A simple TCP packetlogger/sniffer for Linux which includes background logging.
35c08a7777d1b751a168478dad9d3126b0d7fa46d8d372c1035af3c21843f383
Radical Environments part II - This paper continues where part one left off, detailing a technique in writing 0 bytes when exploiting a local buffer overflow using a non-executable stack with the heap being stored in memory at a virtual address containing a \x00 byte.
004f5ce4295a0c7432dff945d7e66862613b1de871421317eb084f690a1eadb4
Radical Environments part I - A paper that compiles various stack related tips and tricks which discusses how an exploit without nops works.
edb58041e15067b25c301cea23aa6636cce03f73b92887f76abbcf3454343f12
Detailed paper that describe format string vulnerabilities and how to exploit them.
58ebad71f55604ab6a49305de83b658c361377f6b555c59d609be9859e0f83d1
Linux x86 shellcode (31 bytes) which does setuid(0); execve ("/bin/sh",0);
5bf02bc71bb5d4648b9c13d8972996bb9aaf9e36385951be7c76068bf151afac
A small utility that allows you to kill zombie processes on x86 Linux.
a2a77ba73f71c96c56aca603232fa0dd92eeb9a87f9c1116df3870f77bfabbd3
Solaris Sparc shellcode that writes netric was here.
e3af7d99040def573ba17626a6c290811b8d7652264094ec8340fdf45dac57c5
Solaris Sparc shellcode that sets the effective uid to 0 and executes a shell.
b4f74f95b8bd45fe94c359024720079f6ee3e0151ca7a8a1f62db7483e21af68
Recluse 0.1 - A web spidering utility written in Perl that takes a host as input along with a document path.
bce2ab1997ba9c18e5fde1e6438685c5f141e02ff3e5b9d6b004bb8c6c3a71cb
Printer fun is a little utility that allows a remote user to change the "ready message" on printers that support PJL commands. Tested against the HP 4000/4100.
1597a3c0f6c607bd942fd6b507789c22fe0be4e8e9f9a0927f03e25bb26e9fe4
Core grep is a utility that works like grep but was designed to be used against core files.
d20e5c8dc13d0cce1e98db9f2a8559cb03f62d5dee59b44f124f195121335d7e
This utility extracts files from the ramdisk image located in the Alcatel speedtouch home/pro modems. The format of these files had to be reverse engineered.
c1c1002c5d2c54b1cc1a2ba161090170ff969c24ad9f83f1c724d17f6e9ee304
This 137 byte Linux shellcode creates a remote ICMP backdoor that can be controlled trough the ping utility.
9b7f1bf697b9a01fb4663131fe0f9e6fccb1296052337e0f27f72333d60f55df
Netric Firewall Package - iptables release. This tool enables administrators to easily implement a solid firewall for iptables.
778c4cb9283f25febd472ac8a8118e5c4e02184aff15bd4e66752a4a5c7f29ec
Null httpd 0.5.0, a small multi-threading HTTP server, contains a remote exploitable heap overflow. Exploit code for Null httpd servers running on Red Hat Linux 7.3 is included in the advisory and can be used to spawn a remote root shell. In Null httpd version 0.5.1 this vulnerability has been fixed.
95d76e6b92f65447e7530f675554f162ca32748533586a45c71c64acd8977618
Atftp tftp server v0.6 and below contains multiple exploitable stack overflows. Includes local exploit.
bb7bf00e211f49a798a097f40519d7f866c03973f54108b0f2b7732def3437fa