what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files from Shahriyar Jalayeri

Email addressshahriyar.j at gmail.com
First Active2008-10-20
Last Active2012-08-26
Microsoft Windows Kernel Intel x64 SYSRET Proof Of Concept
Posted Aug 26, 2012
Authored by Shahriyar Jalayeri | Site repret.wordpress.com

This is proof of concept code that demonstrates the Microsoft Windows kernel (Intel/x64) SYSRET vulnerability as described in MS12-042. The shellcode disables code signing and will grant NT SYSTEM privileges to a specified application or already running process.

tags | exploit, kernel, shellcode, proof of concept
systems | windows
advisories | CVE-2012-0217
SHA-256 | 55e5a8e72dbb887b38dad0ce6c7bebe03b8466705cf04ce1a1a8c9406a8c4db3
Adobe Reader X Atom Type Confusion Vulnerability
Posted Jul 4, 2011
Authored by Shahriyar Jalayeri

Adobe Reader X Atom Type Confusion vulnerability exploit. Versions prior to 10.1 are affected.

tags | exploit
systems | linux
advisories | CVE-2011-0611
SHA-256 | 2033f50cee77bc7f1fa1709b3584c486872bb3fd662c3debbf685bbbeac65b4f
The Arashi AKA Storm
Posted Jul 3, 2011
Authored by Shahriyar Jalayeri, Shahin

This is a whitepaper called The Arashi (A.K.A Storm). It discusses ASLR/DEP bypass techniques.

tags | paper
SHA-256 | dfa912b70bb400100b503c7a03da6c98181c89c6c0691fda5e22af5afb3f5a95
MS Office 2010 Stack Overflow
Posted Jul 3, 2011
Authored by Shahriyar Jalayeri

MS Office 2010 RTF header stack overflow vulnerability exploit.

tags | exploit, overflow
systems | linux
advisories | CVE-2010-3333
SHA-256 | 588a0fa3c54b92278c6cc9362ccb9c22e758bc06d2add63b51f46ae7e2a7878a
djvu-overflow.txt
Posted Oct 30, 2008
Authored by Shahriyar Jalayeri

DjVu Active-X Control version 3.0 ImageURL property overflow exploit.

tags | exploit, overflow, activex
SHA-256 | 2d202aea26e136bc9b6a95fe616e54593e44ed8810f2d9850e0defcb7b4a62b4
powertcpftp-overflow.txt
Posted Oct 27, 2008
Authored by Shahriyar Jalayeri

PowerTCP FTP module multiple technique exploit using SEH overwrite and heapspray.

tags | exploit, overflow
SHA-256 | 9d48b43ea454d0c15cc86e7fa405f6e1abbd72ea2fdf81dcfef1a6e8563b3330
Detecting_and_Exploiting_ActiveX_Controls.pdf
Posted Oct 20, 2008
Authored by Shahriyar Jalayeri

Whitepaper entitled Detecting and Exploiting Vulnerabilities in ActiveX Controls. Written in Farsi.

tags | paper, vulnerability, activex
SHA-256 | a55486b2ef8323dff122d471481f484a8d72623c271a349cd0b318f55b96ca82
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close