exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 118 RSS Feed

Files from Jeremy Brown

Real NameJeremy Brown
Email addressprivate
Websitewww.patchtuesday.org
First Active2008-07-15
Last Active2022-09-05
View User Profile
gAlan 0.2.1 Buffer Overflow Exploit
Posted Dec 31, 2009
Authored by Jeremy Brown, loneferret | Site metasploit.com

This Metasploit module exploits a stack overflow in gAlan 0.2.1. By creating a specially crafted galan file, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
SHA-256 | 2e0713dab708cb8928f5ff1281dd21157fc4f28fefbc51535925ce25b30b52e8
Generic Random Remote Fuzzer
Posted Dec 15, 2009
Authored by Jeremy Brown

This small perl script is a generic random remote fuzzer.

tags | remote, perl, fuzzer
SHA-256 | f4bddba1bc5967ea0646d047d5e4b798651d79d68b89137957542fd3a0fcb94b
Mozilla Codesighs Memory Corruption
Posted Dec 12, 2009
Authored by Jeremy Brown

Mozilla Codesighs proof of concept memory corruption exploit.

tags | exploit, proof of concept
SHA-256 | ac84817c4dfc7ef08ccd8e283fbe5ef0d20f14b66c2ebc672172c6dda236941d
gAlan 0.2.1 Buffer Overflow
Posted Dec 8, 2009
Authored by Jeremy Brown, loneferret | Site metasploit.com

This Metasploit module exploits a stack overflow in gAlan 0.2.1 By creating a specially crafted galan file, an an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
SHA-256 | 84833b79cf2cab4f019e6973600309cc45a88235936500d449effe956f3c1c72
gAlan Buffer Overflow
Posted Dec 7, 2009
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

gAlan buffer overflow 0-day exploit. Spawns a shell on port 4444.

tags | exploit, overflow, shell
SHA-256 | 529fd011b70918966b4dc24d3212e6178ad12b168b2838b27dcd31f6bfb1cc5a
Polipo 1.0.4 Remote Memory Corruption
Posted Dec 7, 2009
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Polipo version 1.0.4 remote memory corruption 0-day proof of concept exploit.

tags | exploit, remote, proof of concept
SHA-256 | f0c3f97fb8cde0a5a5185ce0a01dc58d0b7e14232087ec8b44d18608edf9a268
Safari 4.0.3 Win32 Denial Of Service
Posted Nov 17, 2009
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Safari version 4.0.3 (Win32) XSS remote denial of service exploit.

tags | exploit, remote, denial of service
systems | windows
SHA-256 | a7d9ba59f478e5a36cfe543be10d0937974a736f8df9367cba150bfafe28c98d
Mozilla Firefox 3.5.3 Local Download Manager Exploit
Posted Oct 28, 2009
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Mozilla Firefox version 3.5.3 local download manager exploit that demonstrates a temporary file creation vulnerability.

tags | exploit, local
SHA-256 | c57f747c188be90e736885f8d76cc1b16b4e1cbbc6eee9473f672dc486c86f84
Geany 0.18 Local File Overwrite
Posted Oct 6, 2009
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Geany version 0.18 local file overwrite exploit.

tags | exploit, local
SHA-256 | a7a3082a458cb9a5407ee29030388b9fd81db7ce126fa8d2139b4e3d1b97f6f9
Sun Solaris 10 RPC dmispd Remote Resource Consumption
Posted Sep 24, 2009
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Sun Solaris 10 RPC dmispd remote resource consumption exploit.

tags | exploit, remote
systems | solaris
SHA-256 | 68846ee95a74c6a2bd7ec27d0f12f6f7ff11db7b031d8801eb567b3017bd745d
4F - The File Format Fuzzing Framework
Posted Sep 10, 2009
Authored by Jeremy Brown | Site krakowlabs.com

4f is the file format fuzzing framework.

tags | fuzzer
SHA-256 | 008ec7e8c205931119fd3a3bc5f03ef58d628982adc30a9530caaae62cf58313
GemStone/S 6.3.1 Buffer Overflow
Posted Sep 7, 2009
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

GemStone/S version 6.3.1 "stoned" local buffer overflow exploit.

tags | exploit, overflow, local
SHA-256 | 70a8894cf0f23bf12c6a2ed163f1ec19b33051065ee557a0b635c9597e99dcb2
Safari 3.2.3 (Win32) JavaScript eval Denial Of Service
Posted Sep 7, 2009
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Safari version 3.2.3 (Win32) javascript eval remote denial of service exploit.

tags | exploit, remote, denial of service, javascript
systems | windows
SHA-256 | 490f06e5338cab63bd2928a68a3a9a7ef5222f8bb66d7a05072d30d8bd887906
Ipswitch WS_FTP 12 Professional Format String
Posted Sep 6, 2009
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Ipswitch WS_FTP version 12 Professional remote format string proof of concept exploit.

tags | exploit, remote, proof of concept
SHA-256 | 3d28fc88846ed7542b1710374f7dfada1afc361ac468aa6af106cbda82a5da35
Adobe Acrobat 9.1.2 NOS Privilege Escalation
Posted Jul 21, 2009
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Adobe Acrobat version 9.1.2 NOS local privilege escalation exploit.

tags | exploit, local
SHA-256 | c5e8e232d6334990e5e9405b8fa2fbb77b058ca324c79bc5d4cfcd3cc1081e24
Grabit 1.7.2x Buffer Overflow
Posted May 8, 2009
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

GrabIt version 1.7.2x NZB DTD reference buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 6194460d5210dafaad1533b705fb4449d43f9bc1f6d292929c0c1fadd26b0de3
HZZP HTTP Fuzzer
Posted Apr 28, 2009
Authored by Jeremy Brown | Site krakowlabs.com

Hzzp is a HTTP compliant client and server fuzzer. Hzzp's main features include HTTP response and request fuzzing, authentication fuzzing, query parameter fuzzing, and automatic or manual exploit generation.

tags | web, fuzzer
SHA-256 | 7407b05d1cf6bb1faff9f84cb8b6c90807c711fc7d4cb78481ca10533173aeea
POP Peeper 3.4.0.0 Buffer Overflow Exploit
Posted Mar 12, 2009
Authored by Jeremy Brown | Site krakowlabs.com

POP Peeper version 3.4.0.0 remote buffer overflow exploit that spawns a shell on port 55555.

tags | exploit, remote, overflow, shell
SHA-256 | d4d795143ee698dc9b46c6db354f2aa5ed011e378b2491fa94d64a0770125d31
POP Peeper 3.4.0.0 Buffer Overflow Vulnerability
Posted Mar 12, 2009
Authored by Jeremy Brown | Site krakowlabs.com

POP Peeper version 3.4.0.0 is vulnerable to a remote buffer overflow vulnerability. This vulnerability is exploitable on the client side. A vulnerable POP Peeper user must connect to an exploitation server and retrieve mail to be affected.

tags | advisory, remote, overflow
SHA-256 | 7e864726d86e126383c7e331e2a51f140bb51683dad50c8f9835cb3ffb508365
Pop Peeper 3.4.0.0 UIDL Buffer Overflow Exploit
Posted Feb 27, 2009
Authored by Jeremy Brown, Jayji | Site krakowlabs.com

POP Peeper version 3.4.0.0 UIDL command remote buffer overflow SEH overwrite exploit that spawns a win32 bindshell on port 55555.

tags | exploit, remote, overflow
systems | windows
SHA-256 | 5e1096ecb0bce0b064f117ba74b2a5a09ddcb5529a2b555bff5980f790a314d9
POP Peeper 3.4.0.0 UIDL Buffer Overflow Advisory
Posted Feb 27, 2009
Authored by Jeremy Brown | Site krakowlabs.com

POP Peeper version 3.4.0.0 suffers from an UIDL command related remote buffer overflow vulnerability in the client.

tags | advisory, remote, overflow
SHA-256 | 1e2bca809abe96062727e81100e29a2caa524e9c2a45aa5c22fef4d479395bb4
FZEM MUA Fuzzing Utility
Posted Feb 25, 2009
Authored by Jeremy Brown | Site krakowlabs.com

fzem is a MUA (mail user agent) fuzzer that fuzzes MAIL/MIME email headers as well as how clients handle SMTP, POP and IMAP responses.

tags | imap, fuzzer
SHA-256 | 599f60cea508535311603dca6768627d03bd9bcd767d3a2b1e4e869a9ece418a
Fuzzing For Fun And Profit
Posted Feb 11, 2009
Authored by Jeremy Brown | Site krakowlabs.com

Whitepaper called Fuzzing for Fun and Profit.

tags | paper
SHA-256 | 768dd0043af9a050054a164285b92b9a735df2f08c479aa9062253d8d6558d37
Browser Fuzzer 2
Posted Jan 21, 2009
Authored by Jeremy Brown | Site krakowlabs.com

Browser Fuzzer 2 (bf2) is a comprehensive web browser fuzzer that fuzzes CSS, DOM, HTML and JavaScript.

tags | web, javascript, fuzzer
SHA-256 | 9c0853e1720bef8ed4d5727782ddb76c3ffde6981e51439d0fe5e1c930239e27
Novell Netware 6.5 Denial Of Service
Posted Jan 16, 2009
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Novell Netware 6.5 ICEbrowser remote system denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | 8cf6e163511ddc9bbab87eac58691a40950d62e487f361ad82a515f5293e5aa7
Page 3 of 5
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close