Remote exploit for the Microsoft Windows DNS RPC service vulnerability. Tested on Windows 2000 SP4. Binds a shell to TCP port 4444.
52be5bb153f92f69f6c22aada5a4bf41e884d3ca129b013c5861c86b7ca83c81
Easy File Sharing FTP server version 2.0 PASS remote exploit for Win2k SP4 that binds a shell to TCP port 4444.
3def45a977c52b6e8f0f60e1a2e14790ace91d83b4d0ef088bca447292e76c55
Helix Server version 11.0.1 remote heap overflow exploit for win2k SP4. Binds a shell to tcp/4444.
c52c582103c5577a2b99d4aa4f07b6f24caf6ac6cf3785608d6e53b10fc34d91
CA BrightStor ARCserve remote stack overflow exploit that takes advantage of msgeng.exe.
0b1a30b722ff620e0febfdb5b8951ad05cb2c7414c5e23ae648fd2e32271331f
WarFTP version 1.65 USER remote buffer overflow exploit for win2k SP4.
f878afd4c62f2bab59dde5f5b1fc20cbe6d6f8426bbcf377ee0c38af73b3fa2f
Heap overflow exploit for msgeng.exe in Computer Associates BrightStor ARCserve Backup.
a973115577880be9cb7f40039a629b7c8037ece864581b839544fb8c6ac71cb9
CA BrightStor ARCserver tapeeng.exe remote buffer overflow exploit for Windows 2000 that binds a shell to port 4443.
55a4cbc6b2c99480c96018ead1f53c77828c32fe522cf290e8d6af97e97deb49
Apple Quicktime buffer overflow exploit for Windows 2000 that makes use of the rtsp URL Handler vulnerability. The qtl file created binds a shell to port 4444.
8668be442ac4578cbed1084e63009713cd92e994d70f4d374f3b519c655904a9
Microsoft Windows NetpManageIPCConnect stack overflow exploit that works against the vulnerability described in MS06-070. Written in Python.
e7219e5b943a866820e11731ac4d79f821c338fc4ecd563f5a6243aef702e248
Microsoft Windows Metafile (WMF) remote exploit which takes advantage of the bug known as ms05-053. This program creates a special .wmf file which crashes IE by overflowing the "mtNoObjects" header.
8a69e2857d794a4dbba1f6eb8fe50a28af6da1e116e413522bef8d7a68279195
Microsoft Internet Explorer denial of service metafile exploit. Raises CPU utilization up to 100%.
48fd7350f572c62e78b0b5618eba85ff145865f9260ae631a6875341622b4523
Denial of service exploit that makes use of a memory leak when sending a specially crafted upnp_getdevicelist request.
c4ad49a26be74e913688c536620eb0a55ff34d9b4d6b43f53754461c413ae7c8
Remote denial of service exploit that makes of a length checking issue in the Microsoft UMPNPMGR PNP_GetDeviceList. This code crashes services.exe.
4c414db62f8080df8cfa4b3c934df6fe1b7ac73cf2921817e10cd4373baf9f07