exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 5 of 5 RSS Feed

Files from K-sPecial

Email addresskspecial at xzziroz.net.net
First Active2004-04-25
Last Active2006-12-01
evince-ps-field-bof.c
Posted Dec 1, 2006
Authored by K-sPecial | Site xzziroz.net

Evince Document Viewer buffer overflow exploit that makes use of the same vulnerability that exists in gv.

tags | exploit, overflow
SHA-256 | 1fb79e9eb5d150efcfb4497f638e6d0c46cbc764797b65d2e4f79da83766e247
fmat.txt
Posted Oct 21, 2006
Authored by K-sPecial | Site xzziroz.net

An alternative method in format string exploitation - a paper discussing a method of making format string exploits static again on 2.6 with random VA.

tags | paper
systems | unix
SHA-256 | 0c45b1d562e077e6945b0677cd1ab74d79b4754f927c1df8be3f30b948146365
cyrusimapd.txt
Posted Aug 27, 2006
Authored by K-sPecial

Cyrus IMAPD version 2.3.2 remote buffer overflow exploit.

tags | exploit, remote, overflow
SHA-256 | e97d089ebdd394dfc51151fb89917883a89c603cb0b2544a42d70a648c490ee6
GUESTEX-exec.pl.txt
Posted Jun 12, 2006
Authored by K-sPecial

Remote exploit for an old flaw in GUESTEX 1.0 guestbook that allows for remote code execution.

tags | exploit, remote, code execution
SHA-256 | bb3e843dbd7e85e94f043786965ba4cf0fd2d1035be98b3b2b98554289d95f2a
Kreset.pl
Posted Apr 25, 2004
Authored by K-sPecial | Site xzziroz.freeshell.org

Sample proof of concept exploit that demonstrates the TCP vulnerability discovered by Paul A. Watson. Perl version.

tags | exploit, perl, tcp, proof of concept
advisories | CVE-2004-0230
SHA-256 | 7b8da88a4b120e083cbeadb74aaf609c90eefcbba41d5d768d53613eda9c9800
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close