exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files

manyssl-1.1.tar.gz
Posted Dec 31, 2007
Site portcullis-security.com

This perl script will enumerate the SSL ciphers in use on any SSL encrypted service, including STARTTLS on SMTP. The script will warn the operator if a self signed certificate is detected on a https encrypted service.

tags | web, perl, encryption
SHA-256 | b072fc02eb3c308b65335f16281547f292d409ddca19c12a820a6fe6a2d9eb2c

Related Files

Heartbleed Honeypot Script
Posted Apr 9, 2014
Authored by glitch | Site glitchwrks.com

This Perl script listens on TCP port 443 and responds with completely bogus SSL heartbeat responses, unless it detects the start of a byte pattern similar to that used in Jared Stafford's (jspenguin@jspenguin.org) demo for CVE-2014-0160 'Heartbleed'. Run as root for the privileged port. Outputs IPs of suspected heartbleed scan to the console. Rickrolls scanner in the hex dump.

tags | tool, root, perl, tcp, intrusion detection
systems | unix
advisories | CVE-2014-0160
SHA-256 | 796ad9cc3fad4c720764e5e9bf2d2d16466658b294a8ea3c9c7312235cba21cd
LFI Exploiter 1.1
Posted Dec 8, 2013
Authored by M.R.S.CO

This perl script leverages /proc/self/environ to attempt getting code execution out of a local file inclusion vulnerability.

Changes: Various updates.
tags | tool, local, perl, code execution, file inclusion
systems | unix
SHA-256 | 7ce9af081371d3aac6a99db29aef3d8887c46d12ee280d8061b70faa5799c0f2
LFI Exploiter
Posted Sep 26, 2012
Authored by M.R.S.CO

This perl script leverages /proc/self/environ to attempt getting code execution out of a local file inclusion vulnerability.

tags | tool, local, perl, code execution, file inclusion
systems | unix
SHA-256 | bd77eecfb380be0b2302b89fd25fafe9ee987dadd671f7e40d057f74b0ce0ade
pBot Remote Code Execution
Posted Jul 31, 2012
Authored by bwall

This perl script attacks pBot by leveraging a hidden .eval command to delete and kill the bot.

tags | exploit, perl
SHA-256 | 19d0cd2419b1ba8636cb8720f58807484e2cd5fe55c43028edb94c4dfbfc419f
H4ckCity Auto T00ls 1.0
Posted Aug 24, 2011
Authored by Farbod Mahini | Site h4ckcity.org

This perl script performs a variety of auto-rooting and shell install attempts on a given host once a shell is obtained.

tags | tool, shell, root, perl, rootkit
systems | unix
SHA-256 | b0cc1594ea4f50c159650a89af0baaf2a3e7692cd196414dd2e258a9403aebe6
Simple Encoding Utility
Posted Jan 27, 2010
Authored by MDH3LL

This perl script is a simple encoding utility that converts data to Hex, Unicode, etc.

tags | tool, perl
systems | unix
SHA-256 | 2b30fb69bb60fef848c4afa61d58fad18d20e6e793de647d90fe8fd5c59c4af2
swap.pw.pl
Posted Jan 4, 2003
Authored by Spai

This perl script recovers passwords out of unix swap files. UID or GID 0 required to read swap files. May be useful for finding passwords that were entered into the wrong machine. Tested on Red Hat 6.2 - 8.0.

tags | tool, perl, rootkit
systems | linux, redhat, unix
SHA-256 | 315c8a7d3c4ad00dd5237ad5680f7641193fef637e8a4c7cae7904511b9cc7f9
qpopper.pl
Posted Sep 3, 2001
Authored by Nemes||y

Qualcomm's Qpopper mail server POP3 authentication when used with PAM that gives remote users information about whether user accounts exist or not. This perl script has been tested with Qpopper v4.0.1 on Redhat 7.x.

tags | exploit, remote, perl
systems | linux, redhat
SHA-256 | 552b77283bca7bfe71ead2e26048f4a7c53545e50aaf62baa7867718bbf668db
sr.pl
Posted Jul 18, 2001
Authored by Roelof Temmingh, Haroon Meer | Site sensepost.com

Checkpoint Firewall-1's SecureRemote allows any IP to connect and download sensitive network information. This perl script gives a potential attacker a wealth of information including ip addresses, network masks (and even friendly descriptions).

tags | exploit, perl
SHA-256 | e3619e7d295ef6e80dc77aada9c151eaf7aeff1c25021ef117f8331019de3414
6thSense.tgz
Posted May 10, 2001
Authored by Haroon Meer | Site sensepost.com

6thsense is a TCP port scanning technique which allows you to remain completely invisible to the scanned host, as described in a Bugtraq post by Antirez. This perl script automates the tedious process.

tags | tool, scanner, perl, tcp
systems | unix
SHA-256 | 1d1a5d827807512fba0b4550e510f4dc9a65667e1ff2831570e59dd613bc14c2
vim_exp.pl
Posted Apr 9, 2001
Authored by Nemes||y

Vim 5.7 local exploit - This perl script creates a text file which when edited in vim executes an arbitrary file on the local system as the user running vim.

tags | exploit, arbitrary, local, perl
SHA-256 | 94ac1222cdab6241822c8841377d2a2604f38df90c7a18c05a1615eec0506075
axsploit.pl
Posted Oct 15, 2000
Authored by Xcript | Site rhs-ck.com

AnalogX 1.1 contains remotely exploitable buffer overflows, as reported in USSR Advisory #29. This perl script will crash the server.

tags | denial of service, overflow, perl
SHA-256 | 1bdccecd24f11ee629b770cad98d4f87a53a2f4ce8e4179a6711e1acf4e37d8f
wakeonlan-0.40.tar.gz
Posted Aug 9, 2000
Authored by Jose Pedro Oliveira | Site gsd.di.uminho.pt

This perl script sends 'magic packets' to wake-on-lan enabled ethernet adapters, in order to remotely power up a PC. Features the ability to use broadcast IP addresses.

tags | perl
systems | unix
SHA-256 | fe9574d64254ea77b1edd3457deddd855a7365f2345af748d14d28b3e54bafda
hv-smtpdos.pl
Posted Feb 16, 2000
Authored by Doctorx | Site hven.com.ve

Some SMTP servers crash under high volume - This perl script sends many mails to a list of addresses to test for this vulnerability.

tags | denial of service, perl
SHA-256 | 4b0aae25140afa3b8a22d859954b193385cf734b9286a137faeff59f802e83f9
pop-spoof.pl
Posted Aug 17, 1999
Authored by ManicX

pop-spoof.pl v0.01 - Local POP3 spoofer: Most email clients these days have the ability to cache passwords and other details (Netscape users look at pref.js explorer registry). Spoof a pop server and edit the prefs.js or registry to try and check 127.0.0.1 and run this Perl script to get the passwords in clear text.

tags | exploit, local, perl, spoof, registry
SHA-256 | a75ae0370bc2a1ccf96bf370003c745a0fd946f7d2fec37b567a0d50a5977433
Page 1 of 1
Back1Next

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    57 Files
  • 7
    Jun 7th
    6 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    12 Files
  • 11
    Jun 11th
    27 Files
  • 12
    Jun 12th
    38 Files
  • 13
    Jun 13th
    16 Files
  • 14
    Jun 14th
    14 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    16 Files
  • 18
    Jun 18th
    26 Files
  • 19
    Jun 19th
    15 Files
  • 20
    Jun 20th
    18 Files
  • 21
    Jun 21st
    8 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close