A vulnerability in linux 2.0.X allows local users to crash the kernel. Exploits missing option length checks.
dd9f0fac7e12433fc0f3f39525e139a3db1e9cc38a3334c7305d23225438da86
DoS attack against Proxomitron Universial Web Filter - Version 3.
d5b9907b385577820e4345b6941cd485e08ea41ea503b3ae8ec6dfc61b0cb745
Paper on exploiting security issues in client and other non-server software. Includes a sample exploit against tar.
67a289316796316f40e67df6386dfe291a4eba9fce5c20763db7bc76da920954
Perl based brute force attack on telnet. Takes input from a list.
d7b89b6a048281bcb425cb826ea103f05ab74d982b93035df5432e2348f5f70b
ShareClean is free Win95 software which allows you to control Win95 file sharing to prevent access to your drives by other high speed internet users while online.
811d3d6d7eb1b9d8bba375e7d5ebcafc8cbc63126fb25735d2a92c08b96d0d7c
BarBlanker is a windows program which covers virtually all major Viewbars with a black window.
b741a92849eaac5a2f0c375dc63020a5d46a0b900500d756a66661ec70cb1202
The PHP firewall generator is a simple PHP script that generates a firewall script for ipchains-based firewalls. The aim is to support an easily configurable rule set similar to those supported by commercial firewall systems.
27fb67be6c0ed711bf51d78de095d657d55d28defcdb7fbc8ae84fd78156873d
System Spy is a windows program which will hide on a users computer and record the actions of another user through program title capturing. Captures active window title, time window was opened, time window was closed, and total time window was active. Invisible to user while running, including Task List. Captured data is stored encrypted, in dated files.
b67ff2a8376dc7f389fbdce7ae16740717071f86d9e3b289ee611458c02bcad5
PHP forms can be subverted if the programmer assumed hidden fields are secure variables. Exploit description included.
b339aa9764132f4633481513cf0cb8e1a255f49e3aba89daaec2c95d5a8c11ec
WhoiShOstFast is multi-process TCP port scanner - Now in english.
3acdb135554c2d3a197482f48b202e1675aeb067f35596719f49ced185e260cc
Windows NT rootkit project v0.31 alpha. This build is testing a new technique called EXE Redirection which can hide any trojan from the user. If you open, hash, CRC, or scan the file - you see the original file, but if you execute the file, you get the trojan. This is a very powerful stealth technique. Also, this build sports the ability to hide registry keys and values.
5c6ce632055c2b4e2bba28b0f6fef4b1631597d530612beacf8e86625d024ddf
P3 reprogramming docs and software
c049881e4a4b1479977e338d67f8dcb5d99976eb281696258a2099d53acd952b
Sony CMH-333 NAM Programming docs
8d4c9074e0965a06535e7b53de02b2d066f286017ab773105cfad86f8cc65b2a
CMH333 cable docs
1d5f303205429d222ca2c5b580f93c74549e1f5a38e4c0b96040388c0a19e47c
CMH 333 Mars Bar NAM programming
0e3be6271cd36cfa11d633481929797db7b351d934bacd587dcfe332a4eb39a5
the oki 900 faq
cb6a8f5bb3346bf0c71a401578611e456f74eee354fa12a3686fb6ddd51818ee
4712 modification docs and reprogramming software for the oki900
6844be4a484e481c5257635261daeace197eee88d432b034687184c59f160fc6
more oki 900 docs
19cb40a7c85b7f7dfbc4b2943087e65e20d6527b07ef0b61908fc2ef04360b37
oki900 ctek cable dox
e02aea5ede22b277bfc4053c56c023fd7c4013323a5074cfa9849b69e7fd5f4a
oki900 nam programming
406155c11afa9da7985125759c179dc0804b36257ac7087a4d8f1af360ac3cb4
CTEK scanning software.
50946f5739eee6e8cf7300ea11076b956a8632506933d35f61a2bf6d72193188
P3 test operations and more
88a5fbb20edc6af08d936b701a36d39cc490186eaa25c10e94d586f29aad0e33
PANASONIC EB 2500/2501/2502,TP 500/800 SERIES REPROGRAMMING
71f45a4630b10f053d11abe8bdabaf030653e2f322b5fd1c151a8ec5f1837eda
PANASONIC HH 700/900 NAM Programming
d79f6188a9354c5d2ed027d3826111882b871264bd6c87608b019e7888ef83be
PANASONIC CM/TF800 NAM Programming
769f513a24d09d69423a43933af95e8e1330ebc4ea5b29fcab38bf5c18864e36