exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 3 of 3 RSS Feed

Files Date: 2002-01-03

w00aimexp.tgz
Posted Jan 3, 2002
Authored by Matt Conover | Site w00w00.org

AOL Instant Messenger remote buffer overflow exploit. Affects AOL AIM for Windows stable v4.7.2480 and beta v4.8.2616. Over 100,000,000 users affected. Included shellcode shuts down the AIM client.

tags | exploit, remote, overflow, shellcode
systems | windows
SHA-256 | 8720c24ba34092c4259dac1c30012a1a280c1dcffb617e2d23c9a40f5dd53caa
nemesy13.zip
Posted Jan 3, 2002
Authored by twlc, LucisFero | Site twlc.net

Nemesy v1.3 is a denial of service attack tool which generates random packets with spoofed IP addresses. Run on Windows 2000/XP/NT.

tags | denial of service, spoof
systems | windows
SHA-256 | 14d7b2868bc32217c62111d8bd12984c88447855888952e2bade63fca046ae2a
netscript-1.6.8.tgz
Posted Jan 3, 2002
Authored by vade79, realhalo | Site realhalo.org

Netscript is a portable and lightweight tcp socket scripting tool. It is intended to allow anyone to script situations based on a word-to-word ruleset response system. Includes wildcard support, character replacement, random replacement, argument inclusion, server timeout, initial send, display altering, multiple character dump formats, telnet protocol support, logging, program to socket dumping, executable ruleset support and reverse binding among other things.

Changes: Routing support (-R, -k, -j, and -J options), a new $\ variable to send data directly to the route socket, a $" variable to only send data after an alloted amount of time, a -Q option to define socket options, a --interactive command line option to allow interactive use of netscript, reading of ~/.nsrc to to precurse any other interactive commands, a --list command line option to quickly list and execute rulesets, a $NS_PATH environmental variable to assist the --list option, a new manual page, MD5SUM validity check file, and some new/modified rulesets.
tags | tcp, protocol
systems | unix
SHA-256 | 45425b31c5653367a2be481e0a94b8c8246a0daa793a65aa948c6610cf1e0058
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    18 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    6 Files
  • 28
    May 28th
    12 Files
  • 29
    May 29th
    31 Files
  • 30
    May 30th
    22 Files
  • 31
    May 31st
    18 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close