exploit the possibilities
Showing 1 - 25 of 869 RSS Feed

x86 Files

Microsoft Windows NtUserSetWindowFNID Win32k User Callback
Posted Jul 16, 2019
Authored by ze0r, Jacob Robles, Kaspersky Lab | Site metasploit.com

An elevation of privilege vulnerability exists in Microsoft Windows when the Win32k component fails to properly handle objects in memory. This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This Metasploit module is tested against Windows 10 v1703 x86.

tags | exploit, x86
systems | windows, 7
advisories | CVE-2018-8453
MD5 | 410d26c4ad5d959638a9e5d77947143e
Linux/x86 chmod 666 /etc/passwd / /etc/shadow Shellcode
Posted Jul 12, 2019
Authored by Xavier Invers Fornells

61 bytes small Linux/x86 chmod 666 /etc/passwd and chmod 666 /etc/shadow shellcode.

tags | x86, shellcode
systems | linux
MD5 | 1d275af34ac3eb4e6782353a61ffbebe
Linux/x86 execve /bin/sh Using JMP-CALL-POP Shellcode
Posted Jul 1, 2019
Authored by kiriknik

21 bytes small Linux/x86 execve /bin/sh using JMP-CALL-POP shellcode.

tags | x86, shellcode
systems | linux
MD5 | 3ff7fb39227818050fd269d7a2c8e5d2
Linux/x86 /usr/bin/wget Shellcode
Posted Jun 28, 2019
Authored by LockedByte

129 bytes small Linux/x86 chmod + execute + hide output via /usr/bin/wget shellcode.

tags | x86, shellcode
systems | linux
MD5 | 6af169ea9f238f0411b7d5ee4c594f7a
Windows/x86 iexplore.exe Shellcode
Posted Jun 28, 2019
Authored by Joseph McDonagh

191 bytes small Windows/x86 start iexplore.exe shellcode.

tags | x86, shellcode
systems | windows
MD5 | 69ef1b6a666d78243c14b5a2319c40bd
Windows/x86 bitsadmin Download And Execute Shellcode
Posted Jun 27, 2019
Authored by Joseph McDonagh

210 bytes small Windows/x86 bitsadmin download and execute shellcode.

tags | x86, shellcode
systems | windows
MD5 | c976a6bf095c6cf15e9f503c7292abd1
Linux/x86 ASCII AND, SUB, PUSH, POPAD Encoder Shellcode
Posted Jun 27, 2019
Authored by Petr Javorik

Linux/x86 ASCII AND, SUB, PUSH, POPAD encoder shellcode.

tags | x86, shellcode
systems | linux
MD5 | 7d8add083000fb4263e70c141c03f153
Linux/x86 Reposition + INC Encoder With execve(/bin/sh) Shellcode
Posted Jun 15, 2019
Authored by Jonathan So

66 bytes small Linux/x86 Reposition + INC encoder with execve(/bin/sh) shellcode.

tags | x86, shellcode
systems | linux
MD5 | 83e2415b68f3020e891747eac17830cf
Linux/x86 /sbin/iptables -F Shellcode
Posted May 11, 2019
Authored by Xavi Beltran

43 bytes small Linux/x86 /sbin/iptables -F shellcode.

tags | x86, shellcode
systems | linux
MD5 | 86d365d696217a1d50cb9b0d95bd6cb6
Linux/x86 execve /bin/sh Shellcode
Posted May 8, 2019
Authored by Rajvardhan

20 bytes small Linux/x86 execve /bin/sh shellcode.

tags | x86, shellcode
systems | linux
MD5 | 9f821fa395a37bf2d7f2fd8fd818780b
Chrome 72.0.3626.119 FileReader Use-After-Free
Posted May 8, 2019
Authored by Clement LECIGNE, timwr, Istvan Kurucsai | Site metasploit.com

This exploit takes advantage of a use after free vulnerability in Google Chrome 72.0.3626.119 running on Windows 7 x86. The FileReader.readAsArrayBuffer function can return multiple references to the same ArrayBuffer object, which can be freed and overwritten with sprayed objects. The dangling ArrayBuffer reference can be used to access the sprayed objects, allowing arbitrary memory access from Javascript. This is used to write and execute shellcode in a WebAssembly object. The shellcode is executed within the Chrome sandbox, so you must explicitly disable the sandbox for the payload to be successful.

tags | exploit, arbitrary, x86, javascript, shellcode
systems | windows, 7
advisories | CVE-2019-5786
MD5 | 1845174659a656cb293c5dd2f17fe75c
Linux/x86 Multiple Keys XOR Encoder / Decoder execve(/bin/sh) Shellcode
Posted May 6, 2019
Authored by Xavi Beltran

59 bytes small Linux/x86 multiple keys XOR encoder / decoder execve(/bin/sh) shellcode.

tags | x86, shellcode
systems | linux
MD5 | 4e2fde1764b1bb10036fd4391299849e
Linux/x86 Shred File Shellcode
Posted May 6, 2019
Authored by strider

72 bytes small Linux/x86 shred file shellcode.

tags | x86, shellcode
systems | linux
MD5 | 8883ab158ae8c1da2f4b1a63920635dd
Linux/x86 OpenSSL File Encryption Shellcode
Posted May 3, 2019
Authored by strider

185 bytes small Linux/x86 OpenSSL encrypt files with aes256cbc shellcode.

tags | x86, shellcode
systems | linux
MD5 | bef6affa3c323e2d2f81f0589e99abc5
Linux/x86 Reverse Shell Shellcode / Python Wrapper
Posted May 3, 2019
Authored by Dave Sully

91 bytes small Linux/x86 reverse shell shellcode and python wrapper.

tags | shell, x86, shellcode, python
systems | linux
MD5 | 7a029e8e0dd26662b1c28429e25f2178
Linux/x86 Rabbit Shellcode Crypter
Posted Apr 24, 2019
Authored by Petr Javorik

200 bytes small Linux/x86 rabbit shellcode crypter.

tags | x86, shellcode
systems | linux
MD5 | 35dcc4387006d2416fa6774debd2a9a3
Linux/x86 Cat / Encode / POST Shellcode
Posted Apr 15, 2019
Authored by strider

125 bytes small Linux/x86 cat file encode to base64 and post via curl to webserver shellcode.

tags | x86, shellcode
systems | linux
MD5 | ed92784a59a54c59d40b0ae78ae822ac
Linux/x86 MMX-PUNPCKLBW Encoder Shellcode
Posted Apr 15, 2019
Authored by Petr Javorik

61 bytes small Linux/x86 MMX-PUNPCKLBW encoder shellcode.

tags | x86, shellcode
systems | linux
MD5 | 245a2cc2caaef0f2ee17516eac6ae580
Linux/x86 Add User To Passwd File Shellcode
Posted Apr 12, 2019
Authored by strider

149 bytes small Linux/x86 add user to passwd file shellcode.

tags | x86, shellcode
systems | linux
MD5 | 44caa95cda5b50ce19fab3550fbc0038
Polymorphic execve(/bibn/sh) Shellcode
Posted Mar 9, 2019
Authored by Daniele Votta

Linux/x86 polymorphic shellcode for execve(/bin/sh).

tags | x86, shellcode
systems | linux
MD5 | d466634267c681c46a6503c6019e8ee5
Anyburn 4.x x86 Buffer Overflow
Posted Mar 7, 2019
Authored by Hodorsec

Anyburn version 4.3 x86 "Copy disc to image file" buffer overflow SEH unicode exploit.

tags | exploit, overflow, x86
MD5 | 8e92d805dee2a379fca84a0aa0ea1dda
Insertion Encoder / Decoder Shellcode
Posted Mar 7, 2019
Authored by Daniele Votta

Linux/x86 insertion encoder and decoder shellcode.

tags | x86, shellcode
systems | linux
MD5 | e5cecc39dc9c9a7ebbb0f0c5a9755667
FreeBSD Intel SYSRET Privilege Escalation
Posted Mar 7, 2019
Authored by Rafal Wojtczuk, Brendan Coles, John Baldwin, iZsh | Site metasploit.com

This Metasploit module exploits a vulnerability in the FreeBSD kernel, when running on 64-bit Intel processors. By design, 64-bit processors following the X86-64 specification will trigger a general protection fault (GPF) when executing a SYSRET instruction with a non-canonical address in the RCX register. However, Intel processors check for a non-canonical address prior to dropping privileges, causing a GPF in privileged mode. As a result, the current userland RSP stack pointer is restored and executed, resulting in privileged code execution.

tags | exploit, x86, kernel, code execution
systems | freebsd, bsd
advisories | CVE-2012-0217
MD5 | 3c4bc514cf25ebc9c86255e4a4f4d06e
Linux/x86 iptables -F Shellcode
Posted Mar 4, 2019
Authored by Cameron Brown

43 bytes small Linux/x86 iptables -F shellcode.

tags | x86, shellcode
systems | linux
MD5 | 4dbeca963f8aae1416e64c4b94111820
NOT Encoder / Decoder Shellcode
Posted Mar 4, 2019
Authored by Daniele Votta

44 bytes small Linux/x86 execve() /bin/sh NOT encoder and decoder shellcode. This technique is useful for bypassing some AV systems.

tags | x86, shellcode
systems | linux
MD5 | de82ed37ecb7f593351ba4ec02eff1df
Page 1 of 35
Back12345Next

File Archive:

July 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    34 Files
  • 2
    Jul 2nd
    15 Files
  • 3
    Jul 3rd
    9 Files
  • 4
    Jul 4th
    8 Files
  • 5
    Jul 5th
    2 Files
  • 6
    Jul 6th
    3 Files
  • 7
    Jul 7th
    1 Files
  • 8
    Jul 8th
    15 Files
  • 9
    Jul 9th
    15 Files
  • 10
    Jul 10th
    20 Files
  • 11
    Jul 11th
    17 Files
  • 12
    Jul 12th
    16 Files
  • 13
    Jul 13th
    2 Files
  • 14
    Jul 14th
    1 Files
  • 15
    Jul 15th
    20 Files
  • 16
    Jul 16th
    27 Files
  • 17
    Jul 17th
    7 Files
  • 18
    Jul 18th
    5 Files
  • 19
    Jul 19th
    12 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close