Trojan.Win32.Gofot.htx malware suffers from a buffer overflow vulnerability.
f0fd12c55a50d4ef03b089c656756cc3
Backdoor.Win32.Wollf.h malware suffers from a missing authentication vulnerability.
607f5ab87e25bdd070f14eb39982bb41
Backdoor.Win32.Delf.adag malware suffers from hardcoded credential and traversal vulnerabilities.
43bbfd711b4fcf5ebe51f0cd6acd891f
Backdoor.Win32.Agent.xw malware suffers from denial of service and null pointer vulnerabilities.
133af23d67b6f241199602c300eaa495
Backdoor.Win32.Agent.xs malware suffers from an insecure permissions vulnerability.
d2916061c5f8b68a3a9d24232b67ad6e
This Metasploit module uses job functionality in the Apache Flink dashboard web interface to upload and execute a JAR file, leading to remote execution of arbitrary Java code as the web server user. This module has been tested successfully on Apache Flink versions: 1.9.3 on Ubuntu 18.04.4; 1.11.2 on Ubuntu 18.04.4; 1.9.3 on Windows 10; and 1.11.2 on Windows 10.
df5b84ceecc3ad0a0dd97aadca7fdd1a
240 bytes small Windows/x86 add user Alfred to administrators/remote desktop users group shellcode.
444c0277c03e6f66fefa718118a17499
Backdoor.Win32.DarkKomet.irv malware suffers from an insecure permissions vulnerability.
bb262908599b4bf755bebcca1291acb8
Trojan.Win32.Pluder.o malware suffers from an insecure permissions vulnerability.
693734be11629f19fd9f6adf57b3e887
Trojan.Win32.Pincav.cmfl malware suffers from an insecure permissions vulnerability.
b237580a2e1707ad533440f0bedecdcc
Backdoor.Win32.Ketch.h malware suffers from a buffer overflow vulnerability.
601ca1b3b09071a81ea903200e8a0487
Backdoor.Win32.Inject.tyq malware suffers from an insecure permissions vulnerability.
468cb862df6b63f6bcea90158cd0496c
Trojan-Proxy.Win32.Daemonize.i malware suffers from a denial of service vulnerability.
0543f0e49422f6ff16be36b260dba3c0
Backdoor.Win32.Bionet.10 malware has an ftp service that allows for anonymous login.
17803aed7636479ba3f6b2e26a546ced
Backdoor.Win32.DarkKomet.apcc malware suffers from an insecure permissions vulnerability.
85fc80fb3bc90a30ac42224d63b0242e
Backdoor.Win32.DarkKomet.bhfh malware suffers from an insecure permissions vulnerability.
2495a3e669e584f4844ea3d7f7403027
Backdoor.Win32.Agent.aak malware suffers from a buffer overflow vulnerability.
9c05bcd738259e6d2607b5bf2a011023
Backdoor.Win32.Agent.aak malware suffers from code execution and cross site request forgery vulnerabilities.
3709fd6065b0c25e41efd07763d6e07d
Backdoor.Win32.Agent.aak malware suffers from a hardcoded credential vulnerability.
59f7c8d08a2e0c4cbf04ec25fb6b102e
Recon-Informer is a basic real-time anti-reconnaissance detection tool for offensive security systems, useful for penetration testers. It runs on Windows/Linux and leverages scapy.
143d9d98889ba812fb5ecda85828e081
Backdoor.Win32.Burbul.b malware has an ftp service that allows for anonymous login.
3d159463a07f4beb111e3ffad8eca358
Backdoor.Win32.Indexer.a malware suffers from a denial of service vulnerability.
2df3daf8ec427498f2a506bdcc6e9b99
Backdoor.Win32.Indexer.a malware has a backdoor with weak hardcoded credentials.
a95609de4b4cc00f19e23b9292194bf2
Backdoor.Win32.Bifrose.ahvb malware suffers from an insecure permissions vulnerability.
2086df96f2efa71a3d445e0872eff9bc
Backdoor.Win32.Azbreg.aant malware suffers from an insecure permissions vulnerability.
816985bd18f5b0d39e4207bc6ff4063c