what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 74 of 74 RSS Feed

Files

LFI Image Helper 0.8
Posted Jan 9, 2015
Authored by Doddy Hackman

This is a simple script to infect images with PHP Backdoors for local file inclusion attacks.

tags | tool, local, php, rootkit, file inclusion
systems | unix
SHA-256 | 2417fa7ba59a45f47d8610a1495111a59f039bd586605208288ef92ac36d8906

Related Files

Minishare 1.4.1 Buffer Overflow
Posted Nov 26, 2009
Authored by acaro | Site metasploit.com

This is a simple buffer overflow for the minishare web server. This flaw affects all versions prior to 1.4.2. This is a plain stack overflow that requires a "jmp esp" to reach the payload, making this difficult to target many platforms at once. This Metasploit module has been successfully tested against 1.4.1. Version 1.3.4 and below do not seem to be vulnerable.

tags | exploit, web, overflow
advisories | CVE-2004-2271
SHA-256 | bf2dd8378c0c0c82b912aa8e98c2826676a3f7e41c1c019b8e7c7c3874814359
gw-scrack Password File Cracker
Posted Oct 21, 2009
Authored by gat3way

This is a simple dictionary cracker for shadowed passwords on Linux. Since john and PasswordsPro do not support the new SHA-encrypted ones (implemented in newer Ubuntu and Fedora distros), the author added that functionality.

tags | cracker
systems | linux, fedora, ubuntu
SHA-256 | 921fe9da46f5cf89174c68f9b076f2c98bb89e067daa8c3ee2b0b8929f17142a
LFI/RFI Testing With fimap
Posted Sep 4, 2009
Authored by Iman Karim

This paper discuss local and remote file inclusion testing and exploiting using fimap.

tags | paper, remote, local, file inclusion
SHA-256 | ca0e272e459578d65a04ea70099d78615750a284bffaa9f08e4e57350ee0f311
Utility To Dump head In Hexadecimal
Posted Jun 30, 2009
Authored by aaron conole | Site aconole.brad-x.com

This is a simple head utility that outputs in hexadecimal format. Characters that are non-printable are replaced with the "." character.

tags | tool
systems | unix
SHA-256 | 0c5080928e90b08d6d6768e9822e4f8abf096c4a3266af155b8e438d2ed706fb
Simple Local File Inclusion Checker
Posted Mar 9, 2009
Authored by D4T4X

Simple perl script for checking a variable for local file inclusion.

tags | tool, local, scanner, perl, file inclusion
systems | unix
SHA-256 | 7a89062aa2bc8ae5f5a76310fae76750c8558091805e968453b79a0c4e154f85
File Inclusion Scanning Utility
Posted Jan 6, 2009
Authored by baltazar | Site darkc0de.com

Local / Remote file inclusion scanner that attempts to make use of a c99 shell on a vulnerable host.

tags | tool, remote, shell, local, scanner, code execution, file inclusion
systems | unix
SHA-256 | 3ef3fd5a18405dc440ca9f9b2ee8e623841175bf7d26977dd2f870b8669d6b80
LFI To RCE Exploit With Perl Script
Posted Dec 9, 2008
Authored by CWH Underground | Site citecclub.org

Local File Inclusion to Remote Code Execution with a perl script.

tags | paper, remote, local, perl, code execution, file inclusion
SHA-256 | e40ca4dee137297ed80a811afaad0726c6618222b1a3547a89d1db2abcd4e560
procmask.txt
Posted Aug 1, 2008
Authored by despai | Site despai.es

This is a simple piece of code for GNU/Linux that masquerades a process.

systems | linux
SHA-256 | 2d995009a52a37a5040f72bed8827c1ba14cf44fb05682fd3ee28e43148c8543
procmask.c
Posted Mar 4, 2008
Authored by despai | Site despai.es

This is a simple piece of code for GNU/Linux that masquerades a process.

systems | linux
SHA-256 | 6cfcbfd3ae943cd1d183a2c60da5d289276c293887ba8fb9c7dd48a3eb8de243
proxycheck.pl.txt
Posted Dec 18, 2007
Authored by Tom Van de Wiele

This is a simple proxy tool that checks for the HTTP CONNECT method and grabs verbose output from a webserver. It is primarily useful when verifying false positives from automated vulnerability assessment tools.

tags | tool, web, scanner
systems | unix
SHA-256 | 203ad5690055cb97040a956a45aea7128a31b0d77823f608d16c161a7e50eecc
coarseknocking-0.0.5.tar.gz
Posted Feb 13, 2006
Authored by Andre Luiz Rodrigues Ferreira | Site coarseknocking.sourceforge.net

This is a simple implementation of Port Knocking techniques. It sniffs network packets looking for predetermined keys and executes commands to open and close ports on the firewall. In the client mode it injects packets with the key to server.

Changes: Added support to choose network interface. Added configuration tool.
tags | tool, scanner
systems | unix
SHA-256 | d30525b8efab91320506330f1c33d3a020d84c71556204537afb77e47a42439e
coarseknocking-0.0.2.tar.gz
Posted Nov 4, 2005
Authored by Andre Luiz Rodrigues Ferreira | Site coarseknocking.sourceforge.net

This is a simple implementation of Port Knocking techniques. It sniffs network packets looking for predetermined keys and executes commands to open and close ports on the firewall. In the client mode it injects packets with the key to server.

tags | tool, scanner
systems | unix
SHA-256 | 95e588790aa423059221be1e0e1337e75a7ed8a2cda22435c4fbbb9aac09dc04
getr00t.sh
Posted Mar 25, 2005
Authored by ri0t

This is a simple script automating the equally simple exploitation of a trusted path bug in AIX. The problem lies in the invscout program.

tags | exploit
systems | aix
advisories | CVE-2004-1054
SHA-256 | f0c7b9b062abe8e53cf8f740bd579319dbb3ba0354d5f8b596e731d4cf5dce32
calicserv_getconfig.pm
Posted Mar 5, 2005
Authored by Thor Doomen

This module exploits an vulnerability in the CA License Server network service. This is a simple stack overflow and just one of many serious problems with this software.

tags | exploit, overflow
advisories | CVE-2005-0581
SHA-256 | bf5126926d528fef10504d4baf7762d721fb352b140f76cf11829e96f5c69e14
zipbrk.zip
Posted Nov 20, 2004
Authored by oc.192

This is a simple tool that searches for the central and local headers contained in a zip file and alters the uncompressed data variable to be 0 in an attempt to trick anti-virus software into not scanning the files inside the zip file.

tags | exploit, local, virus
advisories | CVE-2004-0932, CVE-2004-0937
SHA-256 | 89007618a7cc506d601e2523249eba67ce6ad4d3cc000482f70f5e18ab449a0d
bmon.sh
Posted Oct 16, 2004
Authored by Idan Nahoum

This is a simple local exploit for FreeBSD/OpenBSD with bmon < 1.2.1_2 installed. It depends on the fact that bmon doesn't use an absolute path to commands that it calls. This particular exploit uses 'netstat'.

tags | exploit, local
systems | freebsd, openbsd
SHA-256 | 9dc0b346d9fd4262adc9c83e19f1ef804883bb558ed5e2ce720089f496d91be6
ppp-predialer.tar.gz
Posted Oct 10, 2002
Authored by Subbero | Site mhc.ods.org

This is a simple Script written to predial found connects scanned with Toneloc or THC-Scan in intention to find PPP-Dialups or to get the Hex-Values of the PPPD of the remote system. This tool generates output of chat and pppd in the logs directory.

tags | tool, remote, scanner
systems | unix
SHA-256 | e5937235250ee5d2d86f4a0dbfef61acc9cf89a618dd733d5aa813cbe8a53d83
logentry.zip
Posted Aug 26, 2002

This is a simple C++ program that I created.

tags | bbs
SHA-256 | 63f85830e2a2f1ca757fd071557a3a537ebe457d2d3ec8bd0b59af85d17fb2a6
thclinbd.tar.gz
Posted Jan 5, 2001
Authored by s0ftpj, bELFaghor | Site s0ftpj.org

THC Backdoor for Linux - This is a simple but useful backdoor for Linux based on a FreeBSD lkm by pragmatic/THC.

systems | linux, freebsd
SHA-256 | 734681babd24cd7bc455259f89ac4b384ee909a5df908ba0169dabc078d2cb69
thcobsdbd.tar.gz
Posted Jan 5, 2001
Authored by s0ftpj, Pigpen | Site s0ftpj.org

THC Backdoor ported to OpenBSD - This is a simple but useful backdoor for OpenBSD based on a FreeBSD lkm by pragmatic/THC.

systems | freebsd, openbsd
SHA-256 | 05fcfdd8024ff5dbbf471ea66e27a53a4139f2377df3255c490eb5dd6a1f349a
service_check.tcl
Posted Jan 11, 2000
Authored by Phil Ehrens

This is a simple script written in tcl which parses the output of the nmap program to determine whether required services are in fact running on a machine. Output is written as an html formatted log file.

tags | tool, scanner
systems | unix
SHA-256 | e7ffd4cb2568288bd041ca938ab43c887d064dbb920e4b2b0ab6c7a913cd439d
tcp_server-1.0.tar.gz
Posted Aug 17, 1999

This is a simple, generic tcp based server for allowing access to multiple server processes. It's very simply configurable, and can serve up multiple processes. web site

tags | tool, web, tcp
systems | unix
SHA-256 | e1c1151fd069c336cf5a98799e74c34056647169ec082dfc372a0104ca04b153
sr-1.02.tar
Posted Aug 17, 1999
Authored by Patrick Lambert

System Recovery v1.02 - This is a simple program that can be used to set a database of important system files, and then compare them to see if any were hacked and changed with trojans binaries.

tags | trojan
systems | unix
SHA-256 | 149a8ef8542deb6bdf1fab46927e7abc54fc89907a31c6e106c8e2952bc039e7
Page 3 of 3
Back123Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    0 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close