2004-2271
SHA-256 | bf2dd8378c0c0c82b912aa8e98c2826676a3f7e41c1c019b8e7c7c3874814359
gw-scrack Password File Cracker
Posted Oct 21, 2009
Authored by gat3way

This is a simple dictionary cracker for shadowed passwords on Linux. Since john and PasswordsPro do not support the new SHA-encrypted ones (implemented in newer Ubuntu and Fedora distros), the author added that functionality.

tags | cracker
systems | linux, fedora, ubuntu
SHA-256 | 921fe9da46f5cf89174c68f9b076f2c98bb89e067daa8c3ee2b0b8929f17142a
Utility To Dump head In Hexadecimal
Posted Jun 30, 2009
Authored by aaron conole | Site aconole.brad-x.com

This is a simple head utility that outputs in hexadecimal format. Characters that are non-printable are replaced with the "." character.

tags | tool
systems | unix
SHA-256 | 0c5080928e90b08d6d6768e9822e4f8abf096c4a3266af155b8e438d2ed706fb
procmask.txt
Posted Aug 1, 2008
Authored by despai | Site despai.es

This is a simple piece of code for GNU/Linux that masquerades a process.

systems | linux
SHA-256 | 2d995009a52a37a5040f72bed8827c1ba14cf44fb05682fd3ee28e43148c8543
procmask.c
Posted Mar 4, 2008
Authored by despai | Site despai.es

This is a simple piece of code for GNU/Linux that masquerades a process.

systems | linux
SHA-256 | 6cfcbfd3ae943cd1d183a2c60da5d289276c293887ba8fb9c7dd48a3eb8de243
proxycheck.pl.txt
Posted Dec 18, 2007
Authored by Tom Van de Wiele

This is a simple proxy tool that checks for the HTTP CONNECT method and grabs verbose output from a webserver. It is primarily useful when verifying false positives from automated vulnerability assessment tools.

tags | tool, web, scanner
systems | unix
SHA-256 | 203ad5690055cb97040a956a45aea7128a31b0d77823f608d16c161a7e50eecc
coarseknocking-0.0.5.tar.gz
Posted Feb 13, 2006
Authored by Andre Luiz Rodrigues Ferreira | Site coarseknocking.sourceforge.net

This is a simple implementation of Port Knocking techniques. It sniffs network packets looking for predetermined keys and executes commands to open and close ports on the firewall. In the client mode it injects packets with the key to server.

Changes: Added support to choose network interface. Added configuration tool.
tags | tool, scanner
systems | unix
SHA-256 | d30525b8efab91320506330f1c33d3a020d84c71556204537afb77e47a42439e
coarseknocking-0.0.2.tar.gz
Posted Nov 4, 2005
Authored by Andre Luiz Rodrigues Ferreira | Site coarseknocking.sourceforge.net

This is a simple implementation of Port Knocking techniques. It sniffs network packets looking for predetermined keys and executes commands to open and close ports on the firewall. In the client mode it injects packets with the key to server.

tags | tool, scanner
systems | unix
SHA-256 | 95e588790aa423059221be1e0e1337e75a7ed8a2cda22435c4fbbb9aac09dc04
getr00t.sh
Posted Mar 25, 2005
Authored by ri0t

This is a simple script automating the equally simple exploitation of a trusted path bug in AIX. The problem lies in the invscout program.

tags | exploit
systems | aix
advisories | CVE-2004-1054
SHA-256 | f0c7b9b062abe8e53cf8f740bd579319dbb3ba0354d5f8b596e731d4cf5dce32
calicserv_getconfig.pm
Posted Mar 5, 2005
Authored by Thor Doomen

This module exploits an vulnerability in the CA License Server network service. This is a simple stack overflow and just one of many serious problems with this software.

tags | exploit, overflow
advisories | CVE-2005-0581
SHA-256 | bf5126926d528fef10504d4baf7762d721fb352b140f76cf11829e96f5c69e14
zipbrk.zip
Posted Nov 20, 2004
Authored by oc.192

This is a simple tool that searches for the central and local headers contained in a zip file and alters the uncompressed data variable to be 0 in an attempt to trick anti-virus software into not scanning the files inside the zip file.

tags | exploit, local, virus
advisories | CVE-2004-0932, CVE-2004-0937
SHA-256 | 89007618a7cc506d601e2523249eba67ce6ad4d3cc000482f70f5e18ab449a0d
bmon.sh
Posted Oct 16, 2004
Authored by Idan Nahoum

This is a simple local exploit for FreeBSD/OpenBSD with bmon < 1.2.1_2 installed. It depends on the fact that bmon doesn't use an absolute path to commands that it calls. This particular exploit uses 'netstat'.

tags | exploit, local
systems | freebsd, openbsd
SHA-256 | 9dc0b346d9fd4262adc9c83e19f1ef804883bb558ed5e2ce720089f496d91be6
ppp-predialer.tar.gz
Posted Oct 10, 2002
Authored by Subbero | Site mhc.ods.org

This is a simple Script written to predial found connects scanned with Toneloc or THC-Scan in intention to find PPP-Dialups or to get the Hex-Values of the PPPD of the remote system. This tool generates output of chat and pppd in the logs directory.

tags | tool, remote, scanner
systems | unix
SHA-256 | e5937235250ee5d2d86f4a0dbfef61acc9cf89a618dd733d5aa813cbe8a53d83
logentry.zip
Posted Aug 26, 2002

This is a simple C++ program that I created.

tags | bbs
SHA-256 | 63f85830e2a2f1ca757fd071557a3a537ebe457d2d3ec8bd0b59af85d17fb2a6
thclinbd.tar.gz
Posted Jan 5, 2001
Authored by s0ftpj, bELFaghor | Site s0ftpj.org

THC Backdoor for Linux - This is a simple but useful backdoor for Linux based on a FreeBSD lkm by pragmatic/THC.

systems | linux, freebsd
SHA-256 | 734681babd24cd7bc455259f89ac4b384ee909a5df908ba0169dabc078d2cb69
thcobsdbd.tar.gz
Posted Jan 5, 2001
Authored by s0ftpj, Pigpen | Site s0ftpj.org

THC Backdoor ported to OpenBSD - This is a simple but useful backdoor for OpenBSD based on a FreeBSD lkm by pragmatic/THC.

systems | freebsd, openbsd
SHA-256 | 05fcfdd8024ff5dbbf471ea66e27a53a4139f2377df3255c490eb5dd6a1f349a
service_check.tcl
Posted Jan 11, 2000
Authored by Phil Ehrens

This is a simple script written in tcl which parses the output of the nmap program to determine whether required services are in fact running on a machine. Output is written as an html formatted log file.

tags | tool, scanner
systems | unix
SHA-256 | e7ffd4cb2568288bd041ca938ab43c887d064dbb920e4b2b0ab6c7a913cd439d
Page 2 of 3
Back123Next

File Archive:

February 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    11 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    0 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    0 Files
  • 6
    Feb 6th
    0 Files
  • 7
    Feb 7th
    0 Files
  • 8
    Feb 8th
    0 Files
  • 9
    Feb 9th
    0 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    0 Files
  • 13
    Feb 13th
    0 Files
  • 14
    Feb 14th
    0 Files
  • 15
    Feb 15th
    0 Files
  • 16
    Feb 16th
    0 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close