what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 21 of 21 RSS Feed


Shell Shock Auto Exploitation Script
Posted Oct 6, 2015
Authored by Rafay Baloch

This is a small python script that will enumerate through a list of targets and test their user agent for the shellshock vulnerability.

tags | exploit, tool, python
SHA-256 | 394a7921e89370c9d46b7105136fa1e127f06fefe2c6d6a4c8bb66f41b592170

Related Files

Simple Universal Fortigate Fuzzer Extension Script
Posted Dec 5, 2023
Authored by Cody Sixteen

This is a small extension script to monitor suff.py, or the Simple Universal Fortigate Fuzzer, and to collect crashlogs for future analysis.

tags | tool, fuzzer
SHA-256 | e4664830b3fe02fbdd2cb9687909e1cb5827c21ad4da619143c039c0d4cbe83d
TP-Link Backup Decryption Utility
Posted May 24, 2022
Authored by ret5et | Site github.com

This is a small tool written to help decrypt encrypted TP-Link backups.

tags | tool
systems | unix
SHA-256 | 6dfd1b159b4562812a1078e17fd4ac9732d0d63aa702172f555e54c1cfb902a8
Ansible Quick Shot Red Teaming Cheatsheet
Posted Apr 11, 2022
Authored by Cody Sixteen | Site code610.blogspot.com

This is a small document that provides a cheat sheet for use of Ansible during penetration testing and red teaming activities.

tags | paper
SHA-256 | 0c12a80286493aa8bd0c790357f229f5d0169bc51d3a6f38387aea2b27d0ce5d
NetworkManager Daemon Command Execution
Posted Sep 6, 2018
Authored by Sameer Goyal, Felix Wilhelm

This is a small tutorial write up that provides a DynoRoot exploit proof of concept.

tags | exploit, proof of concept
advisories | CVE-2018-1111
SHA-256 | 05bd61cb8ce0024fe6348ca11ae1d9aa32b087a7faf6df353ddc2aface0c11eb
Shellshock Bashed CGI RCE
Posted Oct 3, 2014
Authored by Fady Mohamed Osman, Stephane Chazelas | Site metasploit.com

This Metasploit module exploits the shellshock vulnerability in apache cgi. It allows you to execute any metasploit payload you want.

tags | exploit, cgi
advisories | CVE-2014-6271
SHA-256 | a864c843ce6ef903a561a68316c0959dd2b138cad93a26d0f8f6d85e6d98db5d
NTP Denial Of Service
Posted Feb 17, 2014
Authored by ShadowHatesYou

This is a small perl script called NTP DRDoS which is a denial of service tool for use against NTP.

tags | denial of service, perl
SHA-256 | aace077f2d1467ac05f3510cdb0dd50536eb654724f84af89c96b51140890230
Binary 2 Shellcode
Posted Feb 24, 2013
Authored by Hamza Megahed | Site hamza-mega.blogspot.com

This is a small tool that will convert a binary to shellcode. Additional usage information can be found via the homepage link.

tags | tool, shellcode
systems | unix
SHA-256 | 869ef82878ff568dd9287a18df2adef9a64feeeb4ec10d726b256ad9454f759a
PHP Data Stream File Inclusion To Command Execution Tool
Posted Jan 21, 2013
Authored by infodox

This is a small proof of concept tool that leverages the data:// stream to gain remote code execution from a file inclusion vulnerability.

tags | remote, code execution, proof of concept, file inclusion
SHA-256 | c8c8bbfa963434111dffb850c77790720a4f7b2c74f7310ff876ccea44eb66f6
EAZY Web Scanner
Posted Oct 22, 2012
Authored by r0ckin

This is a small python tool that scans websites to look for PHP shells, backups, admin panels, and more.

tags | tool, shell, scanner, php, python
systems | unix
SHA-256 | eae76aaf398f8283420ca6cccb69d3b75a9e6c4026d44fa9fd0ff9eed3f493d3
darkBC Python Connect-Back Script
Posted Feb 24, 2012
Authored by baltazar

This is a small connect-back script written in Python.

tags | tool, rootkit, python
systems | unix
SHA-256 | 835b9dec3575dd1389efc8a4a007dd336a926416a6593e7523caf0ba48d3e976
PgSql Brute Force
Posted Jan 31, 2012
Authored by James Stevenson | Site stev.org

This is a small application built to demo the weakness in pgsql and networking. It is capable of running login attempts from multiple threads in parallel and can run up to 1024 concurrent connections.

tags | tool, cracker, sql injection
SHA-256 | a1cbc90da097874a42f190353d335d48e7833a5c03b38e5d2c09ee9a1505b115
HTTP Brute Force
Posted Jan 31, 2012
Authored by James Stevenson | Site stev.org

This is a small application built to test the performance of a http authentication system using a lot of concurrent connections. It can also be used to try lots of password against a http server. It is capable of using up to 1024 (or more using multiple processes). However with this amount it is capable or reducing internet connections to a crawl and also greatly increasing the load on the server.

tags | tool, web, cracker
SHA-256 | a5d2da95b1cd1d0ba6fe4dd2c6679e8bf9b21070ccc3eee14c9f4eeffaa83726
MySQL Brute Force Tool
Posted Jan 19, 2012
Authored by James Stevenson | Site stev.org

This is a small MySQL cracking tool capable of running login attempts from multiple threads in parallel. It is capable of 1024 concurrent connections.

tags | tool, cracker, sql injection
SHA-256 | f146f20998994d92b163d14ad2d638e4e8fe1b472cee16e5eb3e73270024ebab
Brief Whitepaper On Tinkering With SIP
Posted Dec 1, 2010
Authored by stormrider

This is a small write-up discussing how to mess with SIP.

tags | paper
SHA-256 | 2a3df45ec1da80a98c2693540f29fcb9861c53dfe978a1792c51f023472e81af
Metasploit Meterpreter Killer 2
Posted May 27, 2010
Authored by Mert SARICA | Site mertsarica.com

This is a small tool that scans memory to detect and kill Metasploit's meterpreter.

Changes: Added a logging feature, auto kill feature, detection mode only and exclusion support.
SHA-256 | a7dfd039754050a977ff7100a38b46030b8e3be34f1eff000e0c24fcd93bcb35
Metasploit Meterpreter Killer
Posted May 22, 2010
Authored by Mert SARICA | Site mertsarica.com

This is a small tool that scans memory to detect and kill Metasploit's meterpreter.

SHA-256 | a1ce3de5edbc686b1357ef7bbc5200ca6b808f04917031dba8e86e17585f8ed0
Small Paper On Hacking CSRF Tokens
Posted Jul 20, 2009
Authored by Inferno from Secure Thoughts

This is a small write up discussing hacking CSRF tokens using CSS history hacking.

tags | paper, csrf
SHA-256 | 3e6af417a275ddd4f54c378f68b635c72decc52dea98fd75f944c2507197f6a4
w32 SEH Omelet Shellcode
Posted Mar 16, 2009
Authored by SkyLined

This is a small piece of shellcode written in assembler that can scan the user-land address space for small blocks of memory ("eggs") and recombine the eggs into one large block.

tags | shellcode
SHA-256 | 8f64a632ae31b520f87ac44f9927c36b3d08aeef8e12e7ea7b7456352c7aadbb
Posted Oct 24, 2004
Authored by Swan | Site 0x557.org

This is a small text document that describes how MS SQL can be "tricked" into creating a command.asp script under the webroot, even when you do not have access to 'sa' privs (dbo privs are probably still a must, though). The technique described uses the SQL server 'backup' command.

tags | paper, web, asp
SHA-256 | 00f4e7c9f7cd17235e6b6b60f335065c99183f5e4af191f5b7d9dfcb8975e8a2
Posted Feb 15, 2000
Authored by Todd Sabin | Site razor.bindview.com

This is a small unix utility that does the equivalent of NT's nbtstat -A . It sends a Node Status request to the host specified on the command line, and waits (up to 10 seconds) for the reply. If it gets the reply, it dumps the reply as hex, and then interprets the name table.

tags | tool, scanner
systems | unix
SHA-256 | f2d1cda851422ba2c3988c1bfce5d3c633d2dd73e5be637a2665736f778bf67e
Posted Jan 11, 2000
Authored by DarkSider | Site freaky.staticusers.net

Macintosh - MacPork new Developed by Team2600 MacPork is a auditing tool like many seen for unix platforms, this is a small program that allow you to scan a server for tracking holes and exploiting them. MacPork scan over 130 vulnerabilities and retrieve a passwd file in 45 differents manners. It's the best scanner/retriever ever made on both macintosh and unix.

tags | vulnerability
systems | unix
SHA-256 | d7495fce7255a9e66fa5180935216c57032fe1c5cd128d9e91f5e16c27ca3616
Page 1 of 1

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By