port of the eeye IIS4 exploit
f227ce0cf8fa14ee3d614aa08127f35e77adeaae036e735393b18468ddc19589
Interscan VirusWall 3.23/3.3 exploit (by dark spyrit, unix port by team teso)
6e4ace9f970b47cf9e7c89aa49783ea028b61de99eb7c9f46eadd4f27ccdf67f
LAN based SYN flooder which spoofs SYN ACK packets too, allowing to bypass SYN-cookies ;)
d6389fa94812201d6f8fca90481cb40f46bb6c73c410787a5ce1da82267394a6
Linux 2.2.x ISN Vulnerability Advisory and Exploit
95d014e8e35cfb3ea836468f2d0ec0947af54f0e99ee6159d36fd319e86ea537
maps connections over http proxies (connect/post)
dc368561a60718b2c86eab0648b63dfacbd087d351117745fe992804dc07207f
ICMP tunneling tool
eb69dd5115a31a163495e42fc528290756b7ee7479d53b654ec291d1613d9725
simple threaded portscanner
05d9e68412a59bea9ac19171140afcd8cd7af676c709715056ec30e8160a277a
scans for relay vulnerable http-proxies
0217e2c40db864b44dbf94e852db56de3c54df0251c9c3e6ecba85ab1f101285
shoots every TCP connection in LAN by spoofing TCP packets
8589b1dbc478d59ca70a644dd12ba947f6d3e623293978c98abbb8f38880c556
like the first, but also spoofs the MAC address
13a2aca18315249383442efd3f89eaeb95dc322d82b27c0363cce55805aa8bdb
maps passive to passive and active to active socket
9b0b143d11c78c83ef09a5b27cfaa3a4557cfe644edbcea6fa83a17f0552d976
http proxy-cache file finder (goes through http proxies from a file and request a file)
3f77732839bc07525ace63773abff4f555dcfbbdbc336f6add8768d1b19f7801