Microsoft WINS remote operating system and service pack scanner.
6e06e716a171f47447252cc7259386ec739b46c0bd047fc05045ccced5caed58
Remote heap buffer overflow exploit for the Microsoft Windows Internet Name Service. Tested against Win2k SP4 Advanced Server English. This exploit can bind a shell to port 101 or will reverse a cmd shell back to a listener.
066ed83cc6f30f1fbe63953338c4c89426c0eae9a7ecfd5d398fd0ba8b78fe6e
BakBone NetVault versions 6.x and 7.x remote heap buffer overflow exploit. Binds a shell to port 101 and can also shuffle a reverse shell back.
1e09722864e1dfdca7a06b9faa4df332e9e691bac4274ca4a2df1dd2d9eff182
BakBone NetVault versions 6.x and 7.x configure.cfg local buffer overflow exploit.
a6eb5bcdfe67330fb32ad6ecd36be4d05c208784b12e2495749f19f03ae718d4
BakBone NetVault versions 7.x and 6.x are susceptible to remote heap and local buffer overflows.
d41408652080a239c3517aa5d539ca4aafc24bb8668da0188dbad31ca7489fb1
Sentinel License Manager version 7.2.0.2 exploit that makes use of stack overflow in the License service on UDP 5093.
a4cfd3100347273b6ad016300dc53e6a5746d8d8ed1b576320b69ea69a4c4f3d
This exploit takes advantage of a stack overflow vulnerability in the CA License Server network service. Versions 1.61 and below are susceptible.
7d2cf16bb7713ea7d275c701f1c25126c9a157166b80c35eb4d2bbdd5353043e
BadBlue webserver version 2.5 is susceptible to a remote buffer overflow vulnerability that allows for code execution. Full exploit provided.
73a20d2002ca46bb0adf0da831ff0b843279055c07ced4db282a219e1074b5fb
3com 3CDaemon FTP unauthorized USER remote buffer overflow exploit that can bind a shell or reverse a shell back to a listener.
58939b294c832619405a1eb0bebba42133ec3b0586bf8f742328b1ae9c4d4e5e
Findjmp2.c is a tool which scans for call/jmp/pushret offsets, and logs to a file. This is a modified version of the Eeye tool Findjmp.
ded944f6f1617a78aca173788e57b43956af8818eef58eb78f07ee8c81cc8bae
Remote stack overflow exploit for Veritas Backup Exec. Works for versions 9.1.4691.SP1, 9.1.4691.SP0, and 8.5.3572. Allows for a shell to be bound to port 101 or it spawn a reverse shell as well.
66d099090c243e36b9f7564b05d434f6f4b2b0d4406b819eb60322f646d6b2fc
A buffer overflow in netcat can allow for remote compromise. Full exploit provided.
6a870fa91a4f04d8ae387bc3eabd6a0168c21283e0b69caa9982ad23d72b9073
MailEnable Professional Edition version 1.52 and MailEnable Enterprise Edition version 1.01 both suffer from a remote buffer overflow in their IMAP service. Full exploit included.
32c6ae1f1b84066439bf30e3587f50ec5f207c7c74e794bbd4f1278e559265ab
NetNote Server version 2.2 build 230 crafted string vulnerability exploit that crashes the server.
7c6dc403c38101273cb023408861ce7734dd9c375fdbf92d16d88321a1e85197
Remote buffer overflow exploit for SlimFTPd versions 3.15 and below. Binds a shell to port 101.
72f616af4023fdd34e495c1bf2a94ae7cdbc6f584edcc17bfc9bb7541143cabd
Minishare versions 1.4.1 and below remote buffer overflow exploit that binds a shell to port 101.
7deb9b62c428f616da8582be9f376e3e7432cab321204c9990482f99a767d441
Remote buffer overflow exploit for ShixxNote 6.net, which, according to the producers site, is "a personal organizer, desktop sticky notes (post-it) program, instant messaging application (LAN messanger) and a communications tool used across a local network (Intranet), Internet and via email. Perfect and ideal tool for your LAN or office communication." The exploit works against Win2k only, it will crash other platforms.
30e61262aa45edc2db0dc1a04dbd2d7312cda620d648fff04a18128e0cabcd5c
YahooPOPS version 1.6 and prior SMTP port buffer overflow exploit version 0.1. Binds a shell to port 101.
d2ee1b20931eae876045ab86c1dd5593d1c5adec78853e59d0fc83e91f651324
DCOM remote exploit for the Win32 platform utilizing the issue discussed here. This version has 73 offsets including all of the magical offsets.
ac96ce44fd5fd3c9c11ad23c63657ff0608e54e19ae13e19e932ec358ea62a04
DameWare Mini Remote Control Server version 3.71.0.0 and below remote exploit that takes advantage of a shatter style attack.
5c712a4f542291267b08b72cc9926fb4e80de1975410636955d039584f5add15