Результаты поиска

  1. Exploiter

    Exploit Apple iOS 10.2 (14C92) - Remote Code Execution

    Apple iOS 10.2 (14C92) - Remote Code Execution Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1317#c3 The exploit achieves R/W access to the host's physical memory. This exploit has been tested on the iPhone 7, iOS 10.2 (14C92). To run the exploit against different devices...
  2. Exploiter

    Exploit Microsoft Windows 10 - WLDP/MSHTML CLSID UMCI Bypass

    Microsoft Windows 10 - WLDP/MSHTML CLSID UMCI Bypass Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1328 Windows: WLDP/MSHTML CLSID UMCI Bypass Platform: Windows 10 S (thought should be anything with UMCI) Class: Security Feature Bypass Summary: The enlightened lockdown...
  3. Exploiter

    Exploit Microsoft Edge Chakra JIT - Incorrect GenerateBailOut Calling Patterns

    Microsoft Edge Chakra JIT - Incorrect GenerateBailOut Calling Patterns /* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1333 Bailout: "ChakraCore’s background JIT compiler generates highly optimized JIT’ed code based upon the data and infers likely usage patterns based on...
  4. Exploiter

    Exploit Rancher Server - Docker Daemon Code Execution (Metasploit)

    Rancher Server - Docker Daemon Code Execution (Metasploit) ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include...
  5. Exploiter

    Exploit OrientDB 2.2.2 < 2.2.22 - Remote Code Execution (Metasploit)

    OrientDB 2.2.2 < 2.2.22 - Remote Code Execution (Metasploit) ## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = GoodRanking include...
  6. Exploiter

    Exploit Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution (2)

    Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution (2) #!/usr/bin/python import requests import re import signal from optparse import OptionParser class bcolors: HEADER = '\033[95m' OKBLUE = '\033[94m' OKGREEN = '\033[92m'...
  7. Exploiter

    Exploit Unitrends UEB 9.1 - Privilege Escalation

    Unitrends UEB 9.1 - Privilege Escalation # Exploit Title: Authenticated lowpriv RCE for Unitrends UEB 9.1 # Date: 08/08/2017 # Exploit Authors: Benny Husted, Jared Arave, Cale Smith # Contact: https://twitter.com/iotennui || https://twitter.com/BennyHusted || https://twitter.com/0xC413 #...
  8. Exploiter

    Exploit Metasploit Web UI < 4.14.1-20170828 - Cross-Site Request Forgery

    Metasploit Web UI < 4.14.1-20170828 - Cross-Site Request Forgery # Exploit Title: CSRF # Date: Wed, Aug 30, 2017 # Software Link: https://www.metasploit.com/ # Exploit Author: Dhiraj Mishra # Contact: http://twitter.com/mishradhiraj_ # Website: http://datarift.blogspot.in/ # CVE...
  9. Exploiter

    Exploit PyroBatchFTP 3.17 - Buffer Overflow (SEH)

    PyroBatchFTP 3.17 - Buffer Overflow (SEH) #!/usr/bin/python print "PyroBatchFTP Local Buffer Overflow (SEH) Server" #Author: Kevin McGuigan @_h3xagram #Author Website: https://www.7elements.co.uk #Vendor Website: https://www.emtech.com #Date: 07/10/2017 #Version: 3.17 #Tested on: Windows 7...
  10. Exploiter

    Exploit Unitrends UEB 9.1 - 'Unitrends bpserverd' Remote Command Execution

    Unitrends UEB 9.1 - 'Unitrends bpserverd' Remote Command Execution # Exploit Title: Unauthenticated root RCE for Unitrends UEB 9.1 # Date: 08/08/2017 # Exploit Authors: Jared Arave, Cale Smith, Benny Husted # Contact: https://twitter.com/iotennui || https://twitter.com/BennyHusted ||...
  11. Exploiter

    Exploit Unitrends UEB 9.1 - Authentication Bypass / Remote Command Execution

    Unitrends UEB 9.1 - Authentication Bypass / Remote Command Execution # Exploit Title: Unauthenticated root RCE for Unitrends UEB 9.1 # Date: 08/08/2017 # Exploit Authors: Cale Smith, Benny Husted, Jared Arave # Contact: https://twitter.com/iotennui || https://twitter.com/BennyHusted ||...
  12. Exploiter

    Exploit Dnsmasq < 2.78 - Information Leak

    Dnsmasq < 2.78 - Information Leak ''' Sources: https://raw.githubusercontent.com/google/security-research-pocs/master/vulnerabilities/dnsmasq/CVE-2017-14494.py https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html Sadly, there are no easy docker setup instructions...
  13. Exploiter

    Exploit Dnsmasq < 2.78 - Lack of free() Denial of Service

    Dnsmasq < 2.78 - Lack of free() Denial of Service ''' Sources: https://raw.githubusercontent.com/google/security-research-pocs/master/vulnerabilities/dnsmasq/CVE-2017-14495.py https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html dnsmasq is vulnerable only if one of...
  14. Exploiter

    Exploit Dnsmasq < 2.78 - Integer Underflow

    Dnsmasq < 2.78 - Integer Underflow ''' Sources: https://raw.githubusercontent.com/google/security-research-pocs/master/vulnerabilities/dnsmasq/CVE-2017-14496.py https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html dnsmasq is vulnerable only if one of the following...
  15. Exploiter

    Exploit Dnsmasq < 2.78 - 2-byte Heap Overflow

    Dnsmasq < 2.78 - 2-byte Heap Overflow ''' Sources: https://raw.githubusercontent.com/google/security-research-pocs/master/vulnerabilities/dnsmasq/CVE-2017-14491.py https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html 1) Build the docker and open three terminals...
  16. Exploiter

    Exploit Dnsmasq < 2.78 - Heap Overflow

    Dnsmasq < 2.78 - Heap Overflow ''' Sources: https://raw.githubusercontent.com/google/security-research-pocs/master/vulnerabilities/dnsmasq/CVE-2017-14492.py https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html 1) Build the docker and open two terminals docker build...
  17. Exploiter

    Exploit Dnsmasq < 2.78 - Stack Overflow

    Dnsmasq < 2.78 - Stack Overflow ''' Sources: https://raw.githubusercontent.com/google/security-research-pocs/master/vulnerabilities/dnsmasq/CVE-2017-14493.py https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html 1) Build the docker and open two terminals docker build...
  18. Exploiter

    Exploit Sync Breeze Enterprise 10.0.28 - Remote Buffer Overflow

    Sync Breeze Enterprise 10.0.28 - Remote Buffer Overflow # Exploit Title: [SyncBreeze POST username overflow] # Date: [30-Sep-2017] # Exploit Author: [Owais Mehtab] # Vendor Homepage: [http://www.syncbreeze.com] # Software Link...
  19. Exploiter

    Exploit phpCollab 2.5.1 - Arbitrary File Upload

    phpCollab 2.5.1 - Arbitrary File Upload # [CVE-2017-6090] PhpCollab 2.5.1 Arbitrary File Upload (unauthenticated) ## Description PhpCollab is an open source web-based project management system, that enables collaboration across the Internet. ## Arbitrary File Upload The phpCollab code does...
  20. Exploiter

    Exploit Qmail SMTP - Bash Environment Variable Injection (Metasploit)

    Qmail SMTP - Bash Environment Variable Injection (Metasploit) ## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = NormalRanking include...
  21. Exploiter

    Exploit [Spanish] [eZine] i sh0t the white hat 1

    [Spanish] [eZine] i sh0t the white hat 1 Essential01.pdf
  22. Exploiter

    Exploit [eZine] i sh0t the white hat 2

    [eZine] i sh0t the white hat 2 Essential02.pdf
  23. Exploiter

    Exploit [Spanish] [eZine] i sh0t the white hat 3

    [Spanish] [eZine] i sh0t the white hat 3 ezineIII.pdf
  24. Exploiter

    Exploit HackThisZine (HTZ) #6 - Lets Smash Windows!

    HackThisZine (HTZ) #6 - Lets Smash Windows! James C. Settle, founder and head of the FBI's National Computer Crime Squad, ha s said: "I don't think the stuff we are seeing is the stuff we need to be worrie d about. What that acti vity we do see is indicative of, however, is that we hav e a...
  25. Exploiter

    Exploit HackThisZine (HTZ) #7

    HackThisZine (HTZ) #7 "You want a seriously righteous hack you score one of those Gibsons man. You know super computers they use to do physics and look for oil and stuff ... Oh man Wouldn't you just love to get one of those Gibsons, baby!"...