exploit the possibilities
Showing 1 - 25 of 45 RSS Feed

Files

Mac OS X Mavericks IOBluetoothHCIUserClient Privilege Escalation
Posted Nov 3, 2014
Authored by Roberto Paleari, Aristide Fattori

This proof of concept exploits a missing sign check in IOBluetoothHCIUserClient::SimpleDispatchWL() on Mac OS X Mavericks.

tags | exploit, proof of concept
systems | apple, osx
MD5 | e5b206d87c9ccb563fc84bccb0d2df66

Related Files

SMBleed / SMBGhost Pre-Authentication Remote Code Execution Proof Of Concept
Posted Jun 11, 2020
Authored by ZecOps | Site zecops.com

This proof of concept exploits a pre-authentication remote code execution vulnerability by combining SMBleed with SMBGhost.

tags | exploit, remote, code execution, proof of concept
advisories | CVE-2020-0796
MD5 | 3dbbc830a0e476d380e1321d4b64dca0
Extreme Networks Aerohive HiveOS 11.x Denial Of Service
Posted May 6, 2020
Authored by LiquidWorm | Site zeroscience.mk

Extreme Networks Aerohive HiveOS versions 11.x and below remote denial of service exploit. An unauthenticated malicious user can trigger a denial of service (DoS) attack when sending specific application layer packets towards the Aerohive NetConfig UI. This proof of concept exploit renders the application unusable for 305 seconds or 5 minutes with a single HTTP request using the action.php5 script calling the CliWindow function thru the _page parameter, denying access to the web server hive user interface.

tags | exploit, remote, web, denial of service, proof of concept
MD5 | 8bc523d3b61e243e2e55cdddefe4c905
ModX CMS Proof Of Concept Shell Upload
Posted May 31, 2017
Authored by Cody Sixteen

This proof of concept code shows how manager functionality can be abused in ModX CMS to upload a shell.

tags | exploit, shell, proof of concept
MD5 | 4a9e82ae99c6a9dbf9554d110145a1a4
Joomla 3.x Proof Of Concept Shell Upload
Posted May 28, 2017
Authored by Cody Sixteen

This proof of concept code shows how administrator functionality can be abused in Joomla to upload a shell.

tags | exploit, shell, proof of concept, file upload
MD5 | 5342f1f41088abee2af959b87cbce235
DokuWiki Proof Of Concept Shell Upload
Posted May 28, 2017
Authored by Cody Sixteen

This proof of concept code shows how administrative functionality can be abused in DokuWiki to upload a shell.

tags | exploit, shell, proof of concept
MD5 | 729d40f68a98bc4c5c3dc2afec215396
Concrete5 Proof Of Concept Shell Upload
Posted May 28, 2017
Authored by Cody Sixteen

This proof of concept code shows how functionality can be abused in Concrete5 to upload a shell.

tags | exploit, shell, proof of concept
MD5 | 9745e0705ed0168941e97981a8f2ab5b
PHPMailer / Zend-mail / SwiftMailer Remote Code Execution
Posted Jan 3, 2017
Authored by Dawid Golunski

This proof of concept exploit aims to execute a reverse shell on the target in the context of the web server user via a vulnerable PHP email library.

tags | exploit, web, shell, php, proof of concept
advisories | CVE-2016-10033, CVE-2016-10034, CVE-2016-10045, CVE-2016-10074
MD5 | a0be91defae2564f4405c81fdeab38cd
LDAP Amplication Denial Of Service
Posted Nov 4, 2016
Authored by ShadowHatesYou

This proof of concept is an LDAP Distributed Reflective Denial of Service/Bandwidth Amplification Attack, similar to DNS and NTP amplification attacks where the target of the DoS is spoofed as the source IP in a request to the reflectors(In this case, LDAP servers). The reflectors then respond to the spoofed target IP with a bigger answer than the original question, resulting in the target experiencing what appears to be a distributed denial of service attack, even though there may only be one true source. suffers from a denial of service vulnerability.

tags | exploit, denial of service, spoof, proof of concept
MD5 | 3c0c963c42fa117bd2ae19bab9220098
Windows 7 win32k Bitmap Use-After-Free
Posted Jun 16, 2016
Authored by Google Security Research, hawkes, Nils Sommer

This proof of concept crashes 32-bit Windows 7 with special pool enabled on win32k.sys. It might take several runs in order to reproduce.

tags | exploit, proof of concept
systems | linux, windows, 7
advisories | CVE-2016-0173
MD5 | 160e4fa92c75ae0cd439e35c508ca694
Windows 7 win32k Bitmap Use-After-Free
Posted Jun 16, 2016
Authored by Google Security Research, hawkes

This proof of concept triggers a blue screen on Windows 7 with special pool enabled on win32k.sys. A reference to the bitmap object still exists in the device context after it has been deleted.

tags | exploit, proof of concept
systems | linux, windows, 7
advisories | CVE-2016-0171
MD5 | 7b31ec4bf7cf5a7032dd8cecf1de4699
Samsung Galaxy S6 Android.media.process Face Recognition Memory Corruption
Posted Feb 7, 2016
Authored by Google Security Research, natashenka

This proof of concept file causes memory corruption when it is scanned by the face recognition library in android.media.process.

tags | exploit, proof of concept
systems | linux
MD5 | dea9ba225479ebfa9d3367b39aa8f9a6
Android Libstagefright Tag Parsing Heap Buffer Overflow
Posted Jan 27, 2016
Authored by Google Security Research, scvitti

This proof of concept demonstrates the Android Libstagefright heap buffer overflow that occurs due to an integer overflow in MP3 ID3 tag parsing.

tags | exploit, overflow, proof of concept
systems | linux
advisories | CVE-2015-6604
MD5 | ff9b3227da297d81a6576c0ad5330a06
Microsoft Windows Kernel Win32k!OffsetChildren Null Pointer Dereference
Posted Dec 18, 2015
Authored by Nils, Google Security Research

This proof of concept exploit triggers a null pointer vulnerability in OffsetChildren on Windows 7 32-bit. By mapping the null page an attacker can leverage this vulnerability to write to an arbitrary address.

tags | exploit, arbitrary, proof of concept
systems | linux, windows, 7
advisories | CVE-2015-6171
MD5 | 22fc86d3464aaadd67a48f82e434c1c1
Win32k Null Pointer Dereference
Posted Dec 18, 2015
Authored by Nils, Google Security Research

This proof of concept exploit triggers a null pointer condition on Windows 7 32-bit, which can potentially be exploited on versions of Windows that allow mapping the null page (e.g. Windows 7 32-bit).

tags | exploit, proof of concept
systems | linux, windows, 7
advisories | CVE-2015-6174
MD5 | b1897836add1009c2f7164a8ddf36c8a
Win32k Clipboard Bitmap Use-After-Free
Posted Dec 18, 2015
Authored by Nils, Google Security Research

This proof of concept exploit triggers a crash on Windows 7 32-bit with Special Pool enabled on win32k.sys. The kernel crashes due to a use-after-free condition with bitmaps in the clipboard.

tags | exploit, kernel, proof of concept
systems | linux, windows, 7
advisories | CVE-2015-6173
MD5 | 4fdf5628f6a5f64c30d17180c647be6f
Beckoff CX9020 CPU Model Remote Code Execution
Posted Oct 23, 2015
Authored by Photubias

This proof of concept exploit allows any attack to reboot any CX9020 PLC and add random (Web) users to be configured.

tags | exploit, web, proof of concept
advisories | CVE-2015-4051
MD5 | 7e1cc2c85a3acb1409945fa7a6993562
Microsoft Office 2007 And 2010 RTF Frmtxtbrl EIP Corruption
Posted Oct 8, 2015
Authored by Google Security Research, scvitti

This proof of concept shows a crash that was observed in MS Office 2007 running under Windows 2003 x86. Microsoft Office File Validation Add-In is disabled and application verified was enabled for testing and reproduction. This sample also reproduced in Office 2010 running on Windows 7 x86. It did not reproduce in Microsoft Office 2013 running under Windows 8.1 x86.

tags | exploit, x86, proof of concept
systems | linux, windows, 7
MD5 | 1128dbfd7ec8f86a7ab1a7b5e1f5fd56
Windows Kernel Pool Buffer Overflow Drawing Caption Bar
Posted Sep 22, 2015
Authored by Nils, Google Security Research

This proof of concept exploit triggers a crashes due to a pool buffer overflow while drawing the caption bar of window.

tags | exploit, overflow, proof of concept
systems | linux
advisories | CVE-2015-1727
MD5 | 0af6837efd8b6007cfc48b0dc36cb23b
Phoenix Contact ILC 150 ETH PLC Remote Control
Posted May 19, 2015
Authored by Photubias

This proof of concept exploit will print out the current status of the PLC, continuously every 0.1 second, after 3 seconds it reverts (start becomes stop, stop becomes cold start), and stops after 5 seconds.

tags | exploit, proof of concept
advisories | CVE-2014-9195
MD5 | 13d87d50c5cad31a23abcd2412ed24b7
Oracle Reports Shell Uploader
Posted Jan 28, 2014
Authored by Dana Taylor

Oracle Reports pwnacle exploit that uploads a jsp shell to the target system using the URLPARAMETER vulnerability that allows for planting files.

tags | exploit, shell
advisories | CVE-2012-3153, CVE-2012-3152
MD5 | fcdc1ad241a1e254b58749531003d3f5
nginx Backdoor
Posted Jul 19, 2013
Authored by t57root | Site hackshell.net

This code is a backdoor for nginx. It provides remote shell access, SOCKS5 tunneling, and HTTP password sniffing and logging.

tags | tool, remote, web, shell, rootkit
systems | unix
MD5 | 3e9aaedacf0e4d4c8a681ec65ae4b52a
Inter-Keystroke Timing Proof Of Concept
Posted Jan 31, 2013
Authored by vladz

This proof of concept exploit determines the password length of a local user who runs "su -".

tags | exploit, local, proof of concept
advisories | CVE-2013-0160
MD5 | e9bb0a59c80980d8fe26ba914be04312
Tunnel Blick Local Root Exploit Version 2
Posted Aug 11, 2012
Authored by zx2c4

Pwnnel-Blicker is a second local root exploit for Tunnel Blick OS X OpenVPN manager.

tags | exploit, local, root
systems | apple, osx
MD5 | 00ab722f2ba1b1ee134371e96d761d4a
Windows XP Keyboard Layouts Pool Corruption Proof Of Concept
Posted May 23, 2012
Authored by Oleksiuk Dmytro

This proof of concept code demonstrates a Microsoft Windows XP keyboard layouts pool corruption vulnerability, post MS12-034. The vulnerability exists in the function win32k!ReadLayoutFile() that parses keyboard layout file data.

tags | exploit, proof of concept
systems | windows, xp
MD5 | 34eea03ff3e3df7878c5cf5571892884
Reflection Scan Proof Of Concept
Posted Jan 18, 2012
Authored by Jan Wrobel

This proof of concept demonstrates how traffic load of a shared packet queue can be exploited as a side channel through which protected information leaks to an off-path attacker.

tags | exploit, proof of concept
MD5 | 64bc671666fc26d1a6fbcfea2dbc73f5
Page 1 of 2
Back12Next

File Archive:

October 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    16 Files
  • 2
    Oct 2nd
    1 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    24 Files
  • 5
    Oct 5th
    24 Files
  • 6
    Oct 6th
    11 Files
  • 7
    Oct 7th
    14 Files
  • 8
    Oct 8th
    19 Files
  • 9
    Oct 9th
    1 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    7 Files
  • 12
    Oct 12th
    15 Files
  • 13
    Oct 13th
    26 Files
  • 14
    Oct 14th
    10 Files
  • 15
    Oct 15th
    6 Files
  • 16
    Oct 16th
    2 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    14 Files
  • 19
    Oct 19th
    15 Files
  • 20
    Oct 20th
    20 Files
  • 21
    Oct 21st
    12 Files
  • 22
    Oct 22nd
    14 Files
  • 23
    Oct 23rd
    3 Files
  • 24
    Oct 24th
    1 Files
  • 25
    Oct 25th
    33 Files
  • 26
    Oct 26th
    27 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close