Twenty Year Anniversary
Showing 1 - 25 of 796 RSS Feed

x86 Files

Linux/x86 Reverse TCP Shell Shellcode
Posted May 15, 2018
Authored by Paolo Perego

96 bytes small Linux/x86 reverse TCP shell shellcode that connects to 127.0.0.1:4444.

tags | shell, x86, tcp, shellcode
systems | linux
MD5 | 595d776824a93f7666b99a23897c290e
rldns 1.2
Posted May 11, 2018
Authored by Ringlayer | Site ringlayer.net

rldns is an open source lightweight DNS server for linux, netbsd, freebsd, and openbsd. Runs on x86 and x86_64 architectures.

Changes: Various updates.
tags | tool, x86
systems | linux, netbsd, unix, freebsd, bsd, openbsd
MD5 | 5b3cb3b9e8efbdc698d6294abcbf309d
Linux/x86 Read /etc/passwd Shellcode
Posted May 11, 2018
Authored by Nuno Freitas

62 bytes small Linux/x86 read /etc/passwd shellcode.

tags | x86, shellcode
systems | linux
MD5 | 22d749d25bebf4705648c7f284a33b44
Linux/x86 TCP/9443 Bindshell Shellcode
Posted May 9, 2018
Authored by Amine Kanane

113 bytes small Linux/x86 bindshell forking null-free shellcode for TCP/9443.

tags | x86, tcp, shellcode
systems | linux
MD5 | 1d7c353245f7ee1d017285c4d7912ba9
Linux/x86 execve(/bin/sh) Shellcode
Posted May 6, 2018
Authored by Nuno Freitas

27 bytes small Linux/x86 execve(/bin/sh) not encoded shellcode.

tags | x86, shellcode
systems | linux
MD5 | b1c067632d5b3649aa48336f5e076c6e
Linux/x86 execve /bin/sh Encoded Shellcode
Posted Apr 25, 2018
Authored by Nuno Freitas

44 bytes small Linux/x86 execve /bin/sh encoded shellcode using ROT-13 + RShift-2 + XOR.

tags | x86, shellcode
systems | linux
MD5 | 66c9b228bfc5ac325b4db48c96248d5a
Linux/x86 Setuid Shell Shellcode
Posted Apr 24, 2018
Authored by absolomb

74 bytes small Linux/x86 cp /bin/sh /tmp/sh; chmod +s /tmp/sh shellcode.

tags | x86, shellcode
systems | linux
MD5 | 3ddc9eeb64e408e1b68c86ecbad57577
Linux/x86 chmod 4755 /bin/dash Shellcode
Posted Apr 24, 2018
Authored by absolomb

33 bytes small Linux/x86 chmod 4755 /bin/dash shellcode.

tags | x86, shellcode
systems | linux
MD5 | 50a49297db99235b957ac45501135b0f
Linux/x86 Edit /etc/sudoers With NOPASSWD For ALL Shellcode
Posted Apr 24, 2018
Authored by absolomb

79 bytes small Linux/x86 shellcode that edits /etc/sudoers with NOPASSWD for ALL.

tags | x86, shellcode
systems | linux
MD5 | d58cc1f56f48649ddfaf83f56e222e04
Linux x86 Reverse TCP 127.1.1.1:5555 Shellcode
Posted Apr 20, 2018
Authored by Anurag Srivastava

73 bytes small Linux x86 reverse TCP shellcode that binds to 127.1.1.1:5555.

tags | x86, tcp, shellcode
systems | linux
MD5 | 9e96cce76f9491a2d09409a32e416c26
Linux x86 TCP Port 1337 Bindshell Shellcode
Posted Apr 19, 2018
Authored by Anurag Srivastava

92 bytes small Linux x86 tcp/1337 bindshell shellcode.

tags | x86, tcp, shellcode
systems | linux
MD5 | ff78686f2571f1c5269ce33e66a58c85
Linux/x86 Egghunter Shellcode
Posted Mar 23, 2018
Authored by Anurag Srivastava

11 bytes small Linux/x86 egghunter shellcode.

tags | x86, shellcode
systems | linux
MD5 | 9b4b51dc63cca9b58c058946a03cf25f
Linux/x86 exit(0) Shellcode
Posted Mar 19, 2018
Authored by Anurag Srivastava

5 bytes small Linux/x86 exit(0) shellcode.

tags | x86, shellcode
systems | linux
MD5 | 97f77e037e6ad851dd4cb58e15f33372
Linux/x86 execve /bin/sh Shellcode
Posted Mar 18, 2018
Authored by Anurag Srivastava

18 bytes small Linux/x86 execve /bin/sh shellcode.

tags | x86, shellcode
systems | linux
MD5 | 739370cc7f3f22c6cac85503319011b5
MikroTik RouterOS Chimay Red Stack Clash Remote Code Execution
Posted Mar 13, 2018
Authored by Lorenzo Santina

MikroTik RouterOS versions prior to 6.38.4 (x86) Chimay Red stack clash remote code execution exploit.

tags | exploit, remote, x86, code execution
MD5 | fa75bb56a5777825b631d7238931d52b
Disk Savvy Enterprise 10.4.18 Buffer Ovreflow
Posted Feb 23, 2018
Authored by Daniel Teixeira | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow vulnerability in Disk Savvy Enterprise version 10.4.18, caused by improper bounds checking of the request sent to the built-in server. This Metasploit module has been tested successfully on Windows 7 SP1 x86.

tags | exploit, overflow, x86
systems | windows, 7
MD5 | bfeae1744c34384854bd5326b5010471
CloudMe Sync 1.10.9 Buffer Overflow
Posted Feb 23, 2018
Authored by Daniel Teixeira, hyp3rlinx | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow vulnerability in the CloudMe Sync version 1.10.9 client application. This Metasploit module has been tested successfully on Windows 7 SP1 x86.

tags | exploit, overflow, x86
systems | windows, 7
advisories | CVE-2018-6892
MD5 | 41dab942f2886640903e2e9e54f5e2e7
MagniComp SysInfo mcsiwrapper Privilege Escalation
Posted Feb 20, 2018
Authored by Brendan Coles, Daniel Lawson, Romain Trouve | Site metasploit.com

This Metasploit module attempts to gain root privileges on systems running MagniComp SysInfo versions prior to 10-H64. The .mcsiwrapper suid executable allows loading a config file using the '--configfile' argument. The 'ExecPath' config directive is used to set the executable load path. This Metasploit module abuses this functionality to set the load path resulting in execution of arbitrary code as root. This Metasploit module has been tested successfully with SysInfo version 10-H63 on Fedora 20 x86_64, 10-H32 on Fedora 27 x86_64, 10-H10 on Debian 8 x86_64, and 10-GA on Solaris 10u11 x86.

tags | exploit, arbitrary, x86, root
systems | linux, solaris, debian, fedora
advisories | CVE-2017-6516
MD5 | 8b66a6c82ba59a4ce479a1d17b9e36b6
Juju-run Agent Privilege Escalation
Posted Feb 11, 2018
Authored by Brendan Coles, David Ames, Ryan Beisner | Site metasploit.com

This Metasploit module attempts to gain root privileges on Juju agent systems running the juju-run agent utility. Juju agent systems running agent tools prior to version 1.25.12, 2.0.x before 2.0.4, and 2.1.x before 2.1.3, provide a UNIX domain socket to manage software ("units") without setting appropriate permissions, allowing unprivileged local users to execute arbitrary commands as root. This Metasploit module has been tested successfully with Juju agent tools versions 1.18.4, 1.25.5 and 1.25.9 on Ubuntu 14.04.1 LTS x86 deployed by Juju 1.18.1-trusty-amd64 and 1.25.6-trusty-amd64 on Ubuntu 14.04.1 LTS x86_64.

tags | exploit, arbitrary, x86, local, root
systems | linux, unix, ubuntu
advisories | CVE-2017-9232
MD5 | eb38e1fdceb4a094a0ae325d89253b30
Apport / ABRT chroot Privilege Escalation
Posted Feb 3, 2018
Authored by Tavis Ormandy, Brendan Coles, StA(c)phane Graber, Ricardo F. Teixeira | Site metasploit.com

This Metasploit module attempts to gain root privileges on Linux systems by invoking the default coredump handler inside a namespace ("container"). Apport versions 2.13 through 2.17.x before 2.17.1 on Ubuntu are vulnerable, due to a feature which allows forwarding reports to a container's Apport by changing the root directory before loading the crash report, causing 'usr/share/apport/apport' within the crashed task's directory to be executed. Similarly, Fedora is vulnerable when the kernel crash handler is configured to change root directory before executing ABRT, causing 'usr/libexec/abrt-hook-ccpp' within the crashed task's directory to be executed. In both instances, the crash handler does not drop privileges, resulting in code execution as root. This Metasploit module has been tested successfully on Apport 2.14.1 on Ubuntu 14.04.1 LTS x86 and x86_64 and ABRT on Fedora 19 and 20 x86_64.

tags | exploit, x86, kernel, root, code execution
systems | linux, fedora, ubuntu
advisories | CVE-2015-1318
MD5 | 1dc9fd5c90665c8934d2712e757240c3
Linux/x86 Egghunter Shellcode
Posted Jan 28, 2018
Authored by Nipun Jaswal

12 bytes small Linux/x86 egghunter shellcode.

tags | x86, shellcode
systems | linux
MD5 | 4c0527aa8ca0d3c599ef7e90b98b4809
Ubuntu Security Notice USN-3548-2
Posted Jan 26, 2018
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3548-2 - USN-3548-1 fixed vulnerabilities in the Linux kernel for Ubuntu 17.10. This update provides the corresponding updates for the Linux Hardware Enablement kernel from Ubuntu 17.10 for Ubuntu 16.04 LTS. Jay Vosburgh discovered a logic error in the x86-64 syscall entry implementation in the Linux kernel, introduced as part of the mitigations for the Spectre vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, x86, kernel, local, vulnerability
systems | linux, ubuntu
MD5 | 0d470581592ec8daa7fabea36ed96c69
Ubuntu Security Notice USN-3548-1
Posted Jan 26, 2018
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3548-1 - Jay Vosburgh discovered a logic error in the x86-64 syscall entry implementation in the Linux kernel, introduced as part of the mitigations for the Spectre vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

tags | advisory, denial of service, arbitrary, x86, kernel, local
systems | linux, ubuntu
MD5 | 98e4af140782a4a6f1256006225407f0
Linux x86 ROT-N + Shift-N + XOR-N Encoded /bin/sh Shellcode
Posted Jan 23, 2018
Authored by Hashim Jawad

77 bytes small Linux/x86 ROT-N + Shift-N + XOR-N encoded /bin/sh shellcode. Tested on Ubuntu 12.04.5 LTS.

tags | x86, shellcode
systems | linux, ubuntu
MD5 | c4e2f2606edd62c35ccc15418da04f55
Linux/x86-64 IPTables Flush Shellcode
Posted Jan 12, 2018
Authored by 0x4ndr3

43 bytes small Linux/x86-64 execve("/sbin/iptables", ["/sbin/iptables", "-F"], NULL) shellcode.

tags | x86, shellcode
systems | linux
MD5 | b6402eb0799fd8fe40b5aff352f7747a
Page 1 of 32
Back12345Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

May 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    15 Files
  • 2
    May 2nd
    17 Files
  • 3
    May 3rd
    30 Files
  • 4
    May 4th
    29 Files
  • 5
    May 5th
    2 Files
  • 6
    May 6th
    3 Files
  • 7
    May 7th
    13 Files
  • 8
    May 8th
    27 Files
  • 9
    May 9th
    17 Files
  • 10
    May 10th
    15 Files
  • 11
    May 11th
    8 Files
  • 12
    May 12th
    2 Files
  • 13
    May 13th
    8 Files
  • 14
    May 14th
    7 Files
  • 15
    May 15th
    43 Files
  • 16
    May 16th
    19 Files
  • 17
    May 17th
    16 Files
  • 18
    May 18th
    15 Files
  • 19
    May 19th
    3 Files
  • 20
    May 20th
    6 Files
  • 21
    May 21st
    15 Files
  • 22
    May 22nd
    3 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close