Linux Information
|
Sping
| Size: 12,099
| Since some people don't necessarily have Windows '95 boxes lying around,
The following exploit program requires a raw socket layer
that doesn't mess with the packet, so BSD 4.3, SunOS and Solaris are out.
It works fine on 4.4BSD systems. It should work on Linux if you compile
with -DREALLY_RAW. Feel free to do with this what you want. Please use this tool only to test
your own machines, and not to crash others'.
compile: gcc -DREALLY_RAW -DLINUX -o sping.c sping.c
|
bsd-rdist.c
| Size: 2,433
| No Description Yet.
|
dipexploitlinux.c
| Size: 1,067
| Overruns the buffer in do_chatkey() to give a shell
|
modify_ldt_exploit.c
| Size: 3,875
|
|
IP Scan
| Size: 25,878
| IP Scanner for Linux (Might be a port scanner as well)
|
mountexp.c
| Size: 2,213
| Mount Exploit for Linux/FreeBSD, Jul 30 1996
|
nfsbug.c
| Size: 6,943
| This program tries to guess the file handle of the root FS by trying reasonable combinations of device and
inode number in succession, and attempting to get its attributes handle from the server. It stops when it receives a valid
reply and prints out the results.
|
rdistexp.c
| Size: 2,464
| Here is the rdist exploit. freebsd/netbsd/bsdi/openbsd/unixware
|
sigurgexp.c
| Size: 2,696
| This program, when run on most Linux systems (tested with 1.2.9,
but should work with versions at least up to 1.2.11 and 1.3.6),
will send SIGURG to specified process, even if you don't own it.
This signal (unless caught or ignored) will terminate the process,
so please don't do that without the permission from your system
administrator.
|
xtermoverflo_exp.c
| Size: 1,346
| X-Term overflow Exploit Script
|