exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 4 of 4 RSS Feed

Files from Adrian Furtuna

Email addressprivate
First Active2010-09-29
Last Active2014-12-10
View User Profile
PuttyRider DLL Injection
Posted Dec 10, 2014
Authored by Adrian Furtuna

PuttyRider is a tool for performing dll injection of Putty and allows an attacker to inject Linux commands.

tags | tool
systems | linux, windows
SHA-256 | bb2aff4d5efeedd4fc7a1ff7409ce816d924a12199aff5cc690c5f3162c74011
Magnolia CMS 4.5.8 Access Bypass
Posted Jun 25, 2013
Authored by Adrian Furtuna

Magnolia CMS versions 4.5.8 and below suffer from multiple access control vulnerabilities that allow a non-administrative user to access and execute administrative functionalities.

tags | exploit, vulnerability, bypass
advisories | CVE-2013-4621
SHA-256 | fb6c27a0797c4b1ac97ad5992f8eddfb9cd896a72f7e7d7b719810e87f85d694
DDOSIM - Layer 7 DDoS Simulator 0.2
Posted Nov 5, 2010
Authored by Adrian Furtuna | Site sourceforge.net

DDOSIM simulates several zombie hosts (having random IP addresses) which create full TCP connections to the target server. After completing the connection, DDOSIM starts the conversation with the listening application (e.g. HTTP server).

tags | tool, web, tcp
systems | unix
SHA-256 | 5b6ceb2e406a4aaf113dc796925048a2c426eaa7c5bb1ad5e4336c85a5ce5a1b
Backward Disassembler For ROP Exploitation
Posted Sep 29, 2010
Authored by Adrian Furtuna

bdasm is a PyCommand written for Immunity Debugger version 1.73. It searches the address space of a process for a certain opcode/instruction and dissasembles backwards and forwards for a specified number of instructions.

tags | tool
systems | unix
SHA-256 | fe58521b41a518098ea9ad9c6287a48a3d89eba28efa2473fd7c45ffe68eb19c
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close