114 bytes small Linux/x86 random bytes encoder and XOR/SUB/NOT/ROR execve(/bin/sh) shellcode.
6821b8b561a61bc5d34076f52fd398bd
114 bytes small Linux/x86 reverse TCP shellcode.
736ab2fee6b1fc77956e403631161630
114 bytes small Linux/x86 bind shell generator shellcode.
9b7bafc7ff4aa9cacdbde1039bca23ca
w00w00's operating system. Yes, a joke.
7b03569337d70874d4142ceeb10bdadd
This little program opens as many sockets with a remote host as can be supported by both. It catches ^C and kill commands to shut down cleanly by closing all open connections before exiting. Often, a remote workstation can be brought to its knees by saturating its process table via multiple invocations of sendmail. That's why port 25 (the sendmail port) is the default. If the target's process table (set when the target kernel was created) is filled, users will be unable to execute any shell commands. Many MUDs also crash when the number of sockets they have open exceeds a certain number. This program will put stress on MUDs by testing their limits. If a limit is reached, the MUD will either crash or will refuse to let new users log in. * The program is incomplete, in that it doesn't check for socket timeouts and subsequently reuse timed out sockets. That means the program can only keep a remote host / mud locked up until it exhausts its own available new sockets, or until it has reached MAX_DESCRIPTORS remote connections as set by the #define statement. * If the local machine starts issuing error messages, then the program has failed to saturate the remote host and has instead reached the limits of the local machine. Use ^C or the kill command to terminate it. If you are knowledgable about rebuilding kernels and have access to the root account, you can build a special kernel that will allow you to reach a much larger number of open sockets.
57f5e537c9adc5964995189dee2618d0
twlc logo
829f9581dc84503bb015f3a8fddd927e
PR09.txt.zip
f3dd4498769b1da00333963bb2471dbd
PR08.txt.zip
0ce948f8c912117fd90a619e2d8b6dab
PR07.txt.zip
77da16cec8c37cbd135647ccbad4be31
PR06.txt.zip
2db8e860aa1f0ba496f1ec03c073c0a4
PR05.txt.zip
05b7e226d46066bc5f37024dae75786c
PR04.txt.zip
7712468359ed26815e08d05c7f875ecd
PR03.txt.zip
6d82b7bd94d290ba2c0b53f45c570a3d
PR02.txt.zip
daaf75e00dd724d144c32e77cd807e04
PR01.txt.zip
9670c08238864cf706da09c36b0118cb
The Netopia R9100 permits a user not authorized with a special security password to neverthless modify the SNMP community strings, including enabling SNMP access that should be disabled.
bfc4f59f410bc5cd989c93e746833946
Prevent Current and Future E-Mail Worms.
ccb29df3cab7315b7bbe73ebc5426747
Users can access the mailbox's content of anybody on the system. They can also steal their POP passwords since Emurl allows you to fetch your POP email from more than one source.
c854c11701ebd63ca453e8f85947aff4
A file called adpassword.txt is world readable as it is assigned the wrong permissions. This will allow a malicious attacker to read the contents of the file, to crack the DES encrypted password it contains (using a common-or-garden password cracker), and to edit banner entries,to add or to remove banners.
f14c2253d94b28844892aa0865a6d3c1
Remote Denial of Service for CProxy v3.3 - Service Pack 2. This program xploits an overflow vulnerability in CProxy 3.3 SP2 HTTP Service (8080), causing server shutdown.
f49a2c47ec6a0437c9ee7590a95682b9
Cisco 760 Series Connection Overflow. Affected Systems: Routers Cisco 760 Series. Others not tested.
a4074a92cb0b32eac9e0680403c56ee5
Remote users can execute arbitrary commands on the web server with the priviledge level of the httpd process.
a5c2a8bd20fdd39774c7f5e722ef9054
A defect in multiple releases of Cisco IOS software will cause a Cisco router or switch to halt and reload if the IOS HTTP service is enabled and browsing to "http://<router-ip>/%%" is attempted. This defect can be exploited to produce a denial of service (DoS) attack. This defect has been discussed on public mailing lists and should be considered public information.
177d2675ccf94d2117289316882510d8
A vulnerable secure shell distribution is available from the popular Zedz Consultants FTP site (formally known as replay.com). The RedHat Linux RPM ssh-1.2.27-8i.src.rpm contains a PAM patch which contains faulty logic allowing users to essentially pass through the username/password authentication step and gain shell access.
95b80c63f273743306ae2cf0b0b7b355
Bypassing Warnings For Invalid SSL Certificates In Netscape Navigator.
1f30c5620c1a04acf9b16c06972bc5d0
"I don't think I really love you" or writing internet worms for fun and profit.
a1bf3c9a055dd560d416ffd234081b6d