exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 703 RSS Feed

Files from malvuln

Email addressprivate
Websitemalvuln.com
First Active2021-01-04
Last Active2024-09-18
View User Profile
Backdoor.Win32.Jeemp.c MVID-2024-0672 Hardcoded Credential
Posted Feb 29, 2024
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Jeemp.c malware suffers from a hardcoded credential vulnerability.

tags | exploit
systems | windows
SHA-256 | 5e4ddaa4fb20fd54762a11e5e3b4f3336161f26cd683100a9b9009e19ba332e0
Backdoor.Win32.AutoSpy.10 MVID-2024-0671 Remote Command Execution
Posted Feb 26, 2024
Authored by malvuln | Site malvuln.com

Backdoor.Win32.AutoSpy.10 malware suffers from a remote command execution vulnerability.

tags | exploit, remote
systems | windows
SHA-256 | 01433d0ad222e5da0927202b151b19c29afd6ce5f59f4e0b3302a97ed91a29bb
Backdoor.Win32.Armageddon.r MVID-2024-0670 Hardcoded Credential
Posted Feb 24, 2024
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Armageddon.r malware suffers from a hardcoded credential vulnerability.

tags | exploit
systems | windows
SHA-256 | a63aee2a17b2de0fd0b66bd203d4a2c97938d4d3f44312228c88c11909ae9131
Trojan.Win32 BankShot MVID-2024-0669 Buffer Overflow
Posted Jan 31, 2024
Authored by malvuln | Site malvuln.com

Trojan.Win32 BankShot malware suffers from a buffer overflow vulnerability.

tags | exploit, overflow, trojan
systems | windows
SHA-256 | 2b3c4192b5308c166c2374b9f23ce4208ceaa4819ae053e8b33695622996db4a
TrojanSpy Win32 Nivdort MVID-2024-0668 Insecure Permissions
Posted Jan 22, 2024
Authored by malvuln | Site malvuln.com

TrojanSpy Win32 Nivdort malware suffers from an insecure permissions vulnerability.

tags | exploit
systems | windows
SHA-256 | 07b40fbb6021397864a451ae058f9ce4a25bc6a349ce285a033ab5429f0d1070
Backdoor.Win32 Carbanak (Anunak) MVID-2024-0667 Named Pipe NULL DACL
Posted Jan 10, 2024
Authored by malvuln | Site malvuln.com

Backdoor.Win32 Carbanak (Anunak) malware creates 8 named pipes used for C2 and interprocess communications and grants RW access to the Everyone user group.

tags | exploit
systems | windows
SHA-256 | 025b315fe5e6131bdb0582d4066dabd2e50db6a7fe60aaa367ddf178890a85fb
RansomLord Anti-Ransomware Exploit Tool 2
Posted Jan 2, 2024
Authored by hyp3rlinx, malvuln | Site malvuln.com

RansomLord generated PE files are saved in x32 and x64 directories and need to be placed in directories where programs execute. The goal of the project is to exploit vulnerabilities inherent in certain strains of ransomware by deploying exploits that defend the network! The DLLs may also provide additional coverage against generic and info stealer malwares.

Changes: This version now intercepts and terminates malware tested from 43 different threat groups, adding Wagner, Hakbit, Paradise, Jaff, DoubleZero, Blacksnake, Darkbit, Vohuk, Medusa and Phobus. Two noteworthy additions mitigate wipers Wagner and DoubleZero that are supposedly used against entities in the Ukraine conflict. Updated the x32/x64 DLLs to exploit ten more vulnerable ransomwares. Added -s Security information flag section.
tags | tool, encryption
SHA-256 | 3d0954a58224a8f54be67a55a09030ed0b5de5923f0fb95816b6be7924a22000
RansomLord Anti-Ransomware Exploit Tool 1.0
Posted Jul 31, 2023
Authored by hyp3rlinx, malvuln | Site malvuln.com

RansomLord generated PE files are saved in x32 and x64 directories and need to be placed in directories where programs execute. The goal of the project is to exploit vulnerabilities inherent in certain strains of ransomware by deploying exploits that defend the network! The DLLs may also provide additional coverage against generic and info stealer malwares.

tags | tool, encryption
SHA-256 | be0ca518deef51df0a96636cca863c555649559f4b5ef25817a684ecfa1b4b9a
Adversary3 3.0
Posted Dec 15, 2022
Authored by malvuln | Site malvuln.com

Adversary3 is a tool to navigate the vast www.malvuln.com malware vulnerability dataset.

Changes: Dozens of new malware vulnerabilities added. New category of Logic Flaw was added.
tags | tool
systems | unix
SHA-256 | 9b13bea6b5b0bded8397b049cc552bc744cf3d67513c8059ab448bf8e9242f5a
Ransom.Win64.AtomSilo MVID-2022-0666 Cryptography Logic Flaw
Posted Dec 14, 2022
Authored by malvuln | Site malvuln.com

Ransom.Win64.AtomSilo malware suffers from a cryptography logic flaw.

tags | exploit
SHA-256 | 3f34b49de4ec6bce1e97067f5337c3513d5b66c17f2c5706a17f5ee88759871f
Backdoor.Win32.InCommander.17.b MVID-2022-0665 Hardcoded Credentials
Posted Dec 14, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.InCommander.17.b malware suffers from a hardcoded credential vulnerability.

tags | exploit
systems | windows
SHA-256 | 099c10722a16f8ff775b1d257478160f16555c845382490673f316cc2a4f04e4
Trojan-Dropper.Win32.Decay.dxv (CyberGate 1.00.0) MVID-2022-0664 Insecure Proprietary Password Encryption
Posted Dec 12, 2022
Authored by malvuln | Site malvuln.com

Trojan-Dropper.Win32.Decay.dxv (CyberGate 1.00.0) malware suffers from an insecure proprietary password encryption vulnerability.

tags | exploit, trojan
systems | windows
SHA-256 | 327cdad4f54bb339def30383a6e9ad6ba1713e20fa30cdbaf1573da6857d4dfe
Backdoor.Win32.Delf.gj MVID-2022-0663 Information Disclosure
Posted Dec 2, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Delf.gj malware suffers from an information leakage vulnerability.

tags | exploit
systems | windows
SHA-256 | 622118d5760b64ae86f8de28e2d430c1c15ec650e7c1db8f5920f134dd887c5e
Backdoor.Win32.Autocrat.b MVID-2022-0660 Weak Hardcoded Credential
Posted Nov 25, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Autocrat.b malware suffers from a weak hardcoded credential vulnerability.

tags | exploit
systems | windows
SHA-256 | d7a1dbe69c51797b7a119cf51d50bfdc0cf2f5d6383559a3c42e0b551d24f2ff
Win32.Ransom.Conti MVID-2022-0662 Cryptography Logic Flaw
Posted Nov 25, 2022
Authored by malvuln | Site malvuln.com

Win32.Ransom.Conti ransomware fails to encrypt non PE files that have a ".exe" in the filename. Creating specially crafted file names successfully evaded encryption for this malware sample.

tags | exploit
systems | windows
SHA-256 | d9c0e9406b722512df44cebb17c86eb5064420bbea72fa35eda62ac98a591282
Trojan.Win32.DarkNeuron.gen MVID-2022-0661 Named Pipe NULL DACL
Posted Nov 25, 2022
Authored by malvuln | Site malvuln.com

Trojan.Win32.DarkNeuron.gen malware creates an IPC pipe with a NULL DACL allowing RW for the Everyone user.

tags | exploit, trojan
systems | windows
SHA-256 | 419a95e24053a48a5b8a151771f5d30d68d5dbe8ac113c538ae6b1f007c00d2a
Backdoor.Win32.Serman.a MVID-2022-0659 Unauthenticated Open Proxy
Posted Nov 23, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Serman.a malware suffers from an unauthenticated open proxy vulnerability.

tags | exploit
systems | windows
SHA-256 | e221bc8a4c226f37e8a799ddd862aa9890e65551bd528db38964e5e344ccb498
Backdoor.Win32.Oblivion.01.a MVID-2022-0658 Insecure Transit
Posted Nov 21, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Oblivion.01.a malware suffers from an insecure transit vulnerability due to sending passwords in the clear over the wire.

tags | exploit
systems | windows
SHA-256 | c9b00ae1cb0d588d2139660e2b1f0d2bffb8cafec26176d718c3f41580dbc52e
Trojan.Win32.Platinum.gen MVID-2022-0657 Code Execution
Posted Nov 21, 2022
Authored by malvuln | Site malvuln.com

Trojan.Win32.Platinum.gen malware suffers from a code execution vulnerability.

tags | exploit, trojan, code execution
systems | windows
SHA-256 | cdc9993c4bb438c0123a75bf753431e3118f0f97de1d721144c5ddb34cf6a07e
Backdoor.Win32.Quux MVID-2022-0656 Hardcoded Credential
Posted Nov 16, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Quux malware suffers from a weak hardcoded credential vulnerability that can allow an attacker to achieve remote code execution.

tags | exploit, remote, code execution
systems | windows
SHA-256 | b4e768cfae821d6b42a6a1558a7ebf632c607467e2460738406164be6973a5b9
Backdoor.Win32.RemServ.d MVID-2022-0655 Remote Command Execution
Posted Nov 14, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.RemServ.d malware suffers from a remote command execution vulnerability.

tags | exploit, remote
systems | windows
SHA-256 | b0430cb5e5e617e50b9038ab9865a9bd2f7b70fa286736b9fd7fbec68609f4eb
Backdoor.Win32.Aphexdoor.LiteSock MVID-2022-0653 Buffer Overflow
Posted Nov 10, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Aphexdoor.LiteSock malware suffers from a buffer overflow vulnerability.

tags | exploit, overflow
systems | windows
SHA-256 | d57d90a38779e50f2f3781d526a6a644767970cad56ee33df9c573299a86202e
HEUR:Trojan.MSIL.Agent.gen MVID-2022-0654 Information Disclosure
Posted Nov 10, 2022
Authored by malvuln | Site malvuln.com

HEUR:Trojan.MSIL.Agent.gen malware suffers from an information disclosure vulnerability.

tags | exploit, trojan, info disclosure
SHA-256 | e2541968fed4764deda9f626a5dd6d150f8556edd06d7b191deae236b82a62c2
Backdoor.Win32.Psychward.10 MVID-2022-0651 Remote Command Execution
Posted Oct 24, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Psychward.10 malware suffers from an unauthenticated remote command execution vulnerability.

tags | exploit, remote
systems | windows
SHA-256 | 50c8d45b439f940960ae1c8f607103a266bf0e358d5a088cf19752880f976bdf
Email-Worm.Win32.Kipis.c MVID-2022-0652 File Write / Code Execution
Posted Oct 24, 2022
Authored by malvuln | Site malvuln.com

Email-Worm.Win32.Kipis.c malware suffers from a remote file write vulnerability that allows for remote code execution.

tags | exploit, worm, remote, code execution
systems | windows
SHA-256 | a928474123c62826be6937b0f16cc3bd810a092305c80c11b1dba87312f0d8be
Page 2 of 29
Back12345Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close