Twenty Year Anniversary
Showing 76 - 100 of 1,964 RSS Feed

Proof of Concept Files

WordPress wp-json Content Injection
Posted Feb 8, 2017
Authored by Larry W. Cashdollar, Marc Montipas

WordPress wp-json API content injection exploit proof of concept.

tags | exploit, proof of concept
MD5 | fa42f8c002a21ad5018cfc312ecd960f
WordPress 4.7.0 / 4.7.1 Content Injection Proof Of Concept
Posted Feb 2, 2017
Authored by leonjza

WordPress versions 4.7.0 and 4.7.1 unauthenticated content injection proof of concept exploit.

tags | exploit, proof of concept
MD5 | 03139864fb5787e9961aca601390dcc2
Microsoft Windows 10 SMBv3 Tree Connect
Posted Feb 2, 2017
Authored by laurent gaffie

Microsoft Windows 10 SMBv3 tree connect proof of concept exploit.

tags | exploit, proof of concept
systems | windows
MD5 | 9c6a3b717fefb0568bc92f9e4261b766
OpenSSL 1.1.0 Remote Client Denial Of Service
Posted Jan 31, 2017
Authored by Guido Vranken

OpenSSL version 1.1.0 remote client denial of service proof of concept exploit.

tags | exploit, remote, denial of service, proof of concept
advisories | CVE-2017-3730
MD5 | 69439210d66c14111fb007ce7ddefba6
Systemd 228 Privilege Escalation
Posted Jan 27, 2017
Authored by Sebastian Krahmer

Systemd 228 privilege escalation proof of concept exploit.

tags | exploit, proof of concept
advisories | CVE-2016-10156
MD5 | 456f8298b5491aa165da8bc7d93c25f0
PHP LibGD Heap Buffer Overflow
Posted Jan 17, 2017
Authored by Hans Jerry Illikainen

Proof of concept exploit for CVE-2016-3074 targeting Ubuntu 15.10 x86-64 with php5-gd and php5-fpm running behind nginx.

tags | exploit, overflow, x86, proof of concept
systems | linux, ubuntu
advisories | CVE-2016-3074
MD5 | 62ec20b51bb7cee9f2062e9144826d2e
Mozilla Firefox Use-After-Free
Posted Jan 13, 2017
Authored by Marcin Ressel

Mozilla Firefox versions prior to 50.1.0 use-after proof of concept exploit.

tags | exploit, proof of concept
advisories | CVE-2016-9899
MD5 | 573f5c94d377121938a2ad14e8d42f44
Adobe Flash 24.0.0.186 Code Execution
Posted Jan 12, 2017
Authored by Francis Provencher

This documented vulnerability allows a remote attacker to execute malicious code or access to a part of the dynamically allocated memory using a user interaction visiting a Web page or open a specially crafted SWF file, an attacker is able to create an "out of bound" memory corruption. A file with an "ActionRecord" structure that contains an invalid value in "ActionGetURL2" could lead to remote code execution in the context of the current user. Proof of concept code included.

tags | exploit, remote, web, code execution, proof of concept
advisories | CVE-2017-2930
MD5 | 29eff5852d8270398abf4007b49b527b
VideoLan VLC Media Player 2.2.1 Buffer Overflow
Posted Jan 12, 2017
Authored by Patrick Coleman

Proof of concept .mov that demonstrates a DecodeAdpcmImaQT buffer overflow vulnerability in VideoLAN VLC Media Player version 2.2.1.

tags | exploit, overflow, proof of concept
advisories | CVE-2016-5108
MD5 | c22ad771dd542bf753e86ddd9e463c00
Microsoft Edge chakra.dll Information Leak / Type Confusion
Posted Jan 6, 2017
Authored by Brian Pak

Proof of concept exploit for Microsoft Edge bugs that allow for remote code execution.

tags | exploit, remote, code execution, proof of concept
advisories | CVE-2016-7200, CVE-2016-7201
MD5 | 12ebdc28ffaf2d37ecd5cda905cbbbdf
PHPMailer / Zend-mail / SwiftMailer Remote Code Execution
Posted Jan 3, 2017
Authored by Dawid Golunski

This proof of concept exploit aims to execute a reverse shell on the target in the context of the web server user via a vulnerable PHP email library.

tags | exploit, web, shell, php, proof of concept
advisories | CVE-2016-10033, CVE-2016-10034, CVE-2016-10045, CVE-2016-10074
MD5 | a0be91defae2564f4405c81fdeab38cd
PHPMailer 5.2.17 Remote Code Execution
Posted Dec 27, 2016
Authored by Dawid Golunski

PHPMailer versions prior to 5.2.18 suffer from a remote code execution vulnerability. This archive consists of the full advisory and also the proof of concept code.

tags | exploit, remote, code execution, proof of concept
advisories | CVE-2016-10033
MD5 | fd1e17cbce43e18c7ccf541988b20ac8
Gstreamer 0.10.x Logic Error
Posted Dec 15, 2016
Authored by Chris Evans | Site scarybeastsecurity.blogspot.com

A vulnerability and a separate logic error exist in the gstreamer 0.10.x player for NSF music files. Combined, they allow for very reliable exploitation and the bypass of 64-bit ASLR, DEP, etc. The reliability is provided by the presence of a turing complete "scripting" inside a music player. Read the homepage link for full analysis. Proof of concept exploit included in this archive.

tags | exploit, proof of concept
MD5 | da231d9408e25a8f4d0e8b1c067159dc
XFINITY Gateway Technicolor DPC3941T Cross Site Request Forgery
Posted Dec 12, 2016
Authored by Ayushman Dutta

XFINITY Gateway Technicolor DPC3941T wifi password changing cross site request forgery proof of concept code.

tags | exploit, proof of concept, csrf
advisories | CVE-2016-7454
MD5 | 15a5f462d705cc849d2ab2c6db485d3d
Microsoft Windows 10 x86/x64 WLAN AutoConfig Named Pipe Proof Of Concept
Posted Dec 7, 2016
Authored by Jeremy Brown

Microsoft Windows 10 x86/x64 build 10.0.14393 WLAN autoconfig named pipe denial of service proof of concept exploit.

tags | exploit, denial of service, x86, proof of concept
systems | windows
MD5 | d78a9bd236d6a1942ee373d12364f61f
ntpd 4.2.8 Stack Overflow Proof Of Concept
Posted Nov 30, 2016
Authored by N_A

Remote ntpd version 4.2.8 stack overflow proof of concept exploit.

tags | exploit, remote, overflow, proof of concept
MD5 | 736431083273dddf2edec7ebea2090c2
WinPower 4.9.0.4 Privilege Escalation
Posted Nov 29, 2016
Authored by Kacper Szurek

WinPower version 4.9.0.4 suffers from a privilege escalation vulnerability. Proof of concept code included.

tags | exploit, proof of concept
MD5 | ed0607905b845ef7350dce9ad139b90e
Microsoft Windows Kernel NtSetWindowLongPtr Privilege Escalation
Posted Nov 28, 2016
Authored by Enrique Nissim

Microsoft Windows Kernel win32k.sys NtSetWindowLongPtr privilege escalation proof of concept exploit. Leverages the issue as noted in MS16-135.

tags | exploit, kernel, proof of concept
systems | windows
advisories | CVE-2016-7255
MD5 | 22e9d6e6eea9e3931c0a3320e5216f50
Linux ntpd 4.2.8 derive_nonce Stack Overflow
Posted Nov 25, 2016
Authored by Todor Donev

Linux ntpd 4.2.8 derive_nonce remote stack overflow proof of concept exploit.

tags | exploit, remote, overflow, proof of concept
systems | linux
MD5 | 82c7c116090828fd0e56ef327c62c461
Gstreamer Heap Corruption
Posted Nov 25, 2016
Authored by Chris Evans

A full analysis and proof of concept 0-day exploits for a heap corruption vulnerability in the gstreamer decoder.

tags | exploit, proof of concept
MD5 | 3a4f02974a472c9519faae24f2a7c085
Linux Kernel 2.6.32-rc1 x86_64 Register Leak
Posted Nov 23, 2016
Authored by Spender

Linux kernel version 2.6.32-rc1 x86_64 register leak proof of concept code.

tags | exploit, kernel, proof of concept
systems | linux
MD5 | d243180fe92ea99f0ca63f222c678db2
Linux Kernel 2.6.32-642 / 3.16.0-4 Inode Integer Overflow
Posted Nov 23, 2016
Authored by Todor Donev

Linux kernels 2.6.32-642 and 3.16.0-4 inode integer overflow proof of concept exploit.

tags | exploit, overflow, kernel, proof of concept
systems | linux
MD5 | 5e4bac26711257f2b173173b9a893edf
ATutor 2.2.2 Cross Site Request Forgery
Posted Nov 14, 2016
Authored by Saravana Kumar

ATutor version 2.2.2 cross site request forgery proof of concept that adds a new course.

tags | exploit, proof of concept, csrf
MD5 | f14414f1cea85260c58ebbcfd9f1fd8b
Microsoft Windows Server AD LDAP RootDSE Netlogon Denial Of Service
Posted Nov 4, 2016
Authored by Todor Donev

Microsoft Windows Server AD LDAP RootDSE Netlogon (CLDAP "AD Ping") query reflection denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
systems | windows
MD5 | 1ef1ea7ca509fdc362e39c90d0f9814e
LDAP Amplication Denial Of Service
Posted Nov 4, 2016
Authored by ShadowHatesYou

This proof of concept is an LDAP Distributed Reflective Denial of Service/Bandwidth Amplification Attack, similar to DNS and NTP amplification attacks where the target of the DoS is spoofed as the source IP in a request to the reflectors(In this case, LDAP servers). The reflectors then respond to the spoofed target IP with a bigger answer than the original question, resulting in the target experiencing what appears to be a distributed denial of service attack, even though there may only be one true source. suffers from a denial of service vulnerability.

tags | exploit, denial of service, spoof, proof of concept
MD5 | 3c0c963c42fa117bd2ae19bab9220098
Page 4 of 79
Back23456Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

April 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    5 Files
  • 2
    Apr 2nd
    17 Files
  • 3
    Apr 3rd
    11 Files
  • 4
    Apr 4th
    21 Files
  • 5
    Apr 5th
    17 Files
  • 6
    Apr 6th
    12 Files
  • 7
    Apr 7th
    1 Files
  • 8
    Apr 8th
    6 Files
  • 9
    Apr 9th
    21 Files
  • 10
    Apr 10th
    18 Files
  • 11
    Apr 11th
    42 Files
  • 12
    Apr 12th
    7 Files
  • 13
    Apr 13th
    14 Files
  • 14
    Apr 14th
    1 Files
  • 15
    Apr 15th
    1 Files
  • 16
    Apr 16th
    15 Files
  • 17
    Apr 17th
    20 Files
  • 18
    Apr 18th
    24 Files
  • 19
    Apr 19th
    20 Files
  • 20
    Apr 20th
    7 Files
  • 21
    Apr 21st
    10 Files
  • 22
    Apr 22nd
    2 Files
  • 23
    Apr 23rd
    17 Files
  • 24
    Apr 24th
    35 Files
  • 25
    Apr 25th
    14 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close