exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 4 of 4 RSS Feed

Files from Adrian Furtuna

Email addressprivate
First Active2010-09-29
Last Active2014-12-10
View User Profile
PuttyRider DLL Injection
Posted Dec 10, 2014
Authored by Adrian Furtuna

PuttyRider is a tool for performing dll injection of Putty and allows an attacker to inject Linux commands.

tags | tool
systems | linux, windows
SHA-256 | bb2aff4d5efeedd4fc7a1ff7409ce816d924a12199aff5cc690c5f3162c74011
Magnolia CMS 4.5.8 Access Bypass
Posted Jun 25, 2013
Authored by Adrian Furtuna

Magnolia CMS versions 4.5.8 and below suffer from multiple access control vulnerabilities that allow a non-administrative user to access and execute administrative functionalities.

tags | exploit, vulnerability, bypass
advisories | CVE-2013-4621
SHA-256 | fb6c27a0797c4b1ac97ad5992f8eddfb9cd896a72f7e7d7b719810e87f85d694
DDOSIM - Layer 7 DDoS Simulator 0.2
Posted Nov 5, 2010
Authored by Adrian Furtuna | Site sourceforge.net

DDOSIM simulates several zombie hosts (having random IP addresses) which create full TCP connections to the target server. After completing the connection, DDOSIM starts the conversation with the listening application (e.g. HTTP server).

tags | tool, web, tcp
systems | unix
SHA-256 | 5b6ceb2e406a4aaf113dc796925048a2c426eaa7c5bb1ad5e4336c85a5ce5a1b
Backward Disassembler For ROP Exploitation
Posted Sep 29, 2010
Authored by Adrian Furtuna

bdasm is a PyCommand written for Immunity Debugger version 1.73. It searches the address space of a process for a certain opcode/instruction and dissasembles backwards and forwards for a specified number of instructions.

tags | tool
systems | unix
SHA-256 | fe58521b41a518098ea9ad9c6287a48a3d89eba28efa2473fd7c45ffe68eb19c
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    42 Files
  • 22
    Aug 22nd
    26 Files
  • 23
    Aug 23rd
    25 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close