Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.
To check md5sum in linux, type md5sum -c md5sum.txt
Where | Type | Platform | Sploit | Dir | Lang |
---|---|---|---|---|---|
Both | Exploit Finder | Linux | n/a | /lin/suggest_exploit.pl | Perl |
Both | Priv Esc | Linux | Exim 4.69 | /lin/pe-exim4 | Perl |
Local | Priv Esc | Linux | Kernel <= 2.6.36-rc8 | /lin/pe-kernel-rds | C |
Local | Priv Esc | Linux | Kernel <= 3.2.2 | /lin/pe-memodipper | C |
Where | Type | Platform | Sploit | Dir | Lang |
---|---|---|---|---|---|
Remote | Buffer Overflow | Windows XP SP2 | War-FTP 1.65 | /win/bof-warftp | Python |
Remote | Buffer Overflow | Windows XP SP1 | CesarFTP 0.99g | /win/bof-cesarftp | Python |
Remote | Buffer Overflow | Windows 7 SP1 - 6.1.7601 | SL Mail | /win/slmail | Python |
Local | Priv Esc | Windows (all up to 7 SP1?) | KiTrap0D | /win/pe-kitrap | v C++ |
Local | Priv Esc | Windows (2k XP 03 - all) | keybd_event | /win/pe-keybd-event | C |
Local | Priv Esc | Windows (XP SP3 & 03 SP2/3) | AFD.sys | /win/pe-afd | Python .exe |
Where | Type | Platform | Sploit | Dir | Lang |
---|---|---|---|---|---|
x | x | x | x | x | x |