what you don't know can hurt you
Showing 101 - 125 of 1,190 RSS Feed

Shellcode Files

Linux/x86_64 execve(/bin/sh) Shellcode
Posted Jun 18, 2019
Authored by Aron Mihaljevic

22 bytes small Linux/x86_64 execve(/bin/sh) shellcode.

tags | shellcode
systems | linux
MD5 | 66ee63238362e15da47537617356f6c3
Linux/x86 Reposition + INC Encoder With execve(/bin/sh) Shellcode
Posted Jun 15, 2019
Authored by Jonathan So

66 bytes small Linux/x86 Reposition + INC encoder with execve(/bin/sh) shellcode.

tags | x86, shellcode
systems | linux
MD5 | 83e2415b68f3020e891747eac17830cf
Linux/x86_64 TCP/4444 Bindshell Shellcode
Posted Jun 10, 2019
Authored by Aron Mihaljevic

104 bytes small Linux/x86_64 shellcode that binds /bin/sh to TCP/4444.

tags | tcp, shellcode
systems | linux
MD5 | a20f533f17e803a65d3c29e06caff338
Linux/x86_64 TCP/4444 Bindshell Shellcode
Posted Jun 7, 2019
Authored by Aron Mihaljevic

131 bytes small Linux/x86_64 /bin/sh TCP/4444 shellbinding shellcode.

tags | tcp, shellcode
systems | linux
MD5 | d6a1562540e77c0b3daa496946e996b2
Safari Webkit Proxy Object Type Confusion
Posted Jun 2, 2019
Authored by saelo, ianbeer, Siguza, niklasb | Site metasploit.com

This Metasploit module exploits a type confusion bug in the Javascript Proxy object in WebKit. The DFG JIT does not take into account that, through the use of a Proxy, it is possible to run arbitrary JS code during the execution of a CreateThis operation. This makes it possible to change the structure of e.g. an argument without causing a bailout, leading to a type confusion (CVE-2018-4233). The type confusion leads to the ability to allocate fake Javascript objects, as well as the ability to find the address in memory of a Javascript object. This allows us to construct a fake JSCell object that can be used to read and write arbitrary memory from Javascript. The module then uses a ROP chain to write the first stage shellcode into executable memory within the Safari process and kick off its execution. The first stage maps the second stage macho (containing CVE-2017-13861) into executable memory, and jumps to its entrypoint. The CVE-2017-13861 async_wake exploit leads to a kernel task port (TFP0) that can read and write arbitrary kernel memory. The processes credential and sandbox structure in the kernel is overwritten and the meterpreter payloads code signature hash is added to the kernels trust cache, allowing Safari to load and execute the (self-signed) meterpreter payload.

tags | exploit, arbitrary, kernel, javascript, shellcode
advisories | CVE-2017-13861, CVE-2018-4233
MD5 | 394148cda471deeb3abbfdccf622fa46
Linux/x64 execve(/bin/sh) Shellcode
Posted May 23, 2019
Authored by Rajvardhan

23 bytes small Linux/x64 execve(/bin/sh) shellcode.

tags | shellcode
systems | linux
MD5 | eeac2e302e95bbc11ba36ce32d6ee146
Linux/x86_64 Delete File (test.txt) Shellcode
Posted May 20, 2019
Authored by Aron Mihaljevic

28 bytes small Linux/x86_64 delete file (test.txt) shellcode.

tags | shellcode
systems | linux
MD5 | 02f29f122bd546be4c5b88f0c697fe42
Windows 7 / 8 LSASS Process Dump Shellcode
Posted May 12, 2019
Authored by Osanda Malith

Windows 7 and 8 LSASS process dumping shellcode for x86_64.

tags | shellcode
systems | windows, 7
MD5 | 6ea474b6dc51324c55fff0a04700b797
Windows 10 / Server 2019 LSASS Process Dump Shellcode
Posted May 12, 2019
Authored by Osanda Malith

Windows 10 and Windows Server 2019 LSASS process dumping shellcode for x86_64.

tags | shellcode
systems | windows
MD5 | 27558db0ca06e1d38e522c2d9cd968fc
Linux/x86 /sbin/iptables -F Shellcode
Posted May 11, 2019
Authored by Xavi Beltran

43 bytes small Linux/x86 /sbin/iptables -F shellcode.

tags | x86, shellcode
systems | linux
MD5 | 86d365d696217a1d50cb9b0d95bd6cb6
Linux/x86 execve /bin/sh Shellcode
Posted May 8, 2019
Authored by Rajvardhan

20 bytes small Linux/x86 execve /bin/sh shellcode.

tags | x86, shellcode
systems | linux
MD5 | 9f821fa395a37bf2d7f2fd8fd818780b
Chrome 72.0.3626.119 FileReader Use-After-Free
Posted May 8, 2019
Authored by Clement LECIGNE, timwr, Istvan Kurucsai | Site metasploit.com

This exploit takes advantage of a use after free vulnerability in Google Chrome 72.0.3626.119 running on Windows 7 x86. The FileReader.readAsArrayBuffer function can return multiple references to the same ArrayBuffer object, which can be freed and overwritten with sprayed objects. The dangling ArrayBuffer reference can be used to access the sprayed objects, allowing arbitrary memory access from Javascript. This is used to write and execute shellcode in a WebAssembly object. The shellcode is executed within the Chrome sandbox, so you must explicitly disable the sandbox for the payload to be successful.

tags | exploit, arbitrary, x86, javascript, shellcode
systems | windows, 7
advisories | CVE-2019-5786
MD5 | 1845174659a656cb293c5dd2f17fe75c
Linux/x86 Multiple Keys XOR Encoder / Decoder execve(/bin/sh) Shellcode
Posted May 6, 2019
Authored by Xavi Beltran

59 bytes small Linux/x86 multiple keys XOR encoder / decoder execve(/bin/sh) shellcode.

tags | x86, shellcode
systems | linux
MD5 | 4e2fde1764b1bb10036fd4391299849e
Linux/x86 Shred File Shellcode
Posted May 6, 2019
Authored by strider

72 bytes small Linux/x86 shred file shellcode.

tags | x86, shellcode
systems | linux
MD5 | 8883ab158ae8c1da2f4b1a63920635dd
Linux/x86 OpenSSL File Encryption Shellcode
Posted May 3, 2019
Authored by strider

185 bytes small Linux/x86 OpenSSL encrypt files with aes256cbc shellcode.

tags | x86, shellcode
systems | linux
MD5 | bef6affa3c323e2d2f81f0589e99abc5
Linux/x86 Reverse Shell Shellcode / Python Wrapper
Posted May 3, 2019
Authored by Dave Sully

91 bytes small Linux/x86 reverse shell shellcode and python wrapper.

tags | shell, x86, shellcode, python
systems | linux
MD5 | 7a029e8e0dd26662b1c28429e25f2178
Linux/x86 Rabbit Shellcode Crypter
Posted Apr 24, 2019
Authored by Petr Javorik

200 bytes small Linux/x86 rabbit shellcode crypter.

tags | x86, shellcode
systems | linux
MD5 | 35dcc4387006d2416fa6774debd2a9a3
Linux/ARM Password Protected Reverse TCP Shell Shellcode
Posted Apr 23, 2019
Authored by Alan Vivona

100 bytes small Linux/ARM password protected reverse TCP shell shellcode.

tags | shell, tcp, shellcode
systems | linux
MD5 | 8354c706305152c8ac2968de64f559b7
Linux/x86 Cat / Encode / POST Shellcode
Posted Apr 15, 2019
Authored by strider

125 bytes small Linux/x86 cat file encode to base64 and post via curl to webserver shellcode.

tags | x86, shellcode
systems | linux
MD5 | ed92784a59a54c59d40b0ae78ae822ac
Linux/x86 MMX-PUNPCKLBW Encoder Shellcode
Posted Apr 15, 2019
Authored by Petr Javorik

61 bytes small Linux/x86 MMX-PUNPCKLBW encoder shellcode.

tags | x86, shellcode
systems | linux
MD5 | 245a2cc2caaef0f2ee17516eac6ae580
Linux/x86 Add User To Passwd File Shellcode
Posted Apr 12, 2019
Authored by strider

149 bytes small Linux/x86 add user to passwd file shellcode.

tags | x86, shellcode
systems | linux
MD5 | 44caa95cda5b50ce19fab3550fbc0038
Linux/x64 XANAX Encoder Shellcode
Posted Apr 9, 2019
Authored by Alan Vivona

127 bytes small Linux/x64 XANAX encoder shellcode.

tags | shellcode
systems | linux
MD5 | 16704e873d382363c29db218d0e1f87f
Linux/x64 XANAX Decoder Shellcode
Posted Apr 9, 2019
Authored by Alan Vivona

127 bytes small Linux/x64 XANAX decoder shellcode.

tags | shellcode
systems | linux
MD5 | 39753fb7c24f475f2a04714c72b78699
Linux/x86 /sbin/route Shellcode
Posted Mar 10, 2019
Authored by Daniele Votta

14 bytes small /sbin/route staged shellcode and can read the second stage from STDIN.

tags | shellcode
MD5 | e8c16e3b24f6f44756d6649ccf732a4a
Polymorphic execve(/bibn/sh) Shellcode
Posted Mar 9, 2019
Authored by Daniele Votta

Linux/x86 polymorphic shellcode for execve(/bin/sh).

tags | x86, shellcode
systems | linux
MD5 | d466634267c681c46a6503c6019e8ee5
Page 5 of 48
Back34567Next

File Archive:

September 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    14 Files
  • 2
    Sep 2nd
    19 Files
  • 3
    Sep 3rd
    9 Files
  • 4
    Sep 4th
    1 Files
  • 5
    Sep 5th
    2 Files
  • 6
    Sep 6th
    3 Files
  • 7
    Sep 7th
    12 Files
  • 8
    Sep 8th
    22 Files
  • 9
    Sep 9th
    17 Files
  • 10
    Sep 10th
    19 Files
  • 11
    Sep 11th
    3 Files
  • 12
    Sep 12th
    2 Files
  • 13
    Sep 13th
    15 Files
  • 14
    Sep 14th
    16 Files
  • 15
    Sep 15th
    15 Files
  • 16
    Sep 16th
    7 Files
  • 17
    Sep 17th
    13 Files
  • 18
    Sep 18th
    2 Files
  • 19
    Sep 19th
    2 Files
  • 20
    Sep 20th
    14 Files
  • 21
    Sep 21st
    20 Files
  • 22
    Sep 22nd
    28 Files
  • 23
    Sep 23rd
    13 Files
  • 24
    Sep 24th
    10 Files
  • 25
    Sep 25th
    1 Files
  • 26
    Sep 26th
    1 Files
  • 27
    Sep 27th
    20 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close