congestant.c - demonstration of sniffer/ID defeating techniques.
6a933cde69a750a571dd4dd56d43f6e750fc27a1571f382f35ea9954c50909ce
Security Flaw in Cookies Implementation by Netscape and MSIE browsers. There are several privacy, security, and efficiency implications resulting from this bug. Read the enclosed document and exploit code for details.
2e5cc6e698f7717183fdcb7332cba4aa4541f4784a67bed0b71ea1d571a5dccc
IRC DCC CHAT/SEND/RECEIVE sessions can be hijacked in popular IRC clients, leaving open connections without any IP control; many exploit possibilities.
b4a22b9ed7b5ff2cfcb99a560403283fd482f37b7ab8c9433202fabf4b8b4c4c
One or more operating systems, popular for use in intelligent embedded controllers or PLCs (Programmed Logic Controllers), may have network protocol stacks which are vulnerable to certain classes of ICMP Redirect attacks. Vulnerable controllers are prone to hang or shutdown shortly after receiving the attacking packets. The failure can extend even to their non-network functionality and can cause the controlled equipment to fail. In other words, you can hack HVAC equipment, medical equipment, etc.... anything but your toaster, unless your entire house runs on NT of course, and everything is connected to a general-purpose TCP/IP network.
aaa2ae0319017d447599c1e7ee63aa0ed61ab901a93eb2c294e7bf74f21dac42
Remote exploit for Excite for Web Servers v1.1.
fdbb228cb81319489f7c93f381359ee91761d618b948b4f15aed17a050b1fefa
Exploit code that occasionally crashes FreeBSD; exploits tcp/ip flaw with bof.
33476ecadd045d9953d5f7696cf9a509e56d2656b074b6bcb399c00cf3c9b48b
This is a brute force hacker for Hotmail (written in Java).
6cf9c676e7add047fa92a6def7076af96a6134e192afd3121b4c54b212871098
The Gran-Son of Cuartango Hole - Another MSIE exploit in which your files can be grabbed by malicious remote web site/code.
2d9d04461a4f028835b9cdb7c019df3df205685c002bcda22e195fd19135d592
HP JetDirect TCP/IP problems result in security flaws in which older TCP/IP implementations on HP JetDirect cards and servers are vulnerable to a wide variety of Denial of Service (DoS) attacks. Newer JetDirect interfaces also have serious weaknesses.
8ccb6b28cf71539727b87ee8292783825d3d577614d43a26ee80d78d1e9a4475
code used for OS fingerprinting via icmp mask.
a46e3da2995476d48c15721c537ef35d28e2fec0948f776da5132111b96c0db6
code used for OS fingerprinting via icmp time.
ffc8be17e46b8ec95a05eed2d533e97b820148f6da021b6efdeea3bf7d227622
Denial of Service attack against MS IIS 3.0 and 4.0 can be executed by simply sending specially-malformed GET requests to IIS web server.
2d40e60aa557c1ae3fd2cec7e9b1a1a76c883be4daf53081a4f0ba4cb639299b
Simple remote DoS attack on iParty chat servers.
675014e7791e0c677160cabc39b4978fee51b1150f0e0d717bdd2d9ff0ae5084
IRIX's (versions 6.4, 6.5 and 6.5.2) fcagent daemon is vulnerable to a Denial of Service attack, which involves sending a specific RPC packet to the fcagent daemon.
4b7cd0ae9439fbb26e8e8cd428eecf4bb11b41bcf64331d0d8dc7533366cd1ef
i386 Solaris root exploit for /usr/openwin/bin/kcms_configure
aeb73f09520ad57d1d506f238cf820a0e5d02c6bea2589c7d4b4bff6d79aad12
inetd-based exploit tool that opens hundreds of connections to a remote host in a matter of seconds, killing the service(s) of your choice.
b0c3b72270898e956ac7fafff44917bfbbbf9c8744b08e47a571feb35beba93e
Simple Denial of Service attack against LICQ (Linux ICQ clone). Thanks for the heads-up, Spikey.
1733336690972f19a944e21884cb4123796daeba3a78f482c29ca4e323833576
LPortFuck v1 - Denial of Service attack similar to octopus.c; as crude as the title of the program, but effective.
7a0c0a706d5db7f404b02d5d4aae5b992e584b853fe62b3eadd7f2e3dd9ac3ff
DoS attack, and maybe worse, present in Apple MacOS 8.5.1 "Web Sharing".
aed7c32d95b5b5b2c61dcb1e6515a3f62876f67545fb30ede8c69fd9d587e019
+++ATH0 Attack - This program simply implements a spoofable version of the +++ATH0 modem bug attack. Contains modem patch string too.
d502e71877d0f112231a5674b7cb5d0f144488ae19389137feedf8055d583e8b
Murderkill Deluxe V2.0 - Latest release of a nice packaged suite of modern DoS tools with perl and shell scripts that automate the process of launching multiple attacks at once. Great tool for testing entire subnets for vulnerabilities.
0b1dc291575c6b11e95d3fc45524d919dca59edaef5342508ccaa15d7f145bde
Microsoft Vulnerability - Excel macros can execute DLL functions without user intervention or knowledge.
13aa4fff7da602615fab342aa7b5bdc0043cee2e5ebe3143a70418cd041ace16
MSIE "Frame Spoof" Vulnerability that could allow a malicious web site operator to impersonate a window on a legitimate web site. The threat posed by this vulnerability is that the bogus window could collect information from the user and send it back to the malicious site.
f70de6b60c34ca6f849cb8854732524b6819b80a8fe1d596ac44e693129d22d1
Microsoft's Network Monitor susceptible to Denial of Service attack, executed by sending a NetBIOS session request from a machine whose NetBIOS Scope ID is 190 or more characters.
d4eda89bb6ead451500e62e14abb9f1c1bedf527ffc43790de1492a5a6e7df55
MSProxy 2.0 can be used to attack hosts on internal network - Microsoft's Proxy server 2.0 can be used as a "gateway" to attack local networks from the outside, bypassing the proxy, even if IP forwarding is not enabled.
5d2caf438ec00d663b749bf7c9840558a524af2ab53c80e82f40c39d6562b497