exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files from koshi

Email addressheykoshi at gmail.com
First Active2007-09-05
Last Active2010-06-17
Microsoft Visual Studio Msmask32.ocx ActiveX Buffer Overflow.
Posted Jun 17, 2010
Authored by koshi, MC | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in Microsoft's Visual Studio 6.0. When passing a specially crafted string to the Mask parameter of the Msmask32.ocx ActiveX Control, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary, activex
advisories | CVE-2008-3704
SHA-256 | def095f5fae66e555774c80c31922aee92bbe086dec4cbf1548a0683a892e8c5
Microsoft Visual Studio Msmask32.ocx ActiveX Buffer Overflow
Posted Nov 26, 2009
Authored by koshi, MC | Site metasploit.com

This Metasploit module exploits a stack overflow in Microsoft's Visual Studio 6.0. When passing a specially crafted string to the Mask parameter of the Msmask32.ocx ActiveX Control, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary, activex
advisories | CVE-2008-3704
SHA-256 | 56b52c8f83d0a22f5e67d717396bd5fe41cbe970d924fc937c14e7521ff8ee80
MP3 Studio 1.0 Buffer Overflow
Posted Jul 28, 2009
Authored by koshi

MP3 Studio version 1.0 local buffer overflow exploit that creates a malicious .mpf file.

tags | exploit, overflow, local
SHA-256 | d1964b25a92459ffadebc2b3cd94172c9e573cf59a13c38c2591b6a92d6e99a6
eXeScope 6.50 Buffer Overflow
Posted Mar 24, 2009
Authored by koshi

eXeScope version 6.50 local buffer overflow exploit that creates a malicious .exe file.

tags | exploit, overflow, local
SHA-256 | 49883f40b03f7ea39c3671422807dfa50b1883ead4aacc1b56752b23f0009599
win32 PEB!NtGlobalFlags Shellcode
Posted Feb 24, 2009
Authored by koshi

14 bytes small win32 PEB!NtGlobalFlags shellcode.

tags | shellcode
systems | windows
SHA-256 | bd6da0384db9681081f499006fe5902116a197a8ea926b38438711cc2ca8fb4f
Getleft 1.2 Buffer Overflow
Posted Dec 30, 2008
Authored by koshi

Getleft version 1.2 proof of concept buffer overflow exploit that causes a denial of service condition.

tags | exploit, denial of service, overflow, proof of concept
SHA-256 | 5519139bcfb084e1b5afe1d514b6af3c2bb23bae05e899b6954e99cec7a4bfc2
alphanumeric-shellcode.txt
Posted Sep 3, 2008
Authored by koshi

67 byte Win32 PEB Kernel32.dll ImageBase Finger Alphanumeric shellcode.

tags | shellcode
systems | windows
SHA-256 | 7edd77337a4cddaae3c77b3778d9de498c100a2f5dbfbb94d1a1bd7484c8ec2b
imagebase-shellcode.txt
Posted Sep 3, 2008
Authored by koshi

49 byte Win32 PEB Kernel32.dll ImageBase Finger shellcode.

tags | shellcode
systems | windows
SHA-256 | 23ae18945ff456479ef4e6344f82cc9a281c5472da34397d346f64073ff308d6
acoustica-overflow.txt
Posted Aug 29, 2008
Authored by koshi

Acoustica Mixcraft versions 4.2 Build 98 and below mx4 file local buffer overflow exploit.

tags | exploit, overflow, local
SHA-256 | 43b6c437b76203c406a76bf1208c80f1560e902d45286eea3f3997178aafd87f
mvs-activex.txt
Posted Aug 27, 2008
Authored by koshi

Microsoft Visual Studio Active-X remote buffer overflow exploit that leverages Msmask32.ocx.

tags | exploit, remote, overflow, activex
SHA-256 | 807bbc098da295675fcf16e2045be01698e849fcabdc6fe4f7c158d6cb3c3e6e
intellitamper207-exec.txt
Posted Jul 23, 2008
Authored by koshi

IntelliTamper version 2.07 server header remote code execution exploit.

tags | exploit, remote, code execution
SHA-256 | b34305238b562e14d5c2bf1bc2ccb0dbfeece31ca10501ae2b18ca248200b80c
msvb-codeexec.txt
Posted Sep 5, 2007
Authored by koshi

Microsoft Visual Basic version 6.0 VBP_Open OLE local code execution exploit.

tags | exploit, local, code execution
SHA-256 | 2dde94986eb1a6eec380df5aae50265343027d4cff29eb3748ff4619878d5d70
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close