exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files from Lympex

Email addresslympex at gmail.com
First Active2005-08-26
Last Active2008-01-25
PExtractor_v0.18b_binary_and_src.rar
Posted Jan 25, 2008
Authored by Lympex | Site l-bytes.tk

PExtractor is a forensics tool that can extract all files from an executable file created by a joiner or similar.

tags | tool, forensics
SHA-256 | d56062cf1ab0f5323aba9e3a81dd0852581f7c1b341823615c4690370255642a
FlashFXP.Account.Spy.1.5.c
Posted Apr 17, 2007
Authored by Lympex | Site l-bytes.tk

FlashFXP Account Spy 1.5 - Utility to capture login credentials of FlashFXP.

tags | tool, sniffer
SHA-256 | 0b06a8ba5caf53a8edbfb021db532e04486671fe7835b9c6c4e5f9737aeb2121
D-Link.Wireless.Access-Point.c
Posted Jun 11, 2006
Authored by Lympex

exploit for D-Link DWL-2100ap which discloses the configuration file to remote users.

tags | exploit, remote
SHA-256 | 9964f14447ea2955f5b7016a84c062307bcc7b43558f3ff7cb4b7aeea4f671f5
ArGoSoft-1.4.3.5-DoS.cpp
Posted Mar 2, 2006
Authored by Lympex

ArGoSoft FTP server versions 1.4.3.5 and below remote denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | 37840dc5e7614f6dacb3b057a5b527ff414a8f2e14adad675f4f68481ade620c
FlashFXP.tgz
Posted Feb 25, 2006
Authored by Lympex | Site l-bytes.tk

FlashFXP Account Spy 1.0 - Utility to capture login credentials of FlashFXP.

tags | tool, sniffer
SHA-256 | b7248c65601bfbcd18068bab72b7d870ad0984e6076a9a7d16c714cbfbfe6ccb
Microsoft.IIS.Malformed.URI.cpp
Posted Dec 28, 2005
Authored by Lympex | Site l-bytes.tk

Microsoft IIS 5.1 malformed URI denial of service exploit.

tags | exploit, denial of service
SHA-256 | 837498a4d744d992373c5ed655af6324ffb4059f266d8a1030be1af897c8de58
cpanel-9x_RCE.c
Posted Sep 1, 2005
Authored by Lympex | Site l-bytes.ne

Exploit for cPanel versions below and equal to 9x that takes advantage of a remote command execution vulnerability.

tags | exploit, remote
SHA-256 | 6e74cd53627a40348b129b2f8f7c66f2eb17564e01d5469e32a0bb3e9bcee9c5
HP_OV_NNM_RCE.c
Posted Aug 31, 2005
Authored by Lympex | Site l-bytes.net

Remote command execution exploit for HP OpenView Network Node Manager versions 6.2, 6.4, 7.01, and 7.50.

tags | exploit, remote
SHA-256 | 35f6fb2bbbf9a319cca337f6e91aa2660874027de25e497f6c79ccace01bedc0
Evil.Shell.Backdoor_1.0.5.c
Posted Aug 26, 2005
Authored by Lympex | Site l-bytes.tk

Password protected windows bind/reverse shell backdoor written in Visual C++ Archive password is set to p4ssw0rd. Use at your own risk.

tags | shell, trojan
systems | windows
SHA-256 | 0475009407cb1326228f33e0edd9b896
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close