ELIDESKEW Public known vulnerablity in SquirrelMail versions 1.4.0 - 1.4.7
ELITEHAMMER Runs against RedFlag Webmail 4, yields user nobody
ENVISIONCOLLISION RCE for phpBB (derivative)
EPICHERO RCE for Avaya Media Server
Misc
calserver spooler RPC based RCE
EARLYSHOVEL RCE RHL7 using sendmail
ECHOWRECKER/sambal: samba 2.2 and 3.0.2a - 3.0.12-5 RCE (with DWARF symbols), for FreeBSD, OpenBSD 3.1, OpenBSD 3.2 (with a non-executable stack, zomg), and Linux. Likely CVE-2003-0201. There is also a Solaris version
ELECTRICSLIDE RCE (heap-overflow) in Squid, with a chinese-looking vector
EMBERSNOUT a remote exploit against Red Hat 9.0's httpd-2.0.40-21
prout (ab)use of pcnfs RPC program (version 2 only) (1999)
slugger: various printers RCE, looks like CVE-1999-0078looks
statdx Redhat Linux 6.0/6.1/6.2 rpc.statd remote root exploit (IA32)
telex Telnetd RCE for RHL ? CVE-1999-0192?
toffeehammer RCE for cgiecho part of cgimail, exploits fprintf
VS-VIOLET Solaris 2.6 - 2.9, something related to XDMCP
SKIMCOUNTRY Steal mobile phone log data
SLYHERETIC_CHECKS Check if a target is ready for SLYHERETIC (not included)
EMPTYBOWL RCE for MailCenter Gateway (mcgate) - an application that comes with Asia Info Message Center mailserver; buffer overflow allows a string passed to popen() call to be controlled by an attacker; arbitraty cmd execute known to work only for AIMC Version 2.9.5.1
Anti-forensic
toast: wtmps editor/manipulator/querier
pcleans: pacctl manipulator/cleaner
DIZZYTACHOMETER: Alters RPM database when system file is changed so that RPM (>4.1) verify doesn't complain
DUBMOAT Manipulate utmp
scrubhands post-op cleanup tool?
Auditcleaner cleans up audit.log
Control
Iting HP-UX, Linux, SunOS
FUNNELOUT: database-based web-backdoor for vbulletin
hi UNIX bind shell
jackpop bind shell for SPARC
NOPEN Backdoor? A RAT or post-exploitation shell consisting of a client and a server that encrypts data using RC6 source
ORLEANSTRIDE
SAMPLEMAN / ROUTER TOUCH Clearly hits Cisco via some sort of redirection via a tool on port 2323... (thanks to @cynicalsecurity)
SECONDDATE Implant for Linux/FreeBSD/Solaris/JunOS
SHENTYSDELIGHT Linux keylogger
SIDETRACK implant used for PITCHIMPAIR
SIFT Implant for Solaris/Linux/FreeBSD
SLYHERETIC SLYHERETIC is a light-weight implant for AIX 5.1:-5.2 Uses Hide-in-Plain-Sight techniques to provide stealth.
STRIFEWORLD: Network-monitoring for UNIX, needs to be launched as root. Strifeworld is a program that captures data transmitted as part of TCP connections and stores the data in a memory for analysis. Strifeworld reconstructs the actual data streams and stores each session in a file for later analysis.
SUCTIONCHAR: 32 or 64 bit OS, solaris sparc 8,9, Kernel level implant - transparent, sustained, or realtime interception of processes input/output vnode traffic, able to intercept ssh, telnet, rlogin, rsh, password, login, csh, su, …
CnC
Seconddate_CnC: CnC for SECONDDATE
ELECTRICSIDE likely a big-fat-ass CnC
NOCLIENT Seems to be the CnC for NOPEN*
DEWDROP
Privesc
Linux
h: linux kernel privesc, old-day compiled hatorihanzo.c, do-brk() in 2.4.22 CVE-2003-0961
evolvingstrategy: privesc, likely for Kaspersky Anti-virus (/sbin/keepup2date is kaspersky's stuff) (what is ey_vrupdate?)
eh OpenWebMail privesc
escrowupgrade cachefsd for solaris 2.6 2.7 sparc
ENGLANDBOGY local exploit against Xorg X11R7 1.0.1, X11R7 1.0, X11R6 6.9, Includes the following distributions: MandrakeSoft Linux 10.2, Ubuntu 5.0.4, SuSE Linux 10.0, RedHat Fedora Core5, MandrakeSoft Linux 2006.0. requires a setuid Xorg