what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Richard Davy

Email addressrd at secureyour.it
First Active2011-05-31
Last Active2024-08-31
LibreOffice 6.03 /Apache OpenOffice 4.1.5 Malicious ODT File Generator
Posted Aug 31, 2024
Authored by Richard Davy | Site metasploit.com

Generates a Malicious ODT File which can be used with auxiliary/server/capture/smb or similar to capture hashes.

tags | exploit
advisories | CVE-2018-10583
SHA-256 | f138b89d8313385c4d39113ab4945e6a9cd3852a097aa80622dc3b61a03317de
BADPDF Malicious PDF Creator
Posted Aug 31, 2024
Authored by Richard Davy, Yaron Fruchtmann, Assaf Baharav, Ido Solomon | Site metasploit.com

This Metasploit module can either creates a blank PDF file which contains a UNC link which can be used to capture NetNTLM credentials, or if the PDFINJECT option is used it will inject the necessary code into an existing PDF document if possible.

tags | exploit
advisories | CVE-2018-4993
SHA-256 | b008d7e54ddfd9cbdcce9f6c237e1e5ab88081ef4d74a59bce1242f2ce897dc6
AnyBurn 4.8 Buffer Overflow
Posted Mar 13, 2020
Authored by Richard Davy, Gary Nield

AnyBurn version 4.8 SEH buffer overflow exploit.

tags | exploit, overflow
SHA-256 | c9837c0eaa90d56ab11b9092c6dba14a4ae3e4aec2a7d4e17e9aba9f3dac811c
LibreOffice 6.0.3 / OpenOffice 4.1.5 Information Disclosure
Posted May 3, 2018
Authored by Richard Davy

LibreOffice version 6.0.3 and OpenOffice version 4.1.5 suffers from a .odt information disclosure vulnerability.

tags | exploit, info disclosure
advisories | CVE-2018-10583
SHA-256 | 8dfaa0fc230503b0a244b16cf2420d39f87af8b19b498af30d536f1a99b040c9
Sage 50 Payroll 2012 Authentication Bypass
Posted Aug 28, 2012
Authored by Richard Davy

This is a whitepaper detailing how to perform authentication bypass against Sage 50 Payroll 2012 version 18.00.031 using Immunity Debugger.

tags | exploit, paper, bypass
SHA-256 | bf9e32ff6711bdd25f0473894bee2ccf852a964b8f3280f156abf18fd8f4ec99
Revese Engineering And Memory Patching
Posted May 31, 2011
Authored by Richard Davy

Whitepaper called Reverse Engineering and Memory Patching.

tags | paper
SHA-256 | bf5743c2cb8982634575f5c681bc4227d41f8d102007140878aee70541416b69
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    42 Files
  • 22
    Aug 22nd
    26 Files
  • 23
    Aug 23rd
    25 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    21 Files
  • 27
    Aug 27th
    28 Files
  • 28
    Aug 28th
    15 Files
  • 29
    Aug 29th
    41 Files
  • 30
    Aug 30th
    13 Files
  • 31
    Aug 31st
    467 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close