Adore is a linux LKM based rootkit. Features smart PROMISC flag hiding, persistant file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.
ba742bd9a58e200fbed9a58044af03f4d0429b7fba2352ea510f2278ffe69410
Linux Kernel 2.0.x and 2.2.x local Denial of Service attack
65c147bd308b43fb3a8d7302ab87c8828f6d771f4a9f3744fbc7ec2aae17c3f8
proftpd exploit for 1.2.0pre3 linux x86
6edee0d79957dc29f1b881883812df5000054566a9ed218b5d2bd52d14c2619a
cloak users utmp host entry
c0c9242b12e010e91bd24cd3baa34312c62ad75a6009c50c5b81b94971b8d773
very fast, clean and mean, but functional banner scanner, with part of the functionality of netcat :-)
8140faf86d4dda36aae57f79ae2a8d27be823118b76e22cf890009a8f15509cc
DoS ascend router with simple udp echo<->echo link
3e610f9dc41e66bc8418d2222d57f4c973771ed8591575ffdb3a1eb229546188
send arp packets useful for man-in-the-middle
2bcbf6fa27b752ae133601c819f5888407f0eb48006a7b7019b0fb3f0d7d7e7c
Delegate 5.9.x - 6.0.x remote exploit for Linux compilations
3ac439d6fef1daef6b26daf2115caeb6dfcdd0765feefc3734a19a6d5e9886a5
linux tty hijacker
1a7d638efbe39f49605381b9cc11b12ec8770a89dae4e2f9abcf4464e3dcc29b
wuftpd 2.5.0 heap-based exploit
c66bbfb8e83b185de65b90f0fbc1f1d1fc5a4716ed694916c9175686d5a745e2
lame libtermcap sploit
f015cdddacdb0e66de98f7c3c9494337480346b8db1aff3ac5d3b0ebd0a737f4
unix-port of the RealSever exploit from dark spyrit
8777ef14ae1e7f0d00c28382575cff75282e02ece3177bcc2f414162b5042261
port of the eeye IIS4 exploit
f227ce0cf8fa14ee3d614aa08127f35e77adeaae036e735393b18468ddc19589
Interscan VirusWall 3.23/3.3 exploit (by dark spyrit, unix port by team teso)
6e4ace9f970b47cf9e7c89aa49783ea028b61de99eb7c9f46eadd4f27ccdf67f
LAN based SYN flooder which spoofs SYN ACK packets too, allowing to bypass SYN-cookies ;)
d6389fa94812201d6f8fca90481cb40f46bb6c73c410787a5ce1da82267394a6
Linux 2.2.x ISN Vulnerability Advisory and Exploit
95d014e8e35cfb3ea836468f2d0ec0947af54f0e99ee6159d36fd319e86ea537
maps connections over http proxies (connect/post)
dc368561a60718b2c86eab0648b63dfacbd087d351117745fe992804dc07207f
ICMP tunneling tool
eb69dd5115a31a163495e42fc528290756b7ee7479d53b654ec291d1613d9725
simple threaded portscanner
05d9e68412a59bea9ac19171140afcd8cd7af676c709715056ec30e8160a277a
scans for relay vulnerable http-proxies
0217e2c40db864b44dbf94e852db56de3c54df0251c9c3e6ecba85ab1f101285
shoots every TCP connection in LAN by spoofing TCP packets
8589b1dbc478d59ca70a644dd12ba947f6d3e623293978c98abbb8f38880c556
like the first, but also spoofs the MAC address
13a2aca18315249383442efd3f89eaeb95dc322d82b27c0363cce55805aa8bdb
maps passive to passive and active to active socket
9b0b143d11c78c83ef09a5b27cfaa3a4557cfe644edbcea6fa83a17f0552d976
http proxy-cache file finder (goes through http proxies from a file and request a file)
3f77732839bc07525ace63773abff4f555dcfbbdbc336f6add8768d1b19f7801