exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 126 - 150 of 152 RSS Feed

Files from Todor Donev

Real Namenoname
Email addressprivate
First Active2009-02-04
Last Active2021-01-16
View User Profile
UPNPD M-SEARCH ssdp:discover Reflection Denial Of Service
Posted Jul 10, 2015
Authored by Todor Donev

UPNPD M-Search ssdp:discover reflection denial of service exploit.

tags | exploit, denial of service
SHA-256 | f367c58f0ffd545e2d90772fec10aeb953a0bcdc97164f66bdb1c8a16e3d98a9
NTP MON_GETLIST Query Amplification DDoS
Posted Jul 9, 2015
Authored by Todor Donev

A Network Time Protocol (NTP) Amplification attack is an emerging form of Distributed Denial of Service (DDoS) that relies on the use of publicly accessible NTP servers to overwhelm a victim system with UDP traffic. The NTP service supports a monitoring service that allows administrators to query the server for traffic counts of connected clients. This information is provided via the "monlist" command. The basic attack technique consists of an attacker sending a "get monlist" request to a vulnerable NTP server, with the source address spoofed to be the victim's address. This tool is a proof of concept that demonstrates this attack.

tags | exploit, denial of service, udp, spoof, protocol, proof of concept
SHA-256 | 48b0f0fb221c6a092ee7210ff8b830e0b5ba18fd3294e65cf266ee2f4b6a19f1
MiniUPNPd 1.0 Remote Denial Of Service
Posted Jul 8, 2015
Authored by Todor Donev

MiniUPNPd version 1.0 remote denial of service exploit.

tags | exploit, remote, denial of service
advisories | CVE-2013-0229, CVE-2013-0230
SHA-256 | ec5af0b0817b8cabdfaec4fbe7d5121d205649e7588521b0ad1d8d6592bbe575
D-Link DSL-2780B DLink_1.01.14 Unauthenticated Remote DNS Change
Posted Jun 7, 2015
Authored by Todor Donev

D-Link DSL-2780B DLink_1.01.14 suffers from an unauthenticated remote DNS change vulnerability.

tags | exploit, remote
SHA-256 | cecf684605be67457577f0c485b7ac88cdd5fa0ae4781581dc2b770628494529
TP-Link ADSL2+ TD-W8950ND Unauthenticated Remote DNS Change
Posted Jun 7, 2015
Authored by Todor Donev

TP-Link ADSL2+ TD-W8950ND suffers from an unauthenticated remote DNS change vulnerability.

tags | exploit, remote
SHA-256 | e734de776dd42a9b07102f99c9c5e872918d43423edddcfb093dbbd2cff10baa
D-Link DSL-2730B AU_2.01 Authentication Bypass DNS Change
Posted Jun 7, 2015
Authored by Todor Donev

D-Link DSL-2730B AU_2.01 suffers from an authentication bypass vulnerability that allows an attacker to change DNS settings.

tags | exploit, bypass
SHA-256 | ba801c06a255c78e4fe5a0151bb18eec1e82a99b3855dbad759c4bb4ad87530b
D-Link DSL-526B ADSL2+ AU_2.01 Unauthenticated Remote DNS Change
Posted Jun 7, 2015
Authored by Todor Donev

D-Link DSL-526B ADSL2+ AU_2.01 suffers from an unauthenticated remote DNS change vulnerability.

tags | exploit, remote
SHA-256 | a045df7dae3d97ce54f437138ae3bfaa1ac885796c92d3c02efe05eadd9a69a5
Broadlight Residential Gateway DI3124 Unauthenticated DNS Change
Posted Jun 6, 2015
Authored by Todor Donev

Broadlight Residential Gateway DI3124 suffers from an unauthenticated remote DNS change vulnerability.

tags | exploit, remote
SHA-256 | cfe753189efca508794672853afd1471566254d5d91a94c2466e0d28e39af396
D-Link DSL-2640B Unauthenticated Remote DNS Changer
Posted Feb 17, 2015
Authored by Todor Donev

Remote exploit for changing DNS settings unauthenticated on the D-Link DSL-2640B.

tags | exploit, remote
SHA-256 | 16ab1d79cb7cf86f00b8d3d3e809b23c74f2de54632f5804f5f0d5dc9ed96331
LG DVR LE6016D Credential Disclosure
Posted Feb 8, 2015
Authored by Todor Donev

LG DVR LE6016D unauthenticated remote user/password disclosure exploit.

tags | exploit, remote, info disclosure
SHA-256 | 78215c344bc67ecd36fd93e2a2a8dabff0e7aeadc8ca7856997f62aae484d853
Shuttle Tech ADSL Modem-Router 915 WM DNS Changer
Posted Feb 5, 2015
Authored by Todor Donev

Shuttle Tech ADSL Modem-Router 915 WM unauthenticated remote DNS change exploit.

tags | exploit, remote
SHA-256 | 867fc1e4a1a8ece9743f8a03a17fbde7500f5eef41e8a82aa4fe7af775f0df16
D-Link DSL-2740R Unauthenticated Remote DNS Change
Posted Jan 27, 2015
Authored by Todor Donev

Exploit for remotely changing DNS settings on the D-Link DSL-2740R router.

tags | exploit
SHA-256 | 12bcee98da8a2545e67c0fd61295e3e76c43d64f193a59bac3a91c594c824b90
Seowonintech Remote Root
Posted Jun 22, 2013
Authored by Todor Donev

Remote root exploit for all Seowonintech devices.

tags | exploit, remote, root
SHA-256 | 595a7decdc3f52417856da361543526dde0357dd9c1d41fd0828e62432f3bfa8
Seowonintech Routers Remote Root File Dumper
Posted Jun 4, 2013
Authored by Todor Donev

This exploit dumps an arbitrary file from the filesystem with root level permissions on Seowonintech routers with firmware less than and equal to 2.3.9.

tags | exploit, arbitrary, root
SHA-256 | a361e183bb4d71aeac2a13c018d683c22813b4cf4ffebf480914b8997082860a
Glibc 2.11.3 / 2.12.x LD_AUDIT libmemusage.so Local Root
Posted May 17, 2013
Authored by Todor Donev

Local root exploit for Glibc versions 2.11.3 and 2.12.x utilizing LD_AUDIT libmemusage.so.

tags | exploit, local, root
advisories | CVE-2010-3856
SHA-256 | dbe0977154f9ed4331b96211af365a5ddd2b1de1c5253179073a44cea5e541e3
Konftel 300IP 2.1.2 Reboot Bypass
Posted Mar 27, 2013
Authored by Todor Donev

Konftel 300IP SIP-based conference phone versions 2.1.2 and below remote bypass reboot exploit.

tags | exploit, remote
SHA-256 | 9e507e381e6d3283aca016657d917380e4a9531c10b62c0736789e6838811a3f
StarVedia IPCamera Remote Username / Password Disclosure
Posted Mar 20, 2013
Authored by Todor Donev

StarVedia IPCamera IC502w and IC502w+ version 020313 remote bypass username/password disclosure exploit.

tags | exploit, remote
SHA-256 | b2e1e754ab46c85bc8c173378b2b272899f11b8f2b489f6d503525cd01b556aa
Mozilla Firefox 10.0 Local Null Byte Bypass File Check Execution
Posted Feb 8, 2012
Authored by Todor Donev

Mozilla Firefox versions 10.0 and below local null byte bypass file check execution exploit.

tags | exploit, local
advisories | CVE-2007-3285
SHA-256 | a174b8edc7151cb08988e3beb64669d96fed35392c36ee8265516b5437c6cfee
Microsoft Internet Explorer 8 Stack Exhaustion
Posted Feb 6, 2012
Authored by Todor Donev

Microsoft Internet Explorer 8 suffers from a denial of service vulnerability due to a stack exhaustion issue.

tags | exploit, denial of service
SHA-256 | c0206d977f507f789c26838b5b33a945a10259c50ae11b7756dce67dd5c7f7ae
Enigma2 Webinterface Remote File Disclosure
Posted Jan 9, 2012
Authored by Todor Donev

Enigma2 Webinterface versions 1.5.x, 1.6.x and 1.7.x suffers from a remote file disclosure vulnerability.

tags | exploit, remote, info disclosure
SHA-256 | fc9bbc6820fa00c3414e7ddd9289efbd8460427518afafafd0bb63131d292e51
Comtrend Router CT-5624 Remote Root Password Changer/Disclosure
Posted Nov 8, 2011
Authored by Todor Donev

Comtrend Router CT-5624 remote root / support password disclosure and change exploit.

tags | exploit, remote, root, info disclosure
SHA-256 | f88bd04a8b099f31b8c798590cd329225fab81697add7757cef9329447167836
DreamBox DM800 1.5rc1 Remote File Disclosure
Posted Nov 3, 2011
Authored by Todor Donev

DreamBox DM800 versions 1.5rc1 and below remote file disclosure exploit.

tags | exploit, remote, info disclosure
SHA-256 | 8fee3da667376ed45ce7f37d430981833a80f00a5a6fc6e5635f8b8511dad4df
Linux 2.6.37-rc1 serial_multiport_struct Local Leak
Posted Nov 2, 2011
Authored by Todor Donev

Linux kernel version 2.6.37-rc1 and below serial_multiport_struct local leak exploit.

tags | exploit, kernel, local
systems | linux
SHA-256 | 339995fa1d5103f1059305032d85f8e55df5432a09a475ad860ec38a5fb31050
ACTi ASOC 2200 Web Configurator 2.6 Remote Root Command Execution
Posted Mar 18, 2011
Authored by baltazar, Todor Donev

ACTi ASOC 2200 Web Configurator versions 2.6 and below remote root command execution exploit. This is a secondary version of the original and is written in Python.

tags | exploit, remote, web, root, python
SHA-256 | 41a108b19f2cd58cd1b3bf78f695f0fc0293c132dc307dfb6fe1b4b8907d2d97
ACTi ASOC 2200 Web Configurator 2.6 Remote Root Command Execution
Posted Mar 17, 2011
Authored by Todor Donev

ACTi ASOC 2200 Web Configurator versions 2.6 and below remote root command execution exploit.

tags | exploit, remote, web, root
SHA-256 | 1fe62001e15658ce95ca3b7e3476da02cdd828855e2386ef2c8cbbf0f8645164
Page 6 of 7
Back34567Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    14 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    20 Files
  • 30
    Apr 30th
    73 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close