exploit the possibilities
Showing 1 - 19 of 19 RSS Feed

Files Date: 2017-04-15

ETERNALBLUE 2.2.0 Windows 2008 R2 SMBv1 Zero Day Exploit
Posted Apr 15, 2017

ETERNALBLUE is an SMBv1 remote unauthenticated zero day exploit that works on 2008 R2. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, remote, web
MD5 | 595c578c1ead82fce86f1234b92544ad
ZIPPYBEER 1.0.2 Authenticated Microsoft Domain Controller Exploit
Posted Apr 15, 2017

ZIPPYBEER is an authenticated Microsoft Domain Controller exploit. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web
MD5 | b9f6ea24dd6d0eb8a6f2795efba063a3
EXPLODINGCAN 2.0.2 Microsoft IIS 6 Exploit
Posted Apr 15, 2017

EXPLODINGCAN is an exploit for Microsoft IIS 6 that leverages WebDAV and works on 2003 only. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web
MD5 | c5948a4bd34c2db7c52c1e8843e3547c
EWOKFRENZY 2.0.0 Lotus Domino 6 / 7 Exploit
Posted Apr 15, 2017

EWOKFRENZY is an exploit for Lotus Domino versions 6 and 7. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web
MD5 | a4ceccd70e552096821731c83c3bd0d2
ETERNALSYNERGY 1.0.1 SMBv3 Remote Code Execution Exploit
Posted Apr 15, 2017

ETERNALSYNERGY is a remote code execution exploit for SMBv3. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, remote, web, code execution
MD5 | e08aee6fa8bc7f12f33a9f1b036304ae
ETERNALROMANCE 1.4.0 Windows XP / 2003 / Vista / 7 / 8 / 2008 / 2008 R2 SMB1 Exploit
Posted Apr 15, 2017

ETERNALROMANCE exploits an SMB1 vulnerability in Microsoft Windows XP, 2003, Vista, 7, 8, 2008, and 2008 R2. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web
systems | windows, xp
MD5 | 05c80e6b7ddc47ea8c2c2b48a071226e
ETERNALROMANCE 1.3.0 Windows XP / 2003 / Vista / 7 / 8 / 2008 / 2008 R2 SMB1 Exploit
Posted Apr 15, 2017

ETERNALROMANCE exploits an SMB1 vulnerability in Microsoft Windows XP, 2003, Vista, 7, 8, 2008, and 2008 R2. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web
systems | windows, xp
MD5 | 96eaa42c9dcf4b976351e53c2820c23c
ESTEEMAUDIT 2.1.0 Windows 2003 / XP RDP Zero Day Exploit
Posted Apr 15, 2017

ESTEEMAUDIT is a  a remote RDP (Remote Desktop) zero day exploit targeting Windows Server 2003 and XP, installs an implant and exploits smart card authentication. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, remote, web
systems | windows
MD5 | 2a3c4e24c3a7eaf9a6692c47bce131e8
ESKIMOROLL 1.1.1 Kerberos Exploit
Posted Apr 15, 2017

ESKIMOROLL is some kind of Kerberos exploit targeting domain controllers running Windows Server 2000, 2003, 2008 and 2008 R2. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web
systems | windows
MD5 | d03c8ce989e6c8dcfafaecf511628c65
ERRATICGOPHER 1.0.1 Windows XP / 2003 SMB Exploit
Posted Apr 15, 2017

ERRATICGOPHER exploits an SMB vulnerability in Microsoft Windows 2003 and XP. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web
systems | windows
MD5 | 81058cd5b86d1710566b28692b2c500e
EMPHASISMINE 3.4.0 IBM Lotus Domino IMAP Exploit
Posted Apr 15, 2017

EMPHASISMINE is an IMAP exploit for IBM Lotus Domino. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web, imap
MD5 | 0cfabb5496e540c645d4cba512a96f1a
EMERALDTHREAD 3.0.0 Windows 2003 / XP SMB Exploit
Posted Apr 15, 2017

EMERALDTHREAD exploits an SMB vulnerability in Microsoft Windows 2003 and XP. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web
systems | windows
MD5 | 0148ac3aff21d3331ce946dd1cdf720f
EDUCATEDSCHOLAR 1.0.0 MS09-050 SMB Exploit
Posted Apr 15, 2017

EDUCATEDSCHOLAR exploits the SMB vulnerability patched by MS09-050. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web
MD5 | 96bf12e303eb1fef6b70e8dcd64b7e4d
ECLIPSEDWING 1.5.2 Windows 2000 / 2003 / XP MS08-67 SMB Exploit
Posted Apr 15, 2017

ECLIPSEDWING exploits the SMB vulnerability patched by MS08-67. It affects Microsoft Windows 2000, 2003, and XP. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web
systems | windows, 2k
MD5 | 27fca616dab5174663a045db979b893b
EASYPI 3.1.0 Lotus CC Mail Exploit
Posted Apr 15, 2017

EASYPI is a Lotus exploit that leverage CC. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web
MD5 | bdeda21cd8b610f84f4770851ca9acaa
EASYBEE 1.0.1 MDaemon Private Email Server Exploit
Posted Apr 15, 2017

EASYBEE is an exploit for the MDaemon private email server. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity.

tags | exploit, web
MD5 | cf0f7e3eaeafdce9ccaa0d2ee0954072
Equation Group Data Leak As Of 04/14/2017
Posted Apr 15, 2017

This is a very large archive (500 MB) of all exploits, implants, and more from the Equation Group that has been leaked by the Shadow Brokers as of 04/14/2017. Consider anything inside of this archive hostile and unverified. For research purposes only.

tags | exploit
MD5 | 4a24dd48253aa704cdf371b4346c69de
Scriptler Jenkins 2.9 Cross Site Scripting
Posted Apr 15, 2017
Authored by Securify B.V., Burak Kelebek

Scriptler Jenkins version 2.9 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 51c7b60005aa4d94fc3a39b0ebc67e50
Kernel Live Patch Security Notice LSN-0021-1
Posted Apr 15, 2017
Authored by Benjamin M. Romer

Several security issues were fixed in the kernel. Andrey Konovalov discovered that the AF_PACKET implementation in the Linux kernel did not properly validate certain block-size data. A local attacker could use this to cause a denial of service (system crash). Andrey Konovalov discovered a use-after-free vulnerability in the DCCP implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly gain administrative privileges. Various other issues were also addressed.

tags | advisory, denial of service, kernel, local
systems | linux
advisories | CVE-2016-5195, CVE-2016-7910, CVE-2016-7911, CVE-2016-7912, CVE-2016-7916, CVE-2016-8399, CVE-2016-8630, CVE-2016-8633, CVE-2016-9191, CVE-2016-9555, CVE-2016-9756, CVE-2017-2583, CVE-2017-6074, CVE-2017-7308
MD5 | 878ad898ccfcd692664025f15c5ea754
Page 1 of 1
Back1Next

File Archive:

February 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    22 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    2 Files
  • 4
    Feb 4th
    15 Files
  • 5
    Feb 5th
    50 Files
  • 6
    Feb 6th
    24 Files
  • 7
    Feb 7th
    15 Files
  • 8
    Feb 8th
    6 Files
  • 9
    Feb 9th
    1 Files
  • 10
    Feb 10th
    1 Files
  • 11
    Feb 11th
    22 Files
  • 12
    Feb 12th
    25 Files
  • 13
    Feb 13th
    16 Files
  • 14
    Feb 14th
    32 Files
  • 15
    Feb 15th
    15 Files
  • 16
    Feb 16th
    10 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close