Adore is a linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.
cb6a7f28f3180a55c6b06e51a03d1a0d0fb4af64f083d6b2b94ca067652a1ed4
Introduction to the MIPS architecture and the IRIX operating system, focusing on how to write shellcode for IRIX. Includes 3 sample shell codes. This is an updated version of the article in Phrack 56.
4ae9d1a99adae30ec567bcc47c657eb5fa712b7d9ea625abbd8747f87f01cfae
Telnetfp is an OS detection tool which uses do / dont requests via telnet to determine remote OS type. Contains 72 OS fingerprints.
ae48c9908a16c1891aecf361d8d8926967db8faac2b155964f6fb83ddb47c8d7
Adore is a linux LKM based rootkit. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.
426425af2fe14766dcb5ee37af975be1d81fe96943bde9e12671fbf26a899a21
German speech given at the CCC - "exploiting format string vulnerabilities". Including examples.
fb6f4bbc3e3270eb0fdf54421051b06b4537b3129ca000b5f781fac055d4b629
Reverb is a tool to access firewalled, dynamic-dialin and otherwise protected hosts.
9548ad877de5a2911412ee36598b233d8e3896399e75768fa1aa5b678c016314
Openssh-Reverse is a patched OpenSSH which goes in reverse, allowing outside users to connect to machines behind NAT firewalls. In reverse mode, sshd acts as a client and brings the connection to a modified ssh server.
c83bf07ed61053f6c369bd3bd2c8252548532e232e27ee4365928a0691d9ff64
Telnetfp is an OS detection tool which uses do / dont requests via telnet to determine remote OS type. Contains 32 OS fingerprints.
e83fb59569a1389c70a22f1b784ff37e5e031e4c84a72080ca8a08acbb023d67
Telnetfp is an OS detection tool which uses do / dont requests via telnet to determine remote OS type. Contains 23 OS fingerprints.
0567b0152bd59007461af62751f10b20eabf48b7fd1831ae530a2e63fcafb436
execve-shell.tar.gz allows you to easily create linux x86 shellcode that execs any command you supply.
0cc554a1bcbc9a9ef9026428188060ef14886a2ba40aad275be5201d08d7fe39
Arpmitm.c is another tool for using arp man-in-the-middle attacks which keeps sending the packets. Requires Libnet 1.00.
a19ed2757a2e4c0b49f24c7b64aee902e263d54e73f80c0eec793933f61e7856
exman.c is a new man exploit.
832e578f11428c863468dabddea6bce1956334bf36020dad8673f91d5be34f3b
outp.c will convert .s files to shell code.
a73e95b1db0a4a21d695a880d2485a1846a07cce539dcd13bafb1682d7bf7492
vulnerability in wmcdplay (installed on Halloween 4 Linux) (advisory + exploit
6477942c86ee6dd52bac80bf956cbed6863e52d464ae92b66bef9d20f7902b03
vulnerability in atsadc (installed on Halloween 4 Linux) (advisory + exploit)
189114c1fe799648b677c16aa36fcc179942f685bacb5b0318c678f0cb0f01b9
TESO Security Advisory #9 - BinTec router security and privacy weakness. By using SNMP brute-force-techniques for SNMP community-names one is able to remotely gain the management accounts passwords, which are the same as the SNMP community names. Additionally the MIB-Tree holds security related information which should not be accessible through read-only/SNMP. These routers also offer services which can be abused rather easily, like dialing out and getting full line access via a CAPI interface, or a debugging interface which gives you all information which is sent over the BRI-lines.
1e4c21598191f4df1d64c9019b1d5c2ae2c88d693bdec2cd20552f3e94bb6c36
Hellkit is a shellcode generator. You write the your shellcode in C, and it gets converted to ASM for use with both heap and stack based overflows. Many examples included.
4de0a0428ffc7564260f6144a3a67a196db6c7af7dba15d6564be3207bbc83ca
TESO Security Advisory - A vulnerability within the kreatecd application for Linux has been discovered. An attacker can gain local root-access. Exploit included.
6b75b08c163190a2f48460df04026108041a65be6542f340bc2ebbebc83a7a66
TESO Security Advisory - A vulnerability within the imwheel application for Linux has been discovered. Some of these packages are shipped with an suid-root wrapper-script that invokes the insecure program 'imwheel' with UID 0. Exploit included.
ce2cf3b23cb544a222d43c6fcfc4168a3bd18450577b959771583ecb4a486ae2
TESO Security Advisory - A vulnerability within the wmcdplay CD playing application for the WindowMaker desktop has been discovered. It allows local root compromise through arbitrary code execution.Any system which has wmcdplay installed as setuid root is vulnerable.
8d5071c1366d929bea61249f0900db3205b2b45ad04b4e9179fa21f235aaefe6
TESO Security Advisory - The atsar application contains an exploitable vulnerability. The Halloween 4 Linux distribution, which is based on RedHat 6.1 is shipped with this suid-root program. It might be used to gain superuser privileges. Any system that has atsar-linux-1.4.2 package installed is vulnerable.
506159ce20ba014e7a4a853444879fe6306bfc6bad43dc564b8b124ccdf79f23
Adore is a linux LKM based rootkit. Features smart PROMISC flag hiding, persistant file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.
de0bab345dbca650c8fba76d3b81c49404b82ffab4ed6d2f4539a87d2aad15ba
Exploit for BIND-8.2/8.2.1 (NXT)
a3fbc75a1aa8873673755bf4b5bbef3765a95fedb9fe5669407df0df343c734f
Nameserver traffic amplify (DNS Smurf) and NS Route discovery (DNS Traceroute) advisory and exploit.
0aaca81a09dcafa2ee112e0e4ed74641b4256e9d1f814bdb86735574a73c2f9f
Hellkit is a shellcode generator. You write the your shellcode in C, and it gets converted to ASM for use with both heap and stack based overflows. Examples included.
f79551c7c0968751b9e2c04ed2b7d01a68b0bd7e81029b1fdf67696e615a7dd7