Interscan VirusWall 3.23/3.3 exploit (by dark spyrit, unix port by team teso)
6e4ace9f970b47cf9e7c89aa49783ea028b61de99eb7c9f46eadd4f27ccdf67f
LAN based SYN flooder which spoofs SYN ACK packets too, allowing to bypass SYN-cookies ;)
d6389fa94812201d6f8fca90481cb40f46bb6c73c410787a5ce1da82267394a6
Linux 2.2.x ISN Vulnerability Advisory and Exploit
95d014e8e35cfb3ea836468f2d0ec0947af54f0e99ee6159d36fd319e86ea537
maps connections over http proxies (connect/post)
dc368561a60718b2c86eab0648b63dfacbd087d351117745fe992804dc07207f
ICMP tunneling tool
eb69dd5115a31a163495e42fc528290756b7ee7479d53b654ec291d1613d9725
simple threaded portscanner
05d9e68412a59bea9ac19171140afcd8cd7af676c709715056ec30e8160a277a
scans for relay vulnerable http-proxies
0217e2c40db864b44dbf94e852db56de3c54df0251c9c3e6ecba85ab1f101285
shoots every TCP connection in LAN by spoofing TCP packets
8589b1dbc478d59ca70a644dd12ba947f6d3e623293978c98abbb8f38880c556
like the first, but also spoofs the MAC address
13a2aca18315249383442efd3f89eaeb95dc322d82b27c0363cce55805aa8bdb
maps passive to passive and active to active socket
9b0b143d11c78c83ef09a5b27cfaa3a4557cfe644edbcea6fa83a17f0552d976
http proxy-cache file finder (goes through http proxies from a file and request a file)
3f77732839bc07525ace63773abff4f555dcfbbdbc336f6add8768d1b19f7801
Linux x86 exploit for Qualcomm Popper 3.0b?? (was fixed silently) Remote, but requires username / password.
ee5bf46e3b23428524f1537aa6b73d69ca254a1b739cf8bccec5390219672ff9
FireWall-1 FTP Server Vulnerability Background Paper #1 - The basic idea of the described attack is to subvert the security policy implemented by a stateful firewall. This is done by triggering the generation of a TCP packet that, when inspected by the firewall, will change the firewall's internal state such that an attacker is able to establish a TCP connection to a filtered port through the firewall. This packet is the server response to a PASV user request during a FTP session.
fcb6f48f31d6598b702db1e3ab3a2478a63a0a80c8c9de809337c6e185b65a4a
Active server pages (ASP) with runtime errors expose a security hole that publishes the full source code name to the caller. If these scripts are published on the internet before they are debugged by the programmer, the major search engines index them. These indexed ASP pages can be then located with a simple search. The search results publish the full path and file name for the ASP scripts. This URL can be viewed in a browser and may reveal full source code with details of business logic, database location and structure.
8df08f77a97c4061a43c01be319e5ef4511a09240fd42e5c021cd65c36a798af
Cfingerd 1.3.3 (*BSD) local root buffer overflow exploit.
5097329aa98ef60c423e4f68641079c5f39fc54d6c9cb6c8ce27b39693f13f56
FreeBSD 3.4-STABLE /usr/bin/doscmd local exploit.
240aafd27efd7ec32f33b54c6a35ce6df301d9a00e9f637b34305726c91908ba
Crashes almost any Windows box on your local network. Compiles on linux. Cycles through many different types of ICMP packets.
2575111d1cf5e36392a4463a57706b1b04889b8ee26fbe68c73a9d0a0787c259
FreeBSD 3.3-RELEASE /sbin/umount local exploit.
05c1e68a23b63191f9b39ac50e86987af8789d42d2f9bc5feda53505bfd8947e
It is possible to cause certain firewalls to open up any TCP port of your choice against FTP servers that are "protected" by those firewalls. This is done by fooling the FTP server into echoing "227 PASV" commands out through the firewall. Firewall-1 v3 and v4 are known to be affected.
02813345d04b4c54a9270f3a6f8c304ab46a80dcf60f14aab96e9458dbf927dd
Anywhere Mail Server Ver.3.1.3 for Windows contains a remote DoS vulnerability, via a long RETR string over port 110. Also multiple connections will kill the sendmail server.
898ce037d5ae22060272023db6f516430cb43637744b94e23045e20f85dc5447
Moves your mouse every specified period of time. Can be very useful for things that check this, like free internet service.
9506274dadf30521ee5544dc26e366348d66d98a21c3ea92ee3409c2a4a4a4f4
NTOMax v1.0 - A scriptable, server stress testing tool.This tool takes a text file as input and runs a server through a series of tests based on the input. The purpose of this tool is to find buffer overflows and DOS points in a server.
67706ebf49993f04d67f291331b9d20efa84b717acc0cb97a856eec2bbf2198b
tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.
0c3927343a479fa72bd2ab10d2f20f6f71997769f5aa3400d908043679b6baf5
Cisco Newsflash - Distributed Denial of Service. Contains information to help you understand how DDoS attacks are orchestrated, recognise programs used to launch DDoS attacks, and apply measures to prevent the attacks (including anti-spoofing commands, egress filtering, RPF and CEF, ACL's, rate limiting for SYN packets). Also contains information on gathering forensic information if you suspect an attack, and learning more about host security.
5706e76198a9513e1ab2858df9480fb5b1c60bd30defbb8002e77823fa329be8