exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files from Gunzip

First Active2003-01-05
Last Active2003-11-08
webscan_0.1.0.tar.gz
Posted Nov 8, 2003
Authored by Gunzip | Site members.xoom.it

Webscan is a web site fuzzer that checks for remote vulnerabilities such as sql injection, cross site scripting, remote code execution, file disclosure, directory traversal, php includes, shell escapes, and insecure perl open() calls.

tags | remote, web, shell, perl, php, vulnerability, code execution, xss, sql injection, fuzzer
SHA-256 | eafcdbf028f048e0942fbbf8b91c58bc7470b0555231101283ddfcebf8e7b45f
xtokkax.c
Posted Aug 5, 2003
Authored by Gunzip

Linux and BSD x86 local exploit for xtokkaetama that gives egid of games.

tags | exploit, x86, local
systems | linux, bsd
SHA-256 | b520af024cb9003b4e1a42a73b3409332209fffab5a67095c1e394f14a9b173b
linux86-udpcode.c
Posted Jun 29, 2003
Authored by Gunzip | Site members.xoom.it

Linux x86 UDP shellcode. Reads from UDP port 13330 to retrieve other shellcode then executes it.

tags | x86, udp, shellcode
systems | linux
SHA-256 | a19f2e0f5e3ed7c024fa5903d3b63b3001cc6d694f0a752097064021a0cea265
squidx.c
Posted Jun 21, 2003
Authored by Gunzip

Remote exploit for Squid V2.4.DEVEL4 and below on linux/x86.

tags | exploit, remote, x86
systems | linux
SHA-256 | 4d88b1cac25a2d926015a0a76de60258e2921cc54ee0b1bed4f093b1ee59cf9e
atftpdx.c
Posted Jun 11, 2003
Authored by Gunzip

Proof of concept remote root exploit for atftpd version 0.6. Makes use of the filename overflow found by Rick Patel. Tested against Debian 3.0.

tags | exploit, remote, overflow, root, proof of concept
systems | linux, debian
SHA-256 | 9f6808a16e0468c6d54152cfeec1e9d9af5e7c3678ec1fac83789785f111fae5
atftpd.patch
Posted Jun 11, 2003
Authored by Gunzip

Simple patch to fix the overflow found in atftpd by Rick Patel.

tags | overflow, patch
systems | unix
SHA-256 | bbb74dfb5d52103ab35a78f731663aae5244b396ecaa1b98451767508ae1c094
katax.c
Posted May 13, 2003
Authored by Gunzip

Local root exploit for Leksbot binary KATAXWR that was accidentally packaged setuid. Tested against Debian Linux 3.0.

tags | exploit, local, root
systems | linux, debian
SHA-256 | ccefd74ac440c99d2929476f1ac0e07bf8e39606aab167acff5334c8834e26e8
oOps.c
Posted Jan 5, 2003
Authored by Gunzip

oOps.c grabs hardcoded strings from binary files. Shows rootkit passwords and other information that is encoded character at a time to avoid binary examination like the strings command. Tested on Linux.

systems | linux
SHA-256 | 6ec922e0fecc9ff438d329269c632e0bdae94a19c0a176bb42b7160fa0bb0f73
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close