Quantcast
Channel: Files from The Itch ≈ Packet Storm
Browsing latest articles
Browse All 9 View Live

dumpx.c

Dump-0.4b15-1 local root exploit tested on Redhat 6.2.

View Article



apcupsdos.c

Apcupsd v3.7.2 local denial of service attack. Can kill any running daemon.

View Article

prodbx.c

Progress Database Server v8.3b local root exploit - Tested on Sco Unix and Linux.

View Article

ascdcx.c

Local exploit for /usr/X11R6/bin/ascdc v0.3-2-i386 which overflows the -c switch.

View Article

execve2.c

Linux x86 shellcode (31 bytes) which does setuid(0); execve ("/bin/sh",0);

View Article


fmtstring.txt

Detailed paper that describe format string vulnerabilities and how to exploit them.

View Article

envpaper.pdf

Radical Environments part I - A paper that compiles various stack related tips and tricks which discusses how an exploit without nops works.

View Article

Netric-RE-partII.pdf

Radical Environments part II - This paper continues where part one left off, detailing a technique in writing 0 bytes when exploiting a local buffer overflow using a non-executable stack with the heap...

View Article


msqlex.c

Remote exploit for miniSQL version 1.3 and below that achieves privilege escalation root gid.

View Article

Browsing latest articles
Browse All 9 View Live


Latest Images