exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files from Winny Thomas

Email addresswinnymthomas at yahoo.com
First Active2005-10-30
Last Active2007-04-17
mswin-dns-meta.txt
Posted Apr 17, 2007
Authored by Winny Thomas

Remote exploit for the Microsoft Windows DNS RPC service vulnerability. Tested on Windows 2000 SP4. Binds a shell to TCP port 4444.

tags | exploit, remote, shell, tcp
systems | windows
SHA-256 | 52be5bb153f92f69f6c22aada5a4bf41e884d3ca129b013c5861c86b7ca83c81
efs20-remote.txt
Posted Mar 27, 2007
Authored by Winny Thomas

Easy File Sharing FTP server version 2.0 PASS remote exploit for Win2k SP4 that binds a shell to TCP port 4444.

tags | exploit, remote, shell, tcp
systems | windows
SHA-256 | 3def45a977c52b6e8f0f60e1a2e14790ace91d83b4d0ef088bca447292e76c55
helix-1101.txt
Posted Mar 22, 2007
Authored by Winny Thomas

Helix Server version 11.0.1 remote heap overflow exploit for win2k SP4. Binds a shell to tcp/4444.

tags | exploit, remote, overflow, shell, tcp
systems | windows
SHA-256 | c52c582103c5577a2b99d4aa4f07b6f24caf6ac6cf3785608d6e53b10fc34d91
caid-msgeng.txt
Posted Mar 20, 2007
Authored by Winny Thomas

CA BrightStor ARCserve remote stack overflow exploit that takes advantage of msgeng.exe.

tags | exploit, remote, overflow
SHA-256 | 0b1a30b722ff620e0febfdb5b8951ad05cb2c7414c5e23ae648fd2e32271331f
warftp-1.txt
Posted Mar 20, 2007
Authored by Winny Thomas

WarFTP version 1.65 USER remote buffer overflow exploit for win2k SP4.

tags | exploit, remote, overflow
systems | windows
SHA-256 | f878afd4c62f2bab59dde5f5b1fc20cbe6d6f8426bbcf377ee0c38af73b3fa2f
MsgEng.py.txt
Posted Jan 29, 2007
Authored by Winny Thomas

Heap overflow exploit for msgeng.exe in Computer Associates BrightStor ARCserve Backup.

tags | exploit, overflow
SHA-256 | a973115577880be9cb7f40039a629b7c8037ece864581b839544fb8c6ac71cb9
arcserve.py.txt
Posted Jan 13, 2007
Authored by Winny Thomas

CA BrightStor ARCserver tapeeng.exe remote buffer overflow exploit for Windows 2000 that binds a shell to port 4443.

tags | exploit, remote, overflow, shell
systems | windows
SHA-256 | 55a4cbc6b2c99480c96018ead1f53c77828c32fe522cf290e8d6af97e97deb49
quicktime.py.txt
Posted Jan 13, 2007
Authored by Winny Thomas

Apple Quicktime buffer overflow exploit for Windows 2000 that makes use of the rtsp URL Handler vulnerability. The qtl file created binds a shell to port 4444.

tags | exploit, overflow, shell
systems | windows, apple
SHA-256 | 8668be442ac4578cbed1084e63009713cd92e994d70f4d374f3b519c655904a9
ms06070-py.txt
Posted Nov 20, 2006
Authored by Winny Thomas

Microsoft Windows NetpManageIPCConnect stack overflow exploit that works against the vulnerability described in MS06-070. Written in Python.

tags | exploit, overflow, python
systems | windows
SHA-256 | e7219e5b943a866820e11731ac4d79f821c338fc4ecd563f5a6243aef702e248
MS05-053.c
Posted Dec 14, 2005
Authored by Winny Thomas

Microsoft Windows Metafile (WMF) remote exploit which takes advantage of the bug known as ms05-053. This program creates a special .wmf file which crashes IE by overflowing the "mtNoObjects" header.

tags | exploit, remote, overflow
systems | windows
SHA-256 | 8a69e2857d794a4dbba1f6eb8fe50a28af6da1e116e413522bef8d7a68279195
ieDoS.pm.txt
Posted Dec 1, 2005
Authored by Winny Thomas

Microsoft Internet Explorer denial of service metafile exploit. Raises CPU utilization up to 100%.

tags | exploit, denial of service
SHA-256 | 48fd7350f572c62e78b0b5618eba85ff145865f9260ae631a6875341622b4523
upnp-dos.c
Posted Nov 15, 2005
Authored by Winny Thomas

Denial of service exploit that makes use of a memory leak when sending a specially crafted upnp_getdevicelist request.

tags | exploit, denial of service, memory leak
SHA-256 | c4ad49a26be74e913688c536620eb0a55ff34d9b4d6b43f53754461c413ae7c8
MS05-047-DoS.c
Posted Oct 30, 2005
Authored by Winny Thomas

Remote denial of service exploit that makes of a length checking issue in the Microsoft UMPNPMGR PNP_GetDeviceList. This code crashes services.exe.

tags | exploit, remote, denial of service
SHA-256 | 4c414db62f8080df8cfa4b3c934df6fe1b7ac73cf2921817e10cd4373baf9f07
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close