This Ruby code will test a specified Host's SSL certificate against the Debian-based blacklist of keys (RSA 2048 and DSA 1024) generated during the period where openssl on Debian-based installs suffered from a weakness in random number generation. Note that the blacklist is embedded in the code so the file is about 23 MB.
288124a67c707a0fcf89edfbedf7c4788dd853dd55871cba94ecfe308e0ea1ae
Hhp-qtip.c is a local root exploit for /usr/bin/tip on BSDI 4.2. Requires access to tip, usually gid(dialer).
68b298f994c8c477f0f7455e566dc8f16aa96901ae020b249e0593c73d2ca8d6
Site Protector v2.0 password deciphering tool coded in javascript.
cc76f4e8ea690abe4502ce4187b490cad701361c15abccedeaa787a2e3c2e703
The TEA (Tiny Encryption Algorithm) is a Feistel type cipher; The block is split into two parts, each being 32 bits, 128 bit key, and by default uses 32 rounds.
6b04bcdb8e2be37013dfaf33f81b10103ea0d42817c21a02d573ffd006dc5e67
A local buffer overflow exploit for pileup v1.1 and maybe others. Will gain root[uid=0].
03ec951fe5e15a9672e1681575352a376e8e0714adebdcf27018783bce3aee5e
A local buffer overflow exploit for sccw v1.1 and maybe others. Will gain root[uid=0].
d1d7ed798702a71cff032aca0dd11741f3f394e38171c2bbc7a8a1538a4d3b4d
Cso.c is a remote exploit for cgicso included with cgiemail 1.6. Tested on Slackware Linux 7.1 running Apache 1.3.20.
8d232fa0a2687a8c7dc294c61bb1c84b0a1be65bdeb8565fa7f6f9fa693a87cb
Hhp-temprace6_0.pl is a quick and simple temp race checker for Linux, BSD, Sun/Solaris and IRIX. Put together to eliminate the hassle of manual checking.
3a7b01350b0436ef102a74f1abf29d166c13d069a577ab60fb104dd82412538d
A tcp proxy.
b0e839102eb66e7fc5fc5e7f23927805b2ddb3b1481a6501192d10905931f47b
Chanshell is somewhat like an IRC bot with bash capabilities.
3d880f15c213c19a4f991c1552cf109daeb6f9cb0553e74114dfaf70036083a1
Programming and Programming Securely - How to do it. Includes information on argument checking, buffer checking, shell escapes, preventing races, logging, sly tricks, and more.
edb8b73394fff8565bcf46d4f90e36e6624ac18ea964a4c8dc669891dc5b6a62
A document Analysis tool which is useful for cryptanalysis. From May '98.
8024662cda4203693c125747c6a763cff1085e773ab5485c9fe0b23f1c2232b7
Hhp-gdc_smash.c is a local root exploit for gdc. Requires group wheel access. Tested on BSDI 4.1 x86 default install.
59ac3f8c25947407d2c2124b1b923963380381d66406ef270bdd57b3c00baae5
Hhp-ospf_smash.c is a local root exploit for ospf_monitor. Tested on BSDI 4.1 x86 default install.
b3df13e1c7b793947794b12771072086104e86b8f0f39f8f17d3b3f017cad2b0
This little utility will use a public service (netcraft) to check the web server version and operating system of a remote host.
9daeb72af38ace3ab3f9e5d03f959dc534f506d19b3bca2a347b14881c7f11c5
Shellcode which plays audio (knock knock) vi /dev/dsp and setreuid(0,0) + execve shellcode for Linux/x86.
a45331428e22c886119ae7325c4e640708d51d8be28eb45a5a5c17f3fa5b13a9
Expect v5.31.8 and v5.28.1 contains local buffer overflows. It is possible to exploit any suid/sgid expect application.
8a69e04abc43d9ebdcd6198de5a7b5431ff007a5dca07c47115be8df48b6e33d
GnomeScott local buffer overflow which provides a gid=40 (game) shell on SuSE 6.4 and 7.0.
b91af559b80952154115640a2ad71c7a3af251836cff99bde6dad6259ee95e28
Expect (/usr/bin/expect) v5.31.8 and v5.28.1 local buffer overflow exploit. Tested on Slackware 7.x. Advisory available here.
763a21a0317bfb6f2998e4af7bd10b8c567fd24381ff2cea8e0f004f377ce176
Gnomehack local buffer overflow exploit which provides a gid=60 (games) shell on Debian 2.2.
5ccc4924acae3a7b73ecd24a19febb73d31ccc8e7ed7d704614e4dcbd8d4550a
Kwintv local buffer overflow exploit which provides a gid=33 (video) shell on SuSE 7.0.
d44863b348783f75efca589a0a0b99b6a150e833cd2e1dd95d32999361050380
Fancylogin v0.99.7 local root exploit. Tested on Red Hat 6.1.
6a6d636b942d55b3a7cd1edceb5b8ba35821afd8196ce14ad6e2f04d65c3d913
Generic ELF .dtors exploit.
7e4fcc9e325b71ea4dd0f30de481f4eb9dcb0403da041f927b6e200a7a9d57d4
Ipchains firewall frontend - Prompts enabled.
79f4d5c6dd2281fff7d8406580199d4e0cd4abdc137d8e7af428569d2d60ced3
STonX v0.6.5 and v0.6.7 local root exploit. Tested on Slackware 7.0.
c751c9ecd87655ab1f2703c193c5080ea84909a0b48d28666ce7f32edbf5b25e