exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 75 RSS Feed

Files from SkyLined

Email addressberendjanwever at gmail.com
Websiteskypher.com
First Active2003-04-10
Last Active2016-12-21
View User Profile
BETA3 Multi-Format Shellcode Encoding Tool
Posted Jan 4, 2010
Authored by SkyLined | Site code.google.com

BETA can convert raw binary shellcode into text that can be used in exploit source-code. It can convert raw binary data to a large number of encodings. It can also do the reverse: decode encoded data into binary from the same types of encodings.

tags | shellcode
SHA-256 | 1b45c685a458df166b54860c098ca9021ba8ff6a73dc10f90d7420bdb9c6d2ca
MSIE Content-Encoding: Deflate Memory Corruption
Posted Oct 15, 2009
Authored by SkyLined

Microsoft Internet Explorer suffers from a Content-Encoding: deflate memory corruption vulnerability.

tags | exploit
advisories | CVE-2009-1547
SHA-256 | 80fa117d24dc8845f2994b4d1e1342b08f6ff97d25b492bb4f924064b92e3e2c
Adobe Objects Memory Corruption
Posted Oct 15, 2009
Authored by SkyLined

Various reproduction code that demonstrates memory corruption when loading/unloading Adobe objects through an EMBED tag in Firefox.

tags | exploit
advisories | CVE-2009-2983
SHA-256 | cbfab4ccb60d417d49251f98b1b677a08ea4a6fa400b4d5b3cd721ce1aeb2be8
Windows x86 Bindshell Shellcode
Posted Jul 28, 2009
Authored by SkyLined

Windows x86 null-free bindshell for Windows 5.0 through 7.0 all service packs.

tags | x86, shellcode
systems | windows
SHA-256 | 04ba99e6d3d4bd989ede7e23e3b2fdf261d5b2e942f08b2197bed07ec00ccd9d
Windows x86 Null-Free Bindshell Code
Posted Jul 23, 2009
Authored by SkyLined

Microsoft Windows x86 null-free bindshell shellcode for Windows 5.0 through 6.0 all service packs.

tags | x86, shellcode
systems | windows
SHA-256 | e30984bbffd193b9456095ecf59c11dc4559ea1dda013038d818184452fc953f
Microsoft Internet Explorer Memory Corruption
Posted Apr 20, 2009
Authored by SkyLined

Microsoft Internet Explorer EMBED memory corruption proof of concept exploit that leverages the vulnerability discussed in MS09-014.

tags | exploit, proof of concept
SHA-256 | fc11bf53d21ba40129e201b7ccaa7856a96e3592bd369f3ebd690e007de4df83
w32 SEH Omelet Shellcode
Posted Mar 16, 2009
Authored by SkyLined

This is a small piece of shellcode written in assembler that can scan the user-land address space for small blocks of memory ("eggs") and recombine the eggs into one large block.

tags | shellcode
SHA-256 | 8f64a632ae31b520f87ac44f9927c36b3d08aeef8e12e7ea7b7456352c7aadbb
Mozilla Firefox 3.0.7 Denial Of Service
Posted Mar 16, 2009
Authored by SkyLined

Mozilla Firefox 3.0.7 OnbeforeUnLoad DesignMode reference crash exploit.

tags | exploit, denial of service
SHA-256 | 02291ecdde47dce048dcb42adac3b1508cdea7e7ab5645016e1f5be7b0b67ea1
Microsoft Internet Explorer Denial Of Service
Posted Jan 7, 2009
Authored by SkyLined

A NULL pointer read vulnerability exists in Microsoft Internet Explorer versions 6.0, 7.0, and 8.0 Beta.

tags | advisory, denial of service
SHA-256 | da104f3d68f39d3929b4c38e3bf2f61ce309b27f516300071bd2635ddb8f20f7
Safari Array Integer Overflow Exploit
Posted Jan 6, 2009
Authored by SkyLined

Safari array integer overflow proof of concept exploit.

tags | exploit, overflow, proof of concept
SHA-256 | 8d018a338ed08422a4dc3a1d1c8f2bef6a08cd0487577e9ff3d96102ba6ea272
asciiart-julia.txt
Posted Aug 4, 2008
Authored by SkyLined

ASCII Art / shellcode hybrid called "Julia". This shellcode was created using Ars Ex Machina Coda. The shellcode will only work when it is run in writable and executable memory and if ECX points to the base address of the shellcode.

tags | shellcode
SHA-256 | 89cdfca38f956e1128ed018784978d1e02fff9f7c01ce163ba847b1d3b640bc1
asciiart-skylined2.txt
Posted Aug 4, 2008
Authored by SkyLined

This is a very cool ASCII Art / shellcode hybrid of "SkyLined".

tags | shellcode
SHA-256 | e752389d0a9b04a413b2b3d936d5fcf8f4d6d34efdbbe2e00c65ccfaa79fd27b
asciiart-skylined.txt
Posted Aug 4, 2008
Authored by SkyLined

This is a very cool ASCII Art / shellcode hybrid of "SkyLined".

tags | shellcode
SHA-256 | 3f50a06a3908cc0e38e66c20fcc5a7aff47435b0847640a4d88ce552494096b6
pwnzilla.txt
Posted Sep 23, 2005
Authored by SkyLined

PwnZilla 5 - Exploit for the IDN host name heap buffer overrun in Mozilla browsers such as Firefox, Mozilla, and Netscape.

tags | exploit, overflow
advisories | CVE-2005-2871
SHA-256 | 5fd84b75e862d1b3f6cac437ba7e571a8da0bd7fe4f45638c172f865b261d320
firefoxIDN.txt
Posted Sep 13, 2005
Authored by SkyLined | Site edup.tudelft.nl

Research and development has led to a 90% reliable working exploit for the IDN Heap Buffer overrun in FireFox on WinXP and Win2k3 as long as DEP is turned off and JavaScript is enabled.

tags | advisory, overflow, javascript
systems | windows
SHA-256 | 58cfafa307dfccf01eda97c1848bac293eebcf18ec5734852be83abf76e17e11
comBad.txt
Posted Aug 19, 2005
Authored by SkyLined

A number of issues have been reported lately by various sources about Internet Explorer vulnerabilities in relation to specific COM objects. Research has shown that the root cause is the fact that these COM objects are not designed to be loaded in IE at all. These objects therefore make wrongful assumptions about the state of the process they are loaded into, specifically about the contents of heap memory. This can be abused to uncover unwanted features, like the ability to run arbitrary code on a victims machine.

tags | advisory, arbitrary, root, vulnerability
SHA-256 | 035a6aa16f04f9d73cacf13f2f3a7db3188f82cf0bd18a282634937ba184ab53
ie_dhtml_poc.txt
Posted Apr 18, 2005
Authored by SkyLined | Site edup.tudelft.nl

Proof-of-Concept exploit code for the MSIE DHTML object handling vulnerabilities (described in MS05-20).

tags | exploit, vulnerability
advisories | CVE-2005-0553
SHA-256 | c26eff210455c49cb3320cc55bf604d64f8ad0b37b6bea90265783cad726472f
InternetExploiter3.2.zip
Posted Jan 15, 2005
Authored by SkyLined | Site edup.tudelft.nl

InternetExploiter 3, .ANI-file Animation header length stack based buffer overflow exploit for Internet Explorer. Uses Cascading Style Sheets to load a malicious animated cursor. Runs a bindshell on port 28876.

tags | exploit, overflow
SHA-256 | 2c241ffbbd01971af65ed38f537c9d5cc267d13e058013c5e7fd39635abbc94c
ieloop.txt
Posted Dec 11, 2004
Authored by SkyLined | Site edup.tudelft.nl

Another MSIE flaw that allows for a nest sort loop to cause an exception.

tags | advisory
SHA-256 | f9e3153a835e256b97c1f3cb90599d1eddf85c9d3a051a20d07215e32baf0dfe
beta.c
Posted Dec 11, 2004
Authored by SkyLined | Site edup.tudelft.nl

Tool that can encode shellcode in various ways. Released by the author of the InternetExploiter exploit. Documentation for this tool available here.

tags | shellcode
SHA-256 | 66588988e27151588f35c1d98e2e115206867e3150312b3abbf669ddfdcc4681
whitepaper_shellcode.html
Posted Nov 20, 2004
Authored by SkyLined | Site edup.tudelft.nl

Writing IA32 Restricted Instruction Set Shellcode Decoder Loops - This article addresses the requirements for writing a shellcode decoder loop using a limited number of characters that limits the instruction set. Most of it is based on the author's experience with alphanumeric decoders but the principles apply to any piece of code that is written to work with a limited instruction set.

tags | paper, shellcode
SHA-256 | 2aea2ebf088e500f6e82bebaad1ecbf8639a257cb6f76e1538ffef1687c2a19a
InternetExploiter.html.gz
Posted Nov 4, 2004
Authored by SkyLined

InternetExploiter.html is a remote exploit for the IE IFRAME html tag buffer overflow vulnerability which binds a shell to tcp port 28876. Tested against IE 6.0 on Win XP SP1 and IE 6.0 on Win2k.

tags | exploit, remote, overflow, shell, tcp
systems | windows
SHA-256 | 0ecca01eb05bab171b33265b3ea3ac3e0cd2cac3fc0ae02350d422d833d55e3f
alpha2.tar.gz
Posted Sep 23, 2004
Authored by SkyLined | Site edup.tudelft.nl

ALPHA 2 Zero-tolerance is a shellcode encoder that will convert any x86 shellcode into 100% alphanumeric code. The resulting code has an OS independent decoder that will convert the encoded shellcode back to the original code and execute it. Features include creating 100% uppercase and unicode-proof code. It also supports automatic EIP grabbing for win32 targets using the Structured Exception Handler. A working version is available for testing on-line at http://www.edup.tudelft.nl/~bjwever.

tags | web, x86, shellcode
systems | windows
SHA-256 | e066bd9f3ea43a9d5f1e8b0a761255877f816d6e725b96a4cdc15c2c5b381033
serv-ME.c
Posted Jan 31, 2004
Authored by SkyLined

Remote exploit that makes use of a buffer overrun in the Serv-U FTP server versions 4.2 and below that binds a shell to port 28876.

tags | exploit, remote, overflow, shell
SHA-256 | ea506acc9b54478ebcde1305c05e03a4d7a82d57254fcf230248bb00ffe76634
coppermine.tgz
Posted Apr 10, 2003
Authored by SkyLined | Site spoor12.edup.tudelft.nl

Coppermine Photo Gallery, the picture gallery which allows users to HTTP upload pictures, fails to extension check pictures that are uploaded. Due to this, a file with the extension .jpg.php can be uploaded allowing a remote attacker to execute commands. Sample .jpg.php included. Patch available here.

tags | exploit, remote, web, php
SHA-256 | 0d2fe1a4e09dda1f2380a7d53ddb87733772a50e381a3cc8e5217a10c4ca5dab
Page 3 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close