what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files from Celil Unuver

Email addresscelilunuver at gmail.com
First Active2010-08-24
Last Active2014-02-06
Discovery Of RPC Vulnerabilities
Posted Feb 6, 2014
Authored by Celil Unuver

This is a whitepaper discussing the discovery of RPC vulnerabilities. Written in Turkish.

tags | paper, vulnerability
SHA-256 | 513fdf6e6be7dba449a50a572bb38d5581417c51cdf7bbfefd1d2f33568e1df0
An Introduction To ARM Exploitation
Posted Sep 12, 2012
Authored by Celil Unuver

This is a brief whitepaper that discusses ARM exploitation and is based on work the author performed against Windows Mobile. Written in Turkish.

tags | paper
systems | windows
SHA-256 | 638a1f29642456d3675f6bb33464269c56d9f9f79accf55a23c7146876d50c73
Analysis Of A MIDI Remote Code Execution Vulnerability
Posted Feb 5, 2012
Authored by Celil Unuver

This whitepaper analyzes the MIDI remote code execution vulnerability found in the Windows Multimedia Library. Written in Turkish.

tags | paper, remote, code execution
systems | windows
advisories | CVE-2012-0003
SHA-256 | bc77e719e2e51fcf4b4ae803f613a643621f8d598b8d91904c9c989f3d76fdee
CoDeSys SCADA 2.3 Webserver Stack Buffer Overflow
Posted Dec 13, 2011
Authored by sinn3r, TecR0c, Celil Unuver | Site metasploit.com

This Metasploit module exploits a remote stack buffer overflow vulnerability in 3S-Smart Software Solutions product CoDeSys Scada Web Server Version 1.1.9.9.

tags | exploit, remote, web, overflow
SHA-256 | 9380ae1d770450dec8ad28bbf0b92b9e420e8cda38119169c69b13c41f6b845a
HTC Touch2 T3333 Memory Corruption
Posted Dec 9, 2011
Authored by Celil Unuver

HTCVideoPlayer is the default media player of HTC Windows Mobile devices. This media player is prone to a memory corruption vulnerability while parsing stbl atom of 3g2 video format.

tags | exploit
systems | linux, windows
SHA-256 | e73e95a4311308b98e3825e22e4fe06f71900b0c45ea2c0e25d03563da3eea17
CoDeSys 2.3 Buffer Overflow
Posted Dec 1, 2011
Authored by Celil Unuver

CoDeSys SCADA version 2.3 remote buffer overflow exploit that spawns a shell on port 4444.

tags | exploit, remote, overflow, shell
SHA-256 | 246e63e61f456255caf013a451fa1ec3a7bfd1fcb05a38899d181f2bf21a75d4
Heap, Overflows And Exploitation
Posted Oct 31, 2011
Authored by Celil Unuver

Whitepaper called Heap, Overflows and Exploitation. Written in Turkish.

tags | paper, overflow
SHA-256 | 7b494d3844c65ed44831e4a8623b0ae9168a5432d8b05e09295782c967294133
Adobe Shockwave Player Memory Corruption
Posted Jun 16, 2011
Authored by Celil Unuver

A memory corruption vulnerability in the Dirapi.dll component of Adobe Shockwave Player could lead to code execution. By crafting specific values within rcsL substructures an attacker can corrupt memory.

tags | advisory, code execution
advisories | CVE-2011-2122
SHA-256 | 33427b996aba6aa980d583c7e8a419ab4dc947616b4df8694cc6665c8241f87f
Windows Mobile 6.1 / 6.5 Denial Of Service
Posted Oct 22, 2010
Authored by Celil Unuver

Windows Mobile versions 6.1 and 6.5 suffer from a double free denial of service.

tags | exploit, denial of service
systems | windows
SHA-256 | 040659a31e444aec442dd946a7ec83713763376f38949d30ca783c4aa2eb7b87
Windows Mobile 6.5 Phone Call Shellcode
Posted Sep 28, 2010
Authored by Celil Unuver

Windows Mobile version 6.5 TR Phone Call shellcode.

tags | shellcode
systems | windows
SHA-256 | b3bd30acb2a379d93f823aeb80e7565031d4b53da0adffad7a451b2b1065e9b9
Windows Mobile 6.5 MessageBox Shellcode
Posted Sep 28, 2010
Authored by Celil Unuver

Windows Mobile version 6.5 TR (WinCE 5.2) MessageBox shellcode for ARM.

tags | shellcode
systems | windows
SHA-256 | 5bf5128f1e57c93e7dcf0f3fa125202d88dfdaa4d07cb98001e49fab9aadbc58
Whitepaper Called Binary Analysis
Posted Sep 23, 2010
Authored by Celil Unuver

Whitepaper called Binary Analysis. Written in Turkish.

tags | paper
SHA-256 | 62485d87cbd499797d8d71cf907c2be530782f370c262dc3e83f3e48d8aed698
Whitepaper Called Binary Modification
Posted Aug 30, 2010
Authored by Celil Unuver

Whitepaper called Binary Modification [Patching Vulnerabilities]. This is the English version.

tags | paper, vulnerability
SHA-256 | af82ee20ef73831193428f3a2a6559efa83590257c927a910ce46f38bf607354
Binary Code Modification
Posted Aug 24, 2010
Authored by Celil Unuver

Whitepaper called Binary Code Modification. Written in Turkish.

tags | paper
SHA-256 | 49805184f64edbdcb7348ceb0f235ba851a2bb0a8153b48cd0f1b6972aeffb5a
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close