objobf is an obfuscater for x86/Linux ELF relocatable object files (.o files) that can produce fancy graphs to visualize function structures. Released at CCCAMP 2k3.
3afd6cb33f2bc2f444e4ae31ac730f84c53f71705207242063224711f8832449
This utility converts a dynamically link Linux IA32 ELF binary to a static binary.
b2f98619b069e576e51819658cb1142cc8d9a95a54a65bd7749c5f19124f8240
Remote root exploit for Solaris Napalm heap overflow - SPARC version. Tested against SunOS 5.6, 5.7, 5.8, and 5.9. Attempts to add a root shell to inetd.conf.
31f1d3a448b985faea7b24302d4c77d14c5872c6dedf6a8acaba2c2b9b0d7b07
7350squish is a Linux / x86 Squid remote exploit. Tested against Debian Squid_2.3.4-2, squid_2.4.1-1, and squid_2.4.2. This code was abandoned in a honey pot and is published under Fair Use Law 17 U.S.C.A 107
c9d3a3dd4dd2f657e576ad62e4b0332e4678ac9a512951acc8c4fe28403a63ef
Solaris /bin/login remote root exploit for SPARC and x86. This code was abandoned in a honey pot and is published under Fair Use Law 17 U.S.C.A 107
9a7dc0465ec7420e64c78c101c235a1124f003775a78c77e6d511355683dc689
364 byte MIPS/Irix PIC port binding shellcode (source included)
c46107fcb5c7497a3d6dd32bc368da7cc825324bae592dbed4b55090d2e2f813
68 byte MIPS/Irix PIC execve shellcode (source included)
6d61eb0821d6cdc026bbc6ae30e9581bf9cef4c2446a60a4aa61309df60b9559
7350854 - x86/bsd telnetd remote root exploit which takes advantage of the AYT buffer overflow. Tested against BSDI BSD/OS 4.1, NetBSD 1.5, FreeBSD 3.1, FreeBSD 4.0-REL, FreeBSD 4.2-REL, FreeBSD 4.3-BETA, FreeBSD 4.3-STABLE, and FreeBSD 4.3-RELEASE.
042fbb8216e3f92fad1e57df03d06a841a1450db42a5c0124584533b112dc627
Exploiting Format String Vulnerabilities v1.2 - Includes over 30 pages of well organized information along with several examples.
4ec81ccf82417d72ae0551b3d1085e97a9b9867f7c180e6ba8dd7c5b18eb6b66
IOB stands for I/O bridge, a simple tty chaining program. It can be used to log almost any session, including ssh, gpg, pgp, cfsattach, losetup, etc.
29c258374e9799d3f17c6e1042df216aa63e48c532e3dc875a467a0d72b893c3
TESO Security Advisory #11 - Multiple vendor Telnet Daemon vulnerability. Most current telnet daemons in use today contain a buffer overflow in the telnet option handling. Under certain circumstances it may be possible to exploit it to gain root privileges remotely. Affected systems include BSDI 4.x, FreeBSD, IRIX, Linux with netkit-telnetd < 0.14, NetBSD, OpenBSD 2.x, and Solaris.
4849ac76d26caec6f947c4879fceb873db9d4fbf399d4ebadda0a88587f6c0ba
Ldistfp is an identd fingerprinting tool which works well with all Linux and most *BSD hosts that have their auth service running.
2a08fdfb2ef25619d4dea35c00c18c685ae1ce253062aac1ea47fecf74f5383e
Ldistfp is an identd fingerprinting tool which works well with all Linux and most *BSD hosts that have their auth service running.
2dd2ec6444e1af21666eded3968c31522c21dd0e5e2746574e87fcb334c614db
Cfingerd prior to v1.4.2 remote root format string exploit. Includes information on finding offsets. Tested against Debian cfingerd v1.3.2, 1.4.0, 1.4.1, and RedHat 7.0 cfingerd 1.3.2.
27d6d03e401bbc5d64121d7bf098b55babef4798dff575768d01cd2abac1b648
Introduction to the MIPS architecture and the IRIX operating system, focusing on how to write shellcode for IRIX. Includes 3 sample shell codes. This is an updated version of the article in Phrack 56.
4ae9d1a99adae30ec567bcc47c657eb5fa712b7d9ea625abbd8747f87f01cfae
7350wu.c is a Wu-ftpd v2.6.0 remote root exploit which does it the proper way. Works on Linux/x86 and FreeBSD.
33f1db59facbfa0648cc1b9e7fac8958fdfbe6056b000bfbd7ca175b8b29af23
German speech given at the CCC - "exploiting format string vulnerabilities". Including examples.
fb6f4bbc3e3270eb0fdf54421051b06b4537b3129ca000b5f781fac055d4b629
Ldistfp is an identd fingerprinting tool which works well with all Linux and most *BSD hosts that have their auth service running.
1881f6c6fa07883c7a887aaf7ae735cd73ebac2d08bc4e0ecfac8d01639138a8
Ldistfp is an identd fingerprinting tool which works well with all Linux and most *BSD hosts that have their auth service running.
a0e02ae45f7bafdea7bf1bf796fdf701738fa98fb3b7144c5532341e9495418b
qpopper 2.53 euidl x86/linux remote exploit. Includes a procedure to abuse format strings to find the correct offset. Tested on Debian 2.1, RedHat 6.1, Slackware 7, Suse 5.2 and 6.0.
d4fbf6b568b41b3a4ab5332d446981b085dcf13b1b623c727517903de3998105
Zodiac is a portable, extensible and multithreaded DNS tool. It is meant to be used as a DNS packet monitor and DNS protocol test and debuging tool. It's basic features are: sniffing of DNS datagrams on an ethernet device, decoding of all types of DNS packets, including safe decompression (partly finished, SOA record are, for example, not decoded yet), nice display and gui, if you like ncurses and text based frontends, always interactive in all situations through built in command line, threaded and flexible design. Advanced features include: local DNS spoof handler, jizz DNS spoof, exploiting a weakness in old bind implementations, determines jizz-weakness, id-prediction and resolver type remotely, id spoofing, exploiting a weakness in the dns protocol itself, implements some advanced DNS denial of service attacks, including flood, label compression and unres attack, advanced DNS smurf.
87f79104df9555ecf18355d034a721bd7327ecf82037e1e480a0752bb07e3a14
execve-shell.tar.gz allows you to easily create linux x86 shellcode that execs any command you supply.
0cc554a1bcbc9a9ef9026428188060ef14886a2ba40aad275be5201d08d7fe39
l0phtl0phe-kid.c - Easy antisniff v1.02 exploit. l0pht messed up the fix for their problem in antisniff by not regarding the type signedness properties of the char and int values used, resulting in a cool of method bypassing the extra length + strncat checks. This version has been made easy enough for script kiddies to use - to avoid that "doesn't work" lamer claim.
bd31032131862d82287cf734e1ae6420cdb563449a5eb13f9c348e7266dd300d
l0phtl0phe.c - antisniff exploit (1.02 included). l0pht messed up the fix for their problem in antisniff by not regarding the type signedness properties of the char and int values used, resulting in a cool of method bypassing the extra length + strncat checks.
936d433c03025bd9a3d606c0f3d43a479b07e715b0201d0e5f316e3adcac8c05
Nameserver traffic amplify (DNS Smurf) and NS Route discovery (DNS Traceroute) advisory and exploit.
0aaca81a09dcafa2ee112e0e4ed74641b4256e9d1f814bdb86735574a73c2f9f