ghba is a PTR record scanner ported from ghba.c. It has been enhanced to run much faster than the original ghba.c. It can scan an entire private class C network in under a minute if 32 threads are available.
92c4565b20b4f73f7f963a482cd44e6bc1db903941ab8b430f543fd68d9c04ca
Aladdin Knowledge Systems Ltd. PrivAgent active-x control overflow exploit.
78e1f9941ee243de2c6fa4f4dd4d806f45dbe201a8b08daf54b144678052bb4f
Indusoft Thin Client version 7.1 suffers from an active-x buffer overflow vulnerability.
c00e0788c5d6462b72882a1157510d0caed575ccdad96d8ed169da385363cbcc
SolarWinds Server and Application Monitor version 6.0 suffers from an active-x related buffer overflow vulnerability.
841395a87d46f8aba7dd14551684fe16b9e3de8cd2cb1433a295058e36790214
McKesson active-x control version 11.0.10.38 suffers from a variable enumeration vulnerability.
eb5a347719e20933c95310d59d0af5d7d0a513bcbf2f6ec63b483b1c7dc9b822
Mitsubishi MC-WorkX version 8.02 active-x control file execution proof of concept exploit.
051bf2d457fb3478224730c5a764957e57768528962485ff7c0f290f39f09bec
KingView version 6.53 has an insecure active-x control that allows for arbitrary file copying.
b16413ec1271c3727d0068f3aaa5e74cf60deb2c6fcbdfbe249e49df7374ffa2
KingView version 6.53 has an insecure active-x control that allows for arbitrary file creation and overwrite.
785c1ed4650168b152eb1ff73cd68727e7dd22759c9a9b2913d8f8f3b8aa9c10
wdivulge is a tool designed to find and download hidden files from a webserver. This is most commonly pictures, but you can adjust the file definitions to bruteforce any type of file that you'd like. wdivulge technically falls under the definition of a web fusker.
29e6623de8a65649d70f952b6b3e9f12a7eefe3ca42b4b1101b33bdfcc5fc10b
Samsung NET-i Viewer version 1.37 active-x SEH overwrite exploit.
89a65827884b5491e386120caa8f2acc5d2507db952b044c4deacb9cceae7d5d
FreeFloat FTP server buffer overflow exploit with DEP bypass that binds a shell to port 4444.
5662da3cb86b287d645ef14fb8cc9a9f867772e178d718b5af7e9ee91b410fed
AVCon H323 DEP bypass SEH overwrite exploits that generates malicious input.
e9723bb21ef7e18d46bb58e8632c159ba2ecf3cb81d3cb33337284e8f6f4f5c3
My MP3 Player version 3.0 buffer overflow exploit with DEP bypass.
b54cbd0865162eb25b5c22342efed86f3a18573bfb45a369f7c7720750c06179
Mini-Stream Ripper version 2.9.7 buffer overflow exploit with DEP bypass.
adab7efd625de89ea37ad48d9dc534b72cc56c9f5bf0af4fbf105a62532378b7
KnFTP server buffer overflow exploit that spawns calc.exe.
269031e41b681d1ddfd8ffb9bf66594087bd9a5295fd9be264a638510214b35f
DVD X Player version 5.5 Pro buffer overflow SEH overwrite exploit that spawns a shell on port 8080.
411ee2842b51ec572d84c97f03c5448321c4898cdbe96297b0f908e53b407c18
CoolPlayer Portable version 2.19.2 buffer overflow exploit with ASLR bypass and calc.exe bypass.
5194e3a74076a91240d0a9d25a7e77bd0b64a0ece05d9ae0aba221a285bb0c62
ActiveX UserManager version 2.03 suffers from a buffer overflow vulnerability.
7344c9a560abd42a22a4cc35be99d1c995f3ce762e33c795af7e937e54679814
CoolPlayer version 2.18 buffer overflow exploit that spawns calc.exe and has DEP bypass.
1f553e0420c68cd55358114e9b7b4a82029def16ea7e993e035b55ca242fe79b
OpenEMR version 3.2.0 suffers from cross site scripting and remote SQL injection vulnerabilities.
9ca836e02286319ce83ae42b646fda3eb4771e29dac9f5fdfbd9b81bc55b9b34
DATAC RealWin SCADA version 1.06 buffer overflow exploit.
6818f87a91e009b671fe428a53fdce95774746ae0a3c4d078f33d078501fe807
Uebimiau Webmail version 3.2.0-2.0 suffers from a local file inclusion vulnerability.
7fc91fe88ddc29761c0a08cb6b86047aa397c875786e4649924f32af2a98044c
DNET Live-Stats version 0.8 suffers from a local file inclusion vulnerability.
c9b189d8fc877e16ec667d8396e8b82cd74519b4232e0d79808a2bed332b0e20
Image22 version 1.1.1 Active-X buffer overflow exploit that binds a shell to port 4444.
41e9853077146d1de1f453ea801f845a3bc321d5f14366f5a7b9deb791e27321
76 bytes small Linux / x86 shellcode that performs a connect back using netcat.
92a674036251b7aa7d6e8cf7f2b13ad73e6b53728d55e041bf98d436ff0be673