This Metasploit module exploits a vulnerability in the FreeBSD run-time link-editor (rtld). The rtld unsetenv() function fails to remove LD_* environment variables if __findenv() fails. This can be abused to load arbitrary shared objects using LD_PRELOAD, resulting in privileged code execution.
b7d2e9a938e3bd3e306735ac30c5547fb5873fe1a798d291f7cd437bdee37ad0
KDE versions 4 and 5 suffer from a KAuth privilege escalation vulnerability.
c554a74a267c52aca3ad742178547b8d2a015c7f0cd8cbcdba5e0a178a1d4c91
This is an SQL Injection proof of concept that will display information about the vBulletin software and the admin details from the database. It can be adjusted to read any part of the database.
31b6c134bd12e2c8a3b7dce76200bcb7e83f26adecf9774a722a58a1aa24bab1
ssharp is a tool for man in the middle attacks against SSH.
2e4df21e2413ddc4731a20b6106f2fb5a75feeccc9288a687315659cefe6ee28
Adore is a Linux LKM based rootkit for Linux v2.[246]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.
f7f3132f7abb9f75bf1761c20916f778d3487efed3356124798ff769d61224c4
Adore is a Linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.
87dcaf982e1058d9279347cd8fd26d51f9edbfca0e02f19d548cdcddcf6ffaf3
Adore is a linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.
ee53884a983a43ec25707f506863dc74451ddf00c166ffe16702abe049b32a70
Adore is a linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.
bc8ab5303f03a7435098e0a13569dd423675198c8181472e3c458b68a2296ecf
Adore is a linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.
81a2723c4a646ea1c9d07a8b8689f5d9f2b498231624d3516bf9a5a8729ca172
Adore is a linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.
cb6a7f28f3180a55c6b06e51a03d1a0d0fb4af64f083d6b2b94ca067652a1ed4
Adore is a linux LKM based rootkit. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.
426425af2fe14766dcb5ee37af975be1d81fe96943bde9e12671fbf26a899a21
TESO Security Advisory #10 - KDE KApplication {} configfile vulnerability. Due to insecure creation of configuration files via KApplication-class, local lusers can create arbitrary files when running setuid root KDE-programs. Tested with SuSE 6.4 standard installation under KDE 1.1.2.
004b3ec17b9d4970f5d766395aef75b5dbd5c2b046edf150e3773fa527b7f18b
Halloween 4 local root exploit for imwheel-solo. Other distros maybe affected as well.
7300584731a280968e5f1a1b1f9f36318180b511c516ed48887ec106be3e6d96
Halloween Linux 4.0 and Debian Linux 2.1 local root exploit for wmcdplay. Other distros are maybe affected as well.
b9017f7829fe03f891ee34fded6071de2ba1348fee2276fddd5db8f9193120dc
Hellkit is a shellcode generator. You write the your shellcode in C, and it gets converted to ASM for use with both heap and stack based overflows. Many examples included.
4de0a0428ffc7564260f6144a3a67a196db6c7af7dba15d6564be3207bbc83ca
Adore is a linux LKM based rootkit. Features smart PROMISC flag hiding, persistant file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.
de0bab345dbca650c8fba76d3b81c49404b82ffab4ed6d2f4539a87d2aad15ba
Hellkit is a shellcode generator. You write the your shellcode in C, and it gets converted to ASM for use with both heap and stack based overflows. Examples included.
f79551c7c0968751b9e2c04ed2b7d01a68b0bd7e81029b1fdf67696e615a7dd7
Adore is a linux LKM based rootkit. Features smart PROMISC flag hiding, persistant file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.
ba742bd9a58e200fbed9a58044af03f4d0429b7fba2352ea510f2278ffe69410
IMON v0.9b is a powerful tool to monitor/analyze ICMP traffic on your LAN (includes LOKI backdoor detection).
ed98ca9c396ea96ba0de1186cc73efa977230e6422c3c97c44734a73a556da64
E2-Zip 1.0 is an excellent whitepaper about EXT2-weaknesses in the Linux 2.0.x kernels. "File-hiding" exploit code included.
195b6e749733909e4b6086b91a1477e49534512097e41aa7e7a7d68b1f0f13d6
A "patched" login.c that gives user privileged access and logs other user's passwords.
ea37fbf067d58d158deffcbec5fc832d5a73cdb2fca3390da184adf460da0349