ETERNALSYNERGY is a remote code execution exploit for SMBv3. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.
7c0d6b0f4d94cfb9e0687521b17d8366d780c0ca9fe6c22453cdc7b22872a6ed
ETERNALROMANCE exploits an SMB1 vulnerability in Microsoft Windows XP, 2003, Vista, 7, 8, 2008, and 2008 R2. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.
cc6021593f9b1a2663a2a29570fc4c7e92ac04f765b7a6a9f9dd5c8196c3b633
ETERNALROMANCE exploits an SMB1 vulnerability in Microsoft Windows XP, 2003, Vista, 7, 8, 2008, and 2008 R2. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.
b731827f9a168d6610e32c2002975cc1c2fe32260f12e50a86429d722e3d908a
ESTEEMAUDIT is a a remote RDP (Remote Desktop) zero day exploit targeting Windows Server 2003 and XP, installs an implant and exploits smart card authentication. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.
cdba14ff2a6f42d4820cce05a9ea4e7c3da31b972c5f6222a55eca0af1ab33bd
ESKIMOROLL is some kind of Kerberos exploit targeting domain controllers running Windows Server 2000, 2003, 2008 and 2008 R2. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.
44445e65de790734a9912cc24326ed275f006414130d1635be605f91692c8aad
ERRATICGOPHER exploits an SMB vulnerability in Microsoft Windows 2003 and XP. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.
95c1b47b4bc8a3c1a063bb393ffb61a4237bc996fb0f0284d653dbfe42effd5f
EMPHASISMINE is an IMAP exploit for IBM Lotus Domino. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.
4b2ffc2584295fcdf19a61c336bece7f070ec740f8f629c4853664d0b198ef5a
EMERALDTHREAD exploits an SMB vulnerability in Microsoft Windows 2003 and XP. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.
ee348289a3e8368faeeca68670d88e718e303f16757bbdcf16a3165891e63eb8
EDUCATEDSCHOLAR exploits the SMB vulnerability patched by MS09-050. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.
989506a4db6e89b37b2c91e5549f923f627c507f74944515cc9a838e1e190907
ECLIPSEDWING exploits the SMB vulnerability patched by MS08-67. It affects Microsoft Windows 2000, 2003, and XP. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.
c570cf8eb7a9ffba6280fa7a06e42182381018eeb22fe59a49cc8478c72812d4
EASYPI is a Lotus exploit that leverage CC. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.
878fbb749c395e611c277424aa48056b3b17bb8a7249886742e25fd5f68808dc
EASYBEE is an exploit for the MDaemon private email server. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.
5554e32b5828ae63cad44af6f187db640fd36c39549253726862b72ccf0ec448
This is a very large archive (500 MB) of all exploits, implants, and more from the Equation Group that has been leaked by the Shadow Brokers as of 04/14/2017. Consider anything inside of this archive hostile and unverified. For research purposes only.
567b6d887d7f1e3030260dfc691abbcab6fea9dff8fd83a829fcee72ccd0a30f
Scriptler Jenkins version 2.9 suffers from a cross site scripting vulnerability.
484f0c9f4c2dce6057d71b5b1848deaed56ea83958b0a2b4f3e86290b3c68a16
The Microsoft Windows kernel suffers from a stack memory disclosure vulnerability in win32kfull!SfnINLPUAHDRAWMENUITEM.
4c9b80091c609bb2d3baf00d69e5a53a22ed77aecd51bfbe4eab9ab9d4f8ecd1
Multiple bugs have been discovered in the implementation of the win32k!NtGdiGetDIBitsInternal system call, which is a part of the graphic subsystem in all modern versions of Windows. The issues can potentially lead to kernel pool memory disclosure or denial of service. Under certain circumstances, memory corruption could also be possible.
87918a29340a0f40627209d6efebf5fdc4fa4d8187afd47124e311d939064579
concrete5 version 8.1.0 suffers from a host header injection vulnerability.
87b68124a633c85f3d133f78abf1cc5f99befd4e143952fd568f6a3dfb8a04cd
Agorum Core Pro version 7.8.1.4-251 suffers from an XML external entity injection vulnerability.
5c97508695298b8a89755d63be627cc2b32ea74f25600dd1f309a386314a7fef
Agorum Core Pro version 7.8.1.4-251 suffers from a reflective cross site scripting vulnerability.
9a0b09816cee17b0adca3c6d62bbd0095b75e32616a1008d817275c0aa8f1b66
This Metasploit module exploits an unauthenticated command injection in Alienvault USM/OSSIM versions 5.3.4 and 5.3.5. The vulnerability lies in an API function that does not check for authentication and then passes user input directly to a system call as root.
d72c139011d02b5dd53490824fea6a9d33d4ea93c69d1eaa4c8702f390b4d945
GNS3 Mac OS-X version 1.5.2 ubridge privilege escalation exploit.
a5e76f57b9fe4ca0325f3a4fbe2fcec453b432eccb24a18d312f44c6c0d6947d
Word Directory Script version 2.1 suffers from cross site scripting and remote SQL injection vulnerabilities.
5b69a90341965fd38f7c86374a141680f315557e4ee3953c218701a49407ad6c
Agorum Core Pro version 7.8.1.4-251 suffers from a cross site request forgery vulnerability.
a5bc07a827c37468c33ac3f27445bcd040b7898c4d9e3bc67d76692c0cf6189c
Agorum Core Pro version 7.8.1.4-251 suffers from a persistent cross site scripting vulnerability.
0e174fa21d039c7949fe776968052b63f7d7afc36d6e44ae1a9dd62831d712cd
PonyOS version 4.0 fluttershy LD_LIBRARY_PATH local kernel exploit.
6867351b25180ee9a58f9f9c9a924f9ce0d77cf00cf72948ef60b4c78af6b5b6