what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 100 RSS Feed

Files

CMS NetCat 3.12 SQL Injection / XSS / LFI
Posted Dec 30, 2008
Authored by s4avrd0w

CMS NetCat versions 3.12 and below suffer from local file inclusion, blind SQL injection, cross site scripting, HTTP response splitting, and CRLF injection vulnerabilities.

tags | exploit, web, local, vulnerability, xss, sql injection, file inclusion
SHA-256 | 730aeb7570a48954a80207737f1bafe5fe9d40926123fed41669691d5ed7d6f7

Related Files

Linux/x86 netcat Bindshell Shellcode
Posted Apr 21, 2011
Authored by Jonathan Salwan

Linux/x86 /usr/bin/netcat -ltp6666 -e/bin/sh shellcode.

tags | x86, shellcode
systems | linux
SHA-256 | 84aa0c4d97e3ba738247628d5bb9d317fcac19a4b680f5764acf2335664d47e8
SSL Capable Netcat 1.05
Posted Mar 26, 2011
Authored by GomoR | Site gomor.org

SSL Capable NetCat is just what it sounds like. It's a perl script that works just like netcat but has SSL capabilities.

Changes: IPv6 support, connection proxying.
tags | perl
systems | unix
SHA-256 | a20c5c6ad561e60cb6dfad12dfb36badee97f23d2e0d50911d29e98e4b8220d6
netcat Connect Back Shellcode
Posted Jul 13, 2010
Authored by Blake

76 bytes small Linux / x86 shellcode that performs a connect back using netcat.

tags | x86, shellcode
systems | linux
SHA-256 | 92a674036251b7aa7d6e8cf7f2b13ad73e6b53728d55e041bf98d436ff0be673
netcat Bindshell Shellcode
Posted Jul 13, 2010
Authored by Blake

75 bytes small Linux / x86 shellcode that binds a shell to port 8080 using netcat.

tags | shell, x86, shellcode
systems | linux
SHA-256 | a43f8b3a5df7c8139ef426155c7f2404d9b5ee192a9b09a054172ff73c73f05f
Puck GNU/Linux Distribution
Posted Jul 6, 2010
Authored by Nima Ghotbi | Site h.ackerz.com

Puck is a GNU/Linux distribution based on TinyCoreLinux. It contains top penetration testing tools like Wireshark, Nmap, NetCat, John the ripper, Yersinia, THC-Hydra, etc while still remaining tiny in size.

tags | tool
systems | linux, unix
SHA-256 | ab0baa97221c116b909eaa4e164f4779e65e48d3f9f364ecd35face950b5eb83
Bash Scripts For Bruteforcing FTP And Looking For RFI/LFI
Posted Apr 14, 2010
Authored by FuRt3X

This tarball has a couple of bash scripts that use netcat to brute force ftp and scan for local and remote file inclusion vulnerabilities.

tags | tool, remote, local, scanner, vulnerability, bash, file inclusion
systems | unix
SHA-256 | e19a0914b0f6880f78c49d6c67f5ecd55462ffd15303f6b5a94f170bc503365b
Netcat v1.10 NT Stack Overflow
Posted Nov 26, 2009
Authored by patrick | Site metasploit.com

This Metasploit module exploits a stack overflow in Netcat v1.10 NT. By sending an overly long string we are able to overwrite SEH. The vulnerability exists when netcat is used to bind (-e) an executable to a port in doexec.c. This Metasploit module tested successfully using "c:\\>nc -L -p 31337 -e ftp".

tags | exploit, overflow
advisories | CVE-2004-1317
SHA-256 | 86cb3709aec7d4ad9e7245bc4d2f9a70dc54e270dbc1a38e9c690f7cf760dcb8
CMS NetCat 3.0/3.12 SQL Injection
Posted Dec 31, 2008
Authored by s4avrd0w

AIST NetCat versions 3.0 and 3.12 blind SQL injection exploit.

tags | exploit, sql injection
SHA-256 | 7485da20e0675f552156229e08a1e3fc634a93d320bee7e89c5e48551832cf0a
CMS NetCat 3.12 Blind SQL Injection Exploit
Posted Dec 30, 2008
Authored by s4avrd0w

CMS NetCat version 3.12 blind SQL injection exploit that makes use of password_recovery.php.

tags | exploit, php, sql injection
SHA-256 | 8670779a58356d6382a73efdb1904f94e7222c22d900b64b0f128e7c51350d9a
scnc-1.00.tgz
Posted Apr 28, 2008
Authored by GomoR | Site gomor.org

SSL Capable NetCat is just what it sounds like. It's a perl script that works just like netcat but has SSL capabilities.

tags | perl
systems | unix
SHA-256 | 5224fa34284e7ddc6eb9ac31cb6f33a7b1a4e4a78f79a0f913e0a995e84c77f7
02062007-raptor_winudf.tgz
Posted Feb 8, 2007
Authored by Marco Ivaldi

This is a MySQL backdoor kit for Windows based on the UDFs (User Defined Functions) mechanism. It can be used to spawn a reverse shell (netcat UDF on port 80/tcp) or to execute single OS commands (exec UDF). Tested on MySQL 4.0.18-win32 (running on Windows XP SP2), MySQL 4.1.22-win32 (running on Windows XP SP2), MySQL 5.0.27-win32 (running on Windows XP SP2).

tags | exploit, shell, tcp
systems | windows
SHA-256 | 15313890177e90628311c6c464cf5a183ed19e89a0eb0fae3370dd041b770aea
Taking_Back_Netcat.pdf
Posted Sep 7, 2006
Authored by Craig Heffner | Site craigheffner.com

While there are some easy ways of changing the antivirus signature of a program (packers, encryptors, etc), they may not always be viable options for those wishing to bypass antivirus applications. This paper will show how to locate the signature used to identify Netcat, and modify it so that the executable no longer matches Symantec's AV signature, without interfering with any of the program's functionality. This is an exercise in identifying and modifying sections of code (aka, signatures) that are used by antivirus programs to identify malicious code; the tools and techniques used here can be applied to any program that is marked as malicious by AV applications.

tags | paper, virus
SHA-256 | acfa9cdef5c30cd4848dccab719ac832c6ce65cf0aae70ef4dc41ad12ea37fd7
z4ck-book_final.pdf
Posted Jun 29, 2006
Authored by Kev Milne | Site z4ck.org

Z4CK is a cyber thriller which includes a gripping story line with an insight into realistic hacker tools and techniques. The main story is about a hacker who creates the ultimate security tool capable of breaching any network security. Other tools such as Nmap, Nessus, Hydra, and Netcat are also put to good use in this novel. The PDF is completely free to download.

tags | paper
SHA-256 | 4d20b44b8248610c702df19f32236850bb03226e31e5f24f5e70b4b65fce5512
metacab-2006-04-R5.zip
Posted Apr 27, 2006
Authored by Phoenix 2600 | Site phx2600.org

Metacab (meta.cab) is a single, inclusive Microsft CAB file of remote administration tools. The CAB file and everything within can be decompressed, installed and used with only cmd.exe. Includes: WinPcap needed for Nmap, DCOM RPC overflow exploit, Simple bat file to ping sweep a Class D, HOD's PnP exploit, Netcat CAB, Nmap CAB, VNC CAB.

Changes: Now includes TCPDUMP, install.bat hides Metacab install, map.bat timeout cut in half, Naming is cleaner, Updated README, including links to sources.
tags | remote, overflow
SHA-256 | a60e89fa97790be36ccc7b36ffd87b0d805831141fe3a210635d0d96ec3b1660
metacab-2006-04-R3.zip
Posted Apr 17, 2006
Authored by Phoenix 2600 | Site phx2600.org

Metacab (meta.cab) is a single, inclusive Microsft CAB file of remote administration tools. The CAB file and everything within can be decompressed, installed and used with only cmd.exe. Includes: WinPcap needed for Nmap, DCOM RPC overflow exploit, Simple bat file to ping sweep a Class D, HOD's PnP exploit, Netcat CAB, Nmap CAB, VNC CAB.

tags | remote, overflow
SHA-256 | 6df9395304d34d112ac357e0da78b215accb202c11a9b4c7dca9b8baf4a52189
Stealfly.tar.gz
Posted Dec 29, 2005
Authored by hash | Site gotfault.net

Stealfly is proof of concept perl code that illustrates the usage of port knocking. The server sits on a defined interface and listens for a certain amount of UDP packets to be sent from a chosen ip that will use a range of source ports for each packet. If the rules are satisfied then server will open it's port or connect back using netcat.

tags | tool, udp, scanner, perl, proof of concept
systems | unix
SHA-256 | 9b559d856cf19a59caa00955eca0de80d9ab917be989d8b0911d9f6f8de86843
as400nc.txt
Posted Apr 14, 2005
Authored by Shalom Carmel

A reverse shell can be obtained using netcat on an AS/400 with PASE installed.

tags | advisory, shell
SHA-256 | 9e78ffcdd03fc9efdee0e3b370eea2d426fcdbb31edeaa8a406ac70e72a9221d
netcat-exp.txt
Posted Jan 2, 2005
Authored by class101

A buffer overflow in netcat can allow for remote compromise. Full exploit provided.

tags | exploit, remote, overflow
SHA-256 | 6a870fa91a4f04d8ae387bc3eabd6a0168c21283e0b69caa9982ad23d72b9073
sbd-1.36.tar.gz
Posted Sep 21, 2004
Authored by Michel Blomgren | Site tigerteam.se

sbd is a Netcat-clone, designed to be portable and offer strong encryption. It runs on Unix-like operating systems and on Microsoft Win32. sbd features AES-128-CBC + HMAC-SHA1 encryption (by Christophe Devine), program execution (-e option), choosing source port, continuous reconnection with delay, and some other nice features. Only TCP/IP communication is supported. Source code and binaries are distributed under the GNU General Public License.

Changes: New timeout feature added, various tweaks and updates.
tags | tcp
systems | windows, unix
SHA-256 | a15ce468e7e04cc12fe2686e0a44e1201d7c67986681d51e255cba9362ab0676
sbd-1.33.tar.gz
Posted Aug 31, 2004
Authored by Michel Blomgren | Site tigerteam.se

sbd is a Netcat-clone, designed to be portable and offer strong encryption. It runs on Unix-like operating systems and on Microsoft Win32. sbd features AES-128-CBC + HMAC-SHA1 encryption (by Christophe Devine), program execution (-e option), choosing source port, continuous reconnection with delay, and some other nice features. Only TCP/IP communication is supported. Source code and binaries are distributed under the GNU General Public License.

Changes: Added the -s option to have sbd invoke a shell (/bin/sh), nothing else. If sbd is setuid 0, -s will invoke a root shell.
tags | tcp
systems | windows, unix
SHA-256 | 6c8d26a05fe91f44aa4b406966355f89c4057c883dadf7ad576fd9c45decae7b
sbd-1.31.tar.gz
Posted Jun 20, 2004
Authored by Michel Blomgren | Site cycom.se

sbd is a Netcat-clone, designed to be portable and offer strong encryption. It runs on Unix-like operating systems and on Microsoft Win32. sbd features AES-128-CBC + HMAC-SHA1 encryption (by Christophe Devine), program execution (-e option), choosing source port, continuous reconnection with delay, and some other nice features. Only TCP/IP communication is supported. Source code and binaries are distributed under the GNU General Public License.

Changes: Version 1.31 added setuid(geteuid()) code and command line wiping. If sbd is setuid (chmod 4755 or 6755), sbd will do setuid(geteuid()) on Unix-like operating systems. Feature added to offer root shells during pen-tests. Various other enhancements.
tags | tcp
systems | windows, unix
SHA-256 | 04e6578b1f96467b06d686fdee0cf09088505e20956429ebb44582e24d9303b0
sbd-1.27.tar.gz
Posted Jun 14, 2004
Authored by Michel Blomgren | Site cycom.se

sbd is a Netcat-clone, designed to be portable and offer strong encryption. It runs on Unix-like operating systems and on Microsoft Win32. sbd features AES-128-CBC + HMAC-SHA1 encryption (by Christophe Devine), program execution (-e option), choosing source port, continuous reconnection with delay, and some other nice features. Only TCP/IP communication is supported. Source code and binaries are distributed under the GNU General Public License.

Changes: Bugfixes, implemented Christophe Devine's optimized AES-CBC-128 code, added the -n and -m options.
tags | tcp
systems | windows, unix
SHA-256 | f56e71ecee6830fe2b0bc39d1d30c30dd3a96041a625884446a2f2faaf7f6367
sbd-1.23.tar.gz
Posted Jun 10, 2004
Authored by Michel Blomgren | Site cycom.se

sbd is a Netcat-clone, designed to be portable and offer strong encryption. It runs on Unix-like operating systems and on Microsoft Win32. sbd features AES-128-CBC + HMAC-SHA1 encryption (by Christophe Devine), program execution (-e option), choosing source port, continuous reconnection with delay, and some other nice features. Only TCP/IP communication is supported. Source code and binaries are distributed under the GNU General Public License.

tags | tcp
systems | windows, unix
SHA-256 | 086b99467b142c0632c0f1433a0bf9c50e9139b7d53a45c4fe2081b100c0772c
bb.c
Posted Dec 15, 2003
Authored by GML | Site phrick.net

Buffer Builder v1.5 is a tool which assists in building buffer overflow strings for local and remote exploits. Goes well with a disassembler and netcat and contains several useful shell codes.

Changes: Added ability to change offset, cleaned up output, added more byte order parameters, added new shellcodes, fixed $SHELLCODE offset calculation problem on freebsd, and added author strings to shellcode.
tags | remote, overflow, shell, local, shellcode
SHA-256 | 39c3af509337569eee964333a3439de850f8fc3714f170e17d504bf6ee4104ed
iawebmail.pl
Posted Nov 19, 2003
Authored by Peter Winter-Smith | Site elitehaven.net

IA WebMail Server v3.1 and below (iaregdll.dll version 1.0.0.5) remote exploit in perl. Tested against Windows XP Home SP1 and Windows 2000 Pro SP4. Included shellcode downloads netcat and spawns a shell.

tags | exploit, remote, shell, perl, shellcode
systems | windows
SHA-256 | 46b9847fb05761825572db77b563585c6c829d08fe1ddd7ba09ddacbc98ff73b
Page 2 of 4
Back1234Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close