exploit the possibilities
Showing 26 - 50 of 5,815 RSS Feed

Operating System: Windows

Recon Informer 1.3
Posted Feb 16, 2021
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Recon-Informer is a basic real-time anti-reconnaissance detection tool for offensive security systems, useful for penetration testers. It runs on Windows/Linux and leverages scapy.

Changes: Added -t flag to process packets from specific inbound IP address of interest. Added timestamp for detection results in console output window. Couple of bug fixes.
tags | tool
systems | linux, windows, unix
MD5 | 143d9d98889ba812fb5ecda85828e081
Backdoor.Win32.Burbul.b Anonymous Login
Posted Feb 16, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Burbul.b malware has an ftp service that allows for anonymous login.

tags | exploit
systems | windows
MD5 | 3d159463a07f4beb111e3ffad8eca358
Backdoor.Win32.Indexer.a Denial Of Service
Posted Feb 16, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Indexer.a malware suffers from a denial of service vulnerability.

tags | exploit, denial of service
systems | windows
MD5 | 2df3daf8ec427498f2a506bdcc6e9b99
Backdoor.Win32.Indexer.a Hardcoded Credentials
Posted Feb 16, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Indexer.a malware has a backdoor with weak hardcoded credentials.

tags | exploit
systems | windows
MD5 | a95609de4b4cc00f19e23b9292194bf2
Backdoor.Win32.Bifrose.ahvb Insecure Permissions
Posted Feb 16, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Bifrose.ahvb malware suffers from an insecure permissions vulnerability.

tags | exploit
systems | windows
MD5 | 2086df96f2efa71a3d445e0872eff9bc
Backdoor.Win32.Azbreg.aant Insecure Permissions
Posted Feb 16, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Azbreg.aant malware suffers from an insecure permissions vulnerability.

tags | exploit
systems | windows
MD5 | 816985bd18f5b0d39e4207bc6ff4063c
Trojan-Spy.Win32.WinSpy.wlt Insecure Permissions
Posted Feb 16, 2021
Authored by malvuln | Site malvuln.com

Trojan-Spy.Win32.WinSpy.wlt malware suffers from an insecure permissions vulnerability.

tags | exploit, trojan
systems | windows
MD5 | 5fbdcb1678c85b1b92181ff2240a058c
Backdoor.Win32.Cabrotor.21 Insecure Permissions
Posted Feb 16, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Cabrotor.21 malware suffers from an insecure permissions vulnerability.

tags | exploit
systems | windows
MD5 | f366a6a6fbdedc50a738ab1e9493c049
Backdoor.Win32.Cafeini.08.b Missing Authentication
Posted Feb 15, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Cafeini.08.b malware suffers from a missing authentication vulnerability.

tags | exploit
systems | windows
MD5 | 1cea2af1a8cbab60a7143aaed75361c4
Backdoor.Win32.Backlash.101 Missing Authentication
Posted Feb 13, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Backlash.101 malware suffers from a missing authentication vulnerability.

tags | exploit
systems | windows
MD5 | 940635375048734dc4376d0392bf4b58
Backdoor.Win32.BackAttack.18 Missing Authentication
Posted Feb 11, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.BackAttack.18 malware suffers from a missing authentication vulnerability that can allow for remote screenshots, system restart, and more.

tags | exploit, remote
systems | windows
MD5 | 6d3c0dc494872c04ac02bb919738596e
Backdoor.Win32.Augudor.a Code Execution
Posted Feb 11, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Augudor.a malware suffers from a code execution vulnerability.

tags | exploit, code execution
systems | windows
MD5 | 786b22b503eb7b973811d821f4a00125
Micro Focus Operations Bridge Manager Remote Code Execution
Posted Feb 10, 2021
Authored by Pedro Ribeiro | Site metasploit.com

This Metasploit module exploits an authenticated Java deserialization that affects a truckload of Micro Focus products: Operations Bridge Manager, Application Performance Management, Data Center Automation, Universal CMDB, Hybrid Cloud Management and Service Management Automation. However, this module was only tested on Operations Bridge Manager. Exploiting this vulnerability will result in remote code execution as the root user on Linux or the SYSTEM user on Windows. Authentication is required as the module user needs to login to the application and obtain the authenticated LWSSO_COOKIE_KEY, which should be fed to the module. Any authenticated user can exploit this vulnerability, even the lowest privileged ones.

tags | exploit, java, remote, root, code execution
systems | linux, windows
advisories | CVE-2020-11853
MD5 | f6552551b0f335ef518698e89a9caa30
Microsoft Windows Server Silo Registry Key Symbolic Link Privilege Escalation
Posted Feb 10, 2021
Authored by James Forshaw, Google Security Research

Microsoft Windows has a privilege escalation vulnerability. When a process is running in a server silo, the checks for trusted hive registry key symbolic links is disabled leading to elevation of privilege.

tags | exploit, registry
systems | windows
advisories | CVE-2021-24096
MD5 | 91697f9020080e5254805aa5e5e1cc57
Backdoor.Win32.Aphexdoor.LiteSock Buffer Overflow
Posted Feb 10, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Aphexdoor.LiteSock malware suffers from a buffer overflow vulnerability.

tags | exploit, overflow
systems | windows
MD5 | 40ccca1a10693f61f03b7a0072056b84
Backdoor.Win32.NetTerrorist Authentication Bypass / Code Execution
Posted Feb 9, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.NetTerrorist malware suffers from bypass and code execution vulnerabilities.

tags | exploit, vulnerability, code execution
systems | windows
MD5 | 0c3156e0a08e087ee0ece6cec6b9dd35
Trojan.Win32.Cafelom.bu Heap Corruption
Posted Feb 9, 2021
Authored by malvuln | Site malvuln.com

Trojan.Win32.Cafelom.bu malware suffers from a heap corruption vulnerability.

tags | exploit, trojan
systems | windows
MD5 | dbe29d1b9bd8dcc2ccdacc8feac59861
Backdoor.Win32.Wollf.15 Missing Authentication
Posted Feb 8, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Wollf.15 malware suffers from a missing authentication vulnerability.

tags | exploit
systems | windows
MD5 | e755cdd9895ac1b0993edf9aa2d047c4
Trojan-Spy.Win32.WinSpy.vwl Insecure Permissions
Posted Feb 8, 2021
Authored by malvuln | Site malvuln.com

Trojan-Spy.Win32.WinSpy.vwl malware suffers from an insecure permissions vulnerability.

tags | exploit, trojan
systems | windows
MD5 | 3588a5f525ca8eedcc7fdf62c0e540d4
Trojan-Spy.Win32.WebCenter.a Information Disclosure
Posted Feb 8, 2021
Authored by malvuln | Site malvuln.com

Trojan-Spy.Win32.WebCenter.a malware suffers from an information leakage vulnerability.

tags | exploit, trojan
systems | windows
MD5 | 74917e460758a49f3e8bd5ca6afa155b
Trojan-Spy.Win32.SpyEyes.awow Insecure Permissions
Posted Feb 8, 2021
Authored by malvuln | Site malvuln.com

Trojan-Spy.Win32.SpyEyes.awow malware suffers from an insecure permissions vulnerability.

tags | exploit, trojan
systems | windows
MD5 | b1dc1d65a2404e69400d254fdec18162
Trojan.Win32.Delf.uq Insecure Permissions
Posted Feb 8, 2021
Authored by malvuln | Site malvuln.com

Trojan.Win32.Delf.uq malware suffers from an insecure permissions vulnerability.

tags | exploit, trojan
systems | windows
MD5 | 384cc73c18f1a31e0773f7084383b9d1
Email-Worm.Win32.Sircam.eb Insecure Permissions
Posted Feb 8, 2021
Authored by malvuln | Site malvuln.com

Email-Worm.Win32.Sircam.eb malware suffers from an insecure permissions vulnerability.

tags | exploit, worm
systems | windows
MD5 | 549ef90768d393736c83930a680b5f5b
Trojan.Win32.Cospet.abg Insecure Permissions
Posted Feb 8, 2021
Authored by malvuln | Site malvuln.com

Trojan.Win32.Cospet.abg malware suffers from an insecure permissions vulnerability.

tags | exploit, trojan
systems | windows
MD5 | 07ecb73daef0b93254d07f1f64c79f10
Trojan.Win32.Comei.pgo Insecure Permissions
Posted Feb 8, 2021
Authored by malvuln | Site malvuln.com

Trojan.Win32.Comei.pgo malware suffers from an insecure permissions vulnerability.

tags | exploit, trojan
systems | windows
MD5 | 83250830089f88c1a5595db91b9f7a6f
Page 2 of 233
Back12345Next

File Archive:

February 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    33 Files
  • 2
    Feb 2nd
    30 Files
  • 3
    Feb 3rd
    15 Files
  • 4
    Feb 4th
    8 Files
  • 5
    Feb 5th
    11 Files
  • 6
    Feb 6th
    2 Files
  • 7
    Feb 7th
    1 Files
  • 8
    Feb 8th
    37 Files
  • 9
    Feb 9th
    15 Files
  • 10
    Feb 10th
    11 Files
  • 11
    Feb 11th
    26 Files
  • 12
    Feb 12th
    8 Files
  • 13
    Feb 13th
    1 Files
  • 14
    Feb 14th
    1 Files
  • 15
    Feb 15th
    9 Files
  • 16
    Feb 16th
    33 Files
  • 17
    Feb 17th
    6 Files
  • 18
    Feb 18th
    10 Files
  • 19
    Feb 19th
    20 Files
  • 20
    Feb 20th
    1 Files
  • 21
    Feb 21st
    1 Files
  • 22
    Feb 22nd
    17 Files
  • 23
    Feb 23rd
    15 Files
  • 24
    Feb 24th
    16 Files
  • 25
    Feb 25th
    28 Files
  • 26
    Feb 26th
    25 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close