exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 5 of 5 RSS Feed

Files from Green-m

Email addressgreenm.xxoo at gmail.com
First Active2018-11-30
Last Active2024-08-31
CouchDB Enum Utility
Posted Aug 31, 2024
Authored by Roberto S. Soares, Max Justicz, Green-m, Hendrik Van Belleghem | Site metasploit.com

This Metasploit module enumerates databases on CouchDB using the REST API (without authentication by default).

tags | exploit
advisories | CVE-2017-12635
SHA-256 | 2942d69e8cd376e67d7cb3531714d06e9b22d6dd3d9fe3f3f432e8930a09dad3
Redis Replication Code Execution
Posted Mar 29, 2020
Authored by Green-m | Site metasploit.com

This Metasploit module can be used to leverage the extension functionality added since Redis 4.0.0 to execute arbitrary code. To transmit the given extension it makes use of the feature of Redis which called replication between master and slave.

tags | exploit, arbitrary
SHA-256 | 2714070c8deee280f0dce194081f510869dec8b4d01b5127d461fe882cd026f7
Redis Unauthenticated Code Execution
Posted Jul 29, 2019
Authored by Green-m | Site metasploit.com

This Metasploit module can be used to leverage the extension functionality added by Redis 4.x and 5.x to execute arbitrary code. To transmit the given extension it makes use of the feature of Redis which called replication between master and slave.

tags | exploit, arbitrary
SHA-256 | 8a25e4a7af0bb0c47237e268c64439b1ccedef5a35d240b4946e5ec04d9df945
Windows Persistent Service Installer
Posted Dec 17, 2018
Authored by Green-m | Site metasploit.com

This Module will generate and upload an executable to a remote host and then makes it a persistent service. It will create a new service which will start the payload whenever the service is running. Admin or system privilege is required.

tags | exploit, remote
SHA-256 | 59ee52699ae499935662334692621ec988e97a42b0c9e26e0d71312fc52970de
Apache Spark Unauthenticated Command Execution
Posted Nov 30, 2018
Authored by Green-m, aRe00t | Site metasploit.com

This Metasploit module exploits an unauthenticated command execution vulnerability in Apache Spark with standalone cluster mode through the REST API. It uses the function CreateSubmissionRequest to submit a malicious java class and triggers it.

tags | exploit, java
SHA-256 | 116bdb53e7d35e2318c64aa8641d121ced48eb91bde9f964beb39633e269de98
Page 1 of 1
Back1Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    0 Files
  • 3
    Oct 3rd
    0 Files
  • 4
    Oct 4th
    0 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close