exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files from Scrippie

First Active1999-08-17
Last Active2001-11-13
dwarf.tgz
Posted Nov 13, 2001
Authored by Scrippie | Site synnergy.net

Dwarf.cpp is an unreleased exploit for Troll ftpd, a supposedly secure ftp server.

tags | exploit
SHA-256 | c289a2eefb385f3cef6e155cc5d978a8d0952c549cb00ff74ebb244d1261355f
obsd-ftpd.c
Posted Dec 24, 2000
Authored by synnergy, Scrippie | Site synnergy.net

OpenBSD v2.6 and 2.7 ftpd remote root exploit.

tags | exploit, remote, root
systems | openbsd
SHA-256 | 3bce3b748cccc4e919388bcb98fab8e0032f8b36b13107f0b8d2af7e7591fff5
coolz.cpp
Posted Nov 21, 2000
Authored by Scrippie | Site synnergy.net

Koules v1.4 (svgalib version) local root exploit.

tags | exploit, local, root
SHA-256 | c1aa67a699bdb06becfd648b8e011150782023036520a46cdbdfa729d406a53d
inebriation.c
Posted Oct 3, 2000
Authored by synnergy, Scrippie | Site synnergy.net

Inebriation.c is a local linux/x86 /bin/su + locale libc functions exploit which has been written in response to previous unreliable exploits for this vulnerability. It includes a perl wrapper to find the correct offset, can use GOT overwrites to evade stackguard, stackshield, and libsafe, uses clean overflow string creation, and has documentation and several other usability improvements.

tags | exploit, overflow, x86, local, perl
systems | linux
SHA-256 | 79c94c5fa03623a02f4886cf1b9049e8f2ca654b18f436c51d3c88a2c462c274
i-was-bored.c
Posted Sep 12, 2000
Authored by Scrippie | Site synnergy.net

Darxite Daemon v0.4 password authentication buffer overflow exploit. Spawns a remote shell.

tags | exploit, remote, overflow, shell
SHA-256 | e3dd3a037dbb8d042f99c43279d3db0d7a79d4196e1044166dd2c8ca7718e9a6
wais.pl.advisory.txt
Posted Aug 14, 2000
Authored by synnergy, Scrippie | Site synnergy.net

The wais.pl CGI written by Tony Sanders provides means to access the waisq WAIS client via the webserver. Waisq contains buffer overflows allowing remote code execution which can be exploited via wais.pl. In addition, files owned by nobody on the webserver can be overwritten with arbitrary content. Includes exploit for Linux/x86.

tags | exploit, remote, overflow, arbitrary, x86, cgi, code execution
systems | linux
SHA-256 | 0a1486af2061c3b2f7952eb470c47fcbf6d3d36571a036f046ae5709356c58d1
smegma_v0.4.tgz
Posted Jul 24, 2000
Authored by Scrippie | Site b0f.freebsd.lublin.pl

SMEGMA is an engine for generating garbled shellcode using several encryption mechanisms and making it self-decryptable by putting an Intel x86 machine-code decryptor in front of it. It uses a hand-written C lexer to grab the shellcode from sourcefiles and try and identify it. Use SMEGMA to modify shellcode in which characters get ruined by regular expressions (often seen in CGI binaries, web applications and webservers).

Changes: Fixed all NULL byte problems - you can now use smegma to rid shellcode of NULL characters, more garbling algorithms, more efficient garbling algorithms, fixed the size problem.
tags | web, x86, cgi, shellcode
SHA-256 | 27190bafedd46710e361a4de759ed1fb919aefd7840e72731dda48838278f0bf
smegma_v0.2.tgz
Posted Jul 8, 2000
Authored by Scrippie | Site b0f.freebsd.lublin.pl

SMEGMA is an engine for generating garbled shellcode using several encryption mechanisms and making it self-decryptable by putting an Intel x86 machine-code decryptor in front of it. It uses a hand-written C lexer to grab the shellcode from sourcefiles and try and identify it. Use SMEGMA to modify shellcode in which characters get ruined by regular expressions (often seen in CGI binaries, web applications and webservers).

tags | web, x86, cgi, shellcode
SHA-256 | 1da73e27fb59643dd6998adbcad2852ae9f92894f5b5ad30e9abbcac42f8bea8
rip.c
Posted Jun 14, 2000
Authored by Scrippie | Site b0f.freebsd.lublin.pl

rip.c is a local exploit for the dump package version 0.3-14 and 0.4b13 (restore binary). Tested against linux, gives a UID=0 shell on 2.2.16, GID=0 on 2.2.15 and below.

tags | exploit, shell, local
systems | linux
SHA-256 | 8d54e411ea387b466577cd77afc89cd9c0b0bdeab57ec369fdba47baf3a580b8
filterape.c
Posted May 25, 2000
Authored by Scrippie | Site b0f.freebsd.lublin.pl

filterape.c exploits a new elm buffer overflow to get EGID mail on Slackware.

tags | exploit, overflow
systems | linux, slackware
SHA-256 | 0283514040bf44953fc6a6a2b5828645f76e0fbbd4376d98586c0470084c52fc
shellhit.c
Posted May 22, 2000
Authored by Scrippie | Site b0f.freebsd.lublin.pl

shellhit.c - TESO Hellkit contains a buffer overflow - exploit is just meant to be funny. To all scriptkiddies: You won't get root from this, go and find something more useful.

tags | exploit, overflow, root
SHA-256 | a3e149bc4123017c3cbb604fcda0c4db3c04f6e279d5b9a75f8c0c48fe6dd47f
fdmnt-smash2.c
Posted May 17, 2000
Authored by Scrippie | Site b0f.freebsd.lublin.pl

fdmount local root exploit - tested on Slackware 4.0. Must be in the floppy group. Modified from last version to work on Slackware 7.

tags | exploit, local, root
systems | linux, slackware
SHA-256 | 255ecb2ad7fe3f717a036f24b6eb2b7864a4ac3e503bf58f697e951d039c3d6b
elm-smash.c
Posted May 5, 2000
Authored by Scrippie | Site b0f.freebsd.lublin.pl

This exploit spawns an EGID mail shell on the default Slackware 4 install.

tags | exploit, shell
systems | linux, slackware
SHA-256 | d1e67efe4126f2f7afd3ac7d85e4649457759a6fd8ea24490ca70370881514ab
connect.asm
Posted May 4, 2000
Authored by Scrippie | Site b0f.freebsd.lublin.pl

Passive Connection Shellcode. Source is well documented.

tags | exploit, shellcode
SHA-256 | 9a944285c6e4fd0c571372a7f0144445fb852e672dec8b5363b5e3def84f1d5e
dsnhack.pl
Posted Apr 15, 2000
Authored by Scrippie | Site b0f.freebsd.lublin.pl

NewDSN.exe/CTGuestB.idc/Details.idc remote NT exploit.

tags | exploit, remote
SHA-256 | 5781b09b479321548029c27b1117422b84680901e7eaae1102c1cf80eb4de30e
fdmnt-smash.c
Posted Apr 3, 2000
Authored by Scrippie | Site b0f.freebsd.lublin.pl

fdmount local root exploit - tested on Slackware 4.0. Must be in the floppy group.

tags | exploit, local, root
systems | linux, slackware
SHA-256 | b9f489398fdfb811cf1ded7dfb08ba23ec8fc414c75571885b29f63112e1ef19
cern-pss.txt
Posted Feb 4, 2000
Authored by Scrippie

CERN 3.0A Heap overflow advisory - There is a heap overflow that wastes memory space in the CERN/3.0A webserver. Close to 50000 bytes of the heap will be ruined! DoS example included.

tags | exploit, overflow
SHA-256 | 489fc3d42f1e7f2c642902f70308d9caefba877586655086add9c34454afe5b3
mdmrst.c
Posted Aug 17, 1999
Authored by Scrippie

+++ATH0 Attack - This program simply implements a spoofable version of the +++ATH0 modem bug attack. Contains modem patch string too.

tags | exploit, spoof
SHA-256 | d502e71877d0f112231a5674b7cb5d0f144488ae19389137feedf8055d583e8b
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close