Remote exploit for miniSQL version 1.3 and below that achieves privilege escalation root gid.
e3637acdc0aea734e04f3ed1cd756e1015ef7c75c0c7bf4b03ee10155c796dc7
Radical Environments part II - This paper continues where part one left off, detailing a technique in writing 0 bytes when exploiting a local buffer overflow using a non-executable stack with the heap being stored in memory at a virtual address containing a \x00 byte.
004f5ce4295a0c7432dff945d7e66862613b1de871421317eb084f690a1eadb4
Radical Environments part I - A paper that compiles various stack related tips and tricks which discusses how an exploit without nops works.
edb58041e15067b25c301cea23aa6636cce03f73b92887f76abbcf3454343f12
Detailed paper that describe format string vulnerabilities and how to exploit them.
58ebad71f55604ab6a49305de83b658c361377f6b555c59d609be9859e0f83d1
Linux x86 shellcode (31 bytes) which does setuid(0); execve ("/bin/sh",0);
5bf02bc71bb5d4648b9c13d8972996bb9aaf9e36385951be7c76068bf151afac
Local exploit for /usr/X11R6/bin/ascdc v0.3-2-i386 which overflows the -c switch.
369413df47f94becaec9f4e8410f671ac2ad5558dfd1fab00aa597cde7c8de5d
Progress Database Server v8.3b local root exploit - Tested on Sco Unix and Linux.
100a970028aac2a1194ba986a81b6e2e4aec519e82a37df1992d7a51e4ecc4c0
Apcupsd v3.7.2 local denial of service attack. Can kill any running daemon.
98d94708575e0137e9354e702878bc24ca1f6d27866f241f5fccddfd8e165f5b