what you don't know can hurt you
Showing 1 - 25 of 25 RSS Feed

Files

Heartbleed Honeypot Script
Posted Apr 9, 2014
Authored by glitch | Site glitchwrks.com

This Perl script listens on TCP port 443 and responds with completely bogus SSL heartbeat responses, unless it detects the start of a byte pattern similar to that used in Jared Stafford's (jspenguin@jspenguin.org) demo for CVE-2014-0160 'Heartbleed'. Run as root for the privileged port. Outputs IPs of suspected heartbleed scan to the console. Rickrolls scanner in the hex dump.

tags | tool, root, perl, tcp, intrusion detection
systems | unix
advisories | CVE-2014-0160
MD5 | aa6604b077be236dfe5f5f3f8c9a84cd

Related Files

Hotel Booking Script 3.4 Cross Site Request Forgery
Posted Dec 19, 2018
Authored by Sainadh Jamalpur

Hotel Booking Script version 3.4 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
MD5 | 8425e4f971e9d347d3ab67726702fd84
HBGK DVR 3.0.0 Build 20161206 Authentication Bypass
Posted Oct 1, 2017
Authored by RAT - ThiefKing

HBGK DVR version 3.0.0 build 20161206 suffers from an authentication bypass vulnerability.

tags | exploit, bypass
MD5 | 53b9a4b42fdf8345ff9dc8a81140c248
Hotel Booking Script 1.0 SQL Injection
Posted Mar 26, 2017
Authored by Ihsan Sencan

Hotel Booking Script version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 608d2b56b8c10d92462a8393c12d05e6
LFI Exploiter 1.1
Posted Dec 8, 2013
Authored by M.R.S.CO

This perl script leverages /proc/self/environ to attempt getting code execution out of a local file inclusion vulnerability.

Changes: Various updates.
tags | tool, local, perl, code execution, file inclusion
systems | unix
MD5 | 802e666f4cfa925563246c19740df286
LFI Exploiter
Posted Sep 26, 2012
Authored by M.R.S.CO

This perl script leverages /proc/self/environ to attempt getting code execution out of a local file inclusion vulnerability.

tags | tool, local, perl, code execution, file inclusion
systems | unix
MD5 | 4a28894995bf7478f9b2b7d5144536dc
Hotel Booking Portal 0.1 Cross Site Scripting / SQL Injection
Posted Aug 13, 2012
Authored by Yakir Wizman

Hotel Booking Portal version 0.1 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
MD5 | 6681a356490ff44dcaab0358c4e61b55
pBot Remote Code Execution
Posted Jul 31, 2012
Authored by bwall

This perl script attacks pBot by leveraging a hidden .eval command to delete and kill the bot.

tags | exploit, perl
MD5 | c1cdb50ab422a8f2053d5be0a1f8b058
Hotel Booking Portal 0.1 SQL Injection
Posted Apr 4, 2012
Authored by Mark Stanislav

Hotel Booking Portal version 0.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2012-1672
MD5 | b980a0dbc8ed9fdda8ed65bab897d67d
H4ckCity Auto T00ls 1.0
Posted Aug 24, 2011
Authored by Farbod Mahini | Site h4ckcity.org

This perl script performs a variety of auto-rooting and shell install attempts on a given host once a shell is obtained.

tags | tool, shell, root, perl, rootkit
systems | unix
MD5 | 5c1eb6df84676039b26b56dda73f62b3
HB Ecommerce SQL Injection
Posted May 27, 2011
Authored by takeshix

HB Ecommerce suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 8d56e6cca063176f9e558c976acdbdc4
Hacked By Hackers Issue 1
Posted Nov 27, 2010
Authored by hbhc

Brazilian hacking magazine called Hacked By Hackers Issue 1. Written in Portuguese.

tags | magazine
MD5 | 63935ac1d06e18b8e0fa02fcfdedd916
Simple Encoding Utility
Posted Jan 27, 2010
Authored by MDH3LL

This perl script is a simple encoding utility that converts data to Hex, Unicode, etc.

tags | tool, perl
systems | unix
MD5 | 4dbb43ebc6e8ae0ee48d232da5ee1fe7
HB-NS 1.3 Administrative Access
Posted Dec 1, 2009
Authored by kurdish hackers team | Site kurdteam.org

The administrative interface for HB-NS version 1.3 appears to be left wide open by default.

tags | exploit, add administrator
MD5 | 94d0dd4ed17d95168992c68b09f28fc5
HB CMS 1.7 SQL Injection
Posted Sep 22, 2009
Authored by Securitylab Security Research | Site securitylab.ir

HB CMS version 1.7 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 8afd6599c5304adb123c9238e8d9cb5f
hbr-rfi.txt
Posted Jul 1, 2008
Authored by Ghost Hacker | Site real-hack.net

HIOX Banner Rotator (HBR) version 1.3 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
MD5 | 059950a053c937cf608ba8fa88fb87c7
manyssl-1.1.tar.gz
Posted Dec 31, 2007
Site portcullis-security.com

This perl script will enumerate the SSL ciphers in use on any SSL encrypted service, including STARTTLS on SMTP. The script will warn the operator if a self signed certificate is detected on a https encrypted service.

tags | web, perl, encryption
MD5 | 67fb8ba8596470c368740beadc4c0609
swap.pw.pl
Posted Jan 4, 2003
Authored by Spai

This perl script recovers passwords out of unix swap files. UID or GID 0 required to read swap files. May be useful for finding passwords that were entered into the wrong machine. Tested on Red Hat 6.2 - 8.0.

tags | tool, perl, rootkit
systems | linux, redhat, unix
MD5 | de8bf096533d7cb9d8b68b9d36269a29
qpopper.pl
Posted Sep 3, 2001
Authored by Nemes||y

Qualcomm's Qpopper mail server POP3 authentication when used with PAM that gives remote users information about whether user accounts exist or not. This perl script has been tested with Qpopper v4.0.1 on Redhat 7.x.

tags | exploit, remote, perl
systems | linux, redhat
MD5 | b84cd17517203b65b5ed2cd4fe7002e7
sr.pl
Posted Jul 18, 2001
Authored by Roelof Temmingh, Haroon Meer | Site sensepost.com

Checkpoint Firewall-1's SecureRemote allows any IP to connect and download sensitive network information. This perl script gives a potential attacker a wealth of information including ip addresses, network masks (and even friendly descriptions).

tags | exploit, perl
MD5 | 64a69339c5b64edbad5cc889a991464a
6thSense.tgz
Posted May 10, 2001
Authored by Haroon Meer | Site sensepost.com

6thsense is a TCP port scanning technique which allows you to remain completely invisible to the scanned host, as described in a Bugtraq post by Antirez. This perl script automates the tedious process.

tags | tool, scanner, perl, tcp
systems | unix
MD5 | b515cb557d2ecee5dd291ab09118c6a8
vim_exp.pl
Posted Apr 9, 2001
Authored by Nemes||y

Vim 5.7 local exploit - This perl script creates a text file which when edited in vim executes an arbitrary file on the local system as the user running vim.

tags | exploit, arbitrary, local, perl
MD5 | 6c239c910da655b40156601960be3d88
axsploit.pl
Posted Oct 15, 2000
Authored by Xcript | Site rhs-ck.com

AnalogX 1.1 contains remotely exploitable buffer overflows, as reported in USSR Advisory #29. This perl script will crash the server.

tags | denial of service, overflow, perl
MD5 | 803ece7f7beaa8e3df6ccf7e9fb5f40d
wakeonlan-0.40.tar.gz
Posted Aug 9, 2000
Authored by Jose Pedro Oliveira | Site gsd.di.uminho.pt

This perl script sends 'magic packets' to wake-on-lan enabled ethernet adapters, in order to remotely power up a PC. Features the ability to use broadcast IP addresses.

tags | perl
systems | unix
MD5 | d045e8e4c1db580e9bc16404c711dabc
hv-smtpdos.pl
Posted Feb 16, 2000
Authored by Doctorx | Site hven.com.ve

Some SMTP servers crash under high volume - This perl script sends many mails to a list of addresses to test for this vulnerability.

tags | denial of service, perl
MD5 | b4392785742298d9f23fe778b50cf55b
pop-spoof.pl
Posted Aug 17, 1999
Authored by ManicX

pop-spoof.pl v0.01 - Local POP3 spoofer: Most email clients these days have the ability to cache passwords and other details (Netscape users look at pref.js explorer registry). Spoof a pop server and edit the prefs.js or registry to try and check 127.0.0.1 and run this Perl script to get the passwords in clear text.

tags | exploit, local, perl, spoof, registry
MD5 | a42b446eb131f3a5146861662e98cd18
Page 1 of 1
Back1Next

File Archive:

October 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    16 Files
  • 2
    Oct 2nd
    1 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    24 Files
  • 5
    Oct 5th
    24 Files
  • 6
    Oct 6th
    11 Files
  • 7
    Oct 7th
    14 Files
  • 8
    Oct 8th
    19 Files
  • 9
    Oct 9th
    1 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    7 Files
  • 12
    Oct 12th
    15 Files
  • 13
    Oct 13th
    26 Files
  • 14
    Oct 14th
    10 Files
  • 15
    Oct 15th
    6 Files
  • 16
    Oct 16th
    2 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    14 Files
  • 19
    Oct 19th
    15 Files
  • 20
    Oct 20th
    20 Files
  • 21
    Oct 21st
    12 Files
  • 22
    Oct 22nd
    14 Files
  • 23
    Oct 23rd
    3 Files
  • 24
    Oct 24th
    1 Files
  • 25
    Oct 25th
    33 Files
  • 26
    Oct 26th
    27 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close