exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files from Gunzip

First Active2003-01-05
Last Active2003-11-08
webscan_0.1.0.tar.gz
Posted Nov 8, 2003
Authored by Gunzip | Site members.xoom.it

Webscan is a web site fuzzer that checks for remote vulnerabilities such as sql injection, cross site scripting, remote code execution, file disclosure, directory traversal, php includes, shell escapes, and insecure perl open() calls.

tags | remote, web, shell, perl, php, vulnerability, code execution, xss, sql injection, fuzzer
SHA-256 | eafcdbf028f048e0942fbbf8b91c58bc7470b0555231101283ddfcebf8e7b45f
xtokkax.c
Posted Aug 5, 2003
Authored by Gunzip

Linux and BSD x86 local exploit for xtokkaetama that gives egid of games.

tags | exploit, x86, local
systems | linux, bsd
SHA-256 | b520af024cb9003b4e1a42a73b3409332209fffab5a67095c1e394f14a9b173b
linux86-udpcode.c
Posted Jun 29, 2003
Authored by Gunzip | Site members.xoom.it

Linux x86 UDP shellcode. Reads from UDP port 13330 to retrieve other shellcode then executes it.

tags | x86, udp, shellcode
systems | linux
SHA-256 | a19f2e0f5e3ed7c024fa5903d3b63b3001cc6d694f0a752097064021a0cea265
squidx.c
Posted Jun 21, 2003
Authored by Gunzip

Remote exploit for Squid V2.4.DEVEL4 and below on linux/x86.

tags | exploit, remote, x86
systems | linux
SHA-256 | 4d88b1cac25a2d926015a0a76de60258e2921cc54ee0b1bed4f093b1ee59cf9e
atftpdx.c
Posted Jun 11, 2003
Authored by Gunzip

Proof of concept remote root exploit for atftpd version 0.6. Makes use of the filename overflow found by Rick Patel. Tested against Debian 3.0.

tags | exploit, remote, overflow, root, proof of concept
systems | linux, debian
SHA-256 | 9f6808a16e0468c6d54152cfeec1e9d9af5e7c3678ec1fac83789785f111fae5
atftpd.patch
Posted Jun 11, 2003
Authored by Gunzip

Simple patch to fix the overflow found in atftpd by Rick Patel.

tags | overflow, patch
systems | unix
SHA-256 | bbb74dfb5d52103ab35a78f731663aae5244b396ecaa1b98451767508ae1c094
katax.c
Posted May 13, 2003
Authored by Gunzip

Local root exploit for Leksbot binary KATAXWR that was accidentally packaged setuid. Tested against Debian Linux 3.0.

tags | exploit, local, root
systems | linux, debian
SHA-256 | ccefd74ac440c99d2929476f1ac0e07bf8e39606aab167acff5334c8834e26e8
oOps.c
Posted Jan 5, 2003
Authored by Gunzip

oOps.c grabs hardcoded strings from binary files. Shows rootkit passwords and other information that is encoded character at a time to avoid binary examination like the strings command. Tested on Linux.

systems | linux
SHA-256 | 6ec922e0fecc9ff438d329269c632e0bdae94a19c0a176bb42b7160fa0bb0f73
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close