Very effective Synflood DoS attack ported to Solaris platforms.
86cf8b2b6185f856a8c69e35d9aa72c823a1739481249f61d63f5e826f735f79
Retrives netbios name from remote Windog (as described in Hobbit'sdocument cifs.txt).
9515a0eac392da0e50348f61ecbed9379abac534c5d58f10f1df17a1f65495ff
Sample daemon, which hooks on the UDP ports, listens and records all incomming packets. (could play ping/pong with them as well).
71e3388678985937115e6aaa064151ee448bc7abe69b7905578d2a4df1e85adf
All versions of USR TotalSwitch have backdoor easily accessible by anyone.
ce4f4e6aa34e7f88e5790ea282a57c5d9aa6d9983c4e2179049fca008fd2b1f2
ValueClick CGI Vulnerability - The ValueClick Online Advertising agency web interface has a CGI vulnerability that allows easy username/password capture without using sniffing software, leaving user accounts vulnerable.
5fad938d5e9332f296da07067591827ce0b71dba380b78ad6eb40bcc70a74d23
bnc remote buffer overflow for linux x86 (w/o stack-non-exec patch), works on versions < 2.4.4.
8805b778e8639c84d22651f4819eef14e260a1c9f36129be631e50bba032a509
Web Spoof - Works as a normal command line web retrieval script, except will spoof the referer. This will bypass any kind of reference checking, in most cases, showing once and for all that referer based security doesn't work.
7296b78f206f6938129a2d08fc84aa87c7beae92355a644eb87a3e5d028e1fce
When wordperfect 8 is installed it creates a /tmp/wpc-(hostname) directory with permissions 777, and all files inside of it are mode 666. If WP8 is installed by root, then you just got serious security problems.
c8a8987122006915fce406536a047e59814ec133ddb65afa8862063a7bf5939b
Yahoo Pager - security bug w/ services #7 and #8 allowing malicious user to activate/deactivate any identity.
bdf06f779507b514c97a9e64cc8930d1e8a43702bb5dbd2913906b42282510a3
Convert IPs to 32bit numbers to exploit MSIE intranet/internet 32bit security bug.
326f9a15025b8a6ffa42132258fa3896cbb39e8fe759cbd197f65e101700a394
DoS attack comes from a poor implementation of AOL Instant Messenger's warn "feature."
e7967529b8707a5def70854cff7ca809673184365c6f1b50d092caa9eccb4b2e
AIX infod vulnerability can result in local root compromise.
a8ffecf8d88dd262fd2594bb583dc2faa50ad50aa733f10936cdb2814f01cb16
buffer overflow condition in AIX 4.2/4.1/? when the shell variable LC_MESSAGES is long enough.
103ea19cb527277842d3dd3bb20b3f14f9f0bd1b02207d703a724b9b6be17f8f
AIX 4.2,(others?) dtaction and HOME exploit that spawns a root shell.
1ac437d1677cf0384f1f7de36f7e24345f6528b93186858140a87185f041e488
buffer overflow in /usr/sbin/lquerylv which spawns a root shell under AIX 4.2, probably 4.x,3.x.
81b8de5c637ccced3cfd8378513947dc6d9f7838e263300aa32fdc9c43b6f8b8
assembly code to reboot a Linux x86 box.
bec821694f807eb5fc78a95fd6ece6452b5afe5a8c50a6600a6c71476768437f
Backdoor daemon that binds a shell to the port of your choice on any machine.
583b62f117e2e7e8fa6b1fe9b1d40973d1c8ca04144a3db0761f6024702711db
BIOS Backdoor Password insecurities. Check out our collection of BIOS passwd crackers
b73f1970298563b2fa0f8600daad77668a6763725e50c5dfdee6aa7e0ac801fa
Browser exploit source code for several platforms.
3c1665e5c69c9a1063a079a5dc9000eabedf0354a164353f9ed5674fb4623f22
No information is available for this file.
483f89f0620eac86e267810a32d7877d7f10f17f6a0c112f52ed29c07fa70a1d
changes mode on /etc/passwd to 777, making it writeable by anyone.
6cd07f3b5f4919c3c73986bb608ee3c4837e38f0eb92185688ed6619f78b8fb9
The Son of Cuartango Hole - new version of "Untrusted Scripted Paste" security hole allows remote web site to grab files from your computer. Defeats latest Microsoft patches.
fef0ae6636d356d7478b82a01566f6283767377789bff92bf9dbd3837e33e6e3
Dillon's Crond v2.2 exploit - buffer overflow in Slackware's /usr/sbin/crond in the fdprintf() function from subs.c.
ad7ee9e392ade8b0f643224f1d40aa4528e0fe1a9c713014423a64ea4a105e25
Solaris 2.6 /usr/dt/bin/dtappgather still contains a security hole.
47c4d7ab720126db720e53ce668f92b83d853d1756f79fc594541ecf4b22297c
Dwarf is a backdoor server that uses challenge-response based authentication.
ccaaea4235c5f9acb45a4890c2a8bbef0ee5e1a2ed1bd91e212b788bf8cc10d6