Linux WU-IMAPD 4.1 remote root exploit.
e3a218fa16e6fb76980fa8726376f11d499254027a11f1359b7f1cbf6682251b
Yet another Imapd remote overflow.
c43a603aed41521971bf354ca7740bbd46771fe3281339c85ea4273a7d9b48dc
SunOS 5.4-5.5 statd remote exploit - in perl.
bd7ebae8ad5e5928d82da9b192e8e4a352c9277ff460e4561511c0ae7b227593
Some testing code I put together to try on a friend's old machine, it essentially tries to overflow the DISPLAY variable in X-based programs.
7613d5b29ec47d7d33a9be662b0d6ff29d63ff54026a3473136af5f95fc5b577
remote bind 4.9.x exploit Example for FreeBSD. bug in: bind/named/ns_req.c:req_inquery().
4acad7f7f93b04c0a7f0d62fa91d01af27211872b858473b8eb810848d404a39
Decrypt kmail passwords.
7e993399d9a65ca2cc5bc223c2cb8f869c63566a7362d48d9655645aae5ea67f
Breeze Network Server for NetBSD has numerous serious security holes.
b4a3996f5f27e9eff38454063f92f9f57b933656098400199978291af676012c
perl script designed to scan user directories on AFS file systems running Hesiod name servers, looking for slack user directory permissions.
a2e1e1022cf208cbd585c062713fdad591dce6caf20a42629bb82088bf718de3
perl script designed to scan user directories on AFS file systems running Hesiod name servers, looking for slack user directory permissions. This version includes option to save any or all of the users files to /tmp/userid, and has a nice command line interface.
1babe6dbc4f4397e05aef4db99ad9302368f7ab122aa321ede019f322dc117a7
bounce v0.0.4 - bouncer to use with wingate or socks proxys. This version has non-authenticated SOCKS5 support and SOCKS5 username/password authentication. Written by stok of The c5 Project
de0f834f80e3d081a5a9efdf9e44a6055848569159bd3b5c19444720424f821d
finger bounce bug still exists with Solaris 2.7.
20ac1e7e683bc81921aad3f7cf372c9f2b75cea0fbde0ec9d0f29172fd702db9
sshd2 (version 2.0.11 and older) has a security bug, which allows any eligible user to request remote forwarding from privileged ports without being root.
ceaaa88ac9994df086c6826cc7ac0e6dd34bd711897053d1cf17bd197b1f6b18
3Com HiPer ARC vulnerable to nestea DoS attack.
bd7f98f0ae798177043904b3f1f9d59c9fcc77728c1cac7d7125885b263e0bdb
The software that 3com has developed for running the NMC (network management card) for the Total Control Hubs has hard-coded "adm" login that cannot be deleted, allowing easy unauthorized remote access.
99132980cd994df32ada10bbac98ce13a2e8f498558d0b838e9df5fe8d80b3e1
Test for common CGI security holes.
ea0cb3160c04b01375eca032dac9aefc101ca5e5d7895059656cf37790898399
Exploit code and description of the AIX 3.x and 4.x infod remote root exploit.
0155df1340c23af4ea8bb824b19d0254aa662715b57e9532592b68984690c819
AOL client connects to the AOL server at port 5190, establishing IP tunnel that effectively bypasses corporate firewalls, leaving client exposed to IP-based attacks.
cfa5b759464b21ec36ccd425d947f531d3fd895fa0ebbd9ba1315c74bd308c94
Simple denial of service attack against Windows98/95 Machines - Sends random spoofed ICMP packets similar to a weaker protocol as of ssping or jolt.
652e8e3e65ba962b03ebc37fda78af7a67f73bd503dba0fcbd07a2d603902f86
Linux remote buffer overflow exploit code for bootpd daemon distributed with most flavors of *nix.
09c61f13bf25577f8c66264bd3cca6676282c0b6391584b366c21c1e4287855f
Bootpd Exploit against debian linux 1.3 and 2.0 and possibly others. This version contains the header files needed. Broken ass code fixed by Bronc Buster.
0d21085b3d46e74f95312f8642f1b2067517bd36ef1eb5c31e28af18d49e0868
Bootpd Exploit.
d1c729b53a632c1d74719856dc003b8a3d68e0454c3690ef0d2dc30351cecbbe
Exploitable buffer overflow in bootpd version 2.4.3. All UNIX systems vulnerable, remote root compromise. Other versions of bootpd may be vulnerable also. Exploit code included.
1484629b14c7c825c71d4c84ef690c13193d74393aec71e35faa515a88b06121
bounce v0.0.2 - bouncer to use with wingate or socks proxys. Written by stok of The c5 Project
f9a59060029a0d98058dca19f7b2108a4c0b9fac988e951a0129aa01bc051cfb
Intruders can disrupt service or crash systems with vulnerable TCP/IP stacks. CERT advisory.
65114de65cc53de2c5d5e370cb5f6982463eb94fba907ada159289eee4f56419
Cisco IOS 12.0 security bug, Denial of Service attack. Several versions of 11.x also affected.
0b7bea99d97167b0e1e757f371651045a3b5f328c887261828bfecc83b87b35f