Obfuscate.c is a linux and bsd log file cleaner.
939125b06fc9ffd36abf2f322e147c4a8138b429d68b588fb867a4b77f4a0afe
L2kscan is a unix based scanner with support for telnetd, smtp and a few updates to the sshd vulns and code.
5ef99baa02e6687e50fa4da9db4d88e5081c2102f4128f0e588ad239b0c95dfc
Mdaemon v6.0.7 and below remote denial of service exploit which takes advantage of the UIDL bug. Exploit code tested to run on Redhat8 and FreeBSD 4.7-STABLE. Requires POP3 account on vulnerable daemon.
790e1a322fccc231fc267ba7117c1710f124d3cfa7931256bae04b1c005e3278
Outlook Express version 5.50 and 6.0 contains a security vulnerability in the handling of S/MIME certificates which allows arbitrary code execution when inspecting a S/MIME signed message.
bc9a16df800c23057348b4928f436978cd5a07b073ace82b10988bb236ad0dc1
BBD is a passcode protected remote backdoor with configurable TCP port. After login the backdoor reports if any users or root users are logged in. Allows remote command execution and file upload.
c94ce4de6648788702f30b912502e40e620be28a93775923d332ef123cb969b4
Ownit is a script that installs libnet, libnids, and dsniff on a system.
c95d409b8135112ec06fe4c0749d40c74ae16248fa15be0723e45e5e18b6e77d
The Linux Intrusion Detection System (LIDS) is a patch which enhances the kernel's security by implementing a reference monitor and Mandatory Access Control (MAC). When it is in effect, chosen file access, all system/network administration operations, any capability use, raw device, memory, and I/O access can be made impossible even for root. You can define which programs may access specific files. It uses and extends the system capabilities bounding set to control the whole system and adds some network and filesystem security features to the kernel to enhance the security. You can finely tune the security protections online, hide sensitive processes, receive security alerts through the network, and more.
33bc39be02f6f9fa92f7efb8c6d01faab2053db50dc8cd1eddd75d3abe91aa5a
MSSQL Server 2000 SP0 - SP2 remote exploit which uses UDP to overflow a buffer and send a shell to tcp port 53. Windows binary, C++ source code here.
d6907914ee2d6127262ab91de8878fe5f9b1afe9e8cda7d6345fd2c14feeb2fe
MSSQL Server 2000 SP0 - SP2 remote exploit which uses UDP to overflow a buffer and send a shell to tcp port 53.
7044113295ae8d7257c9af9f64073d4d2e4576635263c471c511b95c4f6eb551
Enumshare is a Windows utility which enumerates shares on local and remote machines and displays which users are currently logged into those shares.
f7aa663a6bee1baaff103aff685fbe30ed4c9a13e6ee852dbec03d79a658792e
/usr/sbin/grpck proof of concept local exploit. Not setuid by default. Tested on SuSE, Red Hat, Debian, and Mandrake.
71bfe6e2e647879dfcd24d8f56b296965f537cb2bd0c0b575f192e247aeefcfd
FreeBSD Security Advisory FreeBSD-SA-02:43.bind - BIND 8 has two vulnerabilities. The BIND SIG Cached RR overflow allows a remote attacker to force a server with recursion enabled to execute arbitrary code with the privileges of the name server process. The BIND OPT DoS and BIND SIG Expiry Time DoS may cause a remote name server to crash.
c6ffc36a671f6f5c4df06000d02ae9e77bad3e00ca4d79496cd912a7b2c3ff54
The Oracle iSQL*Plus 91 R1 and R2 web based application has an authentication buffer overflow on all OS's in the User ID parameter which allows remote attackers to execute arbitrary code as the oracle user on Unix and SYSTEM on Windows. Patch available here.
1721781c18414d0033b5c54cab225544447998747b4d67107efcbc20286bb7b9
Tftpd TFTP server v2.50.2 and below remote exploit which allows any file on the system to be viewed and written to arbitrary locations. Fix available here.
873d353180f19cd2f3180436d51e6b969551726ec62331c1e8f534cb4d29e38f
Tftpd TFTP server v2.21 and below remote command execution exploit in perl. Fix available here.
fcdc959822bf5fe12b26d0525067a4065e0b63beccdcd45371546b50e251eacf
Paketto Keiretsu v1.0 implements many of the techniques described in recent here.
d299bf6abe03d918e37df1c295802a96440e450cb66dda894e980338dbd31941
iPlanet Remote root exploit tested on v4.x up to SP11. Advisory for this bug here.
6dc8fcf2d54cb62c460e2ef5e5c338d9e564dbb51c7f51391e5af1338aea7bdc
The iPlanet WebServer v4.x up to SP11 contains vulnerabilities which allow remote root command execution by using a cross site scripting vulnerability to redirect the Administrator's browser to a URL in a vulnerable perl script that will cause the open() command injection.
e6d57374873ddcf0334a40142fc81f76dc5c0eaf48548811bef588fe324a0d20
SPIKE proxy is a web application analysis tool which uses the SPIKE API to help reverse engineer new and unknown network protocols. Provides security analysis features for Web applications, a multi-threaded design, man in the middle SSL proxying, form rewriting, SQL injection detection, handles Connection: keep-alive properly (it is possible to log in to Hotmail with it), and rewrites User-Agent to pretend to be running IE. Requires pyOpenSSL pre 0.5 from the SPIKE Web page. Several working examples are included. Screenshot available here.
54a911963dbe4a6caf791058bad81c96bb56b6161bdc47bc2ca775b8dbf8b47a