exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files from poplix

Email addresspoplix at papuasia.org
First Active2005-05-07
Last Active2008-04-04
virtuozzo-xsrf.txt
Posted Apr 4, 2008
Authored by poplix | Site px.dynalias.org

Virtuozzo from Parallels suffers from cross site request forgery vulnerabilities.

tags | advisory, vulnerability, csrf
SHA-256 | ebaad3d635c352d3c9f1ac5fc2240d69b74469fbafa8caa44dfa42135de15d11
pdflib-overflows.txt
Posted Dec 24, 2007
Authored by poplix | Site px.dynalias.org

pdflib, a library used for generating PDFs on the fly, suffers from multiple buffer overflow vulnerabilities due to the use of strcpy().

tags | advisory, overflow, vulnerability
SHA-256 | cc8dcb150298922e6a2a292f9c663f4dbff95dc657c445fc35cdee5ee09e6763
gwcheck.c
Posted Dec 24, 2007
Authored by poplix | Site px.dynalias.org

gwcheck is a simple program that checks if a host in an ethernet network is a gateway to Internet.

tags | tool, scanner
systems | unix
SHA-256 | bbd330c1df80d2586e3ecb1e5671a1a0b3aef4ffd54dd4ef27c45ffaaa50491c
gmailsteal_remote.scpt.txt
Posted Sep 30, 2007
Authored by poplix | Site px.dynalias.org

This script can be used to steal G-Mail's keychained password by injecting javascript into Safari. When executed it opens G-Mail's login page, reads the saved password and sends it to a logging server by creating an hidden iframe into G-Mail's page.

tags | exploit, javascript
SHA-256 | 20de0e897ec70cae2d19020dbc28f0afb395ff11a21cf566e2d898f6373105e1
gmailsteal_local.scpt.txt
Posted Sep 30, 2007
Authored by poplix | Site px.dynalias.org

This script can be used to steal G-Mail's keychained password by injecting javascript into Safari. When executed it opens G-Mail's login page, reads the saved password and prompts it into an alert box.

tags | exploit, javascript
SHA-256 | d1666deab432edbc9e59a484712e616f3e4b12ccc20689e06d1d5c0bc471f7ea
cotv2-dos.txt
Posted Feb 6, 2007
Authored by poplix

cotv 2.0 suffers from a client-side denial of service vulnerability due to a lack of validation. Demonstration exploit included.

tags | exploit, denial of service
SHA-256 | f707ee93bda1d6d72d269716afca6da52d47a31e6d5abc8bec288f711a10b6e2
dlink-arp.txt
Posted Dec 12, 2006
Authored by poplix

The D-LINK DWL-2000AP+ with firmware version 2.11 is prone to two remote denial of service vulnerabilities because it fails to handle arp flooding.

tags | advisory, remote, denial of service, vulnerability
SHA-256 | 87d03a41d7205746c6fdc2717648002c7605bc5def176cb29db02f70e7827bcf
eNM-0.0.1.txt
Posted Oct 31, 2006
Authored by poplix

easy notes manager (eNM) version 0.0.1 is affected by multiple SQL injection issues. POC included that demonstrates how to bypass authentication.

tags | exploit, sql injection
SHA-256 | 8bf434113a79d20b0e13eca016af6e6321a692aac41cb63c7a6ec3adf04d23fd
tripp-alpha0.2.tar.gz
Posted Jun 26, 2006
Authored by poplix | Site tripp.dynalias.org

TRIPP is a utility to rewrite incoming and outgoing IP packets. Since it can rewrite both headers and payload, it can be used to configure the tcp/ip stack behavior in order to perform various tasks mainly intended for network tests, simulations and development.

Changes: The ip options handler, a virtual clock for TCP timestamp, a packet delayer, a packet marker, the ability to match packets randomly, the ability to limit rewriting to a specific host only, the ability to pass rules directly via command line, the ability to set payload to empty packets were added. Various other enhancements and changes.
tags | spoof, tcp
SHA-256 | 378bab5802d5cce78688708b5c718ebf003e8ea399862c886cc986351efdd9d9
payload-rewrite_exploit.txt
Posted Jun 26, 2006
Authored by poplix

Small whitepaper discussing how to use payload rewriting to exploit remote buffer overflow vulnerabilities.

tags | paper, remote, overflow, vulnerability
SHA-256 | 0f69f97a695d554036455180134044f578440c4022112040028883dd582a2d05
tripp-alpha0.1.tar.gz
Posted Feb 22, 2006
Authored by poplix | Site tripp.dynalias.org

TRIPP is a utility to rewrite incoming and outgoing IP packets. Since it can rewrite both headers and payload, it can be used to configure the tcp/ip stack behavior in order to perform various tasks mainly intended for network tests, simulations and development.

tags | spoof, tcp
SHA-256 | 41978f67ad0896e10ec10edd525909b6563e02ab70ca5c0e75d659ae9bfd92f0
p0fspoof.txt
Posted Feb 14, 2006
Authored by poplix | Site tripp.dynalias.org

A paper discussing passive OS fingerprinting and spoofing OpenBSD pf "os" rulesets.

tags | spoof
systems | openbsd
SHA-256 | 0d569aa54bb77d9a75c4c38062ec73498e406c7673560bff04cc7b95c7368e3d
authsyn.tgz
Posted Feb 14, 2006
Authored by poplix | Site tripp.dynalias.org

proof-of-concept tool for performing passive OS fingerprint spoofing to bypass OpenBSD pf firewall rules.

tags | spoof
systems | openbsd
SHA-256 | 5a2ede5d7226dfc63dbb8d460f5f043f9f8b45d0fee869848ed3de681903dd28
tripp_test.1c.tar.gz
Posted May 7, 2005
Authored by poplix | Site tripp.dynalias.org

TRIPP is a utility to rewrite outgoing IP packets. Since it can rewrite both header and payload data, it combines functionality found in iptables as well as netsed. This can be useful for performing replay attacks, altering your own OS fingerprint, or for bypassing remote firewalls.

tags | remote
systems | unix
SHA-256 | dd20c3a4d3957262197fe88667340ecfabf33650727217079e673d6d2796ef11
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close