exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files from Jerome Athias

Email addressjerome.athias at free.fr
First Active2004-11-20
Last Active2012-05-31
.NET Mass Telnet/SSH Multithread Scanner / Botnet Builder
Posted May 31, 2012
Authored by Jerome Athias

This program uses multithreading to scan a range of IP addresses (IPv4) to find telnet/ssh and web servers. It then brute forces credentials against the host and upon success, will detect the type of host and execute commands.

tags | tool, web, scanner
systems | unix
SHA-256 | 387243e74e389e70607dc921917a7ce98e0479096f1955bb53e8173123c4e264
MoroccoTel Default Password
Posted Apr 25, 2012
Authored by Jerome Athias

MoroccoTel boxes suffer from an issue where there is a default password that can be used on the telnet server.

tags | exploit
SHA-256 | 15212df8a3a8d8b6ba16ec77025ef5e22d8dacfee6fd2ff769977b33b5b5fd46
Huawei MT800 Cross Site Request Forgery
Posted Aug 6, 2009
Authored by Jerome Athias

The Huawei MT880 device suffers from cross site request forgery vulnerabilities.

tags | exploit, vulnerability, csrf
SHA-256 | 3fe868872064c2e25216cee4105b2a6578bb14b43e96704b0e53f9d50b06bc5e
w3af UserGuide Written In French
Posted Dec 31, 2008
Authored by Jerome Athias

w3af User Guide written in French.

tags | paper
SHA-256 | 31ac0479b71516c0063f3c2cecabe1e9b612eeeb99fc80951064da52881eb53e
JA-SNMP-Reader Reads OIDs From SNMP Agents
Posted Dec 30, 2008
Authored by Jerome Athias

JA-SNMP-Reader is a simple Windows executable that reads values from an OID of a given SNMP Agent.

systems | windows
SHA-256 | f79868f69d225f4308f36d526a18a2d328f8c100707c806272d882961a3d5feb
JASniff Packet Sniffer
Posted Dec 22, 2008
Authored by Jerome Athias

JASniff is a small handy graphical Windows TCP/UDP/ICMP packet sniffer. This tool will be embedded in the MSF-XB exploits development platform soon.Full source and a binary is included.

tags | tool, udp, sniffer, tcp
systems | windows
SHA-256 | 6b72a88cfe89a5313587d5fba7cc23c2b8067328f13b9efe6198926a12e185e5
Microsoft Visual Basic ActiveX Buffer Overflow
Posted Dec 12, 2008
Authored by Jerome Athias

Microsoft Visual Basic Active-X Controls buffer overflow proof of concept exploit that leverages mscomct2.ocx.

tags | exploit, overflow, activex, proof of concept
SHA-256 | 9e908a95caf95ef805674d900baaa9e609f55f84e306674f7900dde2246a3c2a
Posted Nov 24, 2008
Authored by Jerome Athias

Microsoft XML Core Services DTD cross-domain scripting proof of concept exploit that makes use of the vulnerability noted in MS08-069.

tags | exploit, proof of concept
SHA-256 | 9c41a205f45e8e6c54228661f76071d9b7c78bfe03fea9f194e637bee0017cd3
Posted Oct 27, 2008
Authored by Jerome Athias | Site securinfos.info

MSF eXploit Builder is a Windows GUI to build Metasploit Framework exploit modules. It will help you to edit/modify/create/test exploit modules for the Metasploit Framework. Full source release. It includes a built-in fuzzer, a win32 debugger, and a lot of tools used in the process of exploit development.

tags | tool, fuzzer
systems | windows, unix
SHA-256 | 4a382efc58c637872c644539f8f88fe0989f10424df3f81dc14c702a0e2f6770
Posted Mar 26, 2008
Authored by Jerome Athias | Site securinfos.info

The e107 My_Gallery plugin version 2.3 suffers from an arbitrary file download vulnerability.

tags | exploit, arbitrary
SHA-256 | 2ef4312d97e534f6c07bbe36d7a3a2078377c54b2fcec8d9d17470dfdfafce4b
Posted Jan 2, 2008
Authored by Jerome Athias | Site securinfos.info

BTScan is a bluetooth scanner for Windows. It scans for the accessible bluetooth devices, retrieves the list of available services on these devices, and allow file uploads via bluetooth.

tags | tool, file upload, wireless
systems | windows
SHA-256 | a3d23cec0cde56fb35df911c10b0ea27986a486ebdeae3a5af3d752f72d91746
Posted Aug 10, 2007
Authored by Jerome Athias

Whitepaper discussing how to speed up the exploit development process as presented at VNSECON07.

tags | paper
SHA-256 | ffe923e8398e85378151a0b921bace4d2172ba42ed6499ef888c1bdb1b15a5b4
Posted Jun 29, 2007
Authored by Jerome Athias | Site JA-PSI.fr

The .wdp project file handling in PCSoft WinDEV suffers from a buffer overflow vulnerability.

tags | advisory, overflow
SHA-256 | 9d2bdf9add4eb15757bc1637472308670613d3fab5d8e657520e87cc0a59fc48
Posted Jun 27, 2006
Authored by Jerome Athias | Site securinfos.info

XM Easy Personal FTP server version 5.0.1 remote overflow proof of concept exploit.

tags | exploit, remote, overflow, proof of concept
SHA-256 | e871e58abd0876e23cb061e1576a4237670b226ee100db0208fcfe9af59e80f5
Posted Feb 26, 2006
Authored by Jerome Athias

Remote exploit for ArGoSoft FTP server versions and below that makes use of a remote heap overflow in the DELE command.

tags | exploit, remote, overflow
SHA-256 | 7254d5e1a22aa5a9bedc2e13bb70cc4b7c74c92e5c1eac37b5611a7eb4360abd
Posted May 27, 2005
Authored by Jerome Athias, Reed Arvin | Site reedarvin.thearvins.com

BulletProof FTP server version local privilege escalation exploit that provides a shell with SYSTEM privileges.

tags | exploit, shell, local
SHA-256 | bf0d2a596e4873cd8286ec7287c3700d618e721578db84e1ee1695e7faedd485
Posted Nov 20, 2004
Authored by Jerome Athias

Vulnerabilities that allow an attacker to inject malicious PHP code exist in the phpBB2 forum using the Cash_Mod module.

tags | advisory, php, vulnerability
SHA-256 | 624d762e4f5dae8b18a82ee5892ea42e4e0889fbe304466a9772639cf8109294
Page 1 of 1

File Archive:

February 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    11 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    5 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    0 Files
  • 6
    Feb 6th
    0 Files
  • 7
    Feb 7th
    0 Files
  • 8
    Feb 8th
    0 Files
  • 9
    Feb 9th
    0 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    0 Files
  • 13
    Feb 13th
    0 Files
  • 14
    Feb 14th
    0 Files
  • 15
    Feb 15th
    0 Files
  • 16
    Feb 16th
    0 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By