exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files from Hi_Tech_Assassin

First Active2002-12-27
Last Active2004-04-17
billybastard.c
Posted Apr 17, 2004
Authored by Hi_Tech_Assassin

Local exploit that makes use of the flaw in lsass.exe. Binds a shell to port 31337.

tags | exploit, shell, local
SHA-256 | 5ab651d859d8f895fdbb8b2254456e49cb8e5b76f76710c0e0c66777d172abb3
ThunderstormWks.cpp
Posted Dec 16, 2003
Authored by Hi_Tech_Assassin

ThunderstormWks is a mass exploiter / scanner for the windows workstation vulnerability discussed in ms03-049. Can scan random IP ranges quickly and contains a ftp download payload.

tags | exploit
systems | windows
SHA-256 | 694612fd27f60e80475796f0afdffdc554276104596f06a8469f36d6c0b7e7ed
msnbug.txt
Posted Nov 25, 2003
Authored by Hi_Tech_Assassin, Brice aka THR

A bug exists in MSN's Messenger client that allows a user's IP address to be exposed due to improper parsing of the Ip-Address field when parsing requests.

tags | exploit
SHA-256 | 11b8007718efec8768261dc195d3d80f9c2678aab4655d151fba650b133b883d
redirector.cpp
Posted Aug 11, 2003
Authored by Hi_Tech_Assassin

A high performance C++ class that is useful for getting around firewalls and redirecting TCP traffic.

tags | tcp
systems | unix
SHA-256 | 9905ad8673701946518e32705fb73f51638d79e4fae7d764c5f875eaf260f415
art_of_brute_forcing.txt
Posted Jun 29, 2003
Authored by Hi_Tech_Assassin | Site t3chware.net

Paper written about the art of brute force cracking that comes with example code.

tags | paper
SHA-256 | 45d8ad1042d40237b9961db4391407e13922af227ab3c00955c625e2a4c5e4fe
dirtybrute.zip
Posted Jun 29, 2003
Authored by Hi_Tech_Assassin | Site t3chware.net

Dirtybrute is an advanced multi threaded program that demonstrates the use of a brute force engine which has many options such as the ability to resume cracking sessions for both brute force mode and dictionary attacks. Currently supports remote MSN messenger cracking sessions.

tags | remote, cracker
SHA-256 | 1b5eceb2e1ded79867017fb83a6a76c1bc79c59c0d801c3e6d36725f611ed767
puttypower.cpp
Posted May 15, 2003
Authored by Hi_Tech_Assassin

Putty v0.52 and below remote exploit which poses as an ssh daemon and will bind cmd.exe on port 31337 of the victim sshing inbound. Tested against Windows XP and 98SE.

tags | exploit, remote
systems | windows
SHA-256 | eafb21d90b54269b8a8b5aba1dbea160f82668e29aadfa66c25daf5443e53fc9
efshit.c
Posted Dec 27, 2002
Authored by Hi_Tech_Assassin | Site t3chware.net

Efshit is an exploit for the efstool vulnerability. Unlike other exploits for this vulnerability, Efshit is robust, has a wide range of attack options, incorporates brute forcing, and actually works.

tags | exploit
SHA-256 | 832cf510139b6658abbfd12c0a8fc81a46eea6532be15b619d2c7bf4e3854b9e
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close