Recon-Informer is a basic real-time anti-reconnaissance detection tool for offensive security systems, useful for penetration testers. It runs on Windows/Linux and leverages scapy.
143d9d98889ba812fb5ecda85828e081
Backdoor.Win32.Burbul.b malware has an ftp service that allows for anonymous login.
3d159463a07f4beb111e3ffad8eca358
Backdoor.Win32.Indexer.a malware suffers from a denial of service vulnerability.
2df3daf8ec427498f2a506bdcc6e9b99
Backdoor.Win32.Indexer.a malware has a backdoor with weak hardcoded credentials.
a95609de4b4cc00f19e23b9292194bf2
Backdoor.Win32.Bifrose.ahvb malware suffers from an insecure permissions vulnerability.
2086df96f2efa71a3d445e0872eff9bc
Backdoor.Win32.Azbreg.aant malware suffers from an insecure permissions vulnerability.
816985bd18f5b0d39e4207bc6ff4063c
Trojan-Spy.Win32.WinSpy.wlt malware suffers from an insecure permissions vulnerability.
5fbdcb1678c85b1b92181ff2240a058c
Backdoor.Win32.Cabrotor.21 malware suffers from an insecure permissions vulnerability.
f366a6a6fbdedc50a738ab1e9493c049
Backdoor.Win32.Cafeini.08.b malware suffers from a missing authentication vulnerability.
1cea2af1a8cbab60a7143aaed75361c4
Backdoor.Win32.Backlash.101 malware suffers from a missing authentication vulnerability.
940635375048734dc4376d0392bf4b58
Backdoor.Win32.BackAttack.18 malware suffers from a missing authentication vulnerability that can allow for remote screenshots, system restart, and more.
6d3c0dc494872c04ac02bb919738596e
Backdoor.Win32.Augudor.a malware suffers from a code execution vulnerability.
786b22b503eb7b973811d821f4a00125
This Metasploit module exploits an authenticated Java deserialization that affects a truckload of Micro Focus products: Operations Bridge Manager, Application Performance Management, Data Center Automation, Universal CMDB, Hybrid Cloud Management and Service Management Automation. However, this module was only tested on Operations Bridge Manager. Exploiting this vulnerability will result in remote code execution as the root user on Linux or the SYSTEM user on Windows. Authentication is required as the module user needs to login to the application and obtain the authenticated LWSSO_COOKIE_KEY, which should be fed to the module. Any authenticated user can exploit this vulnerability, even the lowest privileged ones.
f6552551b0f335ef518698e89a9caa30
Microsoft Windows has a privilege escalation vulnerability. When a process is running in a server silo, the checks for trusted hive registry key symbolic links is disabled leading to elevation of privilege.
91697f9020080e5254805aa5e5e1cc57
Backdoor.Win32.Aphexdoor.LiteSock malware suffers from a buffer overflow vulnerability.
40ccca1a10693f61f03b7a0072056b84
Backdoor.Win32.NetTerrorist malware suffers from bypass and code execution vulnerabilities.
0c3156e0a08e087ee0ece6cec6b9dd35
Trojan.Win32.Cafelom.bu malware suffers from a heap corruption vulnerability.
dbe29d1b9bd8dcc2ccdacc8feac59861
Backdoor.Win32.Wollf.15 malware suffers from a missing authentication vulnerability.
e755cdd9895ac1b0993edf9aa2d047c4
Trojan-Spy.Win32.WinSpy.vwl malware suffers from an insecure permissions vulnerability.
3588a5f525ca8eedcc7fdf62c0e540d4
Trojan-Spy.Win32.WebCenter.a malware suffers from an information leakage vulnerability.
74917e460758a49f3e8bd5ca6afa155b
Trojan-Spy.Win32.SpyEyes.awow malware suffers from an insecure permissions vulnerability.
b1dc1d65a2404e69400d254fdec18162
Trojan.Win32.Delf.uq malware suffers from an insecure permissions vulnerability.
384cc73c18f1a31e0773f7084383b9d1
Email-Worm.Win32.Sircam.eb malware suffers from an insecure permissions vulnerability.
549ef90768d393736c83930a680b5f5b
Trojan.Win32.Cospet.abg malware suffers from an insecure permissions vulnerability.
07ecb73daef0b93254d07f1f64c79f10
Trojan.Win32.Comei.pgo malware suffers from an insecure permissions vulnerability.
83250830089f88c1a5595db91b9f7a6f