exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 98 RSS Feed

Files from Jonathan Salwan

First Active2009-01-16
Last Active2014-11-05
ROP Gadget Tool 5.3
Posted Nov 5, 2014
Authored by Jonathan Salwan

This tool lets you search your gadgets on your binaries (ELF format) to facilitate your ROP exploitation. The gadgets are found on executable segments.

Changes: Fixed some bugs. Added various options such as --all, --multibr, -offset, --rawArch, and --rawMode. Various other updates and additions.
tags | tool
systems | unix
SHA-256 | fb9122139453d8f4446211b8abc04b50ffab8420069b74155ee605f46c1cdf71
Kernel MSM Memory Leak
Posted Nov 26, 2013
Authored by Jonathan Salwan

Kernel MSM versions prior to 3.10 suffer from a memory leak in the Genlock driver.

tags | advisory, kernel, memory leak
advisories | CVE-2013-6392
SHA-256 | bab34632681acb34290802692cd529eb033d5bfde86c6aaad103565ca18886e2
Goodix GT915 Driver Memory Corruption / DoS / Privilege Escalation
Posted Nov 7, 2013
Authored by Jonathan Salwan

Multiple issues have been identified in the Goodix GT915 touchscreen driver for Android. The issues were found in the write handler of the procfs entry created by the driver, which by default is readable and writeable to users without any specific privileges.

tags | advisory
advisories | CVE-2013-4740, CVE-2013-6122
SHA-256 | 5468cf6bc4a573bce23d6d2362d62f883dc4f5f44ad54aabb748028e15ad7c7f
Android Camera Driver Buffer Overflow / Memory Disclosure
Posted Oct 21, 2013
Authored by Jonathan Salwan

A stack-based buffer overflow and a kernel memory disclosure vulnerability have been discovered in the system call handlers of the camera driver for Android.

tags | advisory, overflow, kernel
advisories | CVE-2013-4738, CVE-2013-4739
SHA-256 | 5e4baafc3b719ae7fddd0675ed808b960988f0436701a0308d0d5005f17017a3
Taint Analysis And Pattern Matching With Pin
Posted Aug 9, 2013
Authored by Jonathan Salwan

This is a whitepaper called Taint analysis and pattern matching with Pin. All examples in this document are considered a proof of concept and are meant to give others ideas.

tags | paper, proof of concept
SHA-256 | ec76a2f8def58b42c1d7b3105a4bea93f29bbf23d2776a4316a9981f1cb84489
OpenVZ Kernel 2.6.32 Memory Leaks
Posted Jul 5, 2013
Authored by Jonathan Salwan

OpenVZ kernel version 2.6.32 suffers from multiple memory leaks.

tags | advisory, kernel, memory leak
advisories | CVE-2013-2239
SHA-256 | 8564ad61e7645a172b677d9f8cf2e6d215eaeb5a393a80fab15d31814d976364
ROP Gadget Tool 3.4.1
Posted Jul 30, 2012
Authored by Jonathan Salwan

This tool lets you search your gadgets on your binaries (ELF format) to facilitate your ROP exploitation. The gadgets are found on executable segments.

Changes: Various bug fixes and a new feature.
tags | tool
systems | unix
SHA-256 | a3c3ec6b1802094e54da93c80785e1f8daf941d0b55ab312515a20eaca92d966
Linux/SuperH /bin/sh Shellcode
Posted Nov 25, 2011
Authored by Jonathan Salwan

27 bytes small Linux/SuperH setuid(0); execve("/bin/sh",NULL,NULL) shellcode.

tags | shellcode
systems | linux
SHA-256 | b10a669c6e4b3181ef2c671d6b89f203e8448c950e8c52c0df80c2a0ad194d71
ROP Gadget Tool 3.3
Posted Nov 9, 2011
Authored by Jonathan Salwan

This tool lets you search your gadgets on your binaries (ELF format) to facilitate your ROP exploitation. The gadgets are found on executable segments.

Changes: New core and news features.
tags | tool
systems | unix
SHA-256 | ca11bac88062dc522d672fa82c2a551edd60d21ac03d21285a21b27cae625fa6
ROP Gadget Tool 3.2
Posted Oct 11, 2011
Authored by Jonathan Salwan

This tool lets you search your gadgets on your binaries (ELF format) to facilitate your ROP exploitation. The gadgets are found on executable segments.

Changes: This version adds a filter function/researchs opcodes and now you can convert your shellcode on ROP instructions.
tags | tool
systems | unix
SHA-256 | 28f8e63bc35c46325d56c474d5128a74937d61727270c174964c2dd144d25d2a
Bypassing IDS With Return Oriented Programming
Posted Oct 4, 2011
Authored by Jonathan Salwan

Whitepaper called Bypassing IDS with Return Oriented Programming. It heavily discusses and shows the point of leveraging polymorphic shellcode in order to bypass detection.

tags | paper, shellcode
SHA-256 | 7b4233a85e4bc362abaaeaf8b2d2687ed81a3db3a7a699bbe6949214aeb66bae
ROP Gadget Tool 3.0
Posted Aug 1, 2011
Authored by Jonathan Salwan

This tool lets you search your gadgets on your binaries (ELF format) to facilitate your ROP exploitation. The gadgets are found on executable segments.

Changes: This version adds the auto-roper for building your payload automatically with the gadgets found.
tags | tool
systems | unix
SHA-256 | fe20eb082c9b42613c0b48b9b4c5c32bc58c455f4ab0be359ce7c8d85d7fa30e
ROP Gadget Tool 2.3
Posted Jul 11, 2011
Authored by Jonathan Salwan

This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation.

tags | tool
systems | unix
SHA-256 | e4427d5468cdea58f2f78c268fd4dfef942c4d3deff183d345a2ca145d77d671
PHP 5.3.6 Buffer Overflow
Posted Jul 3, 2011
Authored by Jonathan Salwan

PHP version 5.3.6 proof of concept buffer overflow exploit.

tags | exploit, overflow, php, proof of concept
advisories | CVE-2011-1938
SHA-256 | 1dd6733f0605c788059da351818004a21d990674130a330bede2b8de3032be99
Linux/SuperH Add Root User Shellcode
Posted Jun 24, 2011
Authored by Jonathan Salwan

143 bytes small Linux/SuperH sh4 add root user with password shellcode.

tags | root, shellcode
systems | linux
SHA-256 | 9dfaa19c7c70387a951fecf63dda0dc5cbf3d6994790436ec8af033e25311bdf
Linux/x86-32 ConnectBack With SSL Connection Shellcode
Posted Jun 9, 2011
Authored by Jonathan Salwan

422 bytes small Linux/x86-32 connectback with SSL connection shellcode.

tags | x86, shellcode
systems | linux
SHA-256 | 8487f1b7de1c3a9fc9b52f4a78e489eb7cf9494c5be31b21fcbcff1f15509b04
Linux/x86 netcat Bindshell Shellcode
Posted Apr 21, 2011
Authored by Jonathan Salwan

Linux/x86 /usr/bin/netcat -ltp6666 -e/bin/sh shellcode.

tags | x86, shellcode
systems | linux
SHA-256 | 84aa0c4d97e3ba738247628d5bb9d317fcac19a4b680f5764acf2335664d47e8
How To Make A Backdoor With Return Oriented Programming
Posted Apr 13, 2011
Authored by Jonathan Salwan

Whitepaper discussing how to make a backdoor with return oriented programming and ROPgadget. Written in French.

tags | paper
SHA-256 | 359f35beea9bb5e9dd45e28409ccda1fe40ca5f1e3ecfdbb92abacf00fc0bf60
ROP Gadget Tool 2.0
Posted Mar 14, 2011
Authored by Jonathan Salwan

This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation.

tags | tool
systems | unix
SHA-256 | 1b980fc86e7341b8c082abf927494528ed554d57e0c25f7b4c5ba63ecfca3eb0
Create A New User With UID 0 ARM Shellcode
Posted Dec 9, 2010
Authored by Jonathan Salwan

Metasploit framework plugin that generates shellcode to create a new user with uid 0 for the ARM architecture.

tags | shellcode
SHA-256 | 9d8fcf7ca8c8fb2be14a67055397ccae9e20e5aebce90829954cd7e054d0e01d
How To Create Shellcode On ARM Architecture
Posted Dec 2, 2010
Authored by Jonathan Salwan

Whitepaper called How To Create a Shellcode on ARM Architecture.

tags | paper, shellcode
SHA-256 | afc96ecde2f45d34049429d3da01bbc11524655aa7184ff5ccbd014a45ed7f61
Linux/ARM Add Root User Shellcode
Posted Nov 29, 2010
Authored by Jonathan Salwan

151 bytes small Linux/ARM add root user with password shellcode.

tags | root, shellcode
systems | linux
SHA-256 | a38fa7ee86bfb26c74a2b910895893e7c577f127befaa4eca299f339c86515f9
Linux/ARM /bin/sh Shellcode
Posted Sep 6, 2010
Authored by Jonathan Salwan

27 bytes small Linux/ARM execve("/bin/sh",[0],[0],[0 vars]) shellcode.

tags | shellcode
systems | linux
SHA-256 | fbf32dea532b903395b1f7142db9bda7e4bc07537952d97bf32a5de0356b6e44
how-to-create-polymorphic-shellcode.txt
Posted Jul 8, 2010
Authored by Jonathan Salwan | Site shell-storm.org

Whitepaper called How to create a polymorphic shellcode.

tags | paper, shellcode
SHA-256 | d1fd355e88fcde0310c5c3e33b05b23f2ada9bbf2558047dd96893d2881e67eb
how-to-create-shellcode.txt
Posted Jul 8, 2010
Authored by Jonathan Salwan | Site shell-storm.org

Whitepaper called How to create a shellcode on Linux / x86.

tags | paper, x86, shellcode
systems | linux
SHA-256 | be8ad7a3a06855a46d70be336cf0396e40311d917b41a72c66e17cc4f8048afc
Page 1 of 4
Back1234Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close