exploit the possibilities
Showing 1 - 11 of 11 RSS Feed

Files

asciiart-skylined.txt
Posted Aug 4, 2008
Authored by SkyLined

This is a very cool ASCII Art / shellcode hybrid of "SkyLined".

tags | shellcode
MD5 | 891def1be23b2a1c2b4ac6c496deb605

Related Files

Equation Group Data Leak As Of 04/14/2017
Posted Apr 15, 2017

This is a very large archive (500 MB) of all exploits, implants, and more from the Equation Group that has been leaked by the Shadow Brokers as of 04/14/2017. Consider anything inside of this archive hostile and unverified. For research purposes only.

tags | exploit
MD5 | 4a24dd48253aa704cdf371b4346c69de
Comodo Antivirus Forwards Emulated API Calls To Real API
Posted Mar 23, 2016
Authored by Tavis Ormandy, Google Security Research

Comodo Antivirus includes a x86 emulator that is used to unpack and monitor obfuscated executables, this is common practice among antivirus products. The idea is that emulators can run the code safely for a short time, giving the sample enough time to unpack itself or do something that can be profiled. Needless to say, this is a very significant and complicated attack surface, as an attacker can trigger emulation simply by sending the victim an email or getting them to visit a website with zero user interaction. Multiple memory corruption issues have been found with the emulator.

tags | exploit, x86
systems | linux
MD5 | b0d2ff12669de241bd05f2f3090eee5b
SQLmap Cheatsheet 1.0
Posted Jul 28, 2014
Authored by Alejandro Ramos

This is a very thorough cheatsheet for using SQLmap.

tags | paper
MD5 | 7ea687468fba482ff1d7e5126ee353c1
Small Python Backdoor
Posted Jan 21, 2012
Authored by Reflex

This is a very small backdoor written in Python.

tags | tool, rootkit, python
systems | unix
MD5 | abf97854fff55fbaf20ea64011da1522
TCP Fast Scan
Posted Jan 17, 2012
Authored by James Stevenson | Site stev.org

This is a very fast TCP port scanner for Linux that can scan multiple hosts and ports at once.

tags | tool, scanner, tcp
systems | linux, unix
MD5 | b5d0e5e019e3d6a9d81a48d0489ad883
asciiart-julia.txt
Posted Aug 4, 2008
Authored by SkyLined

ASCII Art / shellcode hybrid called "Julia". This shellcode was created using Ars Ex Machina Coda. The shellcode will only work when it is run in writable and executable memory and if ECX points to the base address of the shellcode.

tags | shellcode
MD5 | fff6a982f7a170694d94be43ed1d897b
asciiart-skylined2.txt
Posted Aug 4, 2008
Authored by SkyLined

This is a very cool ASCII Art / shellcode hybrid of "SkyLined".

tags | shellcode
MD5 | 5376dccf4f333f4f5ec7f7574b059ccf
lameSeries60NokiaDoS.pl
Posted Mar 25, 2005
Authored by Q-nix

This is a very simple exploit for a very stupid bug in Nokia/Symbian Series60 bluetooth device-name handling: basically, if your bluetooth device name contains a single newline character, a Nokia Series60 device which sees it will be extremely unhappy and go on strike. The attached "exploit" creates a file with a newline. Which you must then copy to your own device manually. All in only around 60 lines of Perl. However, securityfocus added this "exploit" to their archives, so why shouldn't we add it to ours as well?

tags | exploit, perl
MD5 | 0e93465e98290633c9d072a499afd739
lincrack.c
Posted Apr 20, 2000
Authored by w0rm

This is a very flexible, easy to use password cracker for the Linux/Unix platform. Just specify the dictionary file and the passwd file and your set. It attempts to crack each password in the passwd file using the words from the dictionary file.

tags | cracker
systems | linux, unix
MD5 | 4988dce5e71a1b4fae889ae0c7acce77
alpha_031.zip
Posted Dec 17, 1999
Site rootkit.com

Windows NT rootkit project v0.31 alpha. This build is testing a new technique called EXE Redirection which can hide any trojan from the user. If you open, hash, CRC, or scan the file - you see the original file, but if you execute the file, you get the trojan. This is a very powerful stealth technique. Also, this build sports the ability to hide registry keys and values.

tags | trojan, registry
systems | windows, nt
MD5 | 7224a8c29d36421ba801c7fba8c83a90
bluedisk.zip
Posted Aug 17, 1999

This is a very convincing Blue Screen of Death Screen saver. Send your friends the BSOD (Blue Screen of Death). Thanks Eric. Download at your own risk. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
MD5 | 64ada9d2fb5b7ba261a62e2a095b0028
Page 1 of 1
Back1Next

File Archive:

March 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    15 Files
  • 2
    Mar 2nd
    5 Files
  • 3
    Mar 3rd
    3 Files
  • 4
    Mar 4th
    25 Files
  • 5
    Mar 5th
    20 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    12 Files
  • 9
    Mar 9th
    3 Files
  • 10
    Mar 10th
    4 Files
  • 11
    Mar 11th
    23 Files
  • 12
    Mar 12th
    12 Files
  • 13
    Mar 13th
    12 Files
  • 14
    Mar 14th
    19 Files
  • 15
    Mar 15th
    12 Files
  • 16
    Mar 16th
    3 Files
  • 17
    Mar 17th
    1 Files
  • 18
    Mar 18th
    15 Files
  • 19
    Mar 19th
    1 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close