This is a simple PHP web shell backdoor.
aaad39e328e8da519232f1d7feb60cfd3c991f2aa486739cdba8df7d746a8994
This is a simple hping3 cheatsheet.
4f16370618a571e79dec6749a74f7fea65adfce757efd40758cd3cabecd27131
This is a simple shellscript to bruteforce attack Fritz!Box.
b875368cd36b21097b1848e3b3f86cc8df00b3170437851f7c9786e9279d84ef
This is a simple php script that takes a set of MD5 sums and checks them against md5-decrypter.com and md5decryption.com.
7357299298193cb34d03faec7fb2a8d6f64eadd69933f494f1a98e70606e3a9d
This is a simplified memory corruption proof of concept exploit for Firefox.
84f1b73f392b7d5cac24e6fbbd2c87adfae94e7b77462a12739e5959d7c4e4e3
This is a simple Facebook bruteforcing script that makes use of the Python Mechanize module and a wordlist.
0ca36c97c9d96b5b5bc5d03574a420ab3e18f9fd869d9167d4517662c938c229
This is a simple perl keylogger for Windows. Archive password is set to p4ssw0rd. Use at your own risk.
76d6846f0f060503c1b592ab6ef88766d6f3b09cd933aeddaee0d6e8adba9a4e
This is a simple script that attempts to check if a CGI script suffers from an input validation command execution vulnerability.
ee39234eb7bfde6be7b06a471b85c22615c756334e75f9853f44970c002c335b
This is a simple Gmail account checker.
de9fd56594a985798b628c8648e2ffb5e2d258d6031c2e6ab05c4609883107d9
This is a simple buffer overflow for the minishare web server. This flaw affects all versions prior to 1.4.2. This is a plain stack overflow that requires a "jmp esp" to reach the payload, making this difficult to target many platforms at once. This Metasploit module has been successfully tested against 1.4.1. Version 1.3.4 and below do not seem to be vulnerable.
bf2dd8378c0c0c82b912aa8e98c2826676a3f7e41c1c019b8e7c7c3874814359
This is a simple dictionary cracker for shadowed passwords on Linux. Since john and PasswordsPro do not support the new SHA-encrypted ones (implemented in newer Ubuntu and Fedora distros), the author added that functionality.
921fe9da46f5cf89174c68f9b076f2c98bb89e067daa8c3ee2b0b8929f17142a
This is a simple head utility that outputs in hexadecimal format. Characters that are non-printable are replaced with the "." character.
0c5080928e90b08d6d6768e9822e4f8abf096c4a3266af155b8e438d2ed706fb
This is a simple piece of code for GNU/Linux that masquerades a process.
2d995009a52a37a5040f72bed8827c1ba14cf44fb05682fd3ee28e43148c8543
This is a simple piece of code for GNU/Linux that masquerades a process.
6cfcbfd3ae943cd1d183a2c60da5d289276c293887ba8fb9c7dd48a3eb8de243
This is a simple proxy tool that checks for the HTTP CONNECT method and grabs verbose output from a webserver. It is primarily useful when verifying false positives from automated vulnerability assessment tools.
203ad5690055cb97040a956a45aea7128a31b0d77823f608d16c161a7e50eecc
This is a simple implementation of Port Knocking techniques. It sniffs network packets looking for predetermined keys and executes commands to open and close ports on the firewall. In the client mode it injects packets with the key to server.
d30525b8efab91320506330f1c33d3a020d84c71556204537afb77e47a42439e
This is a simple implementation of Port Knocking techniques. It sniffs network packets looking for predetermined keys and executes commands to open and close ports on the firewall. In the client mode it injects packets with the key to server.
95e588790aa423059221be1e0e1337e75a7ed8a2cda22435c4fbbb9aac09dc04
This is a simple script automating the equally simple exploitation of a trusted path bug in AIX. The problem lies in the invscout program.
f0c7b9b062abe8e53cf8f740bd579319dbb3ba0354d5f8b596e731d4cf5dce32
This module exploits an vulnerability in the CA License Server network service. This is a simple stack overflow and just one of many serious problems with this software.
bf5126926d528fef10504d4baf7762d721fb352b140f76cf11829e96f5c69e14
This is a simple tool that searches for the central and local headers contained in a zip file and alters the uncompressed data variable to be 0 in an attempt to trick anti-virus software into not scanning the files inside the zip file.
89007618a7cc506d601e2523249eba67ce6ad4d3cc000482f70f5e18ab449a0d
This is a simple local exploit for FreeBSD/OpenBSD with bmon < 1.2.1_2 installed. It depends on the fact that bmon doesn't use an absolute path to commands that it calls. This particular exploit uses 'netstat'.
9dc0b346d9fd4262adc9c83e19f1ef804883bb558ed5e2ce720089f496d91be6
This is a simple Script written to predial found connects scanned with Toneloc or THC-Scan in intention to find PPP-Dialups or to get the Hex-Values of the PPPD of the remote system. This tool generates output of chat and pppd in the logs directory.
e5937235250ee5d2d86f4a0dbfef61acc9cf89a618dd733d5aa813cbe8a53d83
This is a simple C++ program that I created.
63f85830e2a2f1ca757fd071557a3a537ebe457d2d3ec8bd0b59af85d17fb2a6
THC Backdoor for Linux - This is a simple but useful backdoor for Linux based on a FreeBSD lkm by pragmatic/THC.
734681babd24cd7bc455259f89ac4b384ee909a5df908ba0169dabc078d2cb69
THC Backdoor ported to OpenBSD - This is a simple but useful backdoor for OpenBSD based on a FreeBSD lkm by pragmatic/THC.
05fcfdd8024ff5dbbf471ea66e27a53a4139f2377df3255c490eb5dd6a1f349a
This is a simple script written in tcl which parses the output of the nmap program to determine whether required services are in fact running on a machine. Output is written as an html formatted log file.
e7ffd4cb2568288bd041ca938ab43c887d064dbb920e4b2b0ab6c7a913cd439d