exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 51 RSS Feed

Files from Blake

Email addressblake at soldierx.com
First Active2009-08-18
Last Active2024-04-01
ghba PTR Record Scanner
Posted Apr 1, 2024
Authored by Blake, Jerbo

ghba is a PTR record scanner ported from ghba.c. It has been enhanced to run much faster than the original ghba.c. It can scan an entire private class C network in under a minute if 32 threads are available.

tags | tool, scanner
systems | linux, unix, apple
SHA-256 | 92c4565b20b4f73f7f963a482cd44e6bc1db903941ab8b430f543fd68d9c04ca
Aladdin Knowledge Systems Ltd. Overflow
Posted Oct 16, 2013
Authored by Blake

Aladdin Knowledge Systems Ltd. PrivAgent active-x control overflow exploit.

tags | exploit, overflow, activex
SHA-256 | 78e1f9941ee243de2c6fa4f4dd4d806f45dbe201a8b08daf54b144678052bb4f
Indusoft Thin Client 7.1 Buffer Overflow
Posted Oct 10, 2013
Authored by Blake

Indusoft Thin Client version 7.1 suffers from an active-x buffer overflow vulnerability.

tags | exploit, overflow, activex
SHA-256 | c00e0788c5d6462b72882a1157510d0caed575ccdad96d8ed169da385363cbcc
SolarWinds Monitor 6.0 Buffer Overflow
Posted Sep 23, 2013
Authored by Blake

SolarWinds Server and Application Monitor version 6.0 suffers from an active-x related buffer overflow vulnerability.

tags | exploit, overflow, activex
SHA-256 | 841395a87d46f8aba7dd14551684fe16b9e3de8cd2cb1433a295058e36790214
McKesson Active-X 11.0.10.38 Enumeration
Posted Sep 19, 2013
Authored by Blake

McKesson active-x control version 11.0.10.38 suffers from a variable enumeration vulnerability.

tags | exploit, activex
SHA-256 | eb5a347719e20933c95310d59d0af5d7d0a513bcbf2f6ec63b483b1c7dc9b822
Mitsubishi MC-WorkX 8.02 File Execution
Posted Sep 16, 2013
Authored by Blake

Mitsubishi MC-WorkX version 8.02 active-x control file execution proof of concept exploit.

tags | exploit, activex, proof of concept
SHA-256 | 051bf2d457fb3478224730c5a764957e57768528962485ff7c0f290f39f09bec
KingView 6.53 Active-X File Copy
Posted Sep 5, 2013
Authored by Blake

KingView version 6.53 has an insecure active-x control that allows for arbitrary file copying.

tags | exploit, arbitrary, activex
SHA-256 | b16413ec1271c3727d0068f3aaa5e74cf60deb2c6fcbdfbe249e49df7374ffa2
KingView 6.53 Active-X File Overwrite / Creation
Posted Sep 5, 2013
Authored by Blake

KingView version 6.53 has an insecure active-x control that allows for arbitrary file creation and overwrite.

tags | exploit, arbitrary, activex
SHA-256 | 785c1ed4650168b152eb1ff73cd68727e7dd22759c9a9b2913d8f8f3b8aa9c10
WDivulge Hidden File Web Scanner
Posted Mar 6, 2013
Authored by Blake | Site soldierx.com

wdivulge is a tool designed to find and download hidden files from a webserver. This is most commonly pictures, but you can adjust the file definitions to bruteforce any type of file that you'd like. wdivulge technically falls under the definition of a web fusker.

tags | tool, web, scanner
systems | unix
SHA-256 | 29e6623de8a65649d70f952b6b3e9f12a7eefe3ca42b4b1101b33bdfcc5fc10b
Samsung NET-i Viewer Active-X SEH Overwrite
Posted May 2, 2012
Authored by Blake

Samsung NET-i Viewer version 1.37 active-x SEH overwrite exploit.

tags | exploit, activex
SHA-256 | 89a65827884b5491e386120caa8f2acc5d2507db952b044c4deacb9cceae7d5d
FreeFloat FTP Server Buffer Overflow
Posted Sep 24, 2011
Authored by Blake

FreeFloat FTP server buffer overflow exploit with DEP bypass that binds a shell to port 4444.

tags | exploit, overflow, shell
SHA-256 | 5662da3cb86b287d645ef14fb8cc9a9f867772e178d718b5af7e9ee91b410fed
AVCon Buffer Overflow With DEP Bypass
Posted Sep 21, 2011
Authored by Blake

AVCon H323 DEP bypass SEH overwrite exploits that generates malicious input.

tags | exploit, bypass
SHA-256 | e9723bb21ef7e18d46bb58e8632c159ba2ecf3cb81d3cb33337284e8f6f4f5c3
My MP3 Player 3.0 DEP Bypass
Posted Sep 16, 2011
Authored by Blake

My MP3 Player version 3.0 buffer overflow exploit with DEP bypass.

tags | exploit, overflow, bypass
SHA-256 | b54cbd0865162eb25b5c22342efed86f3a18573bfb45a369f7c7720750c06179
Mini-Stream Ripper 2.9.7 DEP Bypass
Posted Sep 16, 2011
Authored by Blake

Mini-Stream Ripper version 2.9.7 buffer overflow exploit with DEP bypass.

tags | exploit, overflow, bypass
SHA-256 | adab7efd625de89ea37ad48d9dc534b72cc56c9f5bf0af4fbf105a62532378b7
KnFTP Server Buffer Overflow
Posted Sep 12, 2011
Authored by Blake

KnFTP server buffer overflow exploit that spawns calc.exe.

tags | exploit, overflow
SHA-256 | 269031e41b681d1ddfd8ffb9bf66594087bd9a5295fd9be264a638510214b35f
DVD X Player 5.5 Pro SEH Overwrite
Posted Sep 7, 2011
Authored by Blake

DVD X Player version 5.5 Pro buffer overflow SEH overwrite exploit that spawns a shell on port 8080.

tags | exploit, overflow, shell
SHA-256 | 411ee2842b51ec572d84c97f03c5448321c4898cdbe96297b0f908e53b407c18
CoolPlayer Portable 2.19.2 Buffer Overflow
Posted Sep 5, 2011
Authored by Blake

CoolPlayer Portable version 2.19.2 buffer overflow exploit with ASLR bypass and calc.exe bypass.

tags | exploit, overflow
SHA-256 | 5194e3a74076a91240d0a9d25a7e77bd0b64a0ece05d9ae0aba221a285bb0c62
ActiveX UserManager 2.03 Buffer Overflow
Posted Jan 16, 2011
Authored by Blake

ActiveX UserManager version 2.03 suffers from a buffer overflow vulnerability.

tags | exploit, overflow, activex
SHA-256 | 7344c9a560abd42a22a4cc35be99d1c995f3ce762e33c795af7e937e54679814
CoolPlayer 2.18 DEP Bypass
Posted Jan 2, 2011
Authored by Blake

CoolPlayer version 2.18 buffer overflow exploit that spawns calc.exe and has DEP bypass.

tags | exploit, overflow, bypass
SHA-256 | 1f553e0420c68cd55358114e9b7b4a82029def16ea7e993e035b55ca242fe79b
OpenEMR 3.2.0 SQL Injection / Cross Site Scripting
Posted Dec 27, 2010
Authored by Blake

OpenEMR version 3.2.0 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 9ca836e02286319ce83ae42b646fda3eb4771e29dac9f5fdfbd9b81bc55b9b34
DATAC RealWin SCADA 1.06 Buffer Overflow
Posted Oct 28, 2010
Authored by Blake

DATAC RealWin SCADA version 1.06 buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 6818f87a91e009b671fe428a53fdce95774746ae0a3c4d078f33d078501fe807
Uebimiau Webmail 3.2.0-2.0 Local File Inclusion
Posted Oct 4, 2010
Authored by Blake

Uebimiau Webmail version 3.2.0-2.0 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 7fc91fe88ddc29761c0a08cb6b86047aa397c875786e4649924f32af2a98044c
DNET Live-Stats 0.8 Local File Inclusion
Posted Oct 4, 2010
Authored by Blake

DNET Live-Stats version 0.8 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | c9b189d8fc877e16ec667d8396e8b82cd74519b4232e0d79808a2bed332b0e20
Image22 1.1.1 Buffer Overflow
Posted Jul 13, 2010
Authored by Blake

Image22 version 1.1.1 Active-X buffer overflow exploit that binds a shell to port 4444.

tags | exploit, overflow, shell, activex
SHA-256 | 41e9853077146d1de1f453ea801f845a3bc321d5f14366f5a7b9deb791e27321
netcat Connect Back Shellcode
Posted Jul 13, 2010
Authored by Blake

76 bytes small Linux / x86 shellcode that performs a connect back using netcat.

tags | x86, shellcode
systems | linux
SHA-256 | 92a674036251b7aa7d6e8cf7f2b13ad73e6b53728d55e041bf98d436ff0be673
Page 1 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close