This is a simple script to infect images with PHP Backdoors for local file inclusion attacks.
2417fa7ba59a45f47d8610a1495111a59f039bd586605208288ef92ac36d8906
This is a simple buffer overflow for the minishare web server. This flaw affects all versions prior to 1.4.2. This is a plain stack overflow that requires a "jmp esp" to reach the payload, making this difficult to target many platforms at once. This Metasploit module has been successfully tested against 1.4.1. Version 1.3.4 and below do not seem to be vulnerable.
bf2dd8378c0c0c82b912aa8e98c2826676a3f7e41c1c019b8e7c7c3874814359
This is a simple dictionary cracker for shadowed passwords on Linux. Since john and PasswordsPro do not support the new SHA-encrypted ones (implemented in newer Ubuntu and Fedora distros), the author added that functionality.
921fe9da46f5cf89174c68f9b076f2c98bb89e067daa8c3ee2b0b8929f17142a
This paper discuss local and remote file inclusion testing and exploiting using fimap.
ca0e272e459578d65a04ea70099d78615750a284bffaa9f08e4e57350ee0f311
This is a simple head utility that outputs in hexadecimal format. Characters that are non-printable are replaced with the "." character.
0c5080928e90b08d6d6768e9822e4f8abf096c4a3266af155b8e438d2ed706fb
Simple perl script for checking a variable for local file inclusion.
7a89062aa2bc8ae5f5a76310fae76750c8558091805e968453b79a0c4e154f85
Local / Remote file inclusion scanner that attempts to make use of a c99 shell on a vulnerable host.
3ef3fd5a18405dc440ca9f9b2ee8e623841175bf7d26977dd2f870b8669d6b80
Local File Inclusion to Remote Code Execution with a perl script.
e40ca4dee137297ed80a811afaad0726c6618222b1a3547a89d1db2abcd4e560
This is a simple piece of code for GNU/Linux that masquerades a process.
2d995009a52a37a5040f72bed8827c1ba14cf44fb05682fd3ee28e43148c8543
This is a simple piece of code for GNU/Linux that masquerades a process.
6cfcbfd3ae943cd1d183a2c60da5d289276c293887ba8fb9c7dd48a3eb8de243
This is a simple proxy tool that checks for the HTTP CONNECT method and grabs verbose output from a webserver. It is primarily useful when verifying false positives from automated vulnerability assessment tools.
203ad5690055cb97040a956a45aea7128a31b0d77823f608d16c161a7e50eecc
This is a simple implementation of Port Knocking techniques. It sniffs network packets looking for predetermined keys and executes commands to open and close ports on the firewall. In the client mode it injects packets with the key to server.
d30525b8efab91320506330f1c33d3a020d84c71556204537afb77e47a42439e
This is a simple implementation of Port Knocking techniques. It sniffs network packets looking for predetermined keys and executes commands to open and close ports on the firewall. In the client mode it injects packets with the key to server.
95e588790aa423059221be1e0e1337e75a7ed8a2cda22435c4fbbb9aac09dc04
This is a simple script automating the equally simple exploitation of a trusted path bug in AIX. The problem lies in the invscout program.
f0c7b9b062abe8e53cf8f740bd579319dbb3ba0354d5f8b596e731d4cf5dce32
This module exploits an vulnerability in the CA License Server network service. This is a simple stack overflow and just one of many serious problems with this software.
bf5126926d528fef10504d4baf7762d721fb352b140f76cf11829e96f5c69e14
This is a simple tool that searches for the central and local headers contained in a zip file and alters the uncompressed data variable to be 0 in an attempt to trick anti-virus software into not scanning the files inside the zip file.
89007618a7cc506d601e2523249eba67ce6ad4d3cc000482f70f5e18ab449a0d
This is a simple local exploit for FreeBSD/OpenBSD with bmon < 1.2.1_2 installed. It depends on the fact that bmon doesn't use an absolute path to commands that it calls. This particular exploit uses 'netstat'.
9dc0b346d9fd4262adc9c83e19f1ef804883bb558ed5e2ce720089f496d91be6
This is a simple Script written to predial found connects scanned with Toneloc or THC-Scan in intention to find PPP-Dialups or to get the Hex-Values of the PPPD of the remote system. This tool generates output of chat and pppd in the logs directory.
e5937235250ee5d2d86f4a0dbfef61acc9cf89a618dd733d5aa813cbe8a53d83
This is a simple C++ program that I created.
63f85830e2a2f1ca757fd071557a3a537ebe457d2d3ec8bd0b59af85d17fb2a6
THC Backdoor for Linux - This is a simple but useful backdoor for Linux based on a FreeBSD lkm by pragmatic/THC.
734681babd24cd7bc455259f89ac4b384ee909a5df908ba0169dabc078d2cb69
THC Backdoor ported to OpenBSD - This is a simple but useful backdoor for OpenBSD based on a FreeBSD lkm by pragmatic/THC.
05fcfdd8024ff5dbbf471ea66e27a53a4139f2377df3255c490eb5dd6a1f349a
This is a simple script written in tcl which parses the output of the nmap program to determine whether required services are in fact running on a machine. Output is written as an html formatted log file.
e7ffd4cb2568288bd041ca938ab43c887d064dbb920e4b2b0ab6c7a913cd439d
This is a simple, generic tcp based server for allowing access to multiple server processes. It's very simply configurable, and can serve up multiple processes. web site
e1c1151fd069c336cf5a98799e74c34056647169ec082dfc372a0104ca04b153
System Recovery v1.02 - This is a simple program that can be used to set a database of important system files, and then compare them to see if any were hacked and changed with trojans binaries.
149a8ef8542deb6bdf1fab46927e7abc54fc89907a31c6e106c8e2952bc039e7