exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 41 RSS Feed

Files from Darkeagle

Email addressdarkeagle at unl0ck.org
First Active2005-03-30
Last Active2009-11-26
Internet Explorer createTextRange() Code Execution
Posted Nov 26, 2009
Authored by H D Moore, Darkeagle, justfriends4n0w, Faithless | Site metasploit.com

This Metasploit module exploits a code execution vulnerability in Microsoft Internet Explorer. Both IE6 and IE7 (Beta 2) are vulnerable. It will corrupt memory in a way, which, under certain circumstances, can lead to an invalid/corrupt table pointer dereference. EIP will point to a very remote, non-existent memory location. This Metasploit module is the result of merging three different exploit submissions and has only been reliably tested against Windows XP SP2. This vulnerability was independently discovered by multiple parties. The heap spray method used by this exploit was pioneered by Skylined.

tags | exploit, remote, code execution
systems | windows
advisories | CVE-2006-1359
SHA-256 | cc7d3a0a5a7e5685948a23de177b0b8648ee1b05bb7f812884db09692b243c0f
msie-createTextRang-script.txt
Posted Apr 1, 2006
Authored by Darkeagle | Site unl0ck.net

Microsoft Internet Explorer createTextRang remote command execution exploit. Tested against WinXP SP2 RUS IE 6.0.

tags | exploit, remote
systems | windows
SHA-256 | a2766d515bd66ef3fd37e9617c76b3ab7d6de03231a59be4454f195a4b5f3907
htmlws.c
Posted Feb 14, 2006
Authored by Darkeagle, k3xji | Site guvenliklab.com

Microsoft HTML Help Workshop .hhp file compiled file header buffer overflow exploit.

tags | exploit, overflow
SHA-256 | d8c8e6100f377fb5a222992659e174f484e4a84eae0b3d385a7a8557f67fa7d1
55k7-msdtc.c
Posted Dec 1, 2005
Authored by Darkeagle | Site exploiterz.org

Microsoft Windows Distributed Transaction Coordinator remote proof of concept exploit for the flaw listed in MS05-051.

tags | exploit, remote, proof of concept
systems | windows
SHA-256 | ffaeef19db3c4daa82885e504f38a1055423d7b036404e4e4a8f846eccf60364
up-imapproxy-exp.txt
Posted Nov 2, 2005
Authored by unl0ck, Darkeagle | Site exploiterz.org

A format string vulnerability exists in Imapproxy versions 1.2.4 and below. Proof of concept exploit included.

tags | exploit, proof of concept
SHA-256 | a957e64eb23300ef5bd04f9396a66646f9eb4e1d06921f1eaf18205dd93c00f5
0day-3cdsmash.c
Posted Nov 2, 2005
Authored by unl0ck, Darkeagle | Site exploiterz.org

3CDaemon remote root exploit.

tags | remote, root
SHA-256 | 658be6711b3c4ab25d876b5aeda1635694af0554b4763b808488c3832356dbd5
0xcue.pl
Posted Nov 2, 2005
Authored by unl0ck, Darkeagle | Site exploiterz.org

Mac OS X.

systems | apple, osx
SHA-256 | c446553f4f3166b6eb2e42c816e8b5f650b517abc11872daf2276db5d0338396
0xletzdance.rar
Posted Nov 2, 2005
Authored by unl0ck, Darkeagle | Site exploiterz.org

Exploits for WinRAR versions 3.4x and below, possibly 3.5x.

SHA-256 | 321977b4c6611a137dee4e707f96acbc2b75443b57c3581fec815f9e2657831e
55k7-snake.c
Posted Nov 2, 2005
Authored by unl0ck, Darkeagle | Site exploiterz.org

Mozilla FireFox remote GIF heap overflow exploit for versions 1.0.1 and below.

tags | remote, overflow
SHA-256 | f6bf1f16b4c69ffd0c96d7def4314b0449714708db73bda0548a476c1dc053fd
anti-project6011.rar
Posted Nov 2, 2005
Authored by unl0ck, Darkeagle | Site exploiterz.org

Project6011 PoC exploit.

SHA-256 | c0cef945267e904df5aa6b1978fec527005ae479a19c259adbf35e0655f76310
ashley.tar.gz
Posted Nov 2, 2005
Authored by unl0ck, Darkeagle | Site exploiterz.org

Fast banner grabber.

SHA-256 | 6c12bbb19754fc573f84eec67a3dbc75cc0965052bfb52226d518cf73db1a117
CODES.RAR
Posted Nov 2, 2005
Authored by unl0ck, Darkeagle | Site exploiterz.org

Examples of codes.

SHA-256 | 8e8049ca47b7ffbd37f6e713f61b1f58b4eae81f5df5a5819920d34b4aa4556c
egg-MS05-036.zip
Posted Nov 2, 2005
Authored by unl0ck, Darkeagle | Site exploiterz.org

MS05-036 code execution exploit (Win2k).

tags | code execution
systems | windows
SHA-256 | 48e00bbeeeff04c6b5a22fa2c2c3c998c9fdfea79ebdde54c2f7b9ecaa28a2df
firewall_detect.txt
Posted Nov 2, 2005
Authored by unl0ck, Darkeagle | Site exploiterz.org

Firewall related paper.

SHA-256 | 2228fd4d7daf4d6e0dfd0626154974ef7b3d62db75ec57dc04ae501b9ca2860e
FORMAT.TXT
Posted Nov 2, 2005
Authored by unl0ck, Darkeagle | Site exploiterz.org

Remote format string vulnerabilities.

tags | remote, vulnerability
SHA-256 | 036f8350598c5dfc18a4d702c6e394323c1755a75f0ec682b891038df7f13ae7
goldmine.c
Posted Nov 2, 2005
Authored by unl0ck, Darkeagle | Site exploiterz.org

golden ftp 2.52.0.0 remote root exploit.

tags | remote, root
SHA-256 | 4f4b914ded594ea8c8dbac619487bcbca312cfbace236eb179118e14514763c2
KBOP.TXT
Posted Nov 2, 2005
Authored by unl0ck, Darkeagle | Site exploiterz.org

Kids buffer overflow paper.

tags | overflow
SHA-256 | 80fb6fb02f497cea74049daf83728b003aad4d11e6721eb945dd5115d9f24356
pdvdx.cpp
Posted Nov 2, 2005
Authored by unl0ck, Darkeagle | Site exploiterz.org

PowerDVD 4.x local win32 exploit.

tags | local
systems | windows
SHA-256 | 9ca71090ce171097c92df0d5c8162aa3c10c60119af5ced564dec9414ab90a9e
remote_exploits.txt
Posted Nov 2, 2005
Authored by unl0ck, Darkeagle | Site exploiterz.org

Paper on remote exploits.

tags | remote
SHA-256 | fa5b3b2dd317bf0d324f9dc5e4c8ef6f0afa4db0decc52199b61e207d1122348
uexpg.tar.gz
Posted Nov 2, 2005
Authored by unl0ck, Darkeagle | Site exploiterz.org

Pre-beta of new exploit generator.

SHA-256 | 25035f85d5c99656b5361cb5eb3704011e95c3a140a856a6e45e615c9bf884f7
un-bof-gen5.tgz
Posted Nov 2, 2005
Authored by unl0ck, Darkeagle | Site exploiterz.org

Stupid lame release. Buffer overflow generator.

tags | overflow
SHA-256 | 526dcdd0ee0cea8c13b5277b6dcf7e4a0a27884da61138086b5b99248c870430
un-D_0WNED.c
Posted Nov 2, 2005
Authored by unl0ck, Darkeagle | Site exploiterz.org

GoodTech Telnet Server for Windows NT/2000.

systems | windows
SHA-256 | 907e839f9751fef0930dce3be9d9044671372460a81c694c5e4022e8e07d1304
un-g0d.c
Posted Nov 2, 2005
Authored by unl0ck, Darkeagle | Site exploiterz.org

GoodTech Telnet Server versions 5.0 and below remote root exploit.

tags | remote, root
SHA-256 | 401b4f1dc1a78082494dfefdb04709e899b6ebddd4e4ce7b99c3cd0f3b876d50
un-wftpd-exp.txt
Posted Nov 2, 2005
Authored by unl0ck, Darkeagle | Site exploiterz.org

WinAgents Trial FTP server remote root exploit.

tags | remote, root
SHA-256 | 05b594d2c8754da23bd75546a4eefde568a29c39847387fdfe3b81d8862cd8e2
undead.c
Posted Nov 2, 2005
Authored by unl0ck, Darkeagle | Site exploiterz.org

htget 0.9.x and below local root sploit.

tags | local, root
SHA-256 | 5399850df8e0ceecf6000ec907c6faff3b8ab9f7a58340f19d5a40572aa50f18
Page 1 of 2
Back12Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close