Exploit the possiblities
Showing 1 - 12 of 12 RSS Feed

Files from Nipun Jaswal

Email addressnipun.jaswal at secugenius.com
First Active2012-04-10
Last Active2018-01-28
Linux/x86 Egghunter Shellcode
Posted Jan 28, 2018
Authored by Nipun Jaswal

12 bytes small Linux/x86 egghunter shellcode.

tags | x86, shellcode
systems | linux
MD5 | 4c0527aa8ca0d3c599ef7e90b98b4809
Linux x86 Reverse Shell Shellcode
Posted Jan 6, 2018
Authored by Nipun Jaswal

69 bytes small Linux x86 reverse TCP /bin/sh shell null-free shellcode that connects to 127.1.1.1:8888.

tags | shell, x86, tcp, shellcode
systems | linux
MD5 | 6d533f25a7d4621fb39f38d138aedb06
Disk Pulse Enterprise 9.9.16 GET Buffer Overflow
Posted Sep 21, 2017
Authored by Nipun Jaswal, Chance Johnson, Anurag Srivastava | Site metasploit.com

This Metasploit module exploits an SEH buffer overflow in Disk Pulse Enterprise version 9.9.16. If a malicious user sends a crafted HTTP GET request it is possible to execute a payload that would run under the Windows NT AUTHORITY\SYSTEM account.

tags | exploit, web, overflow
systems | windows, nt
MD5 | 4357afe77b3f0d509c9cfa2b76ef1a5a
VX Search Enterprise 10.0.14 Buffer Overflow
Posted Aug 28, 2017
Authored by Nipun Jaswal, Anurag Srivastava

VX Search Enterprise version 10.0.14 remote buffer overflow exploit.

tags | exploit, remote, overflow
advisories | CVE-2017-13708
MD5 | c8f09635695ec66379ee35d50d113636
Disk Savvy Enterprise 9.9.14 Buffer Overflow
Posted Aug 25, 2017
Authored by Nipun Jaswal, Anurag Srivastava

Disk Savvy Enterprise version 9.9.14 buffer overflow exploit.

tags | exploit, overflow
MD5 | b3e8e187a49b3338c352c4136131da38
Sync Breeze Enterprise 9.9.16 Buffer Overflow
Posted Aug 25, 2017
Authored by Nipun Jaswal, Anurag Srivastava

Sync Breeze Enterprise version 9.9.16 buffer overflow exploit.

tags | exploit, overflow
MD5 | 3bb9e64bd7d3a4ec05bdbcd5efdd300e
Disk Pulse Enterprise 9.9.16 Buffer Overflow
Posted Aug 25, 2017
Authored by Nipun Jaswal, Anurag Srivastava

Disk Pulse Enterprise version 9.9.16 buffer overflow exploit.

tags | exploit, overflow
MD5 | 386e8be5713b52237168227b78abda08
Dup Scout Enterprise 9.9.14 Buffer Overflow
Posted Aug 25, 2017
Authored by Nipun Jaswal, Anurag Srivastava

Dup Scout Enterprise version 9.9.14 buffer overflow exploit.

tags | exploit, overflow
MD5 | 0f187e9fb9a007de9bb79704244c8d98
CIScan 1.00 SEH Overwrite
Posted May 11, 2016
Authored by Nipun Jaswal

CIScan version 1.00 hostname/IP field SEH overwrite proof of concept exploit.

tags | exploit, proof of concept
MD5 | c3c0359fb54254d1870bc180a8ca5ece
Sam Spade 1.14 SEH Overflow
Posted Nov 13, 2015
Authored by Nipun Jaswal

Sam Spade version 1.14 S-Lang command field SEH overflow exploit.

tags | exploit, overflow
MD5 | c111bcf54d93a9b85e07f354a8327365
Hacking Your Girlfriend's Ex-Boyfriend
Posted Jul 1, 2012
Authored by Nipun Jaswal

This is a whitepaper that basically just discusses how to set up a keylogger on a windows box and how to use wireshark.

tags | paper
systems | windows
MD5 | 1ed55eb3972b1a74d3da8f27a87c61c4
Blind Date With Your Girlfriend
Posted Apr 10, 2012
Authored by Nipun Jaswal

This is a whitepaper called Blind Date With Your Girlfriend. It is a brief tutorial that explains how to use Metasploit to hack a Windows box.

tags | paper
systems | windows
MD5 | 581638862cff171206c8c5b82a36fcbc
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

February 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    15 Files
  • 2
    Feb 2nd
    15 Files
  • 3
    Feb 3rd
    15 Files
  • 4
    Feb 4th
    13 Files
  • 5
    Feb 5th
    16 Files
  • 6
    Feb 6th
    15 Files
  • 7
    Feb 7th
    15 Files
  • 8
    Feb 8th
    15 Files
  • 9
    Feb 9th
    18 Files
  • 10
    Feb 10th
    8 Files
  • 11
    Feb 11th
    8 Files
  • 12
    Feb 12th
    17 Files
  • 13
    Feb 13th
    15 Files
  • 14
    Feb 14th
    15 Files
  • 15
    Feb 15th
    17 Files
  • 16
    Feb 16th
    18 Files
  • 17
    Feb 17th
    37 Files
  • 18
    Feb 18th
    2 Files
  • 19
    Feb 19th
    16 Files
  • 20
    Feb 20th
    16 Files
  • 21
    Feb 21st
    15 Files
  • 22
    Feb 22nd
    16 Files
  • 23
    Feb 23rd
    31 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close