Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.
To check md5sum in linux, type md5sum -c md5sum.txt
Where |
Type |
Platform |
Sploit |
Dir |
Lang |
Both |
Exploit Finder |
Linux |
n/a |
/lin/suggest_exploit.pl |
Perl |
Both |
Priv Esc |
Linux |
Exim 4.69 |
/lin/pe-exim4 |
Perl |
Local |
Priv Esc |
Linux |
Kernel <= 2.6.36-rc8 |
/lin/pe-kernel-rds |
C |
Local |
Priv Esc |
Linux |
Kernel <= 3.2.2 |
/lin/pe-memodipper |
C |
Where |
Type |
Platform |
Sploit |
Dir |
Lang |
Remote |
Buffer Overflow |
Windows XP SP2 |
War-FTP 1.65 |
/win/bof-warftp |
Python |
Remote |
Buffer Overflow |
Windows XP SP1 |
CesarFTP 0.99g |
/win/bof-cesarftp |
Python |
Remote |
Buffer Overflow |
Windows 7 SP1 - 6.1.7601 |
SL Mail |
/win/slmail |
Python |
Local |
Priv Esc |
Windows (all up to 7 SP1?) |
KiTrap0D |
/win/pe-kitrap |
v C++ |
Local |
Priv Esc |
Windows (2k XP 03 - all) |
keybd_event |
/win/pe-keybd-event |
C |
Local |
Priv Esc |
Windows (XP SP3 & 03 SP2/3) |
AFD.sys |
/win/pe-afd |
Python .exe |
Where |
Type |
Platform |
Sploit |
Dir |
Lang |
x |
x |
x |
x |
x |
x |