Virtuozzo from Parallels suffers from cross site request forgery vulnerabilities.
ebaad3d635c352d3c9f1ac5fc2240d69b74469fbafa8caa44dfa42135de15d11
pdflib, a library used for generating PDFs on the fly, suffers from multiple buffer overflow vulnerabilities due to the use of strcpy().
cc8dcb150298922e6a2a292f9c663f4dbff95dc657c445fc35cdee5ee09e6763
gwcheck is a simple program that checks if a host in an ethernet network is a gateway to Internet.
bbd330c1df80d2586e3ecb1e5671a1a0b3aef4ffd54dd4ef27c45ffaaa50491c
This script can be used to steal G-Mail's keychained password by injecting javascript into Safari. When executed it opens G-Mail's login page, reads the saved password and sends it to a logging server by creating an hidden iframe into G-Mail's page.
20de0e897ec70cae2d19020dbc28f0afb395ff11a21cf566e2d898f6373105e1
This script can be used to steal G-Mail's keychained password by injecting javascript into Safari. When executed it opens G-Mail's login page, reads the saved password and prompts it into an alert box.
d1666deab432edbc9e59a484712e616f3e4b12ccc20689e06d1d5c0bc471f7ea
cotv 2.0 suffers from a client-side denial of service vulnerability due to a lack of validation. Demonstration exploit included.
f707ee93bda1d6d72d269716afca6da52d47a31e6d5abc8bec288f711a10b6e2
The D-LINK DWL-2000AP+ with firmware version 2.11 is prone to two remote denial of service vulnerabilities because it fails to handle arp flooding.
87d03a41d7205746c6fdc2717648002c7605bc5def176cb29db02f70e7827bcf
easy notes manager (eNM) version 0.0.1 is affected by multiple SQL injection issues. POC included that demonstrates how to bypass authentication.
8bf434113a79d20b0e13eca016af6e6321a692aac41cb63c7a6ec3adf04d23fd
TRIPP is a utility to rewrite incoming and outgoing IP packets. Since it can rewrite both headers and payload, it can be used to configure the tcp/ip stack behavior in order to perform various tasks mainly intended for network tests, simulations and development.
378bab5802d5cce78688708b5c718ebf003e8ea399862c886cc986351efdd9d9
Small whitepaper discussing how to use payload rewriting to exploit remote buffer overflow vulnerabilities.
0f69f97a695d554036455180134044f578440c4022112040028883dd582a2d05
TRIPP is a utility to rewrite incoming and outgoing IP packets. Since it can rewrite both headers and payload, it can be used to configure the tcp/ip stack behavior in order to perform various tasks mainly intended for network tests, simulations and development.
41978f67ad0896e10ec10edd525909b6563e02ab70ca5c0e75d659ae9bfd92f0
A paper discussing passive OS fingerprinting and spoofing OpenBSD pf "os" rulesets.
0d569aa54bb77d9a75c4c38062ec73498e406c7673560bff04cc7b95c7368e3d
proof-of-concept tool for performing passive OS fingerprint spoofing to bypass OpenBSD pf firewall rules.
5a2ede5d7226dfc63dbb8d460f5f043f9f8b45d0fee869848ed3de681903dd28
TRIPP is a utility to rewrite outgoing IP packets. Since it can rewrite both header and payload data, it combines functionality found in iptables as well as netsed. This can be useful for performing replay attacks, altering your own OS fingerprint, or for bypassing remote firewalls.
dd20c3a4d3957262197fe88667340ecfabf33650727217079e673d6d2796ef11