exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 259 RSS Feed

Files

ETERNALSYNERGY 1.0.1 SMBv3 Remote Code Execution Exploit
Posted Apr 15, 2017

ETERNALSYNERGY is a remote code execution exploit for SMBv3. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, remote, web, code execution
SHA-256 | 7c0d6b0f4d94cfb9e0687521b17d8366d780c0ca9fe6c22453cdc7b22872a6ed
ETERNALROMANCE 1.4.0 Windows XP / 2003 / Vista / 7 / 8 / 2008 / 2008 R2 SMB1 Exploit
Posted Apr 15, 2017

ETERNALROMANCE exploits an SMB1 vulnerability in Microsoft Windows XP, 2003, Vista, 7, 8, 2008, and 2008 R2. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web
systems | windows
SHA-256 | cc6021593f9b1a2663a2a29570fc4c7e92ac04f765b7a6a9f9dd5c8196c3b633
ETERNALROMANCE 1.3.0 Windows XP / 2003 / Vista / 7 / 8 / 2008 / 2008 R2 SMB1 Exploit
Posted Apr 15, 2017

ETERNALROMANCE exploits an SMB1 vulnerability in Microsoft Windows XP, 2003, Vista, 7, 8, 2008, and 2008 R2. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web
systems | windows
SHA-256 | b731827f9a168d6610e32c2002975cc1c2fe32260f12e50a86429d722e3d908a
ESTEEMAUDIT 2.1.0 Windows 2003 / XP RDP Zero Day Exploit
Posted Apr 15, 2017

ESTEEMAUDIT is a  a remote RDP (Remote Desktop) zero day exploit targeting Windows Server 2003 and XP, installs an implant and exploits smart card authentication. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, remote, web
systems | windows
SHA-256 | cdba14ff2a6f42d4820cce05a9ea4e7c3da31b972c5f6222a55eca0af1ab33bd
ESKIMOROLL 1.1.1 Kerberos Exploit
Posted Apr 15, 2017

ESKIMOROLL is some kind of Kerberos exploit targeting domain controllers running Windows Server 2000, 2003, 2008 and 2008 R2. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web
systems | windows
SHA-256 | 44445e65de790734a9912cc24326ed275f006414130d1635be605f91692c8aad
ERRATICGOPHER 1.0.1 Windows XP / 2003 SMB Exploit
Posted Apr 15, 2017

ERRATICGOPHER exploits an SMB vulnerability in Microsoft Windows 2003 and XP. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web
systems | windows
SHA-256 | 95c1b47b4bc8a3c1a063bb393ffb61a4237bc996fb0f0284d653dbfe42effd5f
EMPHASISMINE 3.4.0 IBM Lotus Domino IMAP Exploit
Posted Apr 15, 2017

EMPHASISMINE is an IMAP exploit for IBM Lotus Domino. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web, imap
SHA-256 | 4b2ffc2584295fcdf19a61c336bece7f070ec740f8f629c4853664d0b198ef5a
EMERALDTHREAD 3.0.0 Windows 2003 / XP SMB Exploit
Posted Apr 15, 2017

EMERALDTHREAD exploits an SMB vulnerability in Microsoft Windows 2003 and XP. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web
systems | windows
SHA-256 | ee348289a3e8368faeeca68670d88e718e303f16757bbdcf16a3165891e63eb8
EDUCATEDSCHOLAR 1.0.0 MS09-050 SMB Exploit
Posted Apr 15, 2017

EDUCATEDSCHOLAR exploits the SMB vulnerability patched by MS09-050. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web
SHA-256 | 989506a4db6e89b37b2c91e5549f923f627c507f74944515cc9a838e1e190907
ECLIPSEDWING 1.5.2 Windows 2000 / 2003 / XP MS08-67 SMB Exploit
Posted Apr 15, 2017

ECLIPSEDWING exploits the SMB vulnerability patched by MS08-67. It affects Microsoft Windows 2000, 2003, and XP. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web
systems | windows
SHA-256 | c570cf8eb7a9ffba6280fa7a06e42182381018eeb22fe59a49cc8478c72812d4
EASYPI 3.1.0 Lotus CC Mail Exploit
Posted Apr 15, 2017

EASYPI is a Lotus exploit that leverage CC. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web
SHA-256 | 878fbb749c395e611c277424aa48056b3b17bb8a7249886742e25fd5f68808dc
EASYBEE 1.0.1 MDaemon Private Email Server Exploit
Posted Apr 15, 2017

EASYBEE is an exploit for the MDaemon private email server. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web
SHA-256 | 5554e32b5828ae63cad44af6f187db640fd36c39549253726862b72ccf0ec448
Equation Group Data Leak As Of 04/14/2017
Posted Apr 15, 2017

This is a very large archive (500 MB) of all exploits, implants, and more from the Equation Group that has been leaked by the Shadow Brokers as of 04/14/2017. Consider anything inside of this archive hostile and unverified. For research purposes only.

tags | exploit
SHA-256 | 567b6d887d7f1e3030260dfc691abbcab6fea9dff8fd83a829fcee72ccd0a30f
Scriptler Jenkins 2.9 Cross Site Scripting
Posted Apr 15, 2017
Authored by Securify B.V., Burak Kelebek

Scriptler Jenkins version 2.9 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 484f0c9f4c2dce6057d71b5b1848deaed56ea83958b0a2b4f3e86290b3c68a16
Microsoft Windows Kernel win32kfull!SfnINLPUAHDRAWMENUITEM Memory Disclosure
Posted Apr 14, 2017
Authored by Google Security Research, mjurczyk

The Microsoft Windows kernel suffers from a stack memory disclosure vulnerability in win32kfull!SfnINLPUAHDRAWMENUITEM.

tags | exploit, kernel
systems | windows
advisories | CVE-2017-0167
SHA-256 | 4c9b80091c609bb2d3baf00d69e5a53a22ed77aecd51bfbe4eab9ab9d4f8ecd1
Microsoft Windows Kernel NtGdiGetDIBitsInternal Memory Disclosure / DoS
Posted Apr 14, 2017
Authored by Google Security Research, mjurczyk

Multiple bugs have been discovered in the implementation of the win32k!NtGdiGetDIBitsInternal system call, which is a part of the graphic subsystem in all modern versions of Windows. The issues can potentially lead to kernel pool memory disclosure or denial of service. Under certain circumstances, memory corruption could also be possible.

tags | exploit, denial of service, kernel
systems | windows
advisories | CVE-2017-0058
SHA-256 | 87918a29340a0f40627209d6efebf5fdc4fa4d8187afd47124e311d939064579
concrete5 8.1.0 Host Header Injection
Posted Apr 14, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

concrete5 version 8.1.0 suffers from a host header injection vulnerability.

tags | exploit
advisories | CVE-2017-7725
SHA-256 | 87b68124a633c85f3d133f78abf1cc5f99befd4e143952fd568f6a3dfb8a04cd
Agorum Core Pro 7.8.1.4-251 XXE Injection
Posted Apr 14, 2017
Authored by Dr. Erlijn van Genuchten, Sascha Grimmeisen | Site syss.de

Agorum Core Pro version 7.8.1.4-251 suffers from an XML external entity injection vulnerability.

tags | exploit, xxe
SHA-256 | 5c97508695298b8a89755d63be627cc2b32ea74f25600dd1f309a386314a7fef
Agorum Core Pro 7.8.1.4-251 Cross Site Scripting
Posted Apr 14, 2017
Authored by Dr. Erlijn van Genuchten, Sascha Grimmeisen | Site syss.de

Agorum Core Pro version 7.8.1.4-251 suffers from a reflective cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 9a0b09816cee17b0adca3c6d62bbd0095b75e32616a1008d817275c0aa8f1b66
AlienVault USM/OSSIM 5.3.4 / 5.3.5 Remote Command Execution
Posted Apr 14, 2017
Authored by temp66, Peter Lapp | Site metasploit.com

This Metasploit module exploits an unauthenticated command injection in Alienvault USM/OSSIM versions 5.3.4 and 5.3.5. The vulnerability lies in an API function that does not check for authentication and then passes user input directly to a system call as root.

tags | exploit, root
SHA-256 | d72c139011d02b5dd53490824fea6a9d33d4ea93c69d1eaa4c8702f390b4d945
GNS3 Mac OS-X 1.5.2 ubridge Privilege Escalation
Posted Apr 14, 2017
Authored by Hacker Fantastic

GNS3 Mac OS-X version 1.5.2 ubridge privilege escalation exploit.

tags | exploit
systems | apple, osx
SHA-256 | a5e76f57b9fe4ca0325f3a4fbe2fcec453b432eccb24a18d312f44c6c0d6947d
Word Directory Script 2.1 Cross Site Scripting / SQL Injection
Posted Apr 14, 2017
Authored by Bilal Kardadou

Word Directory Script version 2.1 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 5b69a90341965fd38f7c86374a141680f315557e4ee3953c218701a49407ad6c
Agorum Core Pro 7.8.1.4-251 Cross Site Request Forgery
Posted Apr 14, 2017
Authored by Dr. Erlijn van Genuchten, Sascha Grimmeisen | Site syss.de

Agorum Core Pro version 7.8.1.4-251 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | a5bc07a827c37468c33ac3f27445bcd040b7898c4d9e3bc67d76692c0cf6189c
Agorum Core Pro 7.8.1.4-251 Cross Site Scripting
Posted Apr 14, 2017
Authored by Dr. Erlijn van Genuchten, Sascha Grimmeisen | Site syss.de

Agorum Core Pro version 7.8.1.4-251 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 0e174fa21d039c7949fe776968052b63f7d7afc36d6e44ae1a9dd62831d712cd
PonyOS 4.0 fluttershy LD_LIBRARY_PATH Privilege Escalation
Posted Apr 14, 2017
Authored by Hacker Fantastic

PonyOS version 4.0 fluttershy LD_LIBRARY_PATH local kernel exploit.

tags | exploit, kernel, local
SHA-256 | 6867351b25180ee9a58f9f9c9a924f9ce0d77cf00cf72948ef60b4c78af6b5b6
Page 5 of 11
Back34567Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Google Patches Critical Chrome Vulnerability
Posted Apr 24, 2024

tags | headline, flaw, google, patch, chrome
Hackers Are Using Developing Countries For Ransomware Practice
Posted Apr 24, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
Authorities Investigate LabHost Users After Phishing Service Shutdown
Posted Apr 23, 2024

tags | headline, cybercrime, fraud, phish
Windows Vulnerability Reported By The NSA Exploited To Install Russian Malware
Posted Apr 23, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar, spyware, nsa
UnitedHealth Admits Breach Could Cover Substantial Proportion Of People In America
Posted Apr 23, 2024

tags | headline, hacker, privacy, data loss
Microsoft DRM Hack Could Allow Movie Downloads From Streaming
Posted Apr 23, 2024

tags | headline, microsoft, flaw, pirate
Over A Million Neighbourhood Watch Members Exposed
Posted Apr 23, 2024

tags | headline, privacy, britain, data loss
MITRE Hacked By State Sponsored Group Via Ivanti Zero Days
Posted Apr 23, 2024

tags | headline, hacker, government
Russia's Sandworm APT Linked To Attack On Texas Water Plant
Posted Apr 18, 2024

tags | headline, malware, usa, russia, cyberwar, scada
EU Tells Meta It Can't Paywall Privacy
Posted Apr 18, 2024

tags | headline, government, privacy, facebook, social
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close