Remote exploit for Zinf 2.2.1 on Win32 that downloads and executes a file.
e80d2409b6e269d59edd99db2b19a5529b757d7eb1f822c75d015ee3aba48dbb
UPolyX version 0.3 is a simple polymorphic open-source UPX scrambler. Comes with VC6 source code.
76f803c4a241d2b65788305267750d8bb9e1ae284387570a49288f288b7670e9
Buffer overflow exploit for BlackJumboDog FTP server version 3.6.1 that opens up port 7777 allowing for an executable upload.
d0a6cb671c15fdedc7d54c9417ea2d03b420c6181c6f36fa5782a5866cab377d
459 byte upload and execute shellcode for Windows 2000 and XP.
da0aa57a7273af5d6889c71b75bd70f0af07e0c0de19376285710e1118a837f1
A simple tutorial on Windows Shellcoding - Shows how to write shellcode in asm that spawns a cmd shell. Includes tools to encode the asm code to avoid NULL bytes, and to generate the typical C shellcode. In Powerpoint and PDF format.
d612a88f1dba4e28d11743cd0d9579d520bc1ffcfcc355aa2d650faad3da1111
SFPDisable is a utility that disable Microsoft Windows' File Protection by patching sfc.dll under Windows 2000 and sfc_os.dll in Windows XP. This allows a remote attacker to delete, manipulate, and backdoor any file on the system without Windows noticing upon reboot.
24605e3feea0bdf775d9c1ce2ac24e839a5e8effde6a87883b62062b173e2fca
Shellcode-v2.0 is a genetic win32 shellcode generator based mainly on kungfoo. You can generate a shellcode with the help of a GUI. Source and executable included.
bf21bbcff72608584169174404116a665444ac4b9bdc106694a2fe9770f56f35
Denial of service exploit against Half-life servers. After sending 3 specially formed packets the server is unresponsive and there is 100% CPU utilization. Tested against versions 3.1.1.0 under Suse Linux 7.3 and Windows 2000.
f6925a6a151cb89c26585acb1aea48df880c09ff4bfd634972dca9999ce666cd
Shellcode-v1.0.zip is a genetic win32 shellcode generator based mainly on kungfoo. You can generate a shellcode with the help of a GUI. Source and executable included.
7ceadbc837c0a293c10e87c625f4338c9ca2fa138a5049d58d67ace148db452d
Fmt.tar.gz contains tutorials in English and German on exploiting local format string vulnerabilities. This is a summary of tutorials from http://community.core-sdi.com/~juliano and includes sample code.
d8734dad39eae6eac7936a0b8293ae59adf0e02e8af61b742dc02ed9c0a777dc