Flooding and sniffing robot for the IRC that attacks with spoof IGMP packets.
c9511dfcec990896079ce0509d8e7a92f5cf2d5ffb168064ff03db42d335fcdc
Full low level (without libc) AT+T port scanner written for the article "Advanced AT+T asm tutorial. Part 1".
b351a9da40051ae17249d3db2ddf289d051cdd7d92fc3d6c2836ab9d5b54a53d
Demo Permutate Engine for Linux that supports a few permutatable instructions: xor,sub,test,or,mov.
be15fb2bca26a61637e15f8fde38dd123b6a33c3b416fc9a541a0d9f8ac3d003
0x4553_Executor is a memory executor that allows a user to load code from file to memory and execute it.
ee6f412dcf6e5016ccb3bd30d093edd27679edf336bc268f7b36e79104c28552
A vulnerability in the Xeneo Web Server can be exploited by malicious attackers to cause a denial of service due to an error in the handling of requests including a malformed URL encoding representation of a character.
893273caaeca2a5baa326a0456742a7e0d82e24c4657dbd8a249341dabfc93f5
Cisco Security Advisory - Cisco Secure ACS for Windows is vulnerable to a buffer overflow on the administration service which runs on TCP port 2002. Exploitation of this vulnerability results in a Denial of Service, and can potentially result in system administrator access. Cisco Secure ACS versions up to and including version 2.6.4 , 3.0.3, and 3.1.1 are affected by this vulnerability.
480f30faba4a7dc1e5a194019281b719a20ce957e96e56bdb9b229dec2c34792
Snort 1.9.1 and below remote exploit. Related CERT Advisory is here. Tested on Slackware 8.0.
6fb5c8a0246dcb6a64973e1f4f80cc826590cb7b7f3484e6026b64722e722d57
The Nmap 3.20 Statistics Patch adds the -c switch which guesses how much longer the scan will take, shows how many ports have been tested, resent, and the ports per second rate. Useful for scanning firewalled hosts.
4544455af5ab0ed47cbcb4e33e29760ad56ff4235407df2e003cab38ff519257
SAP DB is vulnerable to a race condition during installation. The installer creates a world writable file that gets compiled and then is setuid to root. If a local attacker can overwrite the file in the alloted time-frame they will be able to escalate their privileges.
133ef0c808730e0896b10d01e7b0daaaf775415dcf0f90ca80ffebe268a51845