exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 37 RSS Feed

Files

alph-0.15.tar.gz
Posted Dec 28, 2005
Authored by Corcalciuc V. Horia | Site sourceforge.net

alph implements and analyzes historical and traditional ciphers and codes, such as polyalphabetic, substitutional, and mixed employing human-reconstructable algorithms. It provides a pipe filter interface in order to encrypt and decrypt block text to achieve transparency. The program is meant to be used in conjunction with external programs that transfer data, resulting in transparent encryption or decryption of information. The program can thus be used as a mail filter, IRC filter, IM filter, and so on.

Changes: Fixed help displacement. Removed TEA. Added permutations support. Updated manpage. Implemented/ported several hashing functions.
tags | encryption
SHA-256 | a4b5a9e302ee881ca0d4be628393d73ca286d1dbcea298c16d6e02f9999052ac

Related Files

Zenitel AlphaCom XE Audio Server 11.2.3.10 Shell Upload
Posted Sep 14, 2021
Authored by Ricardo Jose Ruiz Fernandez

Zenitel AlphaCom XE Audio Server versions up to 11.2.3.10 have a web interface called AlphaWeb XE that allows for a remote shell upload.

tags | exploit, remote, web, shell
advisories | CVE-2021-40845
SHA-256 | db3e0721685ee34c318d514cffb76f972c85d297a6080f1d2a9693cb1d01d628
Alphaware E-Commerce System 1.0 Shell Upload / SQL Injection
Posted Mar 16, 2021
Authored by Christian Vierschilling

Alphaware E-Commerce System version 1.0 suffers from unauthenticated remote shell upload and remote SQL injection vulnerabilities.

tags | exploit, remote, shell, vulnerability, sql injection
SHA-256 | fbecea6b0c82b953bb75a6982c2fca7d4e938869ab5be9cbc4582b315ab49413
EMC AlphaStor Device Manager Opcode 0x75 Command Injection
Posted Sep 24, 2014
Authored by Aniway, juan vazquez, Mohsan Farid, Brent Morris, Preston Thornburg | Site metasploit.com

This Metasploit module exploits a flaw within the Device Manager (rrobtd.exe). When parsing the 0x75 command, the process does not properly filter user supplied input allowing for arbitrary command injection. This Metasploit module has been tested successfully on EMC AlphaStor 4.0 build 116 with Windows 2003 SP2 and Windows 2008 R2.

tags | exploit, arbitrary
systems | windows
advisories | CVE-2013-0928
SHA-256 | 3e993a7e854efa86fb910cf5ae6005aed96bf8fef7a6b5ff28fe00ff12003031
Alphanumeric Shellcode
Posted Jun 12, 2012
Authored by hatter of BHA | Site blackhatacademy.org

Alphanumeric shellcode is similar to ascii shellcode in that it is used to bypass character filters and evade intrusion-detection during buffer overflow exploitation. This article documents alphanumeric code on multiple architectures, but primarily the 64 bit x86 architecture. Alphanumeric shellcode requires a basic understanding of bitwise math, assembly and shellcode.

tags | paper, overflow, x86, shellcode
SHA-256 | 58bd7026c178df13e32741aeefd385da0fd61df0dd758c8fe3d294c3c7f8be08
Omnicom Alpha 4.0e LPD Server Denial Of Service
Posted Aug 3, 2011
Authored by Craig Freyman

Proof of concept denial of service exploit for the Omnicom Alpha 4.0e LPD server.

tags | exploit, denial of service, proof of concept
SHA-256 | dfd3fb9fa47baf1676b3b04b31dd595cde00348d26967d6b63543109cf5e6f78
Alphabit Online SQL Injection
Posted Jul 7, 2011
Authored by Kalashinkov3

Alphabit Online suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 2735b6518e0af39be6d92e6e972a95e286d73d0db78d4058a9e677c6b44ea056
Alpha 2 Player Denial Of Service
Posted Oct 19, 2010
Authored by anT!-Tr0J4n

Alpha 2 Player suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 7194fc4056da407f18ef6473af5c70ae287e026950fbd6437db36c1d650d72d9
Alpha CMS 3.2 Local File Inclusion
Posted Apr 2, 2010
Authored by eidelweiss

Alpha CMS version 3.2 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | d4284991aea70e65fc90695d0fabd30361ecefa024d9ad54eb602c6c47f4f8db
Alpha B Forum Cross Site Scripting
Posted Jan 14, 2010
Authored by ViRuSMaN

Alpha B Forum suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | b488668fd320aa1dd8756109f85e50fbd9595dd7231919805cba1ebdfda79354
ALPHA3 Shellcode Encoder
Posted Jan 11, 2010
Authored by SkyLined | Site code.google.com

ALPHA3 is an alphanumeric shellcode encoder.

tags | shellcode
SHA-256 | ce340cf911a3c7c4b4d3e13db65c19e98a5ba76465416bba9e7ded0b446353e5
EMC AlphaStor Agent Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in EMC AlphaStor 3.1. By sending a specially crafted message, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
advisories | CVE-2008-2158
SHA-256 | 8d5b6a48b3d7f5a8de8e276bf81f237545164da6f22f4d76a285254c369b1853
alphanumeric-shellcode.txt
Posted Sep 3, 2008
Authored by koshi

67 byte Win32 PEB Kernel32.dll ImageBase Finger Alphanumeric shellcode.

tags | shellcode
systems | windows
SHA-256 | 7edd77337a4cddaae3c77b3778d9de498c100a2f5dbfbb94d1a1bd7484c8ec2b
alph-0.24.tar.gz
Posted Jun 4, 2008
Authored by Corcalciuc V. Horia | Site sourceforge.net

alph implements and analyzes historical and traditional ciphers and codes, such as polyalphabetic, substitutional, and mixed employing human-reconstructable algorithms. It provides a pipe filter interface in order to encrypt and decrypt block text to achieve transparency. The program is meant to be used in conjunction with external programs that transfer data, resulting in transparent encryption or decryption of information. The program can thus be used as a mail filter, IRC filter, IM filter, and so on.

Changes: Added MILLENIUM photographic steganography. Switched to git repository. Optimised permutation and combination functions. Repaired ALBERTI cypher. Repaired LEWIS cypher. Repaired ROT-13 cypher. Repaired MORSE cypher.
tags | encryption
SHA-256 | c1ca70c2034101828bf6a6996161301331563b4e5a6b3957b3ce33da6c136ba9
alpha6.tar.gz
Posted Feb 26, 2008
Authored by devtar | Site d3vscan.sourceforge.net

d3vscan is a network manager that is able to uniquely identify and graphically plot network and bluetooth devices to provide a higher degree of understanding of a particular network. It is also simple enough to be used by an average end user.

tags | tool, wireless
SHA-256 | 8e6418044e81dd37bf0678cf05065374969b81ada852085d22921a4d422e7bf4
alph-0.23.tar.gz
Posted Jul 10, 2007
Authored by Corcalciuc V. Horia | Site sourceforge.net

alph implements and analyzes historical and traditional ciphers and codes, such as polyalphabetic, substitutional, and mixed employing human-reconstructable algorithms. It provides a pipe filter interface in order to encrypt and decrypt block text to achieve transparency. The program is meant to be used in conjunction with external programs that transfer data, resulting in transparent encryption or decryption of information. The program can thus be used as a mail filter, IRC filter, IM filter, and so on.

Changes: Added warning for possibly irreversible cyphers. Added scramble function. Cleaned up source a bit. Updated manpage.
tags | encryption
SHA-256 | 046b5a882ad4beed71f1f3887a92c6c5cd8e1f94b273d94c22e571b53a63ba09
alph-0.21.tar.gz
Posted Jun 5, 2006
Authored by Corcalciuc V. Horia | Site sourceforge.net

alph implements and analyzes historical and traditional ciphers and codes, such as polyalphabetic, substitutional, and mixed employing human-reconstructable algorithms. It provides a pipe filter interface in order to encrypt and decrypt block text to achieve transparency. The program is meant to be used in conjunction with external programs that transfer data, resulting in transparent encryption or decryption of information. The program can thus be used as a mail filter, IRC filter, IM filter, and so on.

Changes: Fixed some VERNAM trouble. Added input / output file support. Updated man page.
tags | encryption
SHA-256 | bea972240387196acb74685c83bfae93eabe38a36f2935b5f545f2456c9a38a3
alph-0.20.tar.gz
Posted Apr 29, 2006
Authored by Corcalciuc V. Horia | Site sourceforge.net

alph implements and analyzes historical and traditional ciphers and codes, such as polyalphabetic, substitutional, and mixed employing human-reconstructable algorithms. It provides a pipe filter interface in order to encrypt and decrypt block text to achieve transparency. The program is meant to be used in conjunction with external programs that transfer data, resulting in transparent encryption or decryption of information. The program can thus be used as a mail filter, IRC filter, IM filter, and so on.

Changes: Added NIHILIST cipher. Added error hooks for library and application. Added M Del Vayo cypher. Updated manpage.
tags | encryption
SHA-256 | 80396b3a3ae76958924ab4e839bb623ed266e0bb67928999a7766f2268643cac
alph-0.19.tar.gz
Posted Feb 26, 2006
Authored by Corcalciuc V. Horia | Site sourceforge.net

alph implements and analyzes historical and traditional ciphers and codes, such as polyalphabetic, substitutional, and mixed employing human-reconstructable algorithms. It provides a pipe filter interface in order to encrypt and decrypt block text to achieve transparency. The program is meant to be used in conjunction with external programs that transfer data, resulting in transparent encryption or decryption of information. The program can thus be used as a mail filter, IRC filter, IM filter, and so on.

Changes: Added BEALE. Removed unused variables. Fixed some hash returns (new character). Removed special character for complex parameters. Changed permutation and combination output file method. Added ZIGZAG. Corrected cipher count. Updated manpage.
tags | encryption
SHA-256 | dc503670f5f50d3ad7205836f7cffd273c52e9e3cd8ae3c5148dffb95ce8cf59
alph-0.17.tar.gz
Posted Feb 10, 2006
Authored by Corcalciuc V. Horia | Site sourceforge.net

alph implements and analyzes historical and traditional ciphers and codes, such as polyalphabetic, substitutional, and mixed employing human-reconstructable algorithms. It provides a pipe filter interface in order to encrypt and decrypt block text to achieve transparency. The program is meant to be used in conjunction with external programs that transfer data, resulting in transparent encryption or decryption of information. The program can thus be used as a mail filter, IRC filter, IM filter, and so on.

Changes: Multiple bug fixes, modified layout, and some additions.
tags | encryption
SHA-256 | 7f21caa98e2663ac6ff3384f55525e7fb315a0284dbc32e04e6f49a04d7c946c
alph-0.16.tar.gz
Posted Feb 8, 2006
Authored by Corcalciuc V. Horia | Site sourceforge.net

alph implements and analyzes historical and traditional ciphers and codes, such as polyalphabetic, substitutional, and mixed employing human-reconstructable algorithms. It provides a pipe filter interface in order to encrypt and decrypt block text to achieve transparency. The program is meant to be used in conjunction with external programs that transfer data, resulting in transparent encryption or decryption of information. The program can thus be used as a mail filter, IRC filter, IM filter, and so on.

Changes: Added PURPLE machine. Fixed trailing newline after output. Added combinations support. Fixed MORSE.
tags | encryption
SHA-256 | f5aa51c872acee7a128dfa5f2f8514077b82dcdc2b49d6ef166acb365868e644
alph-0.13.tar.gz
Posted Aug 5, 2005
Authored by Corcalciuc V. Horia | Site sourceforge.net

alph implements and analyzes historical and traditional ciphers and codes, such as polyalphabetic, substitutional, and mixed employing human-reconstructable algorithms. It provides a pipe filter interface in order to encrypt and decrypt block text to achieve transparency. The program is meant to be used in conjunction with external programs that transfer data, resulting in transparent encryption or decryption of information. The program can thus be used as a mail filter, IRC filter, IM filter, and so on.

Changes: FEISTEL cipher added. ADFGX cipher added. BASE64 encoding added. Updated manpage.
tags | encryption
SHA-256 | b376f1816b722fc736f128af1ad97188c2535954509ebc1bb38dbce10ab03bc2
alph-0.12.tar.gz
Posted Jun 20, 2005
Authored by Corcalciuc V. Horia | Site sourceforge.net

alph implements and analyzes historical and traditional ciphers and codes, such as polyalphabetic, substitutional, and mixed employing human-reconstructable algorithms. It provides a pipe filter interface in order to encrypt and decrypt block text to achieve transparency. The program is meant to be used in conjunction with external programs that transfer data, resulting in transparent encryption or decryption of information. The program can thus be used as a mail filter, IRC filter, IM filter, and so on.

Changes: ALBERTI cipher implemented. Jeffer-Lewis cipher implemented. Updated man page.
tags | encryption
SHA-256 | 9511de01afd25185ad7e4ff970c0120aa5c7eff29dca613cfaec161468f786dd
alph-0.11.tar.gz
Posted Jun 1, 2005
Authored by Corcalciuc V. Horia | Site sourceforge.net

alph implements and analyzes historical and traditional ciphers and codes, such as polyalphabetic, substitutional, and mixed employing human-reconstructable algorithms. It provides a pipe filter interface in order to encrypt and decrypt block text to achieve transparency. The program is meant to be used in conjunction with external programs that transfer data, resulting in transparent encryption or decryption of information. The program can thus be used as a mail filter, IRC filter, IM filter, and so on.

Changes: Bug fixes.
tags | encryption
SHA-256 | a829f32c211a8955b599210fd7ba9d9c9b47eec285505aa366825e90bf86d2af
alph-0.10.tar.gz
Posted Apr 18, 2005
Authored by Corcalciuc V. Horia | Site sourceforge.net

alph implements and analyzes historical and traditional ciphers and codes, such as polyalphabetic, substitutional, and mixed employing human-reconstructable algorithms. It provides a pipe filter interface in order to encrypt and decrypt block text to achieve transparency. The program is meant to be used in conjunction with external programs that transfer data, resulting in transparent encryption or decryption of information. The program can thus be used as a mail filter, IRC filter, IM filter, and so on.

Changes: twosquare cypher implemented. Updated man page.
tags | encryption
SHA-256 | f8fb086977b4b3d74b4650a6005b104f3ec05a4760f95c0e39f1fdee5ecde572
alph-0.8.tar.gz
Posted Mar 22, 2005
Authored by Corcalciuc V. Horia | Site sourceforge.net

alph implements and analyzes historical and traditional ciphers and codes, such as polyalphabetic, substitutional, and mixed employing human-reconstructable algorithms. It provides a pipe filter interface in order to encrypt and decrypt block text to achieve transparency. The program is meant to be used in conjunction with external programs that transfer data, resulting in transparent encryption or decryption of information. The program can thus be used as a mail filter, IRC filter, IM filter, and so on.

Changes: Morse code implemented.
tags | encryption
SHA-256 | ffcfcd3e9b911f6b3a0cddae8d5c9a361d3e7e7fa4b171ce091fb47a3ee0ca4c
Page 1 of 2
Back12Next

File Archive:

December 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    2 Files
  • 2
    Dec 2nd
    12 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close