exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 100 RSS Feed

Files

Hi5 Brute Forcer
Posted Jun 4, 2009
Authored by P47r1ck | Site darkc0de.com

Hi5 brute forcing utility that takes in a wordlist and is written in Python.

tags | cracker, python
SHA-256 | 20cf2a5a5f41c4cfd2d4f019909b942f71a216d787588a10944ce5e0148869dd

Related Files

Hacking IPv6 Networks
Posted Jul 26, 2011
Authored by Fernando Gont

This file contains slides for the "Hacking IPv6 Networks" training provided at Hack in Paris 2011. They contain quite a few insights about IPv6 security, along with a number of practical examples.

tags | paper
SHA-256 | 0af18cc2f54ae7ea48274dedc1287d62ed07d9b755e212983a06fd390b67eb47
Hi5.com XSS / XSRF / URL Redirection / Lack Of Encryption
Posted May 1, 2011
Authored by Eduardo Garcia Melia

Hi5.com suffers from cross site request forgery, cross site scripting, url redirection, and lack of encryption vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 5341cd0b5d885d93d4a845b388d571fffd33d4f574f0983f3df591be3e2c4bb7
Hiding Data Inside The Padding Area In Files And Packets
Posted Sep 13, 2010
Authored by Fady Mohamed Osman

Whitepaper called Hiding Data Inside the Padding Area in Files and Packets.

tags | paper
SHA-256 | 819645d52b63d793d6d0509595914620f52291f7cfda89efb56aad13d26ca5a0
Hinnendahl.com Gaestebuch 1.2 Remote File Inclusion
Posted Aug 27, 2010
Authored by bd0rk

Hinnendahl.com Gaestebuch version 1.2 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 753a16c21cf462ee367332422953a0909aae6ec64af5922e9601b62b4b8d6e59
HigherSites Local File Inclusion
Posted Jun 16, 2010
Authored by R3VAN_BASTARD

HigherSites suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | f05c758ca2e08f14fcad73bf4b9fcfc55a2583bb677187195632be412155b720
High Frequency System Beep Shellcode
Posted Jun 2, 2010
Authored by gunslinger | Site gunslingerc0de.wordpress.com

53 bytes small high frequency system beep Linux/x86 shellcode.

tags | x86, shellcode
systems | linux
SHA-256 | 5cb9d08717e2ebc911b7b20718905ecab7d9d8f7f037b131c8d504b1286b7c66
Hipergate 4.0.12 SQL Injection
Posted Feb 4, 2010
Authored by N. Grisolia

Hipergate version 4.0.12 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 49a96a235936a4f16057a684a9347f2409a1210c041bdc48c5a1289866909cb2
Hipergate 4.0.12 Reflected Cross Site Scripting
Posted Feb 4, 2010
Authored by N. Grisolia

Hipergate version 4.0.12 suffers from a reflected cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 30dd84617d9ce84b3d41f5b1bc3e2e303150d39f552af503d88c9a54d11e5534
Hipergate 4.0.12 Permanent Cross Site Scripting
Posted Feb 4, 2010
Authored by N. Grisolia

Hipergate version 4.0.12 suffers from a permanent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | d2657460d81351d1806058b7d53de8269f9a28bcad275f33c70a5ebd5c9954e3
Hippolyte Inactive Account Hijacker
Posted Sep 30, 2009
Authored by l0om | Site excluded.org

Hippolyte is a shell script that automates the checking of inactive account hijacking possibilities for accounts that may be used elsewhere for access (ie. Amazon, etc).

tags | shell, cracker
SHA-256 | 1c0cc2c62ba866eb985107f9934f171a08c1a9c308b03ebae41c7f1d8555a69e
Whitepaper - Hijacking LKM's Event Handler
Posted May 5, 2009
Authored by suN8Hclf | Site dark-coders.pl

Whitepaper called Hijacking LKM's Event Handler.

tags | paper
SHA-256 | 5de006873af26f6b85747e8bd6a96255dcc59d5f69d78b953dd595ef34460bd2
hiox-star-rfi.txt
Posted Jul 31, 2008
Authored by Ghost Hacker | Site real-hack.net

HIOX Star Rating System version 1.0 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
SHA-256 | 3274fd3b30d82aaad5f8df9bf4963443df13b22d29f2dcb7e52b8b524a06cc90
hiox-browser-rfi.txt
Posted Jul 31, 2008
Authored by Ghost Hacker | Site real-hack.net

HIOX Browser Statistics version 2.0 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
SHA-256 | 719f28fd0678e09abdae02771977020313e978db6f70873d7cd0d723619292f1
hiox-browseradd.txt
Posted Jul 31, 2008
Authored by Stack | Site v4-team.com

HIOX Browser Statistics version 2.0 add arbitrary administrative user exploit.

tags | exploit, arbitrary
SHA-256 | ca7461517554fb90d804f8d1c90ff8281324f74a2154060d9cf3ffc8c728621c
hiox-addadmin.txt
Posted Jul 31, 2008
Authored by Stack | Site v4-team.com

HIOX Random Ad version 1.3 add arbitrary administrative user exploit.

tags | exploit, arbitrary, add administrator
SHA-256 | e1db9be7bbfd94bc3cd9f3137da92357b0937b65c0ce7769cedf9e5aa0d5f0ad
hifriend-xploit.txt
Posted Jul 21, 2008
Site DarK-CodeZ.com

hifriend.pl from Hibyte Software remote header injection exploit.

tags | exploit, remote
SHA-256 | 7c0b473aaa795399a43d6e49fd976e10b8dbbfdfbe765865e2a1c172afc1fc11
hidattack01.tar.gz
Posted Jan 5, 2007
Authored by Collin R. Mulliner | Site mulliner.org

This tool is a utility for attacking HID servers.

tags | tool, wireless
SHA-256 | 8387fbfcc57a9ee8b2b18d7490fcace034b6a0a507b218f4b2a69cd0fd173e81
Highwall-ids.txt
Posted Oct 21, 2006
Authored by ptsecurity

Highwall Enterprise and Highwall Endpoint wireless IDS management interface contain multiple vulnerabilities which can lead to privilege escalation and code execution.

tags | advisory, vulnerability, code execution
SHA-256 | 104af84b88d66190c16142880c76ba81765558cf0f8d6a9b89f3c81eacec3f1d
hi5.txt
Posted Jun 21, 2006
Authored by Luny

hi5.com appears vulnerable to cross site scripting attacks.

tags | exploit, xss
SHA-256 | e105fd167537337848f3babcc5b2d5c02f247596b741b4ce7e62584e723352eb
hiox.txt
Posted May 23, 2006
Authored by Luny

Hiox Guestbook version 3.1 is susceptible to cross site scripting attacks.

tags | advisory, xss
SHA-256 | eae719f87c78f869aed330033b27a9ee6edf9f5041be2a6aeb095d04cafeb17a
HijackArt.txt
Posted Apr 28, 2006
Authored by AdityaSood

Defacing The Art Of Hijacking Spamming And EMail Viruses - A paper analyzing the methodology of hijacking a users web browser focusing mainly on Internet Explorer.

tags | advisory, web
SHA-256 | a19d8c74cf6da99ca80f6b3a1494254c3e49702f0a7e4c81583dd174eeb52bf6
HijackHeadSet.txt
Posted Sep 24, 2005
Authored by Kevin Finisterre | Site digitalmunition.com

Small write up entitled "Hijacking Bluetooth Headsets for Fun and Profit".

tags | paper
SHA-256 | 77323c05bbb2580095063a300d007938e1bc5d61ac068734b800ab7a87e42caf
hide_lkm.tgz
Posted Jun 24, 2005
Authored by indiasec, Pratap P V | Site indiasec.com

Tool to manipulate /dev/kmem (kernel memory) to completely hide LKMs. Tested on 2.4.x.

tags | kernel
SHA-256 | afad67bd1962d78e3fc466bb2136fbfb5d512592976a66548ebc68a60de238b3
highlight.txt
Posted Mar 22, 2005
Authored by NT | Site ihsteam.com

RUNCMS version 1.1A is susceptible to a file inclusion vulnerability.

tags | exploit, file inclusion
SHA-256 | fec522d818bddde8f0ed43e3e7d05a87589be35f4652c817945938163449ec81
hijack_apache-0.1a.tar.gz
Posted Dec 31, 2004
Authored by EmirAga | Site projects.emiraga.com

A year after the flaw's discovery, this tool has been released to hijack HTTP connections under Apache and Apache2 with mod_php.

tags | exploit, web
SHA-256 | ff8bb3d5e961d477e147a318fc0c64906481bbf025167c3c2c2e37c6ac5fc796
Page 3 of 4
Back1234Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close