?php ## ## Name: Fuzzylime 3.01 Remote Code Execution Exploit ## Credits: Charles real F. charlesfol[at]hotmail.fr ## ## Conditions: None ## ## Greetz: Inphex, hEEGy and austeN ## ## Explanations ## ************ ## ## Ok, so today we will go for a wa
#!/usr/bin/perl # Simple DNS Plus 5.0/4.1 remote Denial of Service exploit # # usage: sdns-dos.pl dns server dns source port num of packets # Exploit written by Exodus. # http://www.blackhat.org.il use IO::Socket; if(@ARGV 3){ print(sdns-dos.pl dns s
########################################################################## #### Felipe Andres Manzano * fmanzano@fceia.unr.edu.ar #### #### updates in http://felipe.andres.manzano.googlepages.com/home #### ############################################
;-------------------------------------------------------------------------; ; OllyDBG v1.10 and ImpREC v1.7f export name buffer overflow vulnerability ; PoC (probably older versions affected too, not tested though.) ; ; Included shellcode shows a mes
#!/usr/bin/python # Download Accelerator Plus - DAP 8.x (m3u) 0day Local Buffer Overflow Exploit # Bug discovered by Krystian Kloskowski (h07) h07@interia.pl # Tested on: Download Accelerator Plus 8.6 / XP SP2 Polish # Shellcode: Windows Execute Comm
#!/usr/bin/perl # # Neutrino 0.8.4 Atomic Edition Perl exploit # # discovered written by Ams # ax330d@gmail.com # # DESCRIPTION: # First exploit destroys /data/sess.php file (simply strips tags), # then we are able to bypass authorization and using a
#!/usr/bin/perl -w #Triton CMS Pro (X-Forwarded-For) Blind SQL Injection #Admin's username/hash disclosure exploit #Benchmark() method, so take a coffee and relax #Coded by __GiReX__ use LWP::UserAgent; use HTTP::Request; if(not defined $ARGV[0]) { p
#!/usr/bin/perl # # quickbite.pl # # Safari + Quicktime = 7.3 RTSP Content-Type overflow exploit # for Mac OS X (Intel) # # Tested with OS X 10.4. # On victim, browse to http://server:8080/ # Binds shell on port 4444. # # by krafty # # greets to sk,
#!/usr/bin/perl # # fuzzylime 3.0.1 Perl exploit # # discovered written by Ams # ax330d@gmail.com # # DESCRIPTION: # There are availability to load files through script # rss.php, and also there are unfiltered extract(); usage. # This exploit creates
Title : ImperialBB = 2.3.5 Remote File Upload Vulnerability Date : 5th July 2008 Found by : PHPLizardo - http://phplizardo.2gb.fr Greetz : Gu1ll4um3r0m41n Howto : 1. Go to your User Control Panel 2. Upload any file you want 3. Tamper the request and
#!/usr/bin/php ?php # # ------- Thelia 1.3.5 Multiple Vulnerability Exploit # http://www.thelia.fr/ # THELIA est un logiciel volutif de Commerce Electronique. THELIA se distingue des applications concurrentes par sa facilit de personnalisation. # A n
#!/usr/bin/perl -w # Joomla Component altas v 1.0 Multiple Remote SQL Injection # variables vuln : ( ano ) ( mes ) #[*] Found by : Houssamix From H-T Team #[*] H-T Team [ HouSSaMix + ToXiC350 ] #[*] Greetz : Islamic Security Team and all musulmans ha