ircd hybrid 6 exploit. inviter side.
5cfb98fc0e693d67317d1e29b46d5d6db00e1b41eb3be165313e5659a8b063ba
Exlpoit for remote DoS of Webtrends Enterprise reporting Server
018fe3bd40f23ab1f0efd016c8fe41552f85936cbe91cefceba52f47bfab1e33
The ultimate proftpd pre0-3 exploiting toolkit
744a9e078f0d17e13487f261d95d50303dcb564cc7275d248079a14966399d1d
Exploit code to utilize the LC_MESSAGES bug in Solaris 2.7 to gain root
352bd30ef796c4958de02ffaeadbeca014feb7c7ede41dae12e38b987443a906
Exploit code for heap overflow in telnet.exe that ships with windows 95
5dedbdbe68c121868b6c2f1e6101be7fef36bcbe396d3b960787039c7221d194
A spoof against blind TCP for linux 2.0.36/37 with exploit code
c76cc40542190ef17090ba2a60c587bb7f678dc3a80a83ed5c3b7dc8e83ecb26
Exploit code for kernel 2.2.10 and 2.0.36
44c28380c49be24ce432f00db06ad453bf278c1d858787199fb33c8a65770fb4
Remote root linux exploit (TROJAN)
133a0285ec6637f8929af8030efbc60ca4c7a35410cc08d234ff0a57688a43ca
Proftpd 1.2.0 remote root exploit for RedHat Linux 6.0
c334165938b304f612e33838cca054259e240a1f0f8e5c09ea662fdfb0cc61e1
A kernel-module for 2.2 kernels to hide itselft
61d9641912f696d8011067de775826046240b1be1efc3d5b8a58e078ac61023c
Local exploit for suid root programs linked to libtermcap < 2.0.8-15
65711105dd2ff2279662c844887f0508df573b4f59a02e0f9c84af0349b3791c
Exploit for libtermcap xterm/nxterm on Slackware 3.5 and 3.6
5b87df20882e8f4acce80796a287af1f0d295cbca0fa9bcd99845e167eddf538
FreeBSD local denial of service exploit
518c1b82076c16c71768eec77d25455eb48b142d96c19adf98c77c77a568ae77
Free BSD local root exploit for fts_print()
d9dedbdfe9f077a02f4574df57f8decc78b9ee47fb26f8e54554808cb8b04b5d
Exploit to send a large volume of IACs which eventually leads to a reboot of 3COM's HiperARC
dbbcf212057df1232edc1ee2a26005a071ab2569f332337a2f2664387ef59609
Exploit for denial of service against IIS version 4.0
93442be5757263d2851ad6073c708bd3203896fedefb241859680cc9caa180f7
Exploit code for ircd 2.10.x/ircnet
737267b386266f264f477f91b39d75caebbf94c635ee5ed669a5a3f83da050ac
Exploit code for a denial of service attack using DNS
54f6a05c7bd3633fc25136253fc301a126258887652dc3d2c1208e341ec62662
Perl exploit code to crash Front Page remotely
837096ace8ebe73fb95659e874e2c27b2641b15befda495d7e6f46f8bc1f8221
Vixie cron root exploit patch
f54026b4066d61c13b69746bfd949aae014586844e6e4dee58a860c2f0096975
crond_exploit.txt
75ad43d4d9465bbbe6936b214b628188aed382d9b6a1ab60ad93b246e6f77bc6
A bug in cfingerd for versions prior to 1.4.0 tha enables any user to execute code with root privaliges
807c962b7f65b20227868690d34abae654c35cf3513f8cc488f3fd5366db85af
Exploit for netbsd/openbsd procfs/fdesc
cb0a085761bf7693a68d4f3da98e5845f742e759a48a6fe9a8af9ddc25ec42e9
Bug to obtain IRCop in v2.8/Hybrid-6b96
36eba34ca5d349531781c7328ba35d5826ae1f2799e705416d4a15be93a72e26
Opensec exploits archive
b3b58d596ab4319089df07c6d2c711f31ba22cacecfd5ada626395993c28c76c