Visual Studio 2005 and below code execution exploit.
f474e8cd34809a660252ae97ee80d5be531c9b414e3d576accb0feb55e852f8b
PHP Counter 7.2 is susceptible to a cross site scripting flaw.
ec9bc45f5335ff03bbf960c7eb269e2336ee2411eddca3d5198516c68bbe1552
CuteFTP Professional version 6.0 local denial of service exploit that makes use of a flaw in the client.
daa23e42c47eed98d84004e5b252b4271f1b5dbd8762bbe7fffe1723ba842163
Efuzz is an easy to use Win32 tcp/udp protocol fuzzer which finds unknown buffer overflows in local and remote services. Uses config files to define the range of malformed requests. Includes C source, released under GPL.
83c25ea1e5b3ca8eaa392c20d213c89de0afe7961f65d36d43a2f77976f63a9c
This package contains example vulnerable C programs. The best way to learn exploit coding is by doing it. Start your search with the index.html. There are examples of buffer overflows (stack and heap) and format string vulnerabilities. All examples are exploitable with a standard linux/x86 environment.
b4a6e4ad9e67fa0be8869334a9ea7b86a7d1712e80c47179e80a481dd08dbd3b
Small white paper regarding keyloggers and basic circumvention.
9e625c2d10f7855d72e6d471bb18629a3b4d78f9f4ace1c443a07dc73b3314f4
Paper written to discuss application layer denial of service attacks with a test script that provides an example attack.
99e71bfefca08435bffe95e4201c73896fedd95f61d35792f8b30c3e2718aeb9
Utility that automates the DNS spoofing vulnerability in Microsoft Windows XP SP1 as described in the Phrack 62 linenoise chapter. It generates a script file that launches the netwox application with correct parameters. It works with Windows and Linux. Binary files are included.
85bdd1f07f2ad093ca6f2d51d289fbb5d912c199a4d830314571f23051a130fa
If any ucd-snmp version, 4.2.6 and below, is installed setuid root, a local attacker can overwrite any file using the -P and -l parameters.
1016752386d08c853e5ec5531500830362c7331f992a62a1b91766d6ec8dab73
Small whitepaper on nop usage and a random nop generation utility is included.
3406580aa94c1fef3dd119dcc1ae93a8d14aebba8e84a5657d72cce1e07e5292
Metamail remote exploit that makes use of a buffer overflow and upon successful exploitation, binds a listening socket to UDP/13330 awaiting shellcode. Affected versions: 2.2 through 2.7.
4b90ebafdf1d434a218d36dfbf9b51ff8ab8e7a904b5b69a39f31b140b267ee8
ucd-snmp versions 4.2.6 and below suffer from a buffer overflow on the command line when the daemon is spawned.
24514b893dcbc9255cf0b3b4192324d7c0f00059646711e8fb3fc0a35111ed7c
Paper discussing shellcode usage that also includes troubleshooting and functionality information. Included are other whitepapers that help offer guidance, some tools, and some shellcodes.
4ec0245150d0f387da8ee2844e769c59d9caac00f74d87dd99b63675db28cafe
HSFTP versions 1.11 and below remote exploit that makes use of a format string vulnerability when processing file names.
0f0b1134f526e9e119a43dac0a36550ab2c1495e9c627acdb6f4557b53503898
Remote root proof of concept exploit for gv versions 3.5.8 and below. Binds a shell to port 65535. Makes use of an old vulnerability that does not have an exploit circulating for it.
11d8cbe05d44de0b0c307ee9081118802cb84f87aeb270e7921d6390d73955dc
Proof of concept demonstration exploit for cdp versions 0.4 and below.
71e8dcfd75673f8e3b2dd6868f7308fc0129309e7be74ce7e3020b9fd0c39176
Brief tutorial on using gdb for developing exploits.
dd65c2569a794f3b7b150515a3f2ed9f78bfb12095612a88d76604a4d0f3fa8d
Brief tutorial on using Perl for developing exploits.
e4720a44d55438b6c8443d0789e3f56d813d0b5b979efac1ac7a1e23c05e3fac
Small tutorial discussing common types of exploitation methods. Cites examples and points to other papers that can provide more information.
ace1ee12ef0af05798d0bff8c62d68803fe68f862ffc43fa3d3e621c5906609d