exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files from Dino Covotsos

First Active2008-04-21
Last Active2019-11-07
Travesty 1.0
Posted Nov 7, 2019
Authored by Dino Covotsos | Site blog.telspace.co.za

Travesty is a tool that can leverage a known directory traversal to assist in identifying interesting directories and files.

tags | tool
systems | unix
SHA-256 | 293428749e98bd1e7a59e6c0b2f55dd18872c3e73a8ff6357ffbf51cf66d0c37
Win10 MailCarrier 2.51 Buffer Overflow
Posted Oct 29, 2019
Authored by Dino Covotsos, Lance Biggerstaff

Win10 MailCarrier version 2.51 POP3 User remote buffer overflow exploit.

tags | exploit, remote, overflow
SHA-256 | 13098e760a816ccb94607e0bf00c0b7ce7100d3be40e32babf503a1307f8b8a4
LabF nfsAxe 3.7 Ping Client Buffer Overflow
Posted Apr 20, 2019
Authored by Dino Covotsos

LabF nfsAxe version 3.7 ping client buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 5232feb1a878eadc6fa5fea25caf4ae4cccff94d7dddea954739c79adf9a2bae
QNAP myQNAPcloud Connect 1.3.4.0317 Username/Password Denial Of Service
Posted Apr 19, 2019
Authored by Dino Covotsos

QNAP myQNAPcloud Connect version 1.3.4.0317 suffers from a username / password denial of service vulnerability.

tags | exploit, denial of service
advisories | CVE-2019-7181
SHA-256 | 1ed366907ba905add57c515eb5e14afb1015ff7b06ae2ff183d2958c5c96d415
MailCarrier 2.51 RETR Buffer Overflow
Posted Apr 16, 2019
Authored by Dino Covotsos

MailCarrier version 2.51 POP3 RETR command remote SEH buffer overflow exploit.

tags | exploit, remote, overflow
advisories | CVE-2019-11395
SHA-256 | 369b8595dde8c9b12c3bf187b78d4d2a5d97de8c059235337dc95c461bb91375
MailCarrier 2.51 TOP Buffer Overflow
Posted Apr 14, 2019
Authored by Dino Covotsos

MailCarrier version 2.51 POP3 TOP command remote SEH buffer overflow exploit.

tags | exploit, remote, overflow
advisories | CVE-2019-11395
SHA-256 | 5e3cfc7a086a3ee6b354e87378e4218d1d8f32e911c2c2075269a0ae3098c550
MailCarrier 2.51 LIST Buffer Overflow
Posted Apr 14, 2019
Authored by Dino Covotsos

MailCarrier version 2.51 POP3 LIST command remote SEH buffer overflow exploit.

tags | exploit, remote, overflow
advisories | CVE-2019-11395
SHA-256 | 0acc339f07429dfc0f2beb0c5c7c0eeb24241c16aa9860feb1dbff3278220106
MailCarrier 2.51 USER Buffer Overflow
Posted Apr 14, 2019
Authored by Dino Covotsos

MailCarrier version 2.51 POP3 USER command remote buffer overflow exploit.

tags | exploit, remote, overflow
advisories | CVE-2019-11395
SHA-256 | a137125e236c4e956266d78de14d425b87cc0c8ead564c4b98597e075719e76c
MailCarrier 2.51 RCPT TO Buffer Overflow
Posted Apr 13, 2019
Authored by Dino Covotsos

MailCarrier version 2.51 RCPT TO remote buffer overflow exploit.

tags | exploit, remote, overflow
advisories | CVE-2019-11395
SHA-256 | 06af225548a7b678034086a9a481c8d02615a3c9cc7cbf7c820107e6dace3387
FTPShell Server 6.83 Account Name To Ban Local Buffer Overflow
Posted Apr 10, 2019
Authored by Dino Covotsos

FTPShell Server version 6.83 Account name to ban local buffer overflow exploit.

tags | exploit, overflow, local
SHA-256 | 0103d38b2c7038d9675cec12825180d27cb3877000d5630b501b92e494d707f8
FTPShell Server 6.83 Virtual Path Mapping Local Buffer Overflow
Posted Apr 10, 2019
Authored by Dino Covotsos

FTPShell Server version 6.83 Virtual Path Mapping local buffer overflow exploit.

tags | exploit, overflow, local
SHA-256 | b248948dec16aaf4914136ef9f42d2199554d52e55dbc3162d171fc4450663a4
UltraISO 9.7.1.3519 Local Buffer Overflow
Posted Jan 31, 2019
Authored by Dino Covotsos

UltraISO version 9.7.1.3519 local buffer overflow SEH exploit.

tags | exploit, overflow, local
SHA-256 | 6ab8a0be9621c72336bf3c3a52766bd10ac6041fa0b278ef35cb5cc1496ef4e2
AnyBurn x86 4.3 Denial Of Service
Posted Jan 31, 2019
Authored by Dino Covotsos

AnyBurn x86 version 4.3 suffers from a denial of service vulnerability.

tags | exploit, denial of service, x86
SHA-256 | f0b728371088f2c5e8db6b8d83c58786df87204d9660153e3bd8f547200264d1
R i386 3.5.0 Local Buffer Overflow
Posted Jan 31, 2019
Authored by Dino Covotsos

R i386 version 3.5.0 local buffer overflow SEH exploit.

tags | exploit, overflow, local
SHA-256 | a4af3b0cf6c770e0a4bffd814b8b4abd7a0fc4844ab958cf2b588386d96df166
HTML Video Player 1.2.5 Local Buffer Overflow
Posted Jan 29, 2019
Authored by Dino Covotsos

HTML Video Player version 1.2.5 suffers from a local buffer overflow vulnerability.

tags | exploit, overflow, local
SHA-256 | 5da13ce830ebd2299eb1a2322857e6fef1523e8861bf45742d5a162d465b4d06
R 3.4.4 Local Buffer Overflow
Posted Jan 27, 2019
Authored by Dino Covotsos

R version 3.4.4 local non-SEH buffer overflow exploit for Windows XP SP3.

tags | exploit, overflow, local
systems | windows
SHA-256 | e429fc91825cbb5af51c40aff7f77d08263caf61f0c30a58c7a5ca15e40021db
PCManFTPD 2.0.7 Server APPE Command Buffer Overflow
Posted Nov 5, 2018
Authored by Dino Covotsos

PCManFTPD 2.0.7 server APPE command buffer overflow exploit.

tags | exploit, overflow
advisories | CVE-2018-18861
SHA-256 | 4b5e524625d8561d8f94907e64844a935db1f3267c60bddae2eaecdb4ddef231
D2T1_-_Dino_Covotsos_-_Hacking_the_Bluetooth_Stack_for_Fun_Fame_and_Mayhem.zip
Posted Apr 21, 2008
Authored by Dino Covotsos | Site conference.hitb.org

Hacking the Bluetooth Stack for Fun, Fame and Mayhem - As the use of bluetooth technology becomes more commonly used, the room for exploitation increases. From cell phones to gaming devices. Dino demonstrates various methods of exploiting this technology in real life situations.

SHA-256 | 371a5f5e0f86c9c0696d681ba324a68ce8da7ea7d9e88421d34c2d5e098fc51f
Page 1 of 1
Back1Next

File Archive:

December 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    2 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close