accept no compromises
Showing 1 - 3 of 3 RSS Feed

Files

hst.tar.gz
Posted May 1, 2004
Authored by BlackAngels | Site blackAngels.it

Scanner for webservers that checks for various CGI and other httpd related vulnerabilities.

tags | cgi, vulnerability
MD5 | bc462741450192c9abceea244f3fcf6b
lboeg.pl.txt
Posted May 1, 2004
Authored by BlackAngels | Site blackAngels.it

Local buffer overflow exploit generator for Linux, BSD, BSDi, HP-UX, UnixWare, IRIX and SCO.

tags | overflow, local
systems | linux, irix, bsd, hpux, unixware
MD5 | cb5cbdcd5c17d8e59d12c37a65fc4867
plem.tar.gz
Posted May 1, 2004
Authored by BlackAngels | Site blackangels.it

Perl Loadable Exploiting Module (PLEM) is an advanced module for Perl programming that provides a list of common functions for local and remote exploit coding.

tags | remote, local, perl
MD5 | 578dd55e75fbb8b39a3f068d5198f707
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Millions Of High Security Crypto Keys Crippled By Newly Discovered Flaw
Posted Oct 16, 2017

tags | headline, flaw, cryptography
Pizza Hut Latest To Be Hit In Card Data Breach
Posted Oct 16, 2017

tags | headline, hacker, privacy, bank, cybercrime, data loss, fraud
Artificial Intelligence - Hype, Hope, And Fear
Posted Oct 16, 2017

tags | headline, botnet, cyberwar
KRACK Attacks: Breaking WPA2 By Forcing Nonce Reuse
Posted Oct 16, 2017

tags | headline, privacy, phone, wireless, flaw, cryptography
Even Pokemon Go Was Used By Russia To Meddle In The Election
Posted Oct 13, 2017

tags | headline, government, usa, russia, cyberwar
US Voices Frustration With Warrant-Proof Encryption
Posted Oct 13, 2017

tags | headline, government, privacy, usa, cryptography
An Unknown Hacker Stole Sensitive Data On Australia's War Planes
Posted Oct 13, 2017

tags | headline, hacker, government, australia, data loss, cyberwar
Legacy Office Feature Used In Novel Document Attacks
Posted Oct 13, 2017

tags | headline, hacker, malware, microsoft, flaw
Equifax Rival TransUnion Also Sends Site Visitors To Malicious Pages
Posted Oct 12, 2017

tags | headline, malware
The Myth Of Responsible Encryption: Experts Say It Can't Work
Posted Oct 12, 2017

tags | headline, government, backdoor, cryptography
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close