exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

HHP Programming

HHP Programming
hhp-site_unp.js.txt
Posted Nov 13, 2001
Authored by hhp, Isox | Site hhp-programming.net

Site Protector v2.0 password deciphering tool coded in javascript.

tags | javascript
SHA-256 | cc76f4e8ea690abe4502ce4187b490cad701361c15abccedeaa787a2e3c2e703
TEA-ICommandLine.tar.gz
Posted Sep 11, 2001
Authored by hhp, Tarsin | Site hhp-programming.net

The TEA (Tiny Encryption Algorithm) is a Feistel type cipher; The block is split into two parts, each being 32 bits, 128 bit key, and by default uses 32 rounds.

SHA-256 | 6b04bcdb8e2be37013dfaf33f81b10103ea0d42817c21a02d573ffd006dc5e67
hhp-pileup_smash.c
Posted Sep 11, 2001
Authored by hhp, Cody Tubbs | Site hhp-programming.net

A local buffer overflow exploit for pileup v1.1 and maybe others. Will gain root[uid=0].

tags | overflow, local, root
SHA-256 | 03ec951fe5e15a9672e1681575352a376e8e0714adebdcf27018783bce3aee5e
hhp-sccw_smash.c
Posted Sep 11, 2001
Authored by hhp, Cody Tubbs | Site hhp-programming.net

A local buffer overflow exploit for sccw v1.1 and maybe others. Will gain root[uid=0].

tags | overflow, local, root
SHA-256 | d1d7ed798702a71cff032aca0dd11741f3f394e38171c2bbc7a8a1538a4d3b4d
hhp-temprace6_0.pl
Posted Sep 11, 2001
Authored by hhp, Cody Tubbs | Site hhp-programming.net

Hhp-temprace6_0.pl is a quick and simple temp race checker for Linux, BSD, Sun/Solaris and IRIX. Put together to eliminate the hassle of manual checking.

systems | linux, solaris, irix, bsd
SHA-256 | 3a7b01350b0436ef102a74f1abf29d166c13d069a577ab60fb104dd82412538d
tcpproxy.c
Posted Sep 11, 2001
Authored by hhp, Cody Tubbs | Site hhp-programming.net

A tcp proxy.

tags | tcp
SHA-256 | b0e839102eb66e7fc5fc5e7f23927805b2ddb3b1481a6501192d10905931f47b
chanshell0_1_4.pl
Posted Sep 11, 2001
Authored by hhp, Cody Tubbs | Site hhp-programming.net

Chanshell is somewhat like an IRC bot with bash capabilities.

tags | bash
SHA-256 | 3d880f15c213c19a4f991c1552cf109daeb6f9cb0553e74114dfaf70036083a1
pro-sec.txt
Posted Sep 11, 2001
Authored by hhp, Cody Tubbs | Site hhp-programming.net

Programming and Programming Securely - How to do it. Includes information on argument checking, buffer checking, shell escapes, preventing races, logging, sly tricks, and more.

tags | shell
SHA-256 | edb8b73394fff8565bcf46d4f90e36e6624ac18ea964a4c8dc669891dc5b6a62
docanal.c
Posted Sep 11, 2001
Authored by hhp, Tarsin | Site hhp-programming.net

A document Analysis tool which is useful for cryptanalysis. From May '98.

SHA-256 | 8024662cda4203693c125747c6a763cff1085e773ab5485c9fe0b23f1c2232b7
hhp-webinfo.pl
Posted Dec 31, 2000
Authored by Loophole, hhp | Site hhp-programming.net

This little utility will use a public service (netcraft) to check the web server version and operating system of a remote host.

tags | remote, web
SHA-256 | 9daeb72af38ace3ab3f9e5d03f959dc534f506d19b3bca2a347b14881c7f11c5
hhp-knock_shellcode.c
Posted Dec 31, 2000
Authored by Loophole, hhp | Site hhp-programming.net

Shellcode which plays audio (knock knock) vi /dev/dsp and setreuid(0,0) + execve shellcode for Linux/x86.

tags | x86, shellcode
systems | linux
SHA-256 | a45331428e22c886119ae7325c4e640708d51d8be28eb45a5a5c17f3fa5b13a9
hhp-dtors.pl
Posted Dec 31, 2000
Authored by Loophole, hhp | Site hhp-programming.net

Generic ELF .dtors exploit.

SHA-256 | 7e4fcc9e325b71ea4dd0f30de481f4eb9dcb0403da041f927b6e200a7a9d57d4
hhp-genchains.pl
Posted Dec 31, 2000
Authored by Loophole, hhp | Site hhp-programming.net

Ipchains firewall frontend - Prompts enabled.

SHA-256 | 79f4d5c6dd2281fff7d8406580199d4e0cd4abdc137d8e7af428569d2d60ced3
hhp-dump.pl
Posted Dec 3, 2000
Authored by hhp, Icesk | Site hhp-programming.net

A local root exploit for /sbin/dump. Tested on RH6.2.

tags | local, root
SHA-256 | 966cbbdeb7805adb5c2121b34a3d4ff536fbe8d9e2b18c9352b9fde122d9b4b0
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Google Patches Critical Chrome Vulnerability
Posted Apr 24, 2024

tags | headline, flaw, google, patch, chrome
Hackers Are Using Developing Countries For Ransomware Practice
Posted Apr 24, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
Authorities Investigate LabHost Users After Phishing Service Shutdown
Posted Apr 23, 2024

tags | headline, cybercrime, fraud, phish
Windows Vulnerability Reported By The NSA Exploited To Install Russian Malware
Posted Apr 23, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar, spyware, nsa
UnitedHealth Admits Breach Could Cover Substantial Proportion Of People In America
Posted Apr 23, 2024

tags | headline, hacker, privacy, data loss
Microsoft DRM Hack Could Allow Movie Downloads From Streaming
Posted Apr 23, 2024

tags | headline, microsoft, flaw, pirate
Over A Million Neighbourhood Watch Members Exposed
Posted Apr 23, 2024

tags | headline, privacy, britain, data loss
MITRE Hacked By State Sponsored Group Via Ivanti Zero Days
Posted Apr 23, 2024

tags | headline, hacker, government
Russia's Sandworm APT Linked To Attack On Texas Water Plant
Posted Apr 18, 2024

tags | headline, malware, usa, russia, cyberwar, scada
EU Tells Meta It Can't Paywall Privacy
Posted Apr 18, 2024

tags | headline, government, privacy, facebook, social
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close