This script uses the linux ping command to simulate the +++ATH0 bug represented in modems that have thier gaurd time set low. Consider this a version of gin.c that actually works... but it is also more efficient in a way because of the emplementation of "ping".
ad188dd1d0e4912673cdad5d3b3e4fa6f80962690fec38012d2b615413e7a23f
stuff.c v1.0 sends an illegal character for ppp frames, causing a packet of double size to be returned.
6ffa52818243eca9d792e090449bb997f9a1f740b3ebe0cc9d96ca1ad2c40abf
Stegtunnel is a tool written to hide data within TCP/IP header fields. It was designed to be undetectable, even by people familiar with the tool. It can hide the data underneath real TCP connections, using real, unmodified clients and servers to provide the TCP conversation. In this way, detection of odd-looking sessions is avoided. It provides covert channels in the sequence numbers and IPIDs of TCP connections.
ebef4d7fb76c4d35e30fe24a2260a12237b058adad112fa1c746f7a0277b289c
Local exploit/trojan that makes use of REGEDIT.EXE. Any file containing a value of more than 260 characters causes an error exception by the RegSetValueExW function, which then uses a function of NTDLL.DLL which is vulnerable.
c874fde4ec04f62e0bde41e571ba6761e1c46629f665638a2753eb90b45c1471
Remote exploit for Apache + OpenSSL v0.9.6d and below. This exploit is based upon the openssl-too-open exploit by Solar Eclipse and offers more than 130 targets including various flavors of Linux. Updates: More targets have been added and this version of the exploit also attempts to download the ptrace exploit, compile, and execute it in an attempt to gain root privileges.
a47755378b773f335a74bb7a4b40dcd8af408322961e6a3c7e5252d068998e50
Yabase v1.5.0 remote exploit to spawn bash shell with Apache uid.
58656cc32a0af4370be32b024340a8b698195d4cb03ac29dfab328c01e3fb61e
The Abyss Web Server v1.1.2 and below has a denial of service vulnerability where the server can be crashed remotely via uncompleted fields.
d86a3e89daf4e0b1c43cb68523417f0347659320ea71449cfdd0694782755813
Local root exploit utilizing the overflow in XLOCALEDIR under XFree86 Version 4.2.x using xlock. Written to work on Redhat 7.2.
4f06feb2008a323c9ee1ec5fc10c12fb0db7abdec79524c84490367295d8d227
Secure Network Operations Advisory 1106 - The AOLServer Proxy Daemon API contains exploitable syslog() calls in nspd/libnspd.a. This vulnerability is remotely exploitable.
68e25eb097cfab06cdbd23579c0aa94b2ed828355e93606d120a274ab998f1fe