Dwarf.cpp is an unreleased exploit for Troll ftpd, a supposedly secure ftp server.
c289a2eefb385f3cef6e155cc5d978a8d0952c549cb00ff74ebb244d1261355f
OpenBSD v2.6 and 2.7 ftpd remote root exploit.
3bce3b748cccc4e919388bcb98fab8e0032f8b36b13107f0b8d2af7e7591fff5
Koules v1.4 (svgalib version) local root exploit.
c1aa67a699bdb06becfd648b8e011150782023036520a46cdbdfa729d406a53d
Inebriation.c is a local linux/x86 /bin/su + locale libc functions exploit which has been written in response to previous unreliable exploits for this vulnerability. It includes a perl wrapper to find the correct offset, can use GOT overwrites to evade stackguard, stackshield, and libsafe, uses clean overflow string creation, and has documentation and several other usability improvements.
79c94c5fa03623a02f4886cf1b9049e8f2ca654b18f436c51d3c88a2c462c274
Darxite Daemon v0.4 password authentication buffer overflow exploit. Spawns a remote shell.
e3dd3a037dbb8d042f99c43279d3db0d7a79d4196e1044166dd2c8ca7718e9a6
The wais.pl CGI written by Tony Sanders provides means to access the waisq WAIS client via the webserver. Waisq contains buffer overflows allowing remote code execution which can be exploited via wais.pl. In addition, files owned by nobody on the webserver can be overwritten with arbitrary content. Includes exploit for Linux/x86.
0a1486af2061c3b2f7952eb470c47fcbf6d3d36571a036f046ae5709356c58d1
SMEGMA is an engine for generating garbled shellcode using several encryption mechanisms and making it self-decryptable by putting an Intel x86 machine-code decryptor in front of it. It uses a hand-written C lexer to grab the shellcode from sourcefiles and try and identify it. Use SMEGMA to modify shellcode in which characters get ruined by regular expressions (often seen in CGI binaries, web applications and webservers).
27190bafedd46710e361a4de759ed1fb919aefd7840e72731dda48838278f0bf
SMEGMA is an engine for generating garbled shellcode using several encryption mechanisms and making it self-decryptable by putting an Intel x86 machine-code decryptor in front of it. It uses a hand-written C lexer to grab the shellcode from sourcefiles and try and identify it. Use SMEGMA to modify shellcode in which characters get ruined by regular expressions (often seen in CGI binaries, web applications and webservers).
1da73e27fb59643dd6998adbcad2852ae9f92894f5b5ad30e9abbcac42f8bea8
rip.c is a local exploit for the dump package version 0.3-14 and 0.4b13 (restore binary). Tested against linux, gives a UID=0 shell on 2.2.16, GID=0 on 2.2.15 and below.
8d54e411ea387b466577cd77afc89cd9c0b0bdeab57ec369fdba47baf3a580b8
filterape.c exploits a new elm buffer overflow to get EGID mail on Slackware.
0283514040bf44953fc6a6a2b5828645f76e0fbbd4376d98586c0470084c52fc
shellhit.c - TESO Hellkit contains a buffer overflow - exploit is just meant to be funny. To all scriptkiddies: You won't get root from this, go and find something more useful.
a3e149bc4123017c3cbb604fcda0c4db3c04f6e279d5b9a75f8c0c48fe6dd47f
fdmount local root exploit - tested on Slackware 4.0. Must be in the floppy group. Modified from last version to work on Slackware 7.
255ecb2ad7fe3f717a036f24b6eb2b7864a4ac3e503bf58f697e951d039c3d6b
This exploit spawns an EGID mail shell on the default Slackware 4 install.
d1e67efe4126f2f7afd3ac7d85e4649457759a6fd8ea24490ca70370881514ab
Passive Connection Shellcode. Source is well documented.
9a944285c6e4fd0c571372a7f0144445fb852e672dec8b5363b5e3def84f1d5e
NewDSN.exe/CTGuestB.idc/Details.idc remote NT exploit.
5781b09b479321548029c27b1117422b84680901e7eaae1102c1cf80eb4de30e
fdmount local root exploit - tested on Slackware 4.0. Must be in the floppy group.
b9f489398fdfb811cf1ded7dfb08ba23ec8fc414c75571885b29f63112e1ef19
CERN 3.0A Heap overflow advisory - There is a heap overflow that wastes memory space in the CERN/3.0A webserver. Close to 50000 bytes of the heap will be ruined! DoS example included.
489fc3d42f1e7f2c642902f70308d9caefba877586655086add9c34454afe5b3