Nwkill is a simple shell script which kills Netware 5.0 by using netcat to send /dev/random to tcp port 40193.
97eb772389ccf50550b76c384134e7cdefed0c78d4a4144f1301a4cd0cdff19b
A beginners introductory model into Cross platform open source trojans. Currently only Win32 code implemented. Written in rapid-q. No longer supported by author. Archive password is set to p4ssw0rd. Use at your own risk.
ccca3e9dcbafbb3711307eb74d6ff5b086cbdad325e055d3d9632411d0293de5
X-Chat v1.2.x format string bug exploit. Tested against x-chat v1.2.1 on Slackware 7.1.
b469eda18d6e1805cd4e8a0be2fbb3cb43284ad07087b99b32725d1ff02f9fc4
AdoreBSD 0.34 - Based off Linux Adore by Stealth. Features hiding files and directories from view, makes processes invisible, hides promiscuous flag and syslog messages, execute as root, hides sysctl mib entries, netstat service hiding, authentication, and module hiding. Developed on FreeBSD 4.3-STABLE.
cfeece4d9e9d8347a58eddaf64786360a9187ee3f9bc5af4ee4426bc941f9e3b
Adore is a linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.
81a2723c4a646ea1c9d07a8b8689f5d9f2b498231624d3516bf9a5a8729ca172
Microsoft Security Bulletin (MS00-079) - Microsoft has released a patch that eliminates the "HyperTerminal Buffer Overflow" which allows malicious users to execute arbitrary code on another users system by sending a long telnet:// URL in a HTML mail message. HyperTerminal is the default Telnet client on Windows 98, 98SE and ME, but not Windows 2000. Updated hyperterminal available here.
80f7bc89cbf0b5dd6b119914307bb706cfbc08bcaefbecc2b83feaa064de2a0b
How to decode a base64 encoded string.
cc8c9fba745a5b6451db1aa4ba0b428f270bdb49055875b80b67d0f3702617ce
Microsoft Security Advisory MS01-029 - Two separate vulnerabilities have been found in Windows Media Player. The first is a buffer overflow in the parsing of Active Stream Redirector (.ASX) files which allows attackers to run arbitrary code on the users machine. The vulnerability can be exploited via a malicious website. The second vulnerability is a bug in the handling of shortcuts which allows attackers to read any file on the users system. Microsoft FAQ on this issue available here.
de8c057c169b4d064727062240aadae3926e0dd115c8e508d5de6a3574efe7fc