Microsoft IIS 4(NT4) and - IIS 5(Windows 2k) .asp buffer overflow exploit. Includes targets for IIS5 Chinese SP0, SP1, and SP2 and English SP2. Binds a shell to port 7788. Includes brute force mode.
cff7c84fef9c4f74d0c37c73407a5acab0f309b70a8a522033b68e5349f2fc61
Majordomo v1.94.4 local exploit in perl. Binds a shell to port 1234 with uid=Majordomo.
3a1bfea6bba3d9ea6fd7f66f9211de9ecce5dbe5b859d9ffa9613bbeeeb45ced
Qualcomm's Qpopper mail server POP3 authentication when used with PAM that gives remote users information about whether user accounts exist or not. This perl script has been tested with Qpopper v4.0.1 on Redhat 7.x.
552b77283bca7bfe71ead2e26048f4a7c53545e50aaf62baa7867718bbf668db
/usr/bin/mailx local buffer overflow exploit. Gives gid=mail shell. Tested against Solaris 8.
8270d776c54245c8f9730bdf87c4de6ee29ce8e325d9e3fb78e6f9951ae96cbc
TalkBack.cgi directory traversal remote exploit.
396c1d51895015c18e8733df3f237702266c9de2fd99fca89addccdee7fc09e6
Vim 5.7 local exploit - This perl script creates a text file which when edited in vim executes an arbitrary file on the local system as the user running vim.
94ac1222cdab6241822c8841377d2a2604f38df90c7a18c05a1615eec0506075
Windows SSHD remote denial of service exploit - Written in perl, affects SSH Communications Security SSH 2.4 for Microsoft Windows 95,98,NT4,2000.
53a2efceffbe1c6830a7e37b74a54871d0ece685d060fe04b74b5d8b870a9167
Bind Scan is a perl script which scans for vulnerable BIND servers. Uses dig to get information.
f61a4f4d436d5be1de4dfe50468d058777208b082da2808da3f641c2ac0e2afa
OpenSSH-2.2.0 remote exploit - Includes a wrapper to brute force the offset.
69c2cf51173e0fc8e778c6301220d383a260b74f3973fc7a977063b57e64b674