elm_again.c exploits another buffer overflow in elm v2.5 giving a gid=12 shell if /usr/bin/elm is SGID. Tested on Slackware 3.6 and RedHat on elm2.5PL3.
a63af30bfc97eb80e07b9f38915a5c778463721196ce3c7f4a6bf9172b6729c7
Elm v2.5 buffer overflow exploit which provides a gid=12 shell if /usr/bin/elm is SGID. Tested on elm 2.5PL1-3, on Red Hat. Perl script to find offsets included.
de3ca64288f925a9826cafbf271fc6605aa272bb27361e89cf5913320a7c513f
Elm v2.4 buffer overflow exploit which provides a gid=12 shell if /usr/bin/elm is SGID. Tested on Slackware 3.6, elm 2.4PL25. Perl script to find offsets included.
03d1978ea3b8ab5173fda42c7786dc04993514aae31b5c97466470d36a8dddcf
sendfile.pl is a tool which uses echo to send files to any webserver which has an unchecked open() call in a cgi script.
7c555f235208e9dcdbdb3351234decf73f56993d31d16ac5d34bf257b6e64390
Major security issue with networksolutions.com(easysteps.pl). This is being distributed amongst the irc.
5bb0b27956ea17dfff4e3397488439c628f1b4637003f3b6a938c243e772152c
ide_expl.mrc is an ircii-4-4 exploit ported to mirc5.7, works reverse to ircii-4.4.c. You send the chat request instead of having them chat you, attempts to execute /bin/sh.
07bb96538921b3cdfee62b6c246d8843f69f27f4c4ae7b182d900f7f81eee2fb
Documentation on possibilities to freeze/deny service to applications and daemons via reading devices on unix/windows based operating systems. (unix note: most of these device calls don't require root, on most dists) Includes some sample html for crashing browsers through file:// links.
d7c8deedc35391eaa333c07710195642bccfa5468ade29076a0bcabc58fa637c
AVscan is a perl script which submits garbage queries to altavista in order to find hosts to scan.
65e888ac12d49818985f0d7d38052033f23c495205dab54bd382351a34d7d7ae
Most webservers can be DoS'd by creating a large number of tcp connections from the same host. Simple, lame, and not spoofed, but effective nonetheless.
742f8b8c58b74086dd6f9e8870807bede34139f4d3d48adb713b24fbf53308f2