what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 100 RSS Feed

Files

Hi5 Brute Forcer
Posted Jun 4, 2009
Authored by P47r1ck | Site darkc0de.com

Hi5 brute forcing utility that takes in a wordlist and is written in Python.

tags | cracker, python
SHA-256 | 20cf2a5a5f41c4cfd2d4f019909b942f71a216d787588a10944ce5e0148869dd

Related Files

Hidden Network: Detecting Hidden Networks Created With USB Devices
Posted Jul 13, 2017
Authored by Francisco Jose Ramirez Vicente, Pablo Gonzalez Perez

Whitepaper called Hidden Network: Detecting Hidden Networks created with USB Devices.

tags | paper
SHA-256 | 531441acb57722437bbe94c8f071badc20f04dfa33b34ce9c8812ca8f7b97acc
HideMyAss Pro VPN Client 3.3.0.3 Privilege Escalation
Posted Apr 30, 2017
Authored by Han Sahin

HideMyAss Pro VPN client version 3.3.0.3 for OS X suffers from a helper binary (com.privax.hmaprovpn.helper) local privilege escalation vulnerability.

tags | exploit, local
systems | apple, osx
SHA-256 | 37f5fa5c2d88399f63a027e0edcd1f34ea06dd428dfe8989bd994c0a70a3511e
HideMyAss Pro VPN Client 2.2.7.0 Privilege Escalation
Posted Apr 29, 2017
Authored by Han Sahin

HideMyAss Pro VPN client version 2.2.7.0 for OS X suffers from a helper binary (HMAHelper) local privilege escalation vulnerability.

tags | exploit, local
systems | apple, osx
SHA-256 | afad6aec8c41a7fdc2956fc606d1e979cc75e625296147faf54c0cf49979be05
Hipchat Remote Code Execution
Posted Apr 14, 2017
Authored by Matthew Hart

Hipchat server versions prior to 2.2.3 suffer from a remote code execution vulnerability that can be leveraged via Administrative Imports.

tags | advisory, remote, code execution
advisories | CVE-2017-7357
SHA-256 | 607fef099ad5faf68b7433b02457043b6d6c288f2e724d183ad5b65fb66f406b
Atlassian HipChat Secret Key Disclosure
Posted Oct 6, 2016
Authored by David Black

The Atlassian HipChat plugin for various products leaks the secret key it uses to communicate with a linked HipChat instance.

tags | advisory, info disclosure
advisories | CVE-2016-6668
SHA-256 | 345b646185427493eb236fd026b44691cfbcfec6cebe1f1fb55177bfcea28fd7
Hide.Me VPN Client 1.2.4 Privilege Escalation
Posted Jul 8, 2016
Authored by sh4d0wman

Hide.Me VPN Client version 1.2.4 suffers from a privilege escalation vulnerability.

tags | exploit
SHA-256 | 57be48e680d74269a402aa4cf588cfe094e17c65e7a82064ae466458a88fac1b
Hipchat Server Remote Code Execution / File Read / SSRF
Posted May 14, 2016
Authored by David Black

HipChat Server versions below 2.0 build 1.4.1 suffer from vulnerabilities including code execution, insufficient shell characters, file deletion, file moving, local file read, and Server-Side Request Forgery.

tags | advisory, shell, local, vulnerability, code execution
SHA-256 | 51f7ff56cb32406c73d6232aee84e2cf2951d8dbfedaba6c3b94f1aa3ec2d083
Hikvision DS-7108HWI-SH XML Injection / Abuse Issues
Posted May 21, 2015
Authored by MustLive

Hikvision DS-7108HWI-SH suffers from XML injection and abuse control vulnerabilities.

tags | exploit, vulnerability, xxe
SHA-256 | d1bb4634146fdef0c8b2ec9946f0fa8374acbf0fa0d2991358c04ebba364be68
Hikvision DS-2CD2012-I XML Injection / Abuse Issues
Posted May 15, 2015
Authored by MustLive

Hikvision DS-2CD2012-I suffers from XML injection and abuse control vulnerabilities.

tags | exploit, vulnerability, xxe
SHA-256 | 1c2e78e7ec0327818de05824e547cf8af2af3fb0717a7ae08f9503728cc5fa9f
Hippo CMS 7.9.7 Enterprise Edition CRLF Injection
Posted Apr 10, 2015
Authored by Provensec

Hippo CMS version 7.9.7 Enterprise Edition suffers from a CRLF header injection vulnerability.

tags | exploit
SHA-256 | 2fb4fa85ea66e995db6ab55d0538b5311601d0e89367a86fc0e5f6c567ccbaa7
Hikvision DS-7204HWI-SH Brute Force
Posted Mar 1, 2015
Authored by MustLive

Hikvision DS-7204HWI-SH suffers from abuse of functionality and brute force vulnerabilities.

tags | advisory, vulnerability
SHA-256 | 46a44e8b3bbd205d125500849fbb79671f633e32429ba836a0be68ee55f0de16
HikaShop 2.3.3 Local File Inclusion
Posted Jan 5, 2015
Authored by HauntIT

This Metasploit module exploits a local file inclusion vulnerability in HikaShop version 2.3.3.

tags | exploit, local, file inclusion
SHA-256 | 330887e904358c968e0c5a9618e1a6ad9b321fb038a0dd04d60338680d8879b0
Hikvision DVR RTSP Request Remote Code Execution
Posted Nov 20, 2014
Authored by Mark Schloesser | Site metasploit.com

This Metasploit module exploits a buffer overflow in the RTSP request parsing code of Hikvision DVR appliances. The Hikvision DVR devices record video feeds of surveillance cameras and offer remote administration and playback of recorded footage. The vulnerability is present in several models / firmware versions but due to the available test device this module only supports the DS-7204 model.

tags | exploit, remote, overflow
advisories | CVE-2014-4880
SHA-256 | 6b2b9a85fb38d16071b6b342c045ffee4f7eec319cde44c45f5692a33a084002
High Performance Computer Architecture And Security
Posted Jul 1, 2014
Authored by Antoine Vincent Jebara

This whitepaper is an introduction to security in high performance computer architecture.

tags | paper
SHA-256 | 4337cb70d614e077a9820aee114c0aa3a101b1836901fcfc7b8811d90e34b6df
Hiox Guest Book 5.0 Cross Site Scripting
Posted Jan 5, 2014
Authored by JoKeR_StEx

Hiox Guest Book version 5.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 7d3cf1111c33a481e8bf5055f4fb2f89af8fa2389636226574df3f4d7f5ba67a
Burp Suite Pro Real-Life Tips And Tricks
Posted Jun 23, 2013
Authored by Nicolas Gregoire

These are the presentation slides given at Hack in Paris 2013 giving tips and tricks for using Burp Suite Pro.

tags | paper
SHA-256 | 6eb93e4f370bae913fe79dd342c4f800b20b1c02177cbc5a77b10acdf66ce7e3
Hindi Browser 1.2 Denial Of Service
Posted Jun 1, 2013
Authored by Nikhalesh Singh Bhadoria

Hindi browser version 1.0 remote crash exploit.

tags | exploit, remote, denial of service
SHA-256 | 54eb52bf78034abac4de64902bbf8a20618f3f01cc39821133532bc33733e6fa
HighMax SQL Injection
Posted Aug 31, 2012
Authored by C0dex

HighMax suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 4c5fb7df57b60277eb391d5bd9b959b8381e98d684f88b6b99e2046878b2b446
Hi-Media SQL Injection
Posted Jun 29, 2012
Authored by Mr.XpR

Hi-media suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 17ee62de993a1e79a03aca02af14eae5006cd8b1e1305748e7941e113e0187e0
Hirakee SQL Injection
Posted Jun 20, 2012
Authored by Taurus Omar

Sites designed by Hirakee suffer from remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | ef9fedaafee10295598db990c383926b58c8c23690691aee0035c0b62c2d20b7
Hire Ground SQL Injection
Posted Feb 8, 2012
Authored by Th4 MasK

Hire Ground Software suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | ab95d03af887b50d6fe32da8300465a5b7a9e6f776b042723d5f45bf3df7cfe8
HideMAC 1.2
Posted Dec 3, 2011
Authored by infodox | Site compsoc.nuigalway.ie

A MAC changing utility that uses both ifconfig and GNU-Macchanger (checks if mac changer exists, if not, uses ifconfig) to spoof ones MAC with a totally random value. Written in Python.

tags | tool, spoof, python
systems | unix
SHA-256 | be6130bf64c1b4bd8dff08738fd95e00e2600a3558797364ad485593266a1157
Hillstone Software HS TFTP Server Denial Of Service
Posted Dec 2, 2011
Authored by Prabhu S Angadi | Site secpod.com

Hillstone Software HS TFTP Server suffers from a denial of service vulnerability. Proof of concept exploit included. The vulnerability is caused due to improper validation of a WRITE/READ request parameter containing a long file name, which allows remote attackers to crash the service.

tags | exploit, remote, denial of service, proof of concept
SHA-256 | d85fb6660f78e545641e6b84a78b3e08561fe20866b6f07c082c038e3d26fced
HighCMS Overflow
Posted Oct 30, 2011
Authored by BHG Security Center

HighCMS suffers from an overflow vulnerability when handling the pageid variable.

tags | exploit, overflow
SHA-256 | 93744a6c8c3f2e97056286c6fb6d441ee2dd84ef4497dc29022027a1079223e9
Imperva's Web Application Attack Report July 2011
Posted Jul 27, 2011
Authored by Imperva | Site imperva.com

As a part of its ongoing Hacker Intelligence Initiative, Imperva's Application Defense Center (ADC) observed and categorized attacks across 30 applications as well as onion router (TOR) traffic, monitoring more than 10 million individual attacks targeted at web applications over a period of six months. This report discusses and analyzes their findings.

tags | paper, web
SHA-256 | d8446dc2813a8f3f673ae8f51f4af9ade74f8848efa267da16853c3e1e98f85f
Page 2 of 4
Back1234Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    6 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close