what you don't know can hurt you
Showing 1 - 15 of 15 RSS Feed

Files

Steinberg MyMp3PRO 5.0 Buffer Overflow
Posted Dec 5, 2013
Authored by metacom

Steinberg MyMp3PRO version 5.0 buffer overflow exploit that creates a malicious .m3u file.

tags | exploit, overflow
MD5 | 7abc572c39ee9b80ff4621e08fd1fc08

Related Files

PCManFTPD 2.0.7 Server APPE Command Buffer Overflow
Posted Nov 5, 2018
Authored by Dino Covotsos

PCManFTPD 2.0.7 server APPE command buffer overflow exploit.

tags | exploit, overflow
advisories | CVE-2018-18861
MD5 | 87e02e4c60d4fa6a60c8975a6278da60
Steinberg MyMp3PRO 5.0 SEH Buffer Overflow
Posted Dec 5, 2013
Authored by metacom

Steinberg MyMp3PRO version 5.0 SEH buffer overflow exploit that creates a malicious .m3u file.

tags | exploit, overflow
MD5 | af360b7b618250a47c39159e32430980
Steinberg MyMp3PRO 5.0 DEP Bypass With ROP
Posted Dec 5, 2013
Authored by metacom

Steinberg MyMp3PRO version 5.0 buffer overflow exploit that has DEP bypass with ROP that creates a malicious .m3u file.

tags | exploit, overflow
MD5 | a127e5e1e58257af08d9ba61f595e030
bofra_overview.txt
Posted Nov 20, 2004
Authored by Bryan Burns

Brief analysis of the Bofra, aka MyDoom.AG/AH, worm that was first discovered circulating in the wild November 8th.

tags | paper, worm, virus
MD5 | 1ada5872347d870822aec9f3feb880b6
boFreeBSDroot.txt
Posted Sep 21, 2004
Authored by rookie

A buffer overflow has been discovered in the trap.c syscall() function of the FreeBSD source tree. However, you need to be root to exploit this.

tags | advisory, overflow, root
systems | freebsd
MD5 | 3b5b7af45f45cac6e50e620b4e08f447
bof4kids2.txt
Posted Sep 19, 2002
Authored by Bob, dsr | Site blaat.dtors.net

Buffer Overflows for Kids part 2 - This is part two, the follow on from bofs4kids. In this tutorial I am going to attempt to give you the knowledge to be able to e exploit a program, without coding in C. But we will need to use gdb quite a bit, so any prior knowledge would be helpful but not necessary.

tags | overflow
MD5 | 4cfd9785b13c35dc81b71b93e26cb49f
bofs4kids.txt
Posted Sep 19, 2002
Authored by Bob, dsr | Site blaat.dtors.net

This tutorial is not going to teach you how to code an exploit, but what it is going to do is give you a good understanding of what a buffer overflow is, what types of buffer overflows there are, how we would go about exploiting a buffer overflow, and how to identify a buffer overflow. C and ASM knowledge is not required.

tags | overflow
MD5 | 7fbf27ec6573ab0c860055f326755bf1
bofh.zip
Posted Aug 26, 2002

Bastard Operater From Hell. Hilarious!!!

tags | bbs
MD5 | 76a7a6c143b116e63ee91ee8ea03e6fb
bofh_where.html
Posted Sep 3, 1999
Authored by bofh

Where the bastard came from

tags | magazine
MD5 | 937015862e899703bc1462a74d57ef3e
bofh-16.html
Posted Sep 3, 1999
Authored by bofh

The Bastard Operator from Hell goes Meglomanic - The Sealed Section

tags | magazine
MD5 | 647b2c76044475ad16b74eaefaeeca7c
bofh-glossary.html
Posted Sep 3, 1999
Authored by bofh

Getting to Know Your Computer: A Short Glossary of Computer Terms

tags | magazine
MD5 | f1cc00ee885762507133b97624f44b91
bofhfaq.html
Posted Sep 3, 1999
Authored by bofh

The PreHistory of BOFH / The BOFH FAQ

tags | magazine
MD5 | 7364dfb517f76886e492280a84369f87
bofix_11.zip
Posted Aug 17, 1999
Authored by GroupaXion

Back OrifiX locates and destroys the Back Orifice trojan. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
MD5 | 654b5a0a820afee0c863ee3f7fa2ff34
bof.exe
Posted Aug 17, 1999
Authored by Wacky Zany Crazy Productions

!BO!FREEZE! v1.20.0200 - BO FREEZE detects subnet scans by remote hosts looking for Bo Servers, logs the scans, and then sends malformed packets to the remote host running the BO GUI causing the remote BO GUI to "freeze" or lock up. Archive password is set to p4ssw0rd. Use at your own risk.

tags | remote, trojan
MD5 | fddbe53d1b344053ad773cfd5d1e5bf3
bof_ocxs.exe
Posted Aug 17, 1999

No information is available for this file.

MD5 | 6dd27e9631a3994345d7830221ff73e0
Page 1 of 1
Back1Next

File Archive:

June 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    35 Files
  • 2
    Jun 2nd
    14 Files
  • 3
    Jun 3rd
    40 Files
  • 4
    Jun 4th
    22 Files
  • 5
    Jun 5th
    1 Files
  • 6
    Jun 6th
    1 Files
  • 7
    Jun 7th
    19 Files
  • 8
    Jun 8th
    14 Files
  • 9
    Jun 9th
    39 Files
  • 10
    Jun 10th
    20 Files
  • 11
    Jun 11th
    22 Files
  • 12
    Jun 12th
    2 Files
  • 13
    Jun 13th
    1 Files
  • 14
    Jun 14th
    32 Files
  • 15
    Jun 15th
    34 Files
  • 16
    Jun 16th
    9 Files
  • 17
    Jun 17th
    33 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close