exploit the possibilities
Showing 1 - 25 of 100 RSS Feed

Files

Linux/x86 /usr/bin/head -n99 cat etc/passwd Shellcode
Posted Dec 5, 2018
Authored by Nelis

61 bytes small Linux/x86 /usr/bin/head -n99 cat etc/passwd shellcode.

tags | x86, shellcode
systems | linux
MD5 | 2fbbef5bdb2a35867aacd529a1fda03c

Related Files

Linux/x86 chmod 666 /etc/passwd / /etc/shadow Shellcode
Posted Jul 12, 2019
Authored by Xavier Invers Fornells

61 bytes small Linux/x86 chmod 666 /etc/passwd and chmod 666 /etc/shadow shellcode.

tags | x86, shellcode
systems | linux
MD5 | 1d275af34ac3eb4e6782353a61ffbebe
Linux/x86 MMX-PUNPCKLBW Encoder Shellcode
Posted Apr 15, 2019
Authored by Petr Javorik

61 bytes small Linux/x86 MMX-PUNPCKLBW encoder shellcode.

tags | x86, shellcode
systems | linux
MD5 | 245a2cc2caaef0f2ee17516eac6ae580
Linux/x86 Read File (/etc/passwd) MSF Optimized Shellcode
Posted Sep 14, 2018
Authored by Ray Doyle

61 bytes small Linux/x86 read file (/etc/passwd) MSF optimized shellcode.

tags | x86, shellcode
systems | linux
MD5 | 774bb96e53da0cf6170ece1a360e3be1
Reverse Shell Shellcode
Posted Jul 13, 2012
Authored by KedAns-Dz

61 bytes small Unix/x86 reverse shell TCP port 30 shellcode.

tags | shell, x86, tcp, shellcode
systems | unix
MD5 | c921e90b42c3151ce7e327eb62fa9ec2
Drop Suid Root Shell Shellcode
Posted Jul 6, 2010
Authored by gunslinger | Site gunslingerc0de.wordpress.com

161 bytes small polymorphic Linux / x86 shellcode that drops a suid root shell in /tmp/.hiddenshell.

tags | shell, x86, root, shellcode
systems | linux
MD5 | 5737ac695d7d50d1d952d2a237d5dcc0
Polymorphic setuid(0) + chmod("/etc/shadow", 0666) Shellcode
Posted Jun 2, 2010
Authored by antrhacks

61 bytes small polymorphic setuid(0) + chmod("/etc/shadow", 0666) Linux/x86 shellcode.

tags | x86, shellcode
systems | linux
MD5 | 5b82ec11db04f2a42bc3f61594fdc875
Windows Seven cmd.exe Shellcode
Posted Jun 2, 2010
Authored by agix

61 bytes small Windows 7 x64 cmd.exe shellcode.

tags | shellcode
systems | windows, 7
MD5 | e7dec6834b59e7628bb54fb28e9e705e
killall5 Polymorphic Shellcode For Linux/x86
Posted Aug 11, 2009
Authored by Jonathan Salwan | Site shell-storm.org

61 bytes small killall5 polymorphic shellcode for Linux/x86.

tags | x86, shellcode
systems | linux
MD5 | 75f545836047abffaa87a2eeb53a2409
linux-390-shellcode-devel.txt
Posted Jul 24, 2002
Authored by thc, Johnny Cyberpunk | Site thc.org

Writing shellcode for Linux/390 mainframes. Includes port binding shellcode example.

tags | paper, shellcode
systems | linux, unix
MD5 | 7065ee89fdd6f0feef6c441ebd9d9031
Openwall Linux Kernel Patch
Posted Jun 3, 2002
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security "hardening" features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

Changes: Updated for Linux 2.2.21. Permissions on /proc entries have been changed to be consistent with Linux 2.4.18-ow0, and the getcwd(2) instance of the d_path() truncation problem and the fsuid/fsgid handling inconsistency have been fixed.
tags | overflow, kernel
systems | linux
MD5 | 0b846c829eae6276c57357fe72c3d180
linux-2.2.20-ow3.tar.gz
Posted Apr 6, 2002
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security "hardening" features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

Changes: Fixes the recent zlib (PPP/IrDA Deflate compression) problem and added fixes for two Alpha-specific bugs introduced in Linux 2.2.20.
tags | overflow, kernel
systems | linux
MD5 | 021cc007b503daa3cad2bb0ef35c4fb5
linux-2.2.20-ow2.tar.gz
Posted Mar 4, 2002
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security "hardening" features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

Changes: Fixed an x86-specific Linux kernel vulnerability where local users could abuse a binary compatibility interface (lcall) to kill processes not belonging to them, including system processes.
tags | overflow, kernel
systems | linux
MD5 | 789b9b631a3930e3ba765381278d04ea
linux-rename.c
Posted Feb 5, 2002
Authored by Zillion | Site safemode.org

Linux x86 shellcode that does a rename() of /bin/motd to /bin/owned.txt.

tags | x86, shellcode
systems | linux
MD5 | 5499694acd0e057779e2d16da4eca17a
Openwall Linux Kernel Patch
Posted Nov 6, 2001
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security "hardening" features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

Changes: Ported to 2.2.0. This version moves even more of the support for combined ELF/a.out setups under the configuration option introduced with 2.2.19-ow4. Readme available <a href="http://www.openwall.com/linux/README"here.</a>
tags | overflow, kernel
systems | linux
MD5 | 1567d99da210896db17c3eee79f49969
linux-2.2.19-ow4.tar.gz
Posted Oct 23, 2001
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security "hardening" features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

Changes: Fixes two Linux kernel vulnerabilities. A non-security symbol export issue was fixed and support for ELF executables was put into a separate configuration option. Readme available <a href="http://www.openwall.com/linux/README"here.</a>
tags | overflow, kernel
systems | linux
MD5 | 07a55b30cb52a8646d42037965695df7
linux-2.2.19-ow3.tar.gz
Posted Oct 20, 2001
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security "hardening" features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

Changes: Fixes the possible local root vulnerability discovered recently in kernel v2.2.19. Readme available <a href="http://www.openwall.com/linux/README"here.</a>
tags | overflow, kernel
systems | linux
MD5 | 26fd536156c5f44070817cd512e42fa0
linux-2.2.19-sf1.tar.gz
Posted Apr 17, 2001
Authored by Andi | Site segfault.net

Linux Kernel Patch from the segfault.net project - This patch for kernel v2.2.19 allows you to specify GID's which are allowed to bind to each interface. This patch could be very useful for shell providers or admins who wants to restrict the using of more interfaces.

tags | shell, kernel, patch
systems | linux, unix
MD5 | 32dfda21cd473387d033e608e02230ed
Linux 2.2.19 Stealth Patch
Posted Apr 7, 2001
Authored by Sean Trifero | Site innu.org

The Stealth Kernel Patch for Linux v2.2.19 makes the linux kernel discard the packets that many OS detection tools use to query the TCP/IP stack. Includes logging of the dropped query packets and packets with bogus flags. Does a very good job of confusing nmap and queso.

Changes: Now works with kernel v2.2.19.
tags | kernel, tcp
systems | linux
MD5 | 29d386c15f8bd808ae57e44d43a61afc
Openwall Linux Kernel Patch
Posted Mar 29, 2001
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security "hardening" features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

Changes: Updated to Linux 2.2.19, which contains security fixes not included in older versions of the patch. Readme available <a href="http://www.openwall.com/linux/README"here.</a>
tags | overflow, kernel
systems | linux
MD5 | 944a6566a057ca99a3b1575e67db8aea
linux-2.0.39-ow3.tar.gz
Posted Mar 29, 2001
Authored by Solar Designer | Site openwall.com

The Secure-Linux patch adds a few security features to the kernel which, while not a complete method of protection, will stop most of the 'cookbook' buffer overflow exploits cold. It also adds the option of restricting the use of symlinks and named pipes in +t (temp) directories which fixes most tmp-race exploits as well. It can also add a little bit more privacy to the system by restricting access to parts of /proc to root so that users may not see who else is logged on or what they're doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction, and privileged IP aliases for kernel 2.0.

Changes: There are important bugfixes, including to an older kernel vulnerability fix. Readme available <a href="http://www.openwall.com/linux/README"here.</a>
tags | overflow, kernel, root
systems | linux
MD5 | f444dae268d4523ac7a96cef7b23776c
linux-2.2.18-ow4.tar.gz
Posted Feb 10, 2001
Authored by Solar Designer | Site openwall.com

The Secure-Linux patch adds a few security features to the kernel which, while not a complete method of protection, will stop most of the 'cookbook' buffer overflow exploits cold. It also adds the option of restricting the use of symlinks and named pipes in +t (temp) directories which fixes most tmp-race exploits as well. It can also add a little bit more privacy to the system by restricting access to parts of /proc to root so that users may not see who else is logged on or what they're doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction, and privileged IP aliases for kernel 2.0.

Changes: A fix for the recently announced execve(2)/ptrace(2) race condition vulnerability in the Linux kernel. Readme available <a href="http://www.openwall.com/linux/README"here.</a>
tags | overflow, kernel, root
systems | linux
MD5 | 3778930319d1d3040f9fc598005cbad2
linux-2.0.39-ow2.tar.gz
Posted Feb 10, 2001
Authored by Solar Designer | Site openwall.com

The Secure-Linux patch adds a few security features to the kernel which, while not a complete method of protection, will stop most of the 'cookbook' buffer overflow exploits cold. It also adds the option of restricting the use of symlinks and named pipes in +t (temp) directories which fixes most tmp-race exploits as well. It can also add a little bit more privacy to the system by restricting access to parts of /proc to root so that users may not see who else is logged on or what they're doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction, and privileged IP aliases for kernel 2.0.

Changes: A fix for the recently announced execve(2)/ptrace(2) race condition vulnerability in the Linux kernel. Readme available <a href="http://www.openwall.com/linux/README"here.</a>
tags | overflow, kernel, root
systems | linux
MD5 | 448e15e2a0268611ce885dc7162ee74a
Linux 2.2.18 Stealth Patch
Posted Dec 20, 2000
Authored by Sean Trifero | Site innu.org

The Stealth Kernel Patch for Linux v2.2.18 makes the linux kernel discard the packets that many OS detection tools use to query the TCP/IP stack. Includes logging of the dropped query packets and packets with bogus flags. Does a very good job of confusing nmap and queso.

Changes: Fixed 2.2->2.4 connectivity problems and ported to kernel 2.2.18.
tags | kernel, tcp
systems | linux
MD5 | a0a77e93859e7bd2b2dba329fc459516
Openwall Linux Kernel Patch
Posted Dec 15, 2000
Authored by Solar Designer | Site openwall.com

The Secure-Linux patch adds a few security features to the kernel which, while not a complete method of protection, will stop most of the 'cookbook' buffer overflow exploits cold. It also adds the option of restricting the use of symlinks and named pipes in +t (temp) directories which fixes most tmp-race exploits as well. It can also add a little bit more privacy to the system by restricting access to parts of /proc to root so that users may not see who else is logged on or what they're doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction, and priveledged IP aliases for kernel 2.0.

Changes: Now works on kernel 2.2.18! Also includes workarounds for GNU MailMan and Courier Mail. Readme available <a href="http://www.openwall.com/linux/README"here.</a>
tags | overflow, kernel, root
systems | linux
MD5 | 5e901962c353d8424e51297ff4158b50
linuxbsm-0.60.tar.gz
Posted Nov 25, 2000
Authored by Jeremy Banford, Daniel Holmlund | Site linuxbsm.sourceforge.net

The Linux Basic Security Module (Linux BSM) is a kernel patch and userspace tools to implement C2 level security. It is patterned after Sun's Solaris Basic Security Module.

tags | kernel
systems | linux, solaris
MD5 | 25400be63376b9fb262cb3fd6b85c32f
Page 1 of 4
Back1234Next

File Archive:

October 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    25 Files
  • 2
    Oct 2nd
    13 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    1 Files
  • 5
    Oct 5th
    15 Files
  • 6
    Oct 6th
    15 Files
  • 7
    Oct 7th
    15 Files
  • 8
    Oct 8th
    11 Files
  • 9
    Oct 9th
    3 Files
  • 10
    Oct 10th
    1 Files
  • 11
    Oct 11th
    1 Files
  • 12
    Oct 12th
    8 Files
  • 13
    Oct 13th
    12 Files
  • 14
    Oct 14th
    23 Files
  • 15
    Oct 15th
    4 Files
  • 16
    Oct 16th
    13 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    1 Files
  • 19
    Oct 19th
    27 Files
  • 20
    Oct 20th
    41 Files
  • 21
    Oct 21st
    18 Files
  • 22
    Oct 22nd
    16 Files
  • 23
    Oct 23rd
    2 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close