what you don't know can hurt you
Showing 1 - 13 of 13 RSS Feed

Files

Reversing And Malware Analysis Training
Posted Dec 10, 2012
Authored by Amit Malik, Monnappa, Nagareshwar Talekar, Harsimran Walia, Swapnil Pathak | Site securityxploded.com

This archive holds twelves PDFs that hold presentations for Reversing and Malware Analysis Training. The Topics covered are Lab Setup Guide, Introduction to Windows Internals, Windows PE File Format Basics, Assembly Programming Basics, Reverse Engineering Tools Basics, Practical Reversing (I), Unpacking UPX, Malware Memory Forensics, Advanced Malware Analysis, Exploit Development Basics, Exploit Development Advanced, and Rootkit Analysis.

tags | paper
systems | linux, windows
MD5 | cd7003cce71ab853cec70c756ca46aef

Related Files

Low-Level Reversing Of BLUEKEEP
Posted Aug 14, 2019
Authored by Ricardo Narvaja

This whitepaper discusses low-level reversing of the BLUEKEEP vulnerability.

tags | paper
advisories | CVE-2019-0708
MD5 | 3ab6adf388a7c01a0cc216daf74e1f92
ImageTragick ImageMagick Proof Of Concepts
Posted Apr 2, 2019
Authored by Ian Foster

Aptly named ImageTragick, this archive holds various proof of concept exploits for a code execution vulnerability in ImageMagick.

tags | exploit, code execution, proof of concept
advisories | CVE-2016-3714
MD5 | 95961e24ebf2b999f5c7a8f097e77cb7
STMicroelectronics DVB Chipset Reverse Engineering
Posted Jun 8, 2018
Authored by Adam Gowdiak | Site security-explorations.com

This archive holds a 70+ pages long technical paper accompanied by two reverse engineering tools to analyze STMicroelectronics DVB chipsets.

tags | exploit
MD5 | a5d20c1e900110611b12feb7de976edb
Equation Group Data Leak As Of 04/14/2017
Posted Apr 15, 2017

This is a very large archive (500 MB) of all exploits, implants, and more from the Equation Group that has been leaked by the Shadow Brokers as of 04/14/2017. Consider anything inside of this archive hostile and unverified. For research purposes only.

tags | exploit
MD5 | 4a24dd48253aa704cdf371b4346c69de
Netsweeper Bypass / XSS / Redirection / SQL Injection / Execution
Posted Aug 11, 2015
Authored by Anastasios Monachos

This archive houses a large quantity of vulnerabilities identified in Netsweeper versions ranging from 2.6.29 through 4.0.9. These include authentication bypass, file upload and execution, cross site scripting, SQL injection, and more.

tags | exploit, vulnerability, xss, sql injection, file upload
systems | linux
advisories | CVE-2014-9605, CVE-2014-9606, CVE-2014-9607, CVE-2014-9608, CVE-2014-9609, CVE-2014-9610, CVE-2014-9611, CVE-2014-9612, CVE-2014-9613, CVE-2014-9614, CVE-2014-9615, CVE-2014-9616, CVE-2014-9617, CVE-2014-9618, CVE-2014-9619
MD5 | 15a53c60fa1f9b66d9d2524dbb56c7d4
Reversing Encrypted Callbacks And COM Interfaces
Posted Feb 6, 2014
Authored by Sudeep Singh

Whitepaper that discusses viruses that make use of COM interfaces to implement their functionality and how to reverse the binaries.

tags | paper
MD5 | 983f03ef7241929e554ca3df8283dbd4
WordPress Themes Remote File Upload
Posted Nov 13, 2013
Authored by Black Devils

Bordeaux, Bulteno, Oxygen, Radial, Rayoflight, Reganto, and Rockstar WordPress themes suffer from a remote file upload vulnerability. This archive houses metasploit modules that exploits these issues.

tags | exploit, remote, file upload
systems | linux
MD5 | 6cbb43ddbeea15582889fb65a6f632e6
Loftek CSRF / Memory Dump / Credential Disclosure
Posted Aug 23, 2013
Authored by Craig Young

This archive holds proof of concept code for cross site request forgery, memory dump, and wifi credential disclosure vulnerabilities in Loftek Nexus 543 IP cameras.

tags | exploit, vulnerability, proof of concept, csrf
systems | linux
advisories | CVE-2013-3311, CVE-2013-3312, CVE-2013-3313, CVE-2013-3314
MD5 | 02aea1a11fbe505a39d5b5245b30b28d
Reversing Offline Games
Posted Apr 20, 2013
Authored by Dark-Puzzle

This is a brief tutorial that demonstrates how to reverse engineer an offline game (3D Pinball).

tags | paper
MD5 | 4354b4c3d5702117c63f23f608e917fc
Reversing On Linux/x86 With GDB
Posted Aug 26, 2011
Authored by fr0g

Whitepaper called Reversing on Linux x86 (with GDB). Written in French.

tags | paper, x86
systems | linux
MD5 | 8e4b889ca9616dce8a4ad7749b5e9b88
Reversing Basics - A Practical Approach
Posted Mar 16, 2011
Authored by DouBle_Zer0

Whitepaper called Reversing Basics - A Practical Approach. It discusses reverse engineering a simple crackme using IDA Pro.

tags | paper
MD5 | 52c140bc998598706afe8da8a96abbed
thc-nokia-rom-images.tar.gz
Posted Jun 5, 2006
Authored by thc | Site thc.org

This archive holds mobile phone ROM images for the Nokia 6630, Nokia n70, Nokia N-GAGE, and the Sony-Ericsson P900. THC has launched the Mobile Phone ROM Image and Reverse Engineering Invitation. Their intention with this release is to motivate other reverse engineers to take a look at the images and to discover other hidden secrets.

MD5 | e0e7eb981cda5357c180b1ba459dca2d
Page 1 of 1
Back1Next

File Archive:

September 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    1 Files
  • 2
    Sep 2nd
    38 Files
  • 3
    Sep 3rd
    30 Files
  • 4
    Sep 4th
    15 Files
  • 5
    Sep 5th
    12 Files
  • 6
    Sep 6th
    17 Files
  • 7
    Sep 7th
    3 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    24 Files
  • 10
    Sep 10th
    22 Files
  • 11
    Sep 11th
    22 Files
  • 12
    Sep 12th
    15 Files
  • 13
    Sep 13th
    5 Files
  • 14
    Sep 14th
    2 Files
  • 15
    Sep 15th
    1 Files
  • 16
    Sep 16th
    11 Files
  • 17
    Sep 17th
    16 Files
  • 18
    Sep 18th
    8 Files
  • 19
    Sep 19th
    14 Files
  • 20
    Sep 20th
    20 Files
  • 21
    Sep 21st
    3 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close