Section:  .. / 0209-exploits  /

Page 3 of 3
<< 1 2 3 >> Files 50 - 73 of 73
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: SSL-scan.tar.gz
Description:
Apache + OpenSSL v0.9.6d and below exploit for FreeBSD. Tested on FreeBSD 4.4-STABLE, FreeBSD 4.4-RELEASE, FreeBSD 4.5-RELEASE, and FreeBSD 4.6-RELEASE-p1 with Apache-1.3.26 and Apache-1.3.19. Modified to brute force the offset from openssl-too-open.c. Includes scanners. WARNING: The binaries in this archive are infected with the ELF_GMON.A virus which sets up a backdoor on UDP port 3049. Updated by CrZ and Ech0. Notice: Previous versions of this .tar.gz (before 3-11-03) had several binaries infected with the linux.osf.8759 virus. This tar contains both cleaned and infected binaries, with the cleaned ones running by default.
File Size:167196
Last Modified:Mar 12 06:25:12 2003
MD5 Checksum:f210224fbf3fbc145f3e84ab7c844ed1

 ///  File Name: SurfinGate.txt
Description:
The Finjan SurfinGate 6.0x on Windows NT 4.0 and 2000 can be bypassed by using IP addresses instead of hostnames or by adding a dot to the end of hostnames.
Author:Marc Ruef
Homepage:http://www.computec.ch
File Size:2471
Last Modified:Sep 5 08:59:30 2002
MD5 Checksum:1458603dc6c13802ef082062b929b537

 ///  File Name: sws_web_killer.c
Description:
Proof of Concept Exploit for SWS Web Server v0.1.0. The SWS web server will re-spawn its process every time it receives a string without a linebreak. Tested on: Slackware 8.1 and Redhat 7.0.
Author:SaMaN
File Size:2157
Last Modified:Sep 2 18:32:39 2002
MD5 Checksum:b4f2224f7060b64ce3e013d5f258a859

 ///  File Name: sx-slap.pl
Description:
Remote / Local buffer overflow for Savant Web Server 3.1 and below, as described in Foundstone advisory 091002-SVWS. Crashes the daemon, no patch is available as of the 11th of Sept, 02.
Author:NTFX
Homepage:http://legion2000.security.nu
File Size:1106
Last Modified:Sep 12 14:22:18 2002
MD5 Checksum:727c37f6b87d09e49e5738313b20ce83

 ///  File Name: targets.319
Description:
List of targets for the x2 remote crc32 ssh exploit which contains 319 entries.
File Size:34692
Last Modified:Sep 11 16:31:01 2002
MD5 Checksum:d6d6df1179ca1c74160efd5cdeb5b0c0

 ///  File Name: teo-openssl-xpl.tgz
Description:
Teolupus OpenSSL Exploiter is an automated OpenSSL vulnerability scanner able to find, log and exploit a server "without human intervention". It is based on Nebunu apscan2 but has much more targets. Includes openfuckv2 and openssl-too-open both with more than 130 targets.
Author:Teolupus
File Size:146641
Last Modified:Oct 21 04:42:57 2003
MD5 Checksum:b05e333e5fa377ca6c476149ed50c8e9

 ///  File Name: trillian-ini-decrypt.c
Description:
Trillian, a popular utility used in conjunction with various Instant Messaging like ICQ, AIM, MSN Messenger, etc, stores a User's password utilizing a simple XOR with a key that is uniform throughout every installation. This utility decrypts all related .INI files displaying a list of usernames, "encrypted" passwords, and plain text passwords.
Author:Evan Nemerson
File Size:5538
Last Modified:Sep 10 06:53:31 2002
MD5 Checksum:8f33c678cbd7adb091aaa4b1764a89ce

 ///  File Name: Trillian-Privmsg.c
Description:
Exploit for the PRIVMESG DoS that exists in several Trillian versions. This code, which emulates an IRC server, should work against Trillian version 0.73 and 0.74. Compiles on Windows - Tested with Borland 5.5 Commandline Tools.
Author:Lance Fitz-Herbert
File Size:2377
Last Modified:Sep 20 16:32:58 2002
MD5 Checksum:b8200c45f1819c16c6c76345ee427d53

 ///  File Name: trillident.c
Description:
Exploit for the PRIVMESG remote denial of service vulnerability that exists in Trillian v.73 and .74 which sends an overflow in the ident connection. Compiles on Unix based OS's.
Author:Netmask
File Size:4665
Last Modified:Sep 21 09:35:05 2002
MD5 Checksum:73cffa14787d80bf5655dc7c2ecb1125

 ///  File Name: TRU64_dtaction
Description:
Proof of concept local root exploit for dtaction on the HP/Compaq Tru64 Operating System. HP/Compaq advisory and patches available Here.
Author:stripey
Homepage:http://www.snosoft.com/
File Size:995
Last Modified:Sep 11 07:10:28 2002
MD5 Checksum:bad813771eedaf4767d6244cfb4ba69c

 ///  File Name: TRU64_dtprintinfo
Description:
Proof of concept local root exploit for dtprintinfo on the HP/Compaq Tru64 Operating System. HP/Compaq advisory and patches available Here.
Author:stripey
Homepage:http://www.snosoft.com
File Size:992
Last Modified:Sep 11 07:15:10 2002
MD5 Checksum:7e52f96fd8503185cc33cb015befcb06

 ///  File Name: TRU64_dtterm
Description:
Proof of concept local root exploit for dtterm on the HP/Compaq Tru64 Operating System. HP/Compaq advisory and patches available Here.
Author:stripey
Homepage:http://www.snosoft.com
File Size:1037
Last Modified:Sep 11 07:17:34 2002
MD5 Checksum:fbc1785d31e44f9c9588303d7828137f

 ///  File Name: TRU64_dxterm
Description:
Proof of concept local root exploit for dxterm on the HP/Compaq Tru64 Operating System. HP/Compaq advisory and patches available Here.
Author:stripey
Homepage:http://www.snosoft.com
File Size:901
Last Modified:Sep 11 07:20:02 2002
MD5 Checksum:dcff3ccecc59db66d33b935d1b1113d9

 ///  File Name: TRU64_nlspath
Description:
Proof of concept local root exploit written in Perl for NLSPATH overflow on the HP/Compaq Tru64 Operating System. HP/Compaq advisory and patches available Here.
Author:stripey
Homepage:http://www.snosoft.com
File Size:2859
Last Modified:Sep 11 07:27:31 2002
MD5 Checksum:dee2152324a9cc4b106b58e6c131dfef

 ///  File Name: TRU64_su
Description:
Another version of the proof of concept local root exploit for su on the HP/Compaq Tru64 Operating System. HP/Compaq advisory and patches available Here.
Author:stripey
Homepage:http://www.snosoft.com
File Size:946
Last Modified:Sep 11 07:36:28 2002
MD5 Checksum:f587978781a3655004ef60d6595781ee

 ///  File Name: TRU64_xkb
Description:
Proof of concept local root exploit for _XKB_CHARSET on the HP/Compaq Tru64 Operating System. HP/Compaq advisory and patches available Here.
Author:stripey
Homepage:http://www.snosoft.com
File Size:2175
Last Modified:Sep 11 07:38:22 2002
MD5 Checksum:b7d1b4f1d2f36cd4d8925080798e18fd

 ///  File Name: unishell.pl
Description:
Unicode IIS exploit in perl. Tries 20 ways.
Author:Pakk.
File Size:10904
Last Modified:Oct 22 08:58:42 2002
MD5 Checksum:b31f98e1ede92b439df11826c886cdd8

 ///  File Name: upb.admin.txt
Description:
Ultimate PHP Board (UPB) prior to Public Beta v1.0b allows users to gain admin access. Exploit information included.
Author:Hipik
Homepage:http://www.hackeri.org
File Size:2155
Last Modified:Sep 6 07:47:23 2002
MD5 Checksum:b062b12a3b4fcbc8784d6ef88b87722a

 ///  File Name: vbull.c
Description:
Vbulletin/calender.php remote command execution exploit.
Author:Gosper
File Size:4075
Last Modified:Sep 25 07:53:47 2002
MD5 Checksum:0569a0851a81caa5f67a940a3af6fe2d

 ///  File Name: woltlab.txt
Description:
Woltlab Burning Board 2.0 RC 1 has a vulnerability that allows any user (even guests, depending on the configuration) to compromise every other account due to a variable containing unchecked user input in board.php, which can be used for a sql injection attack.
Author:Cano2
File Size:1959
Last Modified:Sep 11 08:30:05 2002
MD5 Checksum:f6e418e576a98c54acfc3e3af0967bb9

 ///  File Name: wuscan.tgz
Description:
Wu-ftpd 2.6.1 mass rooter / scanner.
Author:Daddy_cad
File Size:183110
Last Modified:Sep 7 02:32:43 2002
MD5 Checksum:eb2b86497f9b9f51773beea85d15123a

 ///  File Name: zyxbrut.c
Description:
Zyxbrut.c is a brute force program written for the ZyXel router telnet service.
Author:BetaFly Computer Team
File Size:2066
Last Modified:Dec 14 15:27:54 2002
MD5 Checksum:aa0507fb1ed8677a43d8e629ad4d5380

 ///  File Name: zyxbrut.c.orig
Description:
Unavailable.
File Size:2066
Last Modified:Dec 14 15:27:54 2002
MD5 Checksum:aa0507fb1ed8677a43d8e629ad4d5380