exploit the possibilities
Showing 1 - 15 of 15 RSS Feed

Files

GNS3 Mac OS-X 1.5.2 ubridge Privilege Escalation
Posted Apr 14, 2017
Authored by Hacker Fantastic

GNS3 Mac OS-X version 1.5.2 ubridge privilege escalation exploit.

tags | exploit
systems | apple, osx
MD5 | dec70585733d3d532b738a209e7812a3

Related Files

GNS3 1.2.3 DLL Hijacking
Posted May 2, 2015
Authored by Osanda Malith

GNS3 version 1.2.3 suffers from a dll hijacking vulnerability.

tags | exploit
systems | windows
advisories | CVE-2015-2667
MD5 | 4a4f601198814a9c67a2d5154912731e
Cisco Security Advisory 20131030-asr1000
Posted Oct 30, 2013
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco IOS XE Software for 1000 Series Aggregation Services Routers (ASR) contains multiple denial of service vulnerabilities. Successful exploitation of any of these vulnerabilities could allow an unauthenticated remote attacker to trigger a reload of the embedded services processors (ESP) card or the route processor (RP) card, causing an interruption of services. Repeated exploitation could result in a sustained DoS condition. Note: Cisco IOS Software and Cisco IOS-XR Software are not affected by these vulnerabilities.

tags | advisory, remote, denial of service, vulnerability
systems | cisco
MD5 | 4f7333e0afe6e43335d3ba0b5ede94fd
Rubilyn 0.0.1
Posted Oct 6, 2012
Authored by prdelka | Site nullsecurity.net

This is a 64bit Mac OS-X kernel rootkit that uses no hardcoded address to hook the BSD subsystem in all OS-X Lion and below. It uses a combination of syscall hooking and DKOM to hide activity on a host. String resolution of symbols no longer works on Mountain Lion as symtab is destroyed during load, this code is portable on all Lion and below but requires re-working for hooking under Mountain Lion.

tags | tool, kernel, rootkit
systems | unix, bsd, apple, osx
MD5 | 4e8726f077ff7d1b0a761ab15d4d8bc9
Apple Mac OS-X xnu Local Kernel Denial Of Service
Posted Mar 24, 2009
Authored by mu-b | Site digit-labs.org

Apple Mac OS-X xnu versions 1228.x and below local kernel denial of service proof of concept exploit.

tags | exploit, denial of service, kernel, local, proof of concept
systems | apple, osx
MD5 | 32a3b37cd61fdc81e7765932563e5e5a
Apple Mac OS-X xnu Kernel Memory Leak
Posted Mar 24, 2009
Authored by mu-b | Site digit-labs.org

Apple Mac OS-X xnu versions 1228.3.13 and below local kernel memory leak and denial of service proof of concept exploit.

tags | exploit, denial of service, kernel, local, proof of concept, memory leak
systems | apple, osx
MD5 | 76a1151e694e59e105f76dbecbf81cc7
Mac OS X xnu Kernel Memory Leak
Posted Mar 24, 2009
Authored by mu-b | Site digit-labs.org

Apple Mac OS-X xnu versions 1228.3.13 and below local kernel memory leak and denial of service proof of concept exploit.

tags | exploit, denial of service, kernel, local, proof of concept, memory leak
systems | apple, osx
MD5 | 9d9cd6391d4bfe49cced31cf1f385ad5
Apple MAC OS-X xnu Kernel Overflow
Posted Mar 24, 2009
Authored by mu-b | Site digit-labs.org

Apple Mac OS-X xnu versions 1228.3.13 and below appletalk zip-notify remote kernel overflow proof of concept exploit.

tags | exploit, remote, overflow, kernel, proof of concept
systems | apple, osx
MD5 | 126486d4a0e79d4cd4412641bbcf219a
Mac OS X xnu Root Exploit
Posted Mar 23, 2009
Authored by mu-b | Site digit-labs.org

Apple Mac OS-X with xnu versions 1228.x and below local kernel root exploit.

tags | exploit, kernel, local, root
systems | apple, osx
MD5 | 67933e09877d455565f250b50d6ee252
httprint_macosx_301.zip
Posted Dec 28, 2005
Authored by Saumil Shah | Site net-square.com

httprint is a web server fingerprinting tool. It relies on web server characteristics to accurately identify web servers, despite the fact that they may have been obfuscated by changing the server banner strings, or by plug-ins such as mod_security or servermask. httprint can also be used to detect web enabled devices which do not have a server banner string, such as wireless access points, routers, switches, cable modems, etc. httprint uses text signature strings and it is very easy to add signatures to the signature database. httprint can import web servers from nmap network scans, if they are saved in XML format. The current version adds the ability to save reports in CSV and XML formats, and features a completely new method of scoring by confidence ratings to minimize false positives. This version is the Mac OS-X release.

Changes: New multi-threaded engine. SSL in formation gathering. Automatic SSL port detection. Various bug fixes.
tags | tool, web, scanner
systems | unix, apple, osx
MD5 | 6b188cd60df6eca5409694fa40859f0d
VERITAS-OSX.pl.txt
Posted Oct 30, 2005
Authored by John H. | Site digitalmunition.com

VERITAS Netbackup remote format string exploit for Mac OS-X.

tags | exploit, remote
systems | apple, osx
MD5 | a99cc0cea55e300e8b4870f2a1456aa5
wx-01.tar.gz
Posted Oct 27, 2004
Authored by nemo | Site neil.slampt.net

New Macintosh OS-X rootkit that is roughly based off of adore. It hides itself from kextstat, netstat, utmp and wtmp. Further revisions to include a reverse shell triggered by ARP and DNS packets.

tags | shell
systems | apple, osx
MD5 | 57d1312f1e101f52b9b08e4d557a2f99
osxrk-0.2.1.tbz
Posted Sep 10, 2004
Authored by gapple

MAC OS-X rootkit that has a lot of standard tools included, adds a TCP backdoor via inetd, does data recon, and more.

tags | tool, tcp, rootkit
systems | unix, apple, osx
MD5 | 4d88ce2a44718703f5de06a26c26349a
httprint_macosx_202.zip
Posted May 25, 2004
Authored by Saumil Shah | Site net-square.com

httprint is a web server fingerprinting tool. It relies on web server characteristics to accurately identify web servers, despite the fact that they may have been obfuscated by changing the server banner strings, or by plug-ins such as mod_security or servermask. httprint can also be used to detect web enabled devices which do not have a server banner string, such as wireless access points, routers, switches, cable modems, etc. httprint uses text signature strings and it is very easy to add signatures to the signature database. httprint can import web servers from nmap network scans, if they are saved in XML format. The current version adds the ability to save reports in CSV and XML formats, and features a completely new method of scoring by confidence ratings to minimize false positives. This version is the Mac OS-X release.

Changes: Version 202 has a completely rewritten engine, internally, to increase efficiency and portability across platforms. A minor feature enhancement in version 202 is the ability to automatically follow 301 and 302 redirections.
tags | tool, web, scanner
systems | unix, apple, osx
MD5 | d1ff19c607b8cfe237d2a15bcbfe05b1
macadmin.txt
Posted Mar 19, 2004
Authored by crEp | Site crepinc.com

The admin service on Mac OS-X, which runs on port 660, has a buffer overflow vulnerability.

tags | advisory, overflow
systems | apple, osx
MD5 | 6e0b20cea6a04031757e096e76b4fb42
httprint_macosx_200.zip
Posted Jan 8, 2004
Authored by Saumil Shah | Site net-square.com

httprint is a web server fingerprinting tool. It relies on web server characteristics to accurately identify web servers, despite the fact that they may have been obfuscated by changing the server banner strings, or by plug-ins such as mod_security or servermask. httprint can also be used to detect web enabled devices which do not have a server banner string, such as wireless access points, routers, switches, cable modems, etc. httprint uses text signature strings and it is very easy to add signatures to the signature database. httprint can import web servers from nmap network scans, if they are saved in XML format. The current version adds the ability to save reports in CSV and XML formats, and features a completely new method of scoring by confidence ratings to minimize false positives. This version is the Mac OS-X release.

tags | tool, web, scanner
systems | unix, apple, osx
MD5 | f2339dc65f778912bb9ecb0b8f3fc237
Page 1 of 1
Back1Next

File Archive:

December 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    1 Files
  • 2
    Dec 2nd
    16 Files
  • 3
    Dec 3rd
    17 Files
  • 4
    Dec 4th
    23 Files
  • 5
    Dec 5th
    11 Files
  • 6
    Dec 6th
    9 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close