Aida64 version 6.00.5100 Log to CSV File local SEH buffer overflow exploit.
b7d09dcd2ab63b14316e0b11aef8cde5
12 bytes small Linux/x86 egghunter shellcode.
4c0527aa8ca0d3c599ef7e90b98b4809
69 bytes small Linux x86 reverse TCP /bin/sh shell null-free shellcode that connects to 127.1.1.1:8888.
6d533f25a7d4621fb39f38d138aedb06
This Metasploit module exploits an SEH buffer overflow in Disk Pulse Enterprise version 9.9.16. If a malicious user sends a crafted HTTP GET request it is possible to execute a payload that would run under the Windows NT AUTHORITY\SYSTEM account.
4357afe77b3f0d509c9cfa2b76ef1a5a
VX Search Enterprise version 10.0.14 remote buffer overflow exploit.
c8f09635695ec66379ee35d50d113636
Disk Savvy Enterprise version 9.9.14 buffer overflow exploit.
b3e8e187a49b3338c352c4136131da38
Sync Breeze Enterprise version 9.9.16 buffer overflow exploit.
3bb9e64bd7d3a4ec05bdbcd5efdd300e
Disk Pulse Enterprise version 9.9.16 buffer overflow exploit.
386e8be5713b52237168227b78abda08
Dup Scout Enterprise version 9.9.14 buffer overflow exploit.
0f187e9fb9a007de9bb79704244c8d98
CIScan version 1.00 hostname/IP field SEH overwrite proof of concept exploit.
c3c0359fb54254d1870bc180a8ca5ece
Sam Spade version 1.14 S-Lang command field SEH overflow exploit.
c111bcf54d93a9b85e07f354a8327365
This is a whitepaper that basically just discusses how to set up a keylogger on a windows box and how to use wireshark.
1ed55eb3972b1a74d3da8f27a87c61c4
This is a whitepaper called Blind Date With Your Girlfriend. It is a brief tutorial that explains how to use Metasploit to hack a Windows box.
581638862cff171206c8c5b82a36fcbc