Email address | private |
---|---|
Website | hyp3rlinx.altervista.org |
First Active | 2015-04-28 |
Last Active | 2022-01-11 |
Microsoft Windows Defender suffers from a detection bypass vulnerability due to a sub-par mitigation priorly adopted.
b5337b4ff0ded5ddda0becffc0c9002fdf3288c10396de61b829b2dacbf22ab9
Microsoft Windows suffers from a registration file dialog spoofing vulnerability and their last fix to this issue can be bypassed.
3d0c712557e8ea256ea96f38c4729251ae893ca640831654a5a638e72b4d841e
Microsoft Internet Explorer suffers from an active-x related bypass vulnerability. Microsoft will not address the issue as it is end of life.
fa22daaea0233f0b687f938d605627bbae7fbc5bb28632e8d17422cd0cf0af81
Microsoft Windows cmd.exe suffers from a stack buffer overflow vulnerability.
c0c6e1e6e941a667fff8d2e3a59cb00e4f436bf4e75ed0004cb71c6091fe1a0f
Recon-Informer is a basic real-time anti-reconnaissance detection tool for offensive security systems, useful for penetration testers. It runs on Windows/Linux and leverages scapy.
7f97a6b15e928a7250bd0474cc2f213abf8cc02a26b7e424d31838675907162f
NtFileSins.py is a Windows file enumeration intel gathering tool.
cd7f7668a2bd1ab454e0856174991064837bd101596c5b6b4aca04e244ce7d70
Recon-Informer is a basic real-time anti-reconnaissance detection tool for offensive security systems, useful for penetration testers. It runs on Windows/Linux and leverages scapy.
631fc764a07667ba55ccff741ea4c5d703fb716cdd19dbee4f7067779fe7db39
CloudMe version 1.11.2 exploit that uses MSVCRT.System to create a new user (boku:0v3R9000!) and add the new user to the Administrators group. A requirement of successful exploitation is the CloudMe.exe process must be running as administrator.
fa72c3ffb403b1cf08f01966de80e025ee648636329bef78008faa0a5aee32e9
Mantis Bug Tracker version 2.3.0 suffers from a remote code execution vulnerability.
c5bd41082422ed338ccc46ee3ad8d43820a3a1cd833484f28da741205e12c069
Microsoft Windows TCPIP Finger Command finger.exe that ships with the OS, can be used as a file downloader and makeshift C2 channel. Legitimate use of Windows Finger Command is to send Finger Protocol queries to remote Finger daemons to retrieve user information. However, the finger client can also save the remote server response to disk using the command line redirection operator.
3babc6b7fe4a8f47b91663b7687243b54fb3e6f50d737c19a25a59347d22cb67
Ericom Access Server allows attackers to initiate SSRF requests making outbound connections to arbitrary hosts and TCP ports. Attackers, who can reach the AccessNow server can target internal systems that are behind firewalls that are typically not accessible. This can also be used to target third-party systems from the AccessNow server itself. Version 9.2.0 is affected.
be074654b32c8f5acc5a65ebfb2346bf9d5c96f828c3e11ce96a91c39d1bafef
Microsoft Windows mshta.exe allows processing of XML external entities which can result in local data-theft and or program reconnaissance upon opening specially crafted HTA files.
c2f70b789eac66e7e0227b39147f2ee878460b9df5a5059f2aa17a51234cda97
HFS Http File Server version 2.3m build 300 suffers from a remote buffer overflow vulnerability that can lead to a denial of service.
c7ab5ba2d2663b28ffedb5d9db2e23328041d24057b118524685224b0d480c62
WinGate version 9.4.1.5998 suffers from an insecure permissions vulnerability that allows for privilege escalation.
2b5dfe00be1334114c04e743db783c3a3f1ad2d5004db2216f1ead8c50be8631
Avaya IP Office versions 9.1.8.0 through 11 suffer from an insecure transit vulnerability that allows for password disclosure.
feed9ac59fa8c29769c827c9ab64c5533cc3930d33aaf789ed75c1605b9ace7e
CloudMe version 1.11.2 SEH / DEP / ASLR buffer overflow exploit. The original discovery of this vulnerability was by hyp3rlinx.
f9b36ce85715513e6297fe5545cc87bca3c5904d7f17206e43521ab4744650b8
CloudMe version 1.11.2 buffer overflow proof of concept exploit. Original vulnerability discovered by hyp3rlinx.
ed65bed8b662b7e2d11fe184fc29b26b92fddd08fc3a706685a4125ca60acc16
Neowise CarbonFTP version 1.4 suffers from an insecure proprietary password encryption implementation. Second version of this exploit that is updated to work with Python 3.
85cb5f2e3f8cc5c5c6046d113ad20c3b308549088088cf06664f3bfe93538150
netABuse is a scanner that identifies systems susceptible to a Microsoft Windows insufficient authentication logic flaw.
0c7c190bc3e955ffedd16a90504abb79b5245412afb286a43ee38af4ebf3a6c4
The Windows "net use" network logon type-3 command does not prompt for authentication when the built-in Administrator account is enabled and both remote and originating systems suffer from password reuse. This also works as "standard" user but unfortunately we do not gain high integrity privileges. However, it opens the door and increases the attack surface if the box we laterally move to has other vulnerabilities present.
951dfb35f9a363b5e914b804355769c12f596ba4c1d0f4de84c1869765e684c7
Recon-Informer is a basic real-time anti-reconnaissance detection tool for offensive security systems, useful for penetration testers. It runs on Windows/Linux and leverages scapy.
146ce8d8d2242cab323c77d566f77441925783b4b3a014f6c04050d000ff0ae7
The HP System Event service "HPMSGSVC.exe" will load an arbitrary EXE and execute it with SYSTEM integrity. HPMSGSVC.exe runs a background process that delivers push notifications. The problem is that the HP Message Service will load and execute any arbitrary executable named "Program.exe" if it is found in the user's c:\ drive.
bb1d3051684f78e6f20b0e7c0fac35b0688b7e5e924cc09e9446024ad1d60e8b
NTCrackPipe is a basic local Windows account cracking tool.
369ffc766bb6af146aedb08cf5932e5a672718d60587bd5577a06c772171cd8f
Neowise CarbonFTP version 1.4 suffers from an insecure proprietary password encryption implementation.
860427dfdb6db41fffd3c10a92aede4d5de72be4b33b6d78f1ca5d953c68d971
Trend Micro Security can potentially allow an attacker to use a malicious program to escalate privileges to SYSTEM integrity and obtain persistence on a vulnerable system.
e85735c3e297446cefa2f372abec28e211d0a44ffa2d1cc7c2afff07bd24cd6b