https://github.com/x0rz/EQGRP
DITTLELIGHT (HIDELIGHT) unhide NOPEN window to run unix oracle db scriptsDUL shellcode packeregg_timer execution delayer (equivalent to at)ewok snmpwalk-like?gr Web crontab manager? wtf. NSA are webscale dudejackladderhelper simple port bindermagicjack DES implementation in PerlPORKSERVER inetd-based server for the PORK implantri equivalent to rpcinfouX_local Micro X server, likely for remote managementRemote Code ExecutionSolarisCATFLAP Solaris 7/8/9 (SPARC and Intel) RCE (for a LOT of versions)EASYSTREET/CMSEX and cmsd Solaris rpc.cmsd remote rootEBBISLAND/ELVISCICADA/snmpXdmid and frown: CVE-2001-0236, Solaris 2.6-2.9 - snmpXdmid Buffer Overflowsneer: mibissa (Sun snmpd) RCE, with DWARF symbols :Ddtspcdx_sparc dtspcd RCE for SunOS 5. -5.8. what a useless exploitTOOLTALK DEC, IRIX, or Sol2.6 or earlier Tooltalk buffer overflow RCEVIOLENTSPIRIT RCE for ttsession daemon in CDE on Solaris 2.6-2.9 on SPARC and x86Netscape Serverxp_ns-httpd NetScape Server RCEnsent RCE for NetScape Enterprise server 4.1 for Solariseggbasket another NetScape Enterprise RCE, this time version 3.5, likely SPARC onlyFTP serversEE proftpd 1.2.8 RCE, for RHEL 7.3+/Linux, CVE-2011-4130? another reason not to use proftpdwuftpd likely CVE-2001-0550WebESMARKCONANT exploits phpBB vulnerability (<2.0.11)ELIDESKEW Public known vulnerablity in SquirrelMail versions 1.4.0 - 1.4.7ELITEHAMMER Runs against RedFlag Webmail 4, yields user nobodyENVISIONCOLLISION RCE for phpBB (derivative)EPICHERO RCE for Avaya Media ServerMisccalserver spooler RPC based RCEEARLYSHOVEL RCE RHL7 using sendmailECHOWRECKER/sambal: samba 2.2 and 3.0.2a - 3.0.12-5 RCE (with DWARF symbols), for FreeBSD, OpenBSD 3.1, OpenBSD 3.2 (with a non-executable stack, zomg), and Linux. Likely CVE-2003-0201. There is also a Solaris versionELECTRICSLIDE RCE (heap-overflow) in Squid, with a chinese-looking vectorEMBERSNOUT a remote exploit against Red Hat 9.0's httpd-2.0.40-21ENGAGENAUGHTY/apache-ssl-linux Apache2 mod-ssl RCE (2008), SSLv2ENTERSEED Postfix RCE, for 2.0.8-2.1.5ERRGENTLE/xp-exim-3-remote-linux Exim remote root, likely CVE-2001-0690, Exim 3.22-3.35EXPOSITTRAG exploit pcnfsd version 2.xextinctspinash: Chili!Soft ASP stuff RCE? and Cobalt RaQ too?KWIKEMART (km binary) RCE for SSH1 padding crc32 thingy (https://packetstormsecurity.com/files/24347/ssh1.crc32.txt.html)prout (ab)use of pcnfs RPC program (version 2 only) (1999)slugger: various printers RCE, looks like CVE-1999-0078looksstatdx Redhat Linux 6.0/6.1/6.2 rpc.statd remote root exploit (IA32)telex Telnetd RCE for RHEL ? CVE-1999-0192?toffeehammer RCE for cgiecho part of cgimail, exploits fprintfVS-VIOLET Solaris 2.6 - 2.9, something related to XDMCPSKIMCOUNTRY Steal mobile phone log dataSLYHERETIC_CHECKS Check if a target is ready for SLYHERETIC (not included)EMPTYBOWL RCE for MailCenter Gateway (mcgate) - an application that comes with Asia Info Message Center mailserver; buffer overflow allows a string passed to popen() call to be controlled by an attacker; arbitraty cmd execute known to work only for AIMC Version 2.9.5.1
>>150603575 (OP)Коллекция хлама?>STRIFEWORLD: Network-monitoring for UNIX, needs to be launched as root. Strifeworld is a program that captures data transmitted as part of TCP connections and stores the data in a memory for analysis. Strifeworld reconstructs the actual data streams and stores each session in a file for later analysis.Такая штука была бы полезной под Windows