what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

HHP Programming

HHP Programming
hhp-site_unp.js.txt
Posted Nov 13, 2001
Authored by hhp, Isox | Site hhp-programming.net

Site Protector v2.0 password deciphering tool coded in javascript.

tags | javascript
SHA-256 | cc76f4e8ea690abe4502ce4187b490cad701361c15abccedeaa787a2e3c2e703
TEA-ICommandLine.tar.gz
Posted Sep 11, 2001
Authored by hhp, Tarsin | Site hhp-programming.net

The TEA (Tiny Encryption Algorithm) is a Feistel type cipher; The block is split into two parts, each being 32 bits, 128 bit key, and by default uses 32 rounds.

SHA-256 | 6b04bcdb8e2be37013dfaf33f81b10103ea0d42817c21a02d573ffd006dc5e67
hhp-pileup_smash.c
Posted Sep 11, 2001
Authored by hhp, Cody Tubbs | Site hhp-programming.net

A local buffer overflow exploit for pileup v1.1 and maybe others. Will gain root[uid=0].

tags | overflow, local, root
SHA-256 | 03ec951fe5e15a9672e1681575352a376e8e0714adebdcf27018783bce3aee5e
hhp-sccw_smash.c
Posted Sep 11, 2001
Authored by hhp, Cody Tubbs | Site hhp-programming.net

A local buffer overflow exploit for sccw v1.1 and maybe others. Will gain root[uid=0].

tags | overflow, local, root
SHA-256 | d1d7ed798702a71cff032aca0dd11741f3f394e38171c2bbc7a8a1538a4d3b4d
hhp-temprace6_0.pl
Posted Sep 11, 2001
Authored by hhp, Cody Tubbs | Site hhp-programming.net

Hhp-temprace6_0.pl is a quick and simple temp race checker for Linux, BSD, Sun/Solaris and IRIX. Put together to eliminate the hassle of manual checking.

systems | linux, solaris, irix, bsd
SHA-256 | 3a7b01350b0436ef102a74f1abf29d166c13d069a577ab60fb104dd82412538d
tcpproxy.c
Posted Sep 11, 2001
Authored by hhp, Cody Tubbs | Site hhp-programming.net

A tcp proxy.

tags | tcp
SHA-256 | b0e839102eb66e7fc5fc5e7f23927805b2ddb3b1481a6501192d10905931f47b
chanshell0_1_4.pl
Posted Sep 11, 2001
Authored by hhp, Cody Tubbs | Site hhp-programming.net

Chanshell is somewhat like an IRC bot with bash capabilities.

tags | bash
SHA-256 | 3d880f15c213c19a4f991c1552cf109daeb6f9cb0553e74114dfaf70036083a1
pro-sec.txt
Posted Sep 11, 2001
Authored by hhp, Cody Tubbs | Site hhp-programming.net

Programming and Programming Securely - How to do it. Includes information on argument checking, buffer checking, shell escapes, preventing races, logging, sly tricks, and more.

tags | shell
SHA-256 | edb8b73394fff8565bcf46d4f90e36e6624ac18ea964a4c8dc669891dc5b6a62
docanal.c
Posted Sep 11, 2001
Authored by hhp, Tarsin | Site hhp-programming.net

A document Analysis tool which is useful for cryptanalysis. From May '98.

SHA-256 | 8024662cda4203693c125747c6a763cff1085e773ab5485c9fe0b23f1c2232b7
hhp-webinfo.pl
Posted Dec 31, 2000
Authored by Loophole, hhp | Site hhp-programming.net

This little utility will use a public service (netcraft) to check the web server version and operating system of a remote host.

tags | remote, web
SHA-256 | 9daeb72af38ace3ab3f9e5d03f959dc534f506d19b3bca2a347b14881c7f11c5
hhp-knock_shellcode.c
Posted Dec 31, 2000
Authored by Loophole, hhp | Site hhp-programming.net

Shellcode which plays audio (knock knock) vi /dev/dsp and setreuid(0,0) + execve shellcode for Linux/x86.

tags | x86, shellcode
systems | linux
SHA-256 | a45331428e22c886119ae7325c4e640708d51d8be28eb45a5a5c17f3fa5b13a9
hhp-dtors.pl
Posted Dec 31, 2000
Authored by Loophole, hhp | Site hhp-programming.net

Generic ELF .dtors exploit.

SHA-256 | 7e4fcc9e325b71ea4dd0f30de481f4eb9dcb0403da041f927b6e200a7a9d57d4
hhp-genchains.pl
Posted Dec 31, 2000
Authored by Loophole, hhp | Site hhp-programming.net

Ipchains firewall frontend - Prompts enabled.

SHA-256 | 79f4d5c6dd2281fff7d8406580199d4e0cd4abdc137d8e7af428569d2d60ced3
hhp-dump.pl
Posted Dec 3, 2000
Authored by hhp, Icesk | Site hhp-programming.net

A local root exploit for /sbin/dump. Tested on RH6.2.

tags | local, root
SHA-256 | 966cbbdeb7805adb5c2121b34a3d4ff536fbe8d9e2b18c9352b9fde122d9b4b0
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Microsoft Power Pages Misconfigurations Exposing Sensitive Data
Posted Nov 15, 2024

tags | headline, privacy, microsoft, data loss
Man Gets 5 Years For Laundering Crypto From Bitfinex Hack
Posted Nov 15, 2024

tags | headline, hacker, data loss, fraud, cryptography
Five Eyes Infosec Agencies List 2024's Most Exploited Software Flaws
Posted Nov 14, 2024

tags | headline, government, usa, canada, britain, australia, flaw, new zealand
CISA, FBI Confirm China Hacked Telecoms To Spy
Posted Nov 14, 2024

tags | headline, government, privacy, usa, phone, china, data loss, cyberwar, spyware, backdoor
Two Men Charged For Hacking US Tax Preparation Firms
Posted Nov 14, 2024

tags | headline, hacker, privacy, usa, fraud, identity theft
Iranian Threat Group Targets Aerospace Workers With Fake Job Lures
Posted Nov 14, 2024

tags | headline, hacker, fraud, phish, iran
Air National Guardsman Gets 15 Years For Leaking Docs On Discord
Posted Nov 13, 2024

tags | headline, government, usa, data loss, military
Citrix, Cisco, Fortinet Zero-Days Among 2023's Most Exploited Vulnerabilities
Posted Nov 13, 2024

tags | headline, hacker, flaw, cisco, zero day
Ivanti Patches 50 Vulnerabilities Across Several Products
Posted Nov 13, 2024

tags | headline, flaw, patch
Intel And AMD Have Released Many Advisories
Posted Nov 13, 2024

tags | headline, flaw, patch, intel
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close