exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 76 RSS Feed

Files

frame-pointer-overwrite-linux.txt
Posted Nov 29, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Whitepaper entitled Frame Pointer Overwrite Demonstration [LINUX].

tags | paper
systems | linux
SHA-256 | 48ec50a815d6f4578f50c4fe6f040b3db9d46a1b0033540beaac9b8253b52617

Related Files

Framer Preview 12 Content Injection
Posted Sep 22, 2020
Authored by Julien Ahrens | Site rcesecurity.com

Framer Preview version 12 for Android exposes an activity to other apps called "com.framer.viewer.FramerViewActivity". The purpose of this activity is to show contents of a given URL via an fullscreen overlay to the app user. However, the app does neither enforce any authorization schema on the activity nor does it validate the given URL.

tags | advisory
advisories | CVE-2020-25203
SHA-256 | e54f0aa32e54c06b14955e19264b2f743bd0ebfed0a629f5cc6a8d1038c27426
HackBack - A DIY Guide For Those Without The Patience To Wait For Whistleblowers
Posted Apr 26, 2017
Authored by Phineas Fisher

Whitepaper entitled HackBack - A DIY Guide for those without the patience to wait for whistleblowers.

tags | paper
SHA-256 | 8a4bf253d346e6edb5debbc3d0af1853e0c2c708d9b3c1a2b28a8685f580d674
HackBack - A DIY Guide, Spanish Version
Posted Apr 26, 2017
Authored by Phineas Fisher

Whitepaper entitled HackBack - A DIY Guide. Written in Spanish.

tags | paper
SHA-256 | cd9224d9caca3f6b88269980123d5374486f1353fbc9efb50253557b2a53a6c0
HackBack - A DIY Guide
Posted Apr 26, 2017
Authored by Phineas Fisher

Whitepaper entitled HackBack - A DIY Guide.

tags | paper
SHA-256 | 13106443a0101118a7a673f7eab1962e92e195d9d493092b209fc627e5dc9db6
Metasploit Framework 4.4
Posted Jul 17, 2012
Authored by H D Moore | Site metasploit.com

The Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. Metasploit is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perform regression testing, and security researchers world-wide. The framework is written in the Ruby programming language and includes components written in C and assembler.

Changes: 101 modules have been added. Meterpreter has been modernized. Various other improvements.
tags | tool, ruby
systems | unix
SHA-256 | ddcc7890a394d8154120a163c90b11119a0322b62d937ad1a3a14ef3fe6cf74e
FrameJammer Cross Site Scripting
Posted Feb 27, 2012
Authored by Hal Pawluk

FrameJammer suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 00a720e6b83a0b98c343e3f39629a71a7b9c6092bf3f5d32491ad135d4236f3a
Metasploit Framework 4.0.0
Posted Aug 2, 2011
Authored by H D Moore | Site metasploit.com

The Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. Metasploit is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perform regression testing, and security researchers world-wide. The framework is written in the Ruby programming language and includes components written in C and assembler.

Changes: Ships with 716 exploit modules, 361 auxiliary modules, and 68 post modules. 20 new exploits, 3 new auxiliary modules, and 14 new post modules have been added since the last release.
tags | tool, ruby
systems | unix
SHA-256 | 45c3c379ea82e46d8efef9cbbe0afa8ae8df98e50f2642afcea84a86c83c5a50
Frame-Oshop SQL Injection
Posted May 15, 2011
Authored by SmoG

Frame-Oshop suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | e5e6c29ea045432ad5571a6978aa271ee56254dfa2c0de21dbffb97f733bcd80
Metasploit Framework 3.6.0
Posted Mar 7, 2011
Authored by H D Moore | Site metasploit.com

The Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. Metasploit is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perform regression testing, and security researchers world-wide. The framework is written in the Ruby programming language and includes components written in C and assembler.

Changes: This release adds 15 new exploits for a total of 64 new modules since version 3.5.1. Includes Post Exploitation modules that provide local exploits and additional data gathering capabilities.
tags | tool, ruby
systems | unix
SHA-256 | a113cf9e1a499377807990e506acad83afee18845a148a02747087132fac39a7
Metasploit Framework 3.4.1
Posted Jul 13, 2010
Authored by H D Moore | Site metasploit.com

The Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. Metasploit is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perform regression testing, and security researchers world-wide. The framework is written in the Ruby programming language and includes components written in C and assembler.

Changes: This release has 16 new exploits, 22 new auxiliary modules and 11 new Meterpreter scripts for your pwning enjoyment.
tags | tool, ruby
systems | unix
SHA-256 | 91b37bb46a31498479681c1fc1b8d0762cdbe4f71c3e41d245de0bb57eb4f2f7
Metasploit Framework 3.4.0
Posted May 20, 2010
Authored by H D Moore | Site metasploit.com

The Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. Metasploit is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perform regression testing, and security researchers world-wide. The framework is written in the Ruby programming language and includes components written in C and assembler.

Changes: This release includes massive improvements to the Meterpreter payload; both in terms of stability and features, thanks in large part to Stephen Fewer of Harmony Security. The Meterpreter payload can now capture screenshots without migrating, including the ability to bypass Session 0 Isolation on newer Windows operating systems. This release now supports the ability to migrate back and forth between 32-bit and 64-bit processes on a compromised Windows 64-bit operating system. The Meterpreter protocol now supports inline compression using zlib, resulting in faster transfers of large data blocks. A new command, "getsystem", uses several techniques to gain system access from a low-privileged or administrator-level session, including the exploitation of Tavis Ormandy\'s KiTrap0D vulnerability. Brett Blackham contributed a patch to compress screenshots on the server side in JPG format, reducing the overhead of the screen capture command. The pivoting backend of Meterpreter now supports bi-directional UDP and TCP relays, a big upgrade from the outgoing-only TCP pivoting capabilities of version 3.3.3.
tags | tool, ruby
systems | unix
SHA-256 | da734592a7192747fd66c05459d27daeb3e49aea92dd5dadc3305a6b8ee081e8
Frame Mode Multiprotocol Label Switching (MPLS) Cheatsheet
Posted Mar 12, 2010
Authored by Jeremy Stretch | Site packetlife.net

Frame Mode Multiprotocol Label Switching (MPLS) cheatsheet. Version 2.0.

tags | paper
SHA-256 | db51bb249e9f3b505da0d9cea60fadf68d7bdd458ea742c656d73a287718b8bb
Metasploit Framework 3.3.3
Posted Dec 23, 2009
Authored by H D Moore | Site metasploit.com

The Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. Metasploit is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perform regression testing, and security researchers world-wide. The framework is written in the Ruby programming language and includes components written in C and assembler.

Changes: All exploits now contain a ranking that indicates how dangerous the default settings are to the target host. The search command now takes a -r option to specify a minimum ranking of modules to return. Various other improvements and additions.
tags | tool, ruby
systems | unix
SHA-256 | a650778f7946a7f113acd716023978fd94f01325e9a4cf6342fb00ba3f6a2c0b
Metasploit Framework 3.3.2
Posted Dec 10, 2009
Authored by H D Moore | Site metasploit.com

The Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. Metasploit is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perform regression testing, and security researchers world-wide. The framework is written in the Ruby programming language and includes components written in C and assembler.

Changes: Metasploit now has 463 exploit modules and 219 auxiliary modules (from 453 and 218 respectively in v3.3.1). Tons of fixes and improvements have been made.
tags | tool, ruby
systems | unix
SHA-256 | d9c8449f489efcce2ae006e4ed806ce911cb7fc671593232151ba25f8b098095
Metasploit Framework 3.3.1
Posted Dec 7, 2009
Authored by H D Moore | Site metasploit.com

The Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. Metasploit is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perform regression testing, and security researchers world-wide. The framework is written in the Ruby programming language and includes components written in C and assembler.

Changes: This release provides initial integration with Rapid7 NeXpose and fixes approximately 25 bugs. The Windows installer now bundles Nmap 5.10BETA1.
tags | tool, ruby
systems | unix
SHA-256 | 1c1f09545a58773c8a81cfab7351894a473484fa9530ddbc87125bf703ff941d
Metasploit Framework 3.3
Posted Nov 18, 2009
Authored by H D Moore | Site metasploit.com

The Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. Metasploit is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perform regression testing, and security researchers world-wide. The framework is written in the Ruby programming language and includes components written in C and assembler.

Changes: 446 exploits, 216 auxiliary modules, and hundreds of payloads, including an in-memory VNC service and the Meterpreter. In addition, the Windows payloads now support NX, DEP, IPv6, and the Windows 7 platform. More than 180 bugs were fixed.
tags | tool, ruby
systems | unix
SHA-256 | 226f724ffb5915c8522fcf87ca2f9e787d31c1855dadf80953485f661ea314df
Whitepaper - Short Review Of Modern Vulnerability Research
Posted Jan 12, 2009
Authored by Michal Bucko | Site eleytt.com

Whitepaper entitled Short Review Of Modern Vulnerability Research.

tags | paper
SHA-256 | 50f3d7b703ae7599064134dd9771cdf630e1cfeb90294a067782e794b36e361e
fsharp-reverse.pdf
Posted Dec 3, 2008
Authored by Aodrulez | Site aodrulez.blogspot.com

Whitepaper entitled Reverse Engineering Microsoft F#.

tags | paper
SHA-256 | 4edaef63057c44d9b10082e158d32fd91f25f4a3c1b2b8aa6710a53a6e1909a0
format-string-linux.txt
Posted Nov 29, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Whitepaper entitled Format String Exploitation Demonstration [LINUX].

tags | paper
systems | linux
SHA-256 | 915519f063cd8236fa2caaa14c2c8889ec51bdd79b0d0f3cd8fe31c44d60ccd5
java2-malware.pdf
Posted Nov 20, 2008
Authored by Aodrulez | Site aodrulez.blogspot.com

Whitepaper entitled Java 2 Micro Edition (J2ME or Java ME) Based Computer Malware Propagation Technique.

tags | paper, java
SHA-256 | 33dd9cf75d17e73d0b9c873025e3dd464002ef35b74dc38578987a00ee29000d
framework-3.2.tar.gz
Posted Nov 19, 2008
Authored by H D Moore | Site metasploit.com

The Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. Metasploit is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perform regression testing, and security researchers world-wide. The framework is written in the Ruby programming language and includes components written in C and assembler.

Changes: Version 3.2 includes exploit modules for recent Microsoft flaws, such as MS08-041, MS08-053, MS08-059, MS08-067, MS08-068, and many more. The module format has been changed in version 3.2. The Byakugan WinDBG extension developed by Pusscat has been integrated with this release, enabling exploit developers to quickly exploit new vulnerabilities using the best Win32 debugger available today. Tons of other improvements and additions.
tags | tool, ruby
systems | unix
SHA-256 | fc9366a2ab01924e91575352889970e57a551e087c78b5d1dd4287aaf2136a04
exploration.pdf
Posted Nov 12, 2008
Authored by Xylitol | Site xylitol.free.fr

Whitepaper entitled Exploration In The Cross Territory, a follow up paper to the Cross Site Scripting - Attack and Defense Guide.

tags | paper, xss
SHA-256 | 22261dd7d0353e4a08f864b8638db726e06e08be483dedd672758a6b6ec89362
domain-traversal.pdf
Posted Nov 9, 2008
Authored by hkm

Whitepaper entitled Using Parent Domain Traversal In Drive By Attacks.

tags | paper, file inclusion
SHA-256 | d4d787c3d1f2cecfefafa05d2971a62b461e882fb8960cf9235ced39cfdd1187
file_sharing_security.pdf
Posted Nov 8, 2008
Authored by Francis Corella | Site pomcor.com

Whitepaper entitled Protecting A Web Application Against Attacks Through HTML Shared Files.

tags | paper, web
SHA-256 | a332ffa53a93ffea3c43a63213809c1bc705467514a6098021161dd8468c04fb
banking-flaws.pdf
Posted Nov 4, 2008
Authored by webDEViL

Whitepaper entitled Internet Banking Flaws In India.

tags | paper
SHA-256 | 5403ce64147576e2b9225daa755cef18daa6b1ff8d992b74520e6ce3ce3df920
Page 1 of 4
Back1234Next

File Archive:

October 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    10 Files
  • 2
    Oct 2nd
    0 Files
  • 3
    Oct 3rd
    12 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    18 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close