Remote exploit for miniSQL version 1.3 and below that achieves privilege escalation root gid.
e3637acdc0aea734e04f3ed1cd756e1015ef7c75c0c7bf4b03ee10155c796dc7
A simple TCP packetlogger/sniffer for Linux which includes background logging.
35c08a7777d1b751a168478dad9d3126b0d7fa46d8d372c1035af3c21843f383
Radical Environments part II - This paper continues where part one left off, detailing a technique in writing 0 bytes when exploiting a local buffer overflow using a non-executable stack with the heap being stored in memory at a virtual address containing a \x00 byte.
004f5ce4295a0c7432dff945d7e66862613b1de871421317eb084f690a1eadb4
Radical Environments part I - A paper that compiles various stack related tips and tricks which discusses how an exploit without nops works.
edb58041e15067b25c301cea23aa6636cce03f73b92887f76abbcf3454343f12
Detailed paper that describe format string vulnerabilities and how to exploit them.
58ebad71f55604ab6a49305de83b658c361377f6b555c59d609be9859e0f83d1
Linux x86 shellcode (31 bytes) which does setuid(0); execve ("/bin/sh",0);
5bf02bc71bb5d4648b9c13d8972996bb9aaf9e36385951be7c76068bf151afac
Linux LKM that disables ptrace abilities in the 2.4.x kernels.
1d8cb9eedc847c0da5391b758eba2303658fc96887860ddadb104e0b904b66df
A small utility that allows you to kill zombie processes on x86 Linux.
a2a77ba73f71c96c56aca603232fa0dd92eeb9a87f9c1116df3870f77bfabbd3
Solaris Sparc shellcode that writes netric was here.
e3af7d99040def573ba17626a6c290811b8d7652264094ec8340fdf45dac57c5
Solaris Sparc shellcode that sets the effective uid to 0 and executes a shell.
b4f74f95b8bd45fe94c359024720079f6ee3e0151ca7a8a1f62db7483e21af68
Recluse 0.1 - A web spidering utility written in Perl that takes a host as input along with a document path.
bce2ab1997ba9c18e5fde1e6438685c5f141e02ff3e5b9d6b004bb8c6c3a71cb
Printer fun is a little utility that allows a remote user to change the "ready message" on printers that support PJL commands. Tested against the HP 4000/4100.
1597a3c0f6c607bd942fd6b507789c22fe0be4e8e9f9a0927f03e25bb26e9fe4
Core grep is a utility that works like grep but was designed to be used against core files.
d20e5c8dc13d0cce1e98db9f2a8559cb03f62d5dee59b44f124f195121335d7e
This utility extracts files from the ramdisk image located in the Alcatel speedtouch home/pro modems. The format of these files had to be reverse engineered.
c1c1002c5d2c54b1cc1a2ba161090170ff969c24ad9f83f1c724d17f6e9ee304
Gespuis acts as an irc bouncer and exploits BitchX/Epic clients spawning a bindshell.
dd15eaa198ba5124d4a8fee6a3430072539d129c6f1f74f1e39e66f5101144cb
This 137 byte Linux shellcode creates a remote ICMP backdoor that can be controlled trough the ping utility.
9b7f1bf697b9a01fb4663131fe0f9e6fccb1296052337e0f27f72333d60f55df
Xsun-expl.c is a local exploit for the SPARC architecture that makes use of the Xsun -co heap overflow found in April, 2002 on Solaris 2.6, 7, and 8.
97e55a2ca5d9e617ff856cd2414f020155d9ce6262a00ab465fbed2df4dbfdb0
Netric Firewall Package - iptables release. This tool enables administrators to easily implement a solid firewall for iptables.
778c4cb9283f25febd472ac8a8118e5c4e02184aff15bd4e66752a4a5c7f29ec
Remote root exploit for Linux systems running Null httpd 0.5.0. Tested to work against Red Hat Linux 7.3.
f3ad09d77c82a11ae03bbf3d43ee72abb5ba62e08fc75bd608fa3668f74758b5
Null httpd 0.5.0, a small multi-threading HTTP server, contains a remote exploitable heap overflow. Exploit code for Null httpd servers running on Red Hat Linux 7.3 is included in the advisory and can be used to spawn a remote root shell. In Null httpd version 0.5.1 this vulnerability has been fixed.
95d76e6b92f65447e7530f675554f162ca32748533586a45c71c64acd8977618
Atftp tftp server v0.6 and below contains multiple exploitable stack overflows. Includes local exploit.
bb7bf00e211f49a798a097f40519d7f866c03973f54108b0f2b7732def3437fa
BSD x86 shellcode which does a seteuid(0,0); execve /bin/sh; exit.
5ebf0df299333aa85731a40589283c24601e346f27eb4c85540bbcb350879e59
150 byte BSD shellcode that binds /bin/sh to tcp port 30464.
46e90d484abaafeadeec0338ba23c502fab10692f9aa3c7a492fd88c113aa870
Linux x86 shellcode which does a seteuid(0,0); execve /bin/sh; exit.
6cc8b3b1f1020f760ddff5d729e18b3d55edc7d5fa9c559ca025ce8ea9f1a718
156 byte linux shellcode which binds /bin/sh to tcp port 30464.
b673fd25cac28c5448d67490da248acb6b14e2332d2e066519529e9e342170a0