Adore is a linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.
ee53884a983a43ec25707f506863dc74451ddf00c166ffe16702abe049b32a70
Burneye ELF encryption program, x86-linux binary, version 1.0 - new year release!
abb3b6307900d42db68bca1fe91b32ee37668ddf3c3bc2481803bfd3c64fe830
Stripped burneye sources, for educational purposes (beside the speech + article).
6930a9cad59edd2543fbb07609b403472baa7babb7dcb0d0d20eeb60059386ad
SGI Security Advisory 20020902-01-I - SGI IRIX 6.5 systems apply world-readable permissions on all coredumps. This can allow local users to disclose sensitive information from system coredumps. This affects IRIX versions prior to 6.5.15.
8865c4316b71f35b8b1d3a39f7a567c21b5039bfae4604de43980cfb6abfae49
SGI Security Advisory 20020901-01-A - It has been found that several operating systems have insecurely implemented the IGMP protocol and several attacks can be used to take down network segments that are being routed by such systems. SGI acknowledged the problem but did not release patches yet.
08b944c933f57062e0415a18cfab72760323dd032a31c138c3794625199b5b1c
Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated twice a month to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins, open shares, and much more.
437ac39377017a6b8e21b0d7657972f364942993f9aa15419e8937d9d70a2204
Cisco VPN 5000 Linux client version 5.1.5 local root exploit that uses the close_tunnel binary.
ace076932d0664c2056944cff5c03f7c2d82699188fdeea7f90ecefb6ae7e279
This exploit abuses a local buffer overflow in the Cisco VPN 5000 Linux client v5.1.5 close_tunnel binary to spawn a root shell.
34bafeee302ca398ef823196ebb28939ffd4c7fc879cf8d54ed08151f5f4034e
Foundstone Labs Advisory 091802-ISSC - A vulnerability found in the manner used by Internet Scanner to parse certain types of non-standard HTTP responses can result in a remotely exploitable buffer overflow condition. This affects Internet Scanner version 6.2.1 for Windows (NT/2000) and has been corrected with X-Press Update 6.17.
655c1b08b83654c57d4a7f81aaac0806532b8ff0621b06ad39c9e03d7f841c8b
k3.c is a Linux proof of concept exploit for a buffer overflow vulnerability that exists in the atftp client version 0.5 and 0.6.
c88dc7b4f80fa1f4177433c0caa63dacaa45a74d5342a1f914ded575b8ce3386
Personal FTP 4.0 stores all user names and passwords in the program in clear text, making it often possible to download all the users passwords.
4181e7f6b58a63526cec229d1d3ad58588252fdd1e3681f7f083a1f7753e2193
Apache OpenSSL handshake exploit for Linux/x86, from a circulating Apache worm. Spawns a nobody shell on tcp port 30464. Includes targets for most recent distributions.
d556b921afa65987fbfce40ecaf730bfb6ad9fb761d32e4aaff71b95149502eb
FreeBSD Apache exploit based on apache-worm.c. Affects FreeBSD 4.5 Apache 1.3.20-24. Sends a nobody shell to TCP port 30464. This is a fixed version - Prior versions were broken.
f406bf2bf696f6639b1cc39d57ebe81efe602557b5527375dfa26c0efe708046
Buffer Overflows for Kids part 2 - This is part two, the follow on from bofs4kids. In this tutorial I am going to attempt to give you the knowledge to be able to e exploit a program, without coding in C. But we will need to use gdb quite a bit, so any prior knowledge would be helpful but not necessary.
39a87ffcaf6f339e334dc1cda6f41e33561a41b19cd6e1c899d2b2fa9e343ef2
This tutorial is not going to teach you how to code an exploit, but what it is going to do is give you a good understanding of what a buffer overflow is, what types of buffer overflows there are, how we would go about exploiting a buffer overflow, and how to identify a buffer overflow. C and ASM knowledge is not required.
3b09e6c7b77a96b63d7b66bb3c986b732511691a13617d29880e2b53c3d34f5a
Lastlog log editor.
602feed9a779a7106619a527ad02835fd6bddabf4eb46d84ef3a54902c3ff825
This tutorial was written to show Unix users how to create a simple Unix LogFile editor.
d4ad19517e0180b17fd80c7d62561eae9a764b3d79eb2c17e3b94b0d1d1dd2f5