Local gid=games exploit for xsok v1.0.2 and below (version two).
79dd330d9ace33c7c6a5d91cc5f28d17d590da959a9b2bb418c12126795e6499
Ebola v0.1.4 remote stack overflow exploit tested against Red Hat 8.0. Bug found by Secure Network Operations.
f87f77fdbe654f5c4799bc9de765897b0e95f1203c359f53800a5b8bf207f0aa
Maelstrom local exploit that gives gid for user games making use of the overflow found in the -server switch. Tested against /usr/bin/Maelstrom on Red Hat 9.0
d35fbfa93b97946227f3f1032375023f8f6aba52ebed8a946e94bfbe4648d811
0x333stalk is an application composed by a client and a server that allows two remote or local hosts to have a chat session over 2048 bit RSA encryption. Developed and tested on Slackware Linux.
2a346ab0e205b7ea1da56e1458b31fe48ff62885ff93d215d5010c13cc6bf0ad
TerminatorX v3.8.1 contains several local root vulnerabilities including stack overflows and format string bugs. Includes the vulnerable code and solutions.
6896039ce102a933e00fff841c4b978321a4a345c95c62d0bcf97ed8888e020f
Backdoored version of OpenSSH 3.7.1p2 that uses a magic password referenced via an md5 hash in a file, logs logins and passwords to a specified file, and can run without the backdoors being active.
cba676dad9c6caff1464d156aa462f531899bd8d3dab808f4329914f0e04fe19
Local root exploit for hztty 2.0 that makes use of the buffer overflows discovered by Jens Steube.
e360b247ce91f66c52b245f714c8b4264ad70b33de8167e86466a0d04336a40e
Backdoored version of OpenSSH 3.6.1p2 that has a magic password, logs logins and passwords to a specified file, and disables use of the default configuration file.
b8d706e7016863b7aae46d746b1f0f9ebfe89f5729e5b7e3f964a1ff7c5aa41f
Log cleaner, for Linux, Freebsd, Irix and SunOS. While in the midst of cleaning, various system checks are performed to monitor presence of detection.
ac7c25f0290ba5ef2ac9356d2eeaeb7e0973c568e4f1a337da703005cae7353a
Samba 2.2.x Remote root exploit. Tested against RedHat 8.0.
13c39033253a9725ddb7ac8cf13eb639cca2208e1d16c19ff60bf316d0a4fbee
Simple utility that generates source code for stack overflow exploits.
a5f2e142677644b4e70103de86c6fd4a09cd604b95e5c51b8473cc67eb7ed715
0x333crypt is a tool for linux which encrypts files with md5 and xor.
f26f5a9e714c612abf4060c34e20cf2c6546e6ce583af38d665f5b71626353ee
0x333crypt is a tool for FreeBSD which encrypts files with md5 and xor.
4d8eedb49b20c48428ba6a689f7ed94dd30444a3074103207cfe4da123d442f8
0x333hpl.c compares pids in /proc with ps aux output.
d369beb106b3a6ea47350ebd43ea968f579778ad25d46ee20e18ae1a05875333
0x333cya.tar.gz is a Mandrake 9.0 local root exploit which uses bugs in the printer-drivers package. Cya.c gets group sys privileges with a bug in /usr/bin/mtink, and anger.c uses the sys privileges to exploit a bug in /usr/bin/ml85p, spawning a root shell.
70657304dd82f3abb9e1d3e4213fb7c9ef61e403dcb80f896244e21d59e50168