AdoreBSD 0.34 - Based off Linux Adore by Stealth. Features hiding files and directories from view, makes processes invisible, hides promiscuous flag and syslog messages, execute as root, hides sysctl mib entries, netstat service hiding, authentication, and module hiding. Developed on FreeBSD 4.3-STABLE.
cfeece4d9e9d8347a58eddaf64786360a9187ee3f9bc5af4ee4426bc941f9e3b
Adore is a linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.
81a2723c4a646ea1c9d07a8b8689f5d9f2b498231624d3516bf9a5a8729ca172
Cfingerd prior to v1.4.2 remote root format string exploit. Includes information on finding offsets. Tested against Debian cfingerd v1.3.2, 1.4.0, 1.4.1, and RedHat 7.0 cfingerd 1.3.2.
27d6d03e401bbc5d64121d7bf098b55babef4798dff575768d01cd2abac1b648
Arpmim v0.2 implements an ARP man in the middle attack. Includes single or multiple host support, asymmetric MiM, arpop_request, and macoff.
85d0ebf42ca0b511272bae44719270ba2cc579d2c7b4c60f48725bdb5c1487c5
Adore is a linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.
cb6a7f28f3180a55c6b06e51a03d1a0d0fb4af64f083d6b2b94ca067652a1ed4
Introduction to the MIPS architecture and the IRIX operating system, focusing on how to write shellcode for IRIX. Includes 3 sample shell codes. This is an updated version of the article in Phrack 56.
4ae9d1a99adae30ec567bcc47c657eb5fa712b7d9ea625abbd8747f87f01cfae
Telnetfp is an OS detection tool which uses do / dont requests via telnet to determine remote OS type. Contains 72 OS fingerprints.
ae48c9908a16c1891aecf361d8d8926967db8faac2b155964f6fb83ddb47c8d7
Adore is a linux LKM based rootkit. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.
426425af2fe14766dcb5ee37af975be1d81fe96943bde9e12671fbf26a899a21
7350wu.c is a Wu-ftpd v2.6.0 remote root exploit which does it the proper way. Works on Linux/x86 and FreeBSD.
33f1db59facbfa0648cc1b9e7fac8958fdfbe6056b000bfbd7ca175b8b29af23
German speech given at the CCC - "exploiting format string vulnerabilities". Including examples.
fb6f4bbc3e3270eb0fdf54421051b06b4537b3129ca000b5f781fac055d4b629
Exploit for the Bind NXT remote root vulnerability, which affects Bind v8.2 - 8.2.1. Compiles on Linux, tested against Irix, BSD, and Linux. Includes Irix shellcode for breaking chroot.
febfc0b34d825bb1fd2b1ea1e96374fa6816966c45c2f8ac101caef72cf4b91b
Reverb is a tool to access firewalled, dynamic-dialin and otherwise protected hosts.
9548ad877de5a2911412ee36598b233d8e3896399e75768fa1aa5b678c016314
OpenBSD ftpd v2.4_BASE through 2.8 remote root exploit. Includes offsets for v2.6 through v2.8 and instructions for finding offsets of other versions. Requires a writable directory.
e60d36076da9b2566b60a358f1600945cb7392b7f05305acfc0f2dfa49415169
Openssh-Reverse is a patched OpenSSH which goes in reverse, allowing outside users to connect to machines behind NAT firewalls. In reverse mode, sshd acts as a client and brings the connection to a modified ssh server.
c83bf07ed61053f6c369bd3bd2c8252548532e232e27ee4365928a0691d9ff64
Telnetfp is an OS detection tool which uses do / dont requests via telnet to determine remote OS type. Contains 32 OS fingerprints.
e83fb59569a1389c70a22f1b784ff37e5e031e4c84a72080ca8a08acbb023d67
Telnetfp is an OS detection tool which uses do / dont requests via telnet to determine remote OS type. Contains 23 OS fingerprints.
0567b0152bd59007461af62751f10b20eabf48b7fd1831ae530a2e63fcafb436
qpopper 2.53 euidl x86/linux remote exploit. Includes a procedure to abuse format strings to find the correct offset. Tested on Debian 2.1, RedHat 6.1, Slackware 7, Suse 5.2 and 6.0.
d4fbf6b568b41b3a4ab5332d446981b085dcf13b1b623c727517903de3998105
Zodiac is a portable, extensible and multithreaded DNS tool. It is meant to be used as a DNS packet monitor and DNS protocol test and debuging tool. It's basic features are: sniffing of DNS datagrams on an ethernet device, decoding of all types of DNS packets, including safe decompression (partly finished, SOA record are, for example, not decoded yet), nice display and gui, if you like ncurses and text based frontends, always interactive in all situations through built in command line, threaded and flexible design. Advanced features include: local DNS spoof handler, jizz DNS spoof, exploiting a weakness in old bind implementations, determines jizz-weakness, id-prediction and resolver type remotely, id spoofing, exploiting a weakness in the dns protocol itself, implements some advanced DNS denial of service attacks, including flood, label compression and unres attack, advanced DNS smurf.
87f79104df9555ecf18355d034a721bd7327ecf82037e1e480a0752bb07e3a14
TESO Security Advisory #10 - KDE KApplication {} configfile vulnerability. Due to insecure creation of configuration files via KApplication-class, local lusers can create arbitrary files when running setuid root KDE-programs. Tested with SuSE 6.4 standard installation under KDE 1.1.2.
004b3ec17b9d4970f5d766395aef75b5dbd5c2b046edf150e3773fa527b7f18b
execve-shell.tar.gz allows you to easily create linux x86 shellcode that execs any command you supply.
0cc554a1bcbc9a9ef9026428188060ef14886a2ba40aad275be5201d08d7fe39
l0phtl0phe-kid.c - Easy antisniff v1.02 exploit. l0pht messed up the fix for their problem in antisniff by not regarding the type signedness properties of the char and int values used, resulting in a cool of method bypassing the extra length + strncat checks. This version has been made easy enough for script kiddies to use - to avoid that "doesn't work" lamer claim.
bd31032131862d82287cf734e1ae6420cdb563449a5eb13f9c348e7266dd300d
Arpmitm.c is another tool for using arp man-in-the-middle attacks which keeps sending the packets. Requires Libnet 1.00.
a19ed2757a2e4c0b49f24c7b64aee902e263d54e73f80c0eec793933f61e7856
l0phtl0phe.c - antisniff exploit (1.02 included). l0pht messed up the fix for their problem in antisniff by not regarding the type signedness properties of the char and int values used, resulting in a cool of method bypassing the extra length + strncat checks.
936d433c03025bd9a3d606c0f3d43a479b07e715b0201d0e5f316e3adcac8c05
New TESO kscd exploit (cd player is KDE multimedia package)
e2cfafa7ac798db283b6758278403a70baea8c1bc09a51fe0721f706e1a5989a
exman.c is a new man exploit.
832e578f11428c863468dabddea6bce1956334bf36020dad8673f91d5be34f3b