/* * Copyright (c) 2007 devcode * * * ^^ D E V C O D E ^^ * * Windows DNS DnssrvQuery() Stack Overflow * [CVE-2007-1748] * * * Description: * A vulnerability has been reported in Microsoft Windows, which can * be exploited by malicious people to comp
#!/usr/bin/python # Remote exploit for the 0day Windows DNS RPC service vulnerability as # described in http://www.securityfocus.com/bid/23470/info. Tested on # Windows 2000 SP4. The exploit if successful binds a shell to TCP port 4444 # and then con
? /* Autor: Kacper Contact: kacper1964@yahoo.pl Homepage: http://www.rahim.webd.pl/ Irc: irc.milw0rm.com:6667 #devilteam Pozdro dla wszystkich z kanalu IRC oraz forum DEVIL TEAM. //dork: Help * Contact * Imprint * Sitemap | powered by papoo | powered
?php print_r(' --------------------------------------------------------------------------- XAMPP for Windows = 1.6.0a adodb.php/mssql_connect() remote buffer overflow proof-of-concept exploit seh overwrite method / 2000 sp3 version mail: retrog at al
### $Id$##### This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit# Framework web site for more information on licensing and terms of use.# http://metasploit.com/
/** * airodump-exp.c - aircrack/airodump-ng (0.7) remote exploit * * Proof of concept exploit for a stack (and heap) based * overflow in airodump-ng. The vulnerability can be exploited * by transmitting some specially crafted 802.11 packets to * exec
# usr/bin/python import socket print ------------------------------------------------------------------------- print Sami HTTP Server 2.0.1 POST request Denial of Service print url: http://www.karjasoft.com print author: shinnai print mail: shinnai[a
#!/usr/bin/php -q -d short_open_tag=on ? echo InoutMailingListManager = 3.1 Command Execution Exploit + Login Retrieve + Advisory by BlackHawk hawkgotyou@gmail.com http://itablackhawk.altervista.org Thanks to rgod for the php code and Marty for the L
/* IrfanView 3.99 .ANI File Buffer Overflow (Multiple Targets and port bind shell) Old Target: Windows XP Sp2 FR New targets: Windows XP SP2 Portuguese Call ESP Addr Windows XP SP2 English Call ESP Addr Greetz: Ricardo Fiorelli, Marsu (make this poss
?php print_r( +------------------------------------------------------------------+ Exploit For Phpwind 5.X Version BY Loveshell Just For Fun :) +------------------------------------------------------------------+ ); ini_set(max_execution_time,0); er
/**************************************************************************** * MS Windows Explorer Unspecified .ANI File DoS * * * * * * Another .Ani bug that freezes Explorer if you open a folder that contains * * a crafted file. * * * * Tested aga