what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 34 of 34 RSS Feed

Files from infodox

Real NameDarren Martyn
Email addressprivate
Websiteinsecurety.net
First Active2011-11-16
Last Active2019-01-23
View User Profile

Personal Background

Lets party :3
No seriously. lets do it.

Also, python is great.
You may notice I use SCAPY and requests for everything... Because.


Mambo 4.6.4 Remote File Inclusion
Posted Oct 1, 2012
Authored by infodox

Mambo versions 4.6.4 and below suffer from a remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
SHA-256 | 826f24c1c50ffe80d1ad1c76f696a214320c9bb95368d20ea004268b6a69fda4
Web Malware Collection
Posted Sep 30, 2012
Authored by infodox

This archive contains web malware recovered from honeypots and other places. It includes various backdoors, bots, exploits, and more. Please note that many of the files ARE backdoored so you should exercise extreme caution and analyze them before any execution.

tags | tool, web, rootkit
systems | unix
SHA-256 | b5640ce9c2b5fa07e026765766d34a8d841fe1a2e49b829ad5ddb72b3996a63b
Reaver Pro Livedisc Code Execution
Posted Sep 30, 2012
Authored by infodox

Reaver Pro Livedisc has a named pipe called /tmp/exe that is world writable and any input to it is passed to the shell interpreter, where it is executed as root. This provides a good demonstration as to why using named pipes to execute commands in applications is a bad idea. This exploit spawns a bindshell on localhost:4444 then connects to it.

tags | exploit, shell, root
SHA-256 | c81a78f06cb4d36066f8e2f74dece7cc299f97e8c59ea7b40e8f927d7389faaa
Spyeye Checker
Posted Sep 30, 2012
Authored by infodox

A simple test to see is a host infected with earlier versions of "SpyEye" malware, which dropped a file at the same location every time. Good "proof of concept" showing that malware can be easily detected based on predictable behavior. later versions of SpyEye randomly chose their "drop file" location.

tags | proof of concept
SHA-256 | 47fe222c307b38e17f5980aac2311b07cad91512447c0c7ebe7f8c9f9001844a
MiniWeb Content-Length Denial Of Service
Posted Jun 1, 2012
Authored by infodox

MiniWeb Content-Length denial of service proof of concept exploit. Original vulnerability discovered by Luigi Auriemma.

tags | exploit, denial of service, proof of concept
SHA-256 | f68adef9522b7ceb14448112ea32e0abd2f8d6621850e2a8a61eb0f2110c61a2
PHP 5.3.x Hashtables Proof Of Concept
Posted Jan 1, 2012
Authored by infodox

PHP 5.3.x hash collision denial of service proof of concept exploit.

tags | exploit, denial of service, php, proof of concept
advisories | CVE-2011-4885
SHA-256 | 4fedb48a322a5c1cc6a37e6e8d60e449a09a49c804537bef9e115dec5fade8b1
HideMAC 1.2
Posted Dec 3, 2011
Authored by infodox | Site compsoc.nuigalway.ie

A MAC changing utility that uses both ifconfig and GNU-Macchanger (checks if mac changer exists, if not, uses ifconfig) to spoof ones MAC with a totally random value. Written in Python.

tags | tool, spoof, python
systems | unix
SHA-256 | be6130bf64c1b4bd8dff08738fd95e00e2600a3558797364ad485593266a1157
ARP Toxin Cache Poisoner
Posted Nov 27, 2011
Authored by infodox

ARP Toxin is a simple Perl script designed to ARP poison a host on the LAN. It uses Nemesis as a packet crafting tool to create and send the ARP packets. It is NOT original code, merely a slightly improved version of the sample arpredirect script from the book "Hacking: The Art of Exploitation". This variant allows one to set their own poisoning interval and interface to poison on.

tags | tool, perl
systems | unix
SHA-256 | aaa815740a2967208c32389034fd22ddc713b8769ad0c27475d119c8fbeb276d
TCP Scanners Package Using SCAPY
Posted Nov 16, 2011
Authored by infodox | Site compsoc.nuigalway.ie

A small collection of scanners using SCAPY that scan for Remote Desktop, VNC, SSH and Telnet servers on networks. It can be used to build target lists or discover rogue services running on your networks. Written in Python.

tags | tool, remote, scanner, python
systems | linux, unix
SHA-256 | af46bf1f61d6ac25ffe9a21f178bbd9262eb64e48d53371b8aa3e0e2721606b2
Page 2 of 2
Back12Next

File Archive:

September 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    2 Files
  • 2
    Sep 2nd
    21 Files
  • 3
    Sep 3rd
    0 Files
  • 4
    Sep 4th
    17 Files
  • 5
    Sep 5th
    34 Files
  • 6
    Sep 6th
    29 Files
  • 7
    Sep 7th
    11 Files
  • 8
    Sep 8th
    25 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    26 Files
  • 12
    Sep 12th
    23 Files
  • 13
    Sep 13th
    17 Files
  • 14
    Sep 14th
    22 Files
  • 15
    Sep 15th
    16 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    19 Files
  • 19
    Sep 19th
    60 Files
  • 20
    Sep 20th
    23 Files
  • 21
    Sep 21st
    15 Files
  • 22
    Sep 22nd
    8 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    17 Files
  • 26
    Sep 26th
    3 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close