!-- SonicWall SSL-VPN NeLaunchCtrl ActiveX Control exploit. by krafty greets to SK, muts, halvar, grugq, and all the ethnical hackers sux to exploit traders - ZDI, WabiSabiLabi, and all you h0arders. Bring back the days of technotronic and r00tshell!
/* MS07-055 Kodak Image Viewer TIF/TIFF Code Execution Proof Of Concept by Hong Gil-Dong, Jeon Woo-chi * Hwang-Hee(?~1542), Prime Minister in Korea * Once upon a time, One servant of Hwang-Hee was arguing with another * servant. they asked Hwang-Hee
#!/usr/bin/python #Secunia Advisory : SA27270 #Release Date : 2007-10-29 # Sony CONNECT Player M3U Playlist Processing Stack Buffer Overflow (m3u File) Local Exploit # Bug discovered by Parvez Anwar # Exploit Written by TaMBaRuS (tambarus@gmail.com)
!-- GOM Player 2.1.6.3499 GomWeb Control (GomWeb3.dll 1.0.0.12) remote buffer overflow poc exploit (ie6/xp sp2) quote from Wikipedia: GOM Player(Gretech Online Movie Player) is South Korea's most popular media player; as of July 2007, it had 8.4 mill
#!perl # # IBM Lotus Domino IMAP4 Server 'LSUB' Command Exploit # # Author: Manuel Santamarina Suarez # e-Mail: FistFuXXer@gmx.de # use IO::Socket; use File::Basename; # # destination TCP port # $port = 143; # # SE handler # # You can only use HEX va
#!/usr/bin/python # # IBM Tivoli Storage Manager Express CAD Service Buffer Overflow (5.3) # http://www.zerodayinitiative.com/advisories/ZDI-07-054.html # Tested on windows 2003 server SP0. # Coded by Mati Aharoni # muts.at.offensive-security.com # h
#!/usr/bin/perl #****************************************************** # Jakarta Slide Remote File Disclosure Zeroday Xploit # eliteb0y / 2007 # # thanx to the whole team andi :) # +++KEEP PRIV8+++ # # This Bug may reside in different WebDav impleme
## # $Id: eiqnetworks_esa.rb 4529 2007-03-12 01:08:18Z hdm $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information
#!/usr/bin/perl # Get Net::RawIP at http://search.cpan.org/CPAN/authors/id/S/SZ/SZABGAB/Net-RawIP-0.21_01.tar.gz # cpan Net::DNS:Resolver seems to work fine on each machine I throw it on, as well. # PS: To see if you can spoof, check out the ANA Spoo
?php //PHP 5.x COM functions safe_mode and disable_function bypass //author: shinnai //mail: shinnai[at]autistici[dot]org //site: http://shinnai.altervista.org //dork: intitle:phpinfo intext:php version +windows (thanks to rgod) //Tested on xp Pro sp
#!/usr/bin/perl #================================================================ # Apache Tomcat Remote File Disclosure Zeroday Xploit - With support for SSL # MoDiFiEd version by : h3rcul3s # ORiGiNaL Version by : kcdarookie aka eliteb0y / 2007 htt
#BBPortalS BBsProcesS Remote Blind SQL Injection Exploit #Bug Found And Write By Max007 #Exploit Tested On V.1.5.10 And V.1.6.2 And 1.5.11 #info:For The Version BBPortalS 2.0 name of field is user and password but you have to find name of table #!/us
/* * KNET Webserver (= 1.04c) PoC Exploit * * Testeado en Windows XP Spanish SP1 con KNET 1.04c * Da una cmd shell remota en el puerto 9100 * * Debido a que el server usa la pila para guardar datos * como el directorio web, o las peticiones web ante
/***************************************************************** * hoagie_hlserver.c * * Remote exploit for Halflife-Servers. * * Binds a shell to port 30464/tcp and connects to it. * * Author: KnbykL info@knbykl.org * * Thnx : All Soldier HbT * *