Twenty Year Anniversary
Showing 1 - 25 of 101 RSS Feed

Files from Todor Donev

Real NameTodor Donev
Email addresstodor.donev at gmail.com
Websiteethical-hacker.org
First Active2009-02-04
Last Active2018-04-19
View User Profile

Personal Background

Bulgarian security researcher, an independent security consultant and cyber threats analyst. Deputy Chair at International Cybersecurity Association.


Facebook Graph Groups Crosswalk User Metadata Mapping Weakness
Posted Apr 19, 2018
Authored by Todor Donev

Facebook Graph groups crosswalk user's metadata mapping weakness demo proof of concept script.

tags | exploit, proof of concept
MD5 | cedc3e5b3dddf3d9c0b7c2ff3cd164ac
Facebook Graph Phone Number Metadata Crosswalk Mapping Proof Of Concept
Posted Apr 17, 2018
Authored by Todor Donev

This script is a proof of concept that lets you map out data from the Facebook Graph using a phone number.

tags | exploit, proof of concept
MD5 | 28accc5166d1544ceb05391fe341eb61
Facebook Graph Metadata Crosswalk Mapping Proof Of Concept
Posted Apr 17, 2018
Authored by Todor Donev

This script is a proof of concept that lets you map out data from the Facebook Graph.

tags | exploit, proof of concept
MD5 | ebd6f3ff9190c14f3543fce6a999a667
XOR File Encryption / Decryption
Posted Apr 10, 2018
Authored by Todor Donev

Script to perform basic XOR file encryption / decryption.

tags | tool, cracker
MD5 | 6d819a15e2f76aff3b5ae44bea5b8f22
SSH/SSL RSA Private Key Passphrase Dictionary Enumerator
Posted Apr 9, 2018
Authored by Todor Donev

This is a script to perform SSH/SSL RSA private key passphrase enumeration with a dictionary attack.

tags | tool, cracker
MD5 | a7800e5b746d5a13f5f887936bcbc785
RSA Factorization Attack Using Fermat's Algorithm
Posted Apr 5, 2018
Authored by Todor Donev

Script that performs RSA factorization attack using Fermat's algorithm.

tags | tool, cracker
MD5 | 1c37da73d3f7d27402cfcfb57295c95c
RC4 Simple FILE Encryption / Decryption
Posted Apr 5, 2018
Authored by Todor Donev

Simple script to perform RC4 encryption / decryption.

tags | tool, cracker
MD5 | 3a863b0b5164e05fa847e501c5eb915f
KeePass Simple Dictionary Password Enumerator
Posted Apr 4, 2018
Authored by Todor Donev

This is a simple perl script to perform dictionary attacks against the KeePass password manager.

tags | cracker, perl
MD5 | e2e787dabb8d179b58974a368b36d65f
Secutech RiS-11/RiS-22/RiS-33 5.07.52_es_FRI01 Remote DNS Changer
Posted Apr 2, 2018
Authored by Todor Donev

Secutech RiS-11/RiS-22/RiS-33 version 5.07.52_es_FRI01 remote DNS changer proof of concept exploit.

tags | exploit, remote, proof of concept
MD5 | b9610e5f8f43db01a247cd469065591e
glibc LD_AUDIT libmemusage.so RHEL-Based Arbitrary DSO Load Privilege Escalation
Posted Mar 30, 2018
Authored by Marco Ivaldi, Tavis Ormandy, Todor Donev, zx2c4, Brendan Coles | Site metasploit.com

This Metasploit module attempts to gain root privileges on Linux systems by abusing a vulnerability in the GNU C Library (glibc) dynamic linker with libmemusage.so library.

tags | exploit, root
systems | linux
advisories | CVE-2010-3847, CVE-2010-3856
MD5 | 82d002207d92e79c81d147d0cbc73594
Tenda FH303/A300 5.07.68_EN Remote DNS Changer
Posted Mar 30, 2018
Authored by Todor Donev

Tenda FH303/A300 with firmware version 5.07.68_EN cookie session weakness remote DNS changer proof of concept exploit.

tags | exploit, remote, proof of concept
MD5 | 2504ce8b0547c837ca7b83ab9b96f1e2
Tenda W3002R/A302/w309r Wireless Router 5.07.64_en DNS Changer
Posted Mar 30, 2018
Authored by Todor Donev

Tenda W3002R/A302/w309r wireless router version 5.07.64_en cookie session weakness remote DNS changer proof of concept exploit.

tags | exploit, remote, proof of concept
MD5 | fd6792545074adf74f37ff87b030925f
Tenda W316R Wireless Router 5.07.50 Remote DNS Changer
Posted Mar 30, 2018
Authored by Todor Donev

Tenda W316R wireless router version 5.07.50 cookie session weakness remote DNS changer proof of concept exploit.

tags | exploit, remote, proof of concept
MD5 | 64f928c7e3bf05e3ba5142d01cabff91
Tenda W308R V2 Wireless Router 5.07.48 DNS Changer
Posted Mar 29, 2018
Authored by Todor Donev

Tenda W308R V2 wireless router version 5.07.48 remote DNS changer proof of concept exploit.

tags | exploit, remote, proof of concept
MD5 | 78c72a9c8bc7ea5d1b1ada749accd592
Tenda N11 Wireless Router 5.07.43_en_NEX01 Remote DNS Changer
Posted Mar 27, 2018
Authored by Todor Donev

Tenda N11 wireless router version 5.07.43_en_NEX01 cookie session weakness remote dns change proof of concept exploit.

tags | exploit, remote, proof of concept
MD5 | cd4a8237b225bec1f095381ac7b0117d
glibc LD_AUDIT Arbitrary DSO Load Privilege Escalation
Posted Feb 10, 2018
Authored by Marco Ivaldi, Tavis Ormandy, Todor Donev, zx2c4, Brendan Coles | Site metasploit.com

This Metasploit module attempts to gain root privileges on Linux systems by abusing a vulnerability in the GNU C Library (glibc) dynamic linker. glibc ld.so in versions before 2.11.3, and 2.12.x before 2.12.2 does not properly restrict use of the LD_AUDIT environment variable when loading setuid executables. This allows loading arbitrary shared objects from the trusted library search path with the privileges of the suid user. This Metasploit module uses LD_AUDIT to load the libpcprofile.so shared object, distributed with some versions of glibc, and leverages arbitrary file creation functionality in the library constructor to write a root-owned world-writable file to a system trusted search path (usually /lib). The file is then overwritten with a shared object then loaded with LD_AUDIT resulting in arbitrary code execution. This Metasploit module has been tested successfully on glibc version 2.11.1 on Ubuntu 10.04 x86_64 and version 2.7 on Debian 5.0.4 i386. RHEL 5 is reportedly affected, but untested. Some glibc distributions do not contain the libpcprofile.so library required for successful exploitation.

tags | exploit, arbitrary, root, code execution
systems | linux, debian, ubuntu
advisories | CVE-2010-3847, CVE-2010-3856
MD5 | 2bf9e1106acf9e1f0a7b618fe7f2da3f
D-Link DSL-2640R Unauthenticated Remote DNS Changer
Posted Jan 16, 2018
Authored by Todor Donev

D-Link DSL-2640R unauthenticated remote DNS changing exploit.

tags | exploit, remote
MD5 | 960281695d209020856919aa5a842336
DNS/DNSSEC RR Stub Resolver Denial Of Service
Posted Jul 10, 2017
Authored by Todor Donev

DNS/DNSSEC RR stub resolvers amplification distributed denial of service exploit.

tags | exploit, denial of service
MD5 | 0dcc402c9b94f66a14d0a3fd9f69f56b
IoT mDNS/DNS-SD QM Amplification Distributed Denial Of Service
Posted Jul 5, 2017
Authored by Todor Donev

IoT mDNS/DNS-SD QM amplification distributed denial of service exploit.

tags | exploit, denial of service
MD5 | ac90410a7587c90900ab4cd9931a32ab
rpcinfo Portmap DUMP Call Amplification Distributed Denial Of Service
Posted Jul 5, 2017
Authored by Todor Donev

rpcinfo portmap DUMP call amplification distributed denial of service exploit.

tags | exploit, denial of service
MD5 | 7aecb7302e5513d6fb9ec619f90ed3a6
D-Link ADSL DSL-2640B SEA_1.01 Unauthenticated Remote DNS Changer
Posted Jun 20, 2017
Authored by Todor Donev

D-Link ADSL DSL-2640B SEA_1.01 remote dns changer exploit.

tags | exploit, remote
MD5 | 42bf229f831e70ca320881f824bb980c
Beetel BCM96338 ADSL Router Unauthenticated Remote DNS Changer
Posted Jun 18, 2017
Authored by Todor Donev

Beetel BCM96338 ADSL Router remote dns changer exploit.

tags | exploit, remote
MD5 | 2e02687e30079b52d3b80fe47e0ca4c5
D-Link ADSL DSL-2640B GE_1.07 Unauthenticated Remote DNS Changer
Posted Jun 18, 2017
Authored by Todor Donev

D-Link ADSL DSL-2640B GE_1.07 remote dns changer exploit.

tags | exploit, remote
MD5 | 2f0ad1c14b10a2f7fc27ca4fe09e7f31
D-Link ADSL DSL-2640U IM_1.00 Unauthenticated Remote DNS Changer
Posted Jun 17, 2017
Authored by Todor Donev

D-Link ADSL DSL-2640U IM_1.00 remote dns changer exploit.

tags | exploit, remote
MD5 | 61ce3e26bd5b9efd48b249d86763419b
UTstarcom WA3002G4 Unauthenticated Remote DNS Changer
Posted Jun 17, 2017
Authored by Todor Donev

UTstarcom WA3002G4 remote dns changer exploit.

tags | exploit, remote
MD5 | 44267da336265ebaa27796e5f773cb7e
Page 1 of 5
Back12345Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

May 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    15 Files
  • 2
    May 2nd
    17 Files
  • 3
    May 3rd
    30 Files
  • 4
    May 4th
    29 Files
  • 5
    May 5th
    2 Files
  • 6
    May 6th
    3 Files
  • 7
    May 7th
    13 Files
  • 8
    May 8th
    27 Files
  • 9
    May 9th
    17 Files
  • 10
    May 10th
    15 Files
  • 11
    May 11th
    8 Files
  • 12
    May 12th
    2 Files
  • 13
    May 13th
    8 Files
  • 14
    May 14th
    7 Files
  • 15
    May 15th
    43 Files
  • 16
    May 16th
    19 Files
  • 17
    May 17th
    16 Files
  • 18
    May 18th
    15 Files
  • 19
    May 19th
    3 Files
  • 20
    May 20th
    7 Files
  • 21
    May 21st
    15 Files
  • 22
    May 22nd
    40 Files
  • 23
    May 23rd
    64 Files
  • 24
    May 24th
    55 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close