exploit the possibilities
Showing 1 - 9 of 9 RSS Feed

Files from Daniele Votta

Email addressvottadaniele at gmail.com
First Active2017-08-24
Last Active2019-05-01
Winamp 5.12 Playlist (.pls) Buffer Overflow
Posted May 1, 2019
Authored by Daniele Votta

Winamp version 5.12 playlist (.pls) buffer overflow exploit with ASLR + EGGHUNT + REV_SHELL. Written in Python.

tags | exploit, overflow, python
MD5 | b4f68883190d67e734981e318f21c348
Linux/x86 /sbin/route Shellcode
Posted Mar 10, 2019
Authored by Daniele Votta

14 bytes small /sbin/route staged shellcode and can read the second stage from STDIN.

tags | shellcode
MD5 | e8c16e3b24f6f44756d6649ccf732a4a
Polymorphic execve(/bibn/sh) Shellcode
Posted Mar 9, 2019
Authored by Daniele Votta

Linux/x86 polymorphic shellcode for execve(/bin/sh).

tags | x86, shellcode
systems | linux
MD5 | d466634267c681c46a6503c6019e8ee5
Insertion Encoder / Decoder Shellcode
Posted Mar 7, 2019
Authored by Daniele Votta

Linux/x86 insertion encoder and decoder shellcode.

tags | x86, shellcode
systems | linux
MD5 | e5cecc39dc9c9a7ebbb0f0c5a9755667
NOT Encoder / Decoder Shellcode
Posted Mar 4, 2019
Authored by Daniele Votta

44 bytes small Linux/x86 execve() /bin/sh NOT encoder and decoder shellcode. This technique is useful for bypassing some AV systems.

tags | x86, shellcode
systems | linux
MD5 | de82ed37ecb7f593351ba4ec02eff1df
XOR Encoder / Decoder
Posted Feb 26, 2019
Authored by Daniele Votta

45 bytes small Linux/x86 XOR encoder and decoder shellcode tool.

tags | x86, shellcode
systems | linux
MD5 | bf065857f881c4717625814a847c64eb
Linux/x86 execve() bc Shellcode
Posted Jan 29, 2019
Authored by Daniele Votta

53 bytes small Linux/x86 execve() shellcode that runs bc (terminal calculator).

tags | x86, shellcode
systems | linux
MD5 | f2ed451e169c54f8c783b8190e0407a3
Linux/x86 exit(0) Shellcode
Posted Jan 26, 2019
Authored by Daniele Votta

5 bytes small Linux/x86 exit(0) shellcode.

tags | x86, shellcode
systems | linux
MD5 | 5da07a2248e66ed147f644ba23dbe5ca
PDF-XChange Viewer 2.5 (Build 314.0) Code Execution
Posted Aug 24, 2017
Authored by Daniele Votta

PDF-XChange Viewer version 2.5 (Build 314.0) suffers from a javascript API remote code execution vulnerability.

tags | exploit, remote, javascript, code execution
advisories | CVE-2017-13056
MD5 | 95670a27a8d84b139aea1f89f227147b
Page 1 of 1
Back1Next

File Archive:

August 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    10 Files
  • 2
    Aug 2nd
    8 Files
  • 3
    Aug 3rd
    2 Files
  • 4
    Aug 4th
    1 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    79 Files
  • 7
    Aug 7th
    16 Files
  • 8
    Aug 8th
    11 Files
  • 9
    Aug 9th
    10 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    6 Files
  • 12
    Aug 12th
    26 Files
  • 13
    Aug 13th
    15 Files
  • 14
    Aug 14th
    19 Files
  • 15
    Aug 15th
    52 Files
  • 16
    Aug 16th
    11 Files
  • 17
    Aug 17th
    1 Files
  • 18
    Aug 18th
    2 Files
  • 19
    Aug 19th
    18 Files
  • 20
    Aug 20th
    19 Files
  • 21
    Aug 21st
    17 Files
  • 22
    Aug 22nd
    9 Files
  • 23
    Aug 23rd
    3 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close