exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 19 of 19 RSS Feed

Files Date: 2017-04-15

ETERNALBLUE 2.2.0 Windows 2008 R2 SMBv1 Zero Day Exploit
Posted Apr 15, 2017

ETERNALBLUE is an SMBv1 remote unauthenticated zero day exploit that works on 2008 R2. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, remote, web
SHA-256 | 05652205ec079cb034a9a5089e9083c36d21f4c85c6d7ed59a43282856e0724b
ZIPPYBEER 1.0.2 Authenticated Microsoft Domain Controller Exploit
Posted Apr 15, 2017

ZIPPYBEER is an authenticated Microsoft Domain Controller exploit. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web
SHA-256 | a148e3b45ad148ca6737a4263c0182505021cf747bac80212e574fefb57bccc1
EXPLODINGCAN 2.0.2 Microsoft IIS 6 Exploit
Posted Apr 15, 2017

EXPLODINGCAN is an exploit for Microsoft IIS 6 that leverages WebDAV and works on 2003 only. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web
SHA-256 | 2d29211219806e7a08f3a5f698230796b4681542694e0bd5b0ea60b287739cb2
EWOKFRENZY 2.0.0 Lotus Domino 6 / 7 Exploit
Posted Apr 15, 2017

EWOKFRENZY is an exploit for Lotus Domino versions 6 and 7. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web
SHA-256 | 802e399220f5980b8abeb9745d973c45a5f0896f56a6377dd9019bae93b6953e
ETERNALSYNERGY 1.0.1 SMBv3 Remote Code Execution Exploit
Posted Apr 15, 2017

ETERNALSYNERGY is a remote code execution exploit for SMBv3. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, remote, web, code execution
SHA-256 | 7c0d6b0f4d94cfb9e0687521b17d8366d780c0ca9fe6c22453cdc7b22872a6ed
ETERNALROMANCE 1.4.0 Windows XP / 2003 / Vista / 7 / 8 / 2008 / 2008 R2 SMB1 Exploit
Posted Apr 15, 2017

ETERNALROMANCE exploits an SMB1 vulnerability in Microsoft Windows XP, 2003, Vista, 7, 8, 2008, and 2008 R2. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web
systems | windows
SHA-256 | cc6021593f9b1a2663a2a29570fc4c7e92ac04f765b7a6a9f9dd5c8196c3b633
ETERNALROMANCE 1.3.0 Windows XP / 2003 / Vista / 7 / 8 / 2008 / 2008 R2 SMB1 Exploit
Posted Apr 15, 2017

ETERNALROMANCE exploits an SMB1 vulnerability in Microsoft Windows XP, 2003, Vista, 7, 8, 2008, and 2008 R2. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web
systems | windows
SHA-256 | b731827f9a168d6610e32c2002975cc1c2fe32260f12e50a86429d722e3d908a
ESTEEMAUDIT 2.1.0 Windows 2003 / XP RDP Zero Day Exploit
Posted Apr 15, 2017

ESTEEMAUDIT is a  a remote RDP (Remote Desktop) zero day exploit targeting Windows Server 2003 and XP, installs an implant and exploits smart card authentication. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, remote, web
systems | windows
SHA-256 | cdba14ff2a6f42d4820cce05a9ea4e7c3da31b972c5f6222a55eca0af1ab33bd
ESKIMOROLL 1.1.1 Kerberos Exploit
Posted Apr 15, 2017

ESKIMOROLL is some kind of Kerberos exploit targeting domain controllers running Windows Server 2000, 2003, 2008 and 2008 R2. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web
systems | windows
SHA-256 | 44445e65de790734a9912cc24326ed275f006414130d1635be605f91692c8aad
ERRATICGOPHER 1.0.1 Windows XP / 2003 SMB Exploit
Posted Apr 15, 2017

ERRATICGOPHER exploits an SMB vulnerability in Microsoft Windows 2003 and XP. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web
systems | windows
SHA-256 | 95c1b47b4bc8a3c1a063bb393ffb61a4237bc996fb0f0284d653dbfe42effd5f
EMPHASISMINE 3.4.0 IBM Lotus Domino IMAP Exploit
Posted Apr 15, 2017

EMPHASISMINE is an IMAP exploit for IBM Lotus Domino. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web, imap
SHA-256 | 4b2ffc2584295fcdf19a61c336bece7f070ec740f8f629c4853664d0b198ef5a
EMERALDTHREAD 3.0.0 Windows 2003 / XP SMB Exploit
Posted Apr 15, 2017

EMERALDTHREAD exploits an SMB vulnerability in Microsoft Windows 2003 and XP. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web
systems | windows
SHA-256 | ee348289a3e8368faeeca68670d88e718e303f16757bbdcf16a3165891e63eb8
EDUCATEDSCHOLAR 1.0.0 MS09-050 SMB Exploit
Posted Apr 15, 2017

EDUCATEDSCHOLAR exploits the SMB vulnerability patched by MS09-050. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web
SHA-256 | 989506a4db6e89b37b2c91e5549f923f627c507f74944515cc9a838e1e190907
ECLIPSEDWING 1.5.2 Windows 2000 / 2003 / XP MS08-67 SMB Exploit
Posted Apr 15, 2017

ECLIPSEDWING exploits the SMB vulnerability patched by MS08-67. It affects Microsoft Windows 2000, 2003, and XP. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web
systems | windows
SHA-256 | c570cf8eb7a9ffba6280fa7a06e42182381018eeb22fe59a49cc8478c72812d4
EASYPI 3.1.0 Lotus CC Mail Exploit
Posted Apr 15, 2017

EASYPI is a Lotus exploit that leverage CC. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web
SHA-256 | 878fbb749c395e611c277424aa48056b3b17bb8a7249886742e25fd5f68808dc
EASYBEE 1.0.1 MDaemon Private Email Server Exploit
Posted Apr 15, 2017

EASYBEE is an exploit for the MDaemon private email server. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web
SHA-256 | 5554e32b5828ae63cad44af6f187db640fd36c39549253726862b72ccf0ec448
Equation Group Data Leak As Of 04/14/2017
Posted Apr 15, 2017

This is a very large archive (500 MB) of all exploits, implants, and more from the Equation Group that has been leaked by the Shadow Brokers as of 04/14/2017. Consider anything inside of this archive hostile and unverified. For research purposes only.

tags | exploit
SHA-256 | 567b6d887d7f1e3030260dfc691abbcab6fea9dff8fd83a829fcee72ccd0a30f
Scriptler Jenkins 2.9 Cross Site Scripting
Posted Apr 15, 2017
Authored by Securify B.V., Burak Kelebek

Scriptler Jenkins version 2.9 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 484f0c9f4c2dce6057d71b5b1848deaed56ea83958b0a2b4f3e86290b3c68a16
Kernel Live Patch Security Notice LSN-0021-1
Posted Apr 15, 2017
Authored by Benjamin M. Romer

Several security issues were fixed in the kernel. Andrey Konovalov discovered that the AF_PACKET implementation in the Linux kernel did not properly validate certain block-size data. A local attacker could use this to cause a denial of service (system crash). Andrey Konovalov discovered a use-after-free vulnerability in the DCCP implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly gain administrative privileges. Various other issues were also addressed.

tags | advisory, denial of service, kernel, local
systems | linux
advisories | CVE-2016-5195, CVE-2016-7910, CVE-2016-7911, CVE-2016-7912, CVE-2016-7916, CVE-2016-8399, CVE-2016-8630, CVE-2016-8633, CVE-2016-9191, CVE-2016-9555, CVE-2016-9756, CVE-2017-2583, CVE-2017-6074, CVE-2017-7308
SHA-256 | 42b1d7e92d487c05901f19f08b2e6c9e119556985c2054e46a019c3a3bd7bf0d
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close