what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files from Stefan Le Berre

Email addressprivate
First Active2009-08-25
Last Active2011-10-12
View User Profile
Bypassing Windows 7 Kernel ASLR
Posted Oct 12, 2011
Authored by Stefan Le Berre

Whitepaper called Bypassing Windows 7 Kernel ASLR. In this paper, the author explains every step to code an exploit with a useful kernel ASLR bypass. Successful exploitation is performed on Windows 7 SP0 / SP1.

tags | paper, kernel, bypass
systems | windows
SHA-256 | 5c3994059d8384faf17163e5cb49cd471cedb061f14e2c2b7ef3cdb5ce5724aa
Symantec Backup Exec System Recovery 8.5 Crash
Posted May 12, 2011
Authored by Stefan Le Berre, Heurs

Symantec Backup Exec System Recovery version 8.5 kernel null pointer dereference crash proof of concept exploit.

tags | exploit, kernel, proof of concept
SHA-256 | 8fe48217791153d1a31a66ed324498f54f2c7b00786b5719834eaa8b294e7936
Look N Stop 2.06p4 / 2.07 Denial Of Service
Posted Jan 21, 2011
Authored by Stefan Le Berre

Look N Stop versions 2.06p4 and 2.07 local denial of service exploit.

tags | exploit, denial of service, local
SHA-256 | 38366e3de589fd2ef7d0ec4b3ceb59baa2eb4193fea0063403232b046f8805fc
Panda Global Protection 2010 Local Denial Of Service With Unfiltered wcscpy()
Posted Jan 21, 2011
Authored by Stefan Le Berre

Panda Global Protection 2010 version 3.01.00 local denial of service exploit with unfiltered wcscpy().

tags | exploit, denial of service, local
SHA-256 | b8f8034fca9b425d000da23154d615714b60bd552ae1581119719913e9f55e64
Panda Global Protection 2010 Local Denial Of Service
Posted Jan 21, 2011
Authored by Stefan Le Berre

Panda Global Protection 2010 version 3.01.00 local denial of service exploit.

tags | exploit, denial of service, local
SHA-256 | 002177a31b3e4110ef699bede0043feb3ba0b836255f7f83f4d651e70937a580
GMER 1.0.15.15087 Pointer Dereference
Posted Jan 11, 2011
Authored by Stefan Le Berre

GMER versions 1.0.15.15087 and below suffer from a pointer dereference vulnerability. Both an advisory and exploit are included in this archive.

tags | exploit
systems | linux
SHA-256 | 7cbf50aa017e12f55c31b1f73898c64ed1fe3bdeb1bb0faa8eaac256e81ca369
Windows Win32k Pointer Dereference
Posted Dec 17, 2010
Authored by Stefan Le Berre, Ludo t0ka7a

Microsoft Windows Win32k pointer dereference proof of concept exploit that leverages the vulnerability noted in MS10-098.

tags | exploit, proof of concept
systems | windows
advisories | CVE-2010-3944
SHA-256 | 88c0d56f4f9ce474815203874c072f79800b80461abd432eb2320a32dcce001a
Bypassing SEHOP
Posted Dec 22, 2009
Authored by Damien Cauquil, Stefan Le Berre

Whitepaper called Bypassing SEHOP. Microsoft has recently implemented in many Windows versions a new security feature named Structured Exception Handling Overwrite Protection. This paper discusses how it can be bypassed.

tags | paper
systems | windows
SHA-256 | 494242f6be3d7f34046067b7fd6e0190f1ba76047456124bb6507467ab1279f2
Kaspersky Anti-Virus 2010 9.0.0.463 Denial Of Service
Posted Nov 18, 2009
Authored by Stefan Le Berre

Kaspersky Anti-Virus 2010 version 9.0.0.463 suffers from a denial of service vulnerability.

tags | exploit, denial of service, virus
SHA-256 | 7ae0cfcd643b35679b0935fa72b27c7089e68d07020a0c1a2084c395b59bc687
Avast! 4.8.1335 Professional Buffer Overflow
Posted Aug 25, 2009
Authored by Stefan Le Berre

Avast! version 4.8.1335 Professional local kernel buffer overflow exploit.

tags | exploit, overflow, kernel, local
SHA-256 | 8561ed4b236b1c7dc5fa72e7ec3c492431c87e2b0611b3dc14e20fa298a17ceb
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close