#!/usr/bin/python ''' Exploit Title: PCAnywhere Nuke Date: 2/16/12 Author: Johnathan Norman spoofy at exploitscience.org or @spoofyroot Version: PCAnyWhere (12.5.0 build 463) and below Tested on: Windows Description: The following code will crash the
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framewor
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framewor
-#-#-#-#-#-#-#-##~ Title : windows xp sp2 [ ARABIC] backconnect + acceptconnection shellcode =376 (bytes)#~ Author : TrOoN#~ E-mail : www.facebook.com/fysl.fyslm#~ Home : city 617 logt Draria algeria |#~ Web Site : www.1337day.com#~ platform :window
# Title :Linux x86 BackBox BackConnect Reverse TCP SSL shellcode 442 byte(s)# Author : TrOoN# E-mail : www.facebook.com/fysl.fyslm# Home : city 617 logt Draria algeria# Web Site : www.1337day.com# platform :backboX 32 bit Eng# Type : local root / ex
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framewor
## # $Id: $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasplo
#!/usr/bin/python ########################################################################################################## #Title: Sysax Multi Server = 5.52 File Rename BoF RCE (Egghunter) #Author: Craig Freyman (@cd1zz) #Tested on: XP SP3 32bit an
/* Exploit Title: TORCS = 1.3.2 buffer overflow /SAFESEH evasion # Date: 07/02/2012 # Discovered and exploited by: Fluidsignal Group - Research Team Division # Author: Andres Gomez and David Mora (a.k.a Mighty-D) ... Pwn and beans! # Software Link: h