Hhp-gdc_smash.c is a local root exploit for gdc. Requires group wheel access. Tested on BSDI 4.1 x86 default install.
59ac3f8c25947407d2c2124b1b923963380381d66406ef270bdd57b3c00baae5
Hhp-ospf_smash.c is a local root exploit for ospf_monitor. Tested on BSDI 4.1 x86 default install.
b3df13e1c7b793947794b12771072086104e86b8f0f39f8f17d3b3f017cad2b0
This little utility will use a public service (netcraft) to check the web server version and operating system of a remote host.
9daeb72af38ace3ab3f9e5d03f959dc534f506d19b3bca2a347b14881c7f11c5
Shellcode which plays audio (knock knock) vi /dev/dsp and setreuid(0,0) + execve shellcode for Linux/x86.
a45331428e22c886119ae7325c4e640708d51d8be28eb45a5a5c17f3fa5b13a9
GnomeScott local buffer overflow which provides a gid=40 (game) shell on SuSE 6.4 and 7.0.
b91af559b80952154115640a2ad71c7a3af251836cff99bde6dad6259ee95e28
Gnomehack local buffer overflow exploit which provides a gid=60 (games) shell on Debian 2.2.
5ccc4924acae3a7b73ecd24a19febb73d31ccc8e7ed7d704614e4dcbd8d4550a
Kwintv local buffer overflow exploit which provides a gid=33 (video) shell on SuSE 7.0.
d44863b348783f75efca589a0a0b99b6a150e833cd2e1dd95d32999361050380
Generic ELF .dtors exploit.
7e4fcc9e325b71ea4dd0f30de481f4eb9dcb0403da041f927b6e200a7a9d57d4
Ipchains firewall frontend - Prompts enabled.
79f4d5c6dd2281fff7d8406580199d4e0cd4abdc137d8e7af428569d2d60ced3
STonX v0.6.5 and v0.6.7 local root exploit. Tested on Slackware 7.0.
c751c9ecd87655ab1f2703c193c5080ea84909a0b48d28666ce7f32edbf5b25e
C-Kermit local exploit. Versions 7.0.197 and below are vulnerable. Tested on Slackware 7, where it is not suid. It is suid on Olivetti X/OS R2.3, 3.x.
b1c58ec5e7f44694f976de55f2766d8a2088c17241a91eff5815c66be7258e40
pms.pl is watches for certain running processes and alerts you via /dev/speech when they start.
e43969bd8b52cef54eed32fc170fda5e248565c948046a25250e12d54c508f9b
hhp-trosniff is a complete package of patches to modify ssh, ssh2, sshd, ssh2d, and opensshd to extract and log the Incoming/Target HostName/UserName/Password. Intended to log brute force attacks and deleted users who try to gain access.
dcd2446c221b1f508f4cb4f10180ef49e02bc7c6f6175b03fbda534c2fe97489
Whois.CGI - ADVISORY (hhp) Hole in several known/unknown vulnerabilities in Whois CGI packages. Affected are Whois Internic Lookup version 1.0, CC Whois Version 1.0, and Matt's Whois Version 1. These versions allow execution of commands due to lack of shell escape character parsing.
2360cca9573c4bd4934cb2e44e71bf956a22efa26aedae17ea0768db32124048