what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 91 RSS Feed

Files

macOS Dirty Cow Arbitrary File Write Local Privilege Escalation
Posted Feb 3, 2023
Authored by timwr, Ian Beer, Zhuowei Zhang | Site metasploit.com

Dirty Cow arbitrary file write local privilege escalation exploit for macOS.

tags | exploit, arbitrary, local
advisories | CVE-2022-46689
SHA-256 | 2c735a5dbdfd48004da2df38d8a8eed0528ab5199ff9cd6dbf70e890c7786c0c

Related Files

MAC 1200R Directory Traversal
Posted Apr 10, 2023
Authored by Chunlei Shang

MAC 1200R suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
advisories | CVE-2021-27825
SHA-256 | cc4a576cc94005c55249f862b11f21f974110400ba2bffb27f5d3d1d6e367c9e
macOS/x64 Execve Caesar Cipher String Null-Free Shellcode
Posted Dec 22, 2022
Authored by Bobby Cooke

286 bytes small macOS/x64 execve Caesar cipher string null-free shellcode.

tags | shellcode
SHA-256 | aa23ac4a240ae6871b72d0723b1c8d4ebded5889ad862b0dd0455f86699c05a2
macOS/x64 Execve Null-Free Shellcode
Posted Dec 22, 2022
Authored by Bobby Cooke

253 bytes small macOS/x64 execve null-free shellcode.

tags | shellcode
SHA-256 | 8b589116ca43d93bd39b3f0f87c1530ec372e055ebb8ddff6b021bf288966dd7
macOS 12.3.1 Local Root
Posted Oct 10, 2022
Authored by zhuowei | Site worthdoingbadly.com

This is a write up demonstrating how to get root on macOS 12.3.1 using CoreTrust and DriverKit bugs. Included is the spawn_root proof of concept.

tags | exploit, root, proof of concept
advisories | CVE-2022-26763, CVE-2022-26766
SHA-256 | 42264f6011010d1ea9305f22c2f23628b9337624b236c163e1a40b0e1273560f
Macro Expert 4.7 Unquoted Service Path
Posted Oct 20, 2021
Authored by Mert Das

Macro Expert version 4.7 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | c53ffdacaf887c5e3bbef8ab750fa2e27d1f78ad6d36aff867e3b82dc9cf39c8
Macaron Notes Great Notebook 5.5 Denial Of Service
Posted Jun 4, 2021
Authored by Geovanni Ruiz

Macaron Notes Great Notebook version 5.5 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 31ccde6221360dbafc15dda8126d446f89e959a6e39be1cc7b545e20b88e775f
MacPaw Encrypto 1.0.1 Unquoted Service Path
Posted Mar 22, 2021
Authored by Ismael Nava

MacPaw Encrypto version 1.0.1 suffers from an unquoted service path vulnerability.

tags | exploit
SHA-256 | b5d2d4e435e62adf8936f495f49c69e8a6aa8eb98356b07592b0ca5c404d687c
Macally WIFISD2-2A82 2.000.010 Privilege Escalation
Posted Dec 14, 2020
Authored by Maximilian Barz, Daniel Schwendner

Macally WIFISD2-2A82 version 2.000.010 guest to root privilege escalation exploit.

tags | exploit, root
advisories | CVE-2020-29669
SHA-256 | d03bcf3ef8c984733b8fb9a20ee042058114eff5ee0f50b675d80934f83db097
Machosec 1.0
Posted Nov 16, 2020
Authored by cenobyte

Machosec is a script that checks the security of Mach-O 64-bit executables and application bundles for dyld injection vulnerabilities, LC_RPATH vulnerabilities leading to dyld injection, symlinks pointing to attacker controlled locations, writable by others vulnerabilities, missing stack canaries, disabled PIE (ASLR), and disabled FORTIFY_SOURCE (keeping insecure functions such as strcpy, memcpy etc.).

tags | tool, vulnerability
systems | unix
SHA-256 | 70ca6a3df8488e0268a0db7c2449c2bc9eb3212694506ee5ada98c1deea6a708
macOS 18.7.0 Kernel Local Privilege Escalation
Posted Sep 19, 2019
Authored by A2nkF

macOS version 18.7.0 kernel local privilege escalation exploit that may only work on Macs before 2016.

tags | exploit, kernel, local
SHA-256 | 155c9a77ec71b17b990c29985941fcaf6377273a4a6c13c89f06514c39c675a7
MacOS X 10.14.5 Gatekeeper Bypass
Posted May 27, 2019
Authored by Filippo Cavallarin

MacOS X versions 10.14.5 and below suffer from a Gatekeeper bypass vulnerability.

tags | exploit, bypass
SHA-256 | 76e6187e250514c50b8fb1fa0a230303592e3a59928db823711053d46ba942c4
macOS TCP/4444 Bind Shell Null Free Shellcode
Posted Feb 18, 2019
Authored by Ken Kitahara

123 bytes small macOS TCP/4444 /bin/sh binding null free shellcode.

tags | tcp, shellcode
SHA-256 | 2ae279dcca014cf3fb5d2a1caa2873885ccfdbaea4d0012dccab31d215c3a810
macOS execve(/bin/sh) Null Free Shellcode
Posted Feb 18, 2019
Authored by Ken Kitahara

31 bytes small macOS execve(/bin/sh) null free shellcode.

tags | shellcode
SHA-256 | 020c83d8d534ce8b9582c5dc0959895b312347181b8dc1d0fea9d37d1498fc43
macOS TCP Port 4444 IPv6 Shellcode
Posted Feb 18, 2019
Authored by Ken Kitahara

129 bytes small macOS TCP/4444 binding IPv6 shellcode.

tags | tcp, shellcode
SHA-256 | d10f577bae02e2cd55160cc316fbbb711090e08106dd836f13a6c650be8fa06b
macOS Reverse TCP Port 4444 IPv6 Shellcode
Posted Feb 18, 2019
Authored by Ken Kitahara

119 bytes small macOS reverse shell (::1:4444/TCP) shellcode.

tags | shell, tcp, shellcode
SHA-256 | 787a14793cff4d048c9818a48103f97dbbf55a2d563e4bef9c5ca8ad60c80f67
macOS 127.0.0.1:4444 Reverse Shell Shellcode
Posted Feb 18, 2019
Authored by Ken Kitahara

103 bytes small macOS reverse (127.0.0.1:4444/TCP) shell (/bin/sh) with null-free shellcode.

tags | shell, tcp, shellcode
SHA-256 | e89d3dff82fffaa0aedbffbbabd2f271bbd438e43b6d9f3057b7868ba4bf95d9
macOS 10.13 workq_kernreturn Denial Of Service
Posted Nov 20, 2018
Authored by Fabiano Anemone

macOS version 10.13 workq_kernreturn denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
SHA-256 | c0d719627a62bd9c9a802343bdd5548be3f38127a565a13b3f7be80e85fae7ca
Apple macOS 10.13.4 Denial Of Service
Posted Sep 12, 2018
Authored by Sriram

Apple macOS version 10.13.4 denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
systems | apple
advisories | CVE-2018-4240
SHA-256 | 190b5816b1b98ed6e8554ca59ef9a677abf88d11217687659e80a0c7584dab6f
Machine Learning - Learning Cybersecurity
Posted Aug 10, 2018
Authored by Akash Sarode

Whitepaper called Machine Learning - Learning Cybersecurity.

tags | paper
SHA-256 | 80ab2d27c57df335948cf2475c2f2b380fa6654de6e16605d2716820f2744441
MACCMS 10 Cross Site Request Forgery
Posted Jun 13, 2018
Authored by bay0net

MACCMS version 10 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
advisories | CVE-2018-12114
SHA-256 | 6b7622a4509a98cac5c8e1df293fffe6c6b8f2633f9a3498af2d6b03e637ddfa
Apple macOS IOHIDSystem Kernel Read/Write
Posted Jan 2, 2018
Authored by Siguza

This is a macOS kernel exploit based on an IOHIDFamily vulnerability.

tags | exploit, kernel
SHA-256 | 6ea69ef80ff70cebf65157f4be408a355f3ccb59f4cdf7875c0601be00b560f1
Apple macOS 10.13.1 High Sierra Cron Privilege Escalation
Posted Dec 7, 2017
Authored by Mark Wadham

Apple macOS version 10.13.1 (High Sierra) suffers from a cron related local privilege escalation vulnerability that allows you to gain root privileges.

tags | exploit, local, root
systems | apple
SHA-256 | fbe2d99d3b7ef8fd7877306d5456d2c15f9aac738eb9b0ae46533c5eed03251a
Macro Pack 1.1
Posted Oct 13, 2017
Authored by Emeric Nasi | Site github.com

macro_pack is a tool used to automate obfuscation and generation of MS Office documents for penetration testing, demo, and social engineering assessments. The goal of macro_pack is to simplify bypassing anti-malware solutions and automate the process from vba generation to final Office document generation.

tags | tool
SHA-256 | c5edcba25cf4be512a120d75fc22584e2d4ff925ce78cd23d96e4c714d629695
Apple MacOS Disk Arbitration Daemon Race Condition
Posted Jun 9, 2017
Authored by phoenhex

Apple MacOS disk arbitration daemon race condition exploit.

tags | exploit
systems | apple
advisories | CVE-2017-2533
SHA-256 | 5e822f89be908a76378c56e9215de59cc184f0164ff3f531107ef63a5defc99b
Macro Expert 4.0 Privilege Escalation
Posted Sep 26, 2016
Authored by Tulpa

Macro Expert version 4.0 suffers from multiple privilege escalation vulnerabilities.

tags | exploit, vulnerability
SHA-256 | a58d108f27dbbcb9826ab807cde340349804f0af2171e8dbf29a67e963befa29
Page 1 of 4
Back1234Next

File Archive:

June 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    18 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    0 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close