Exploit the possiblities
Showing 51 - 75 of 772 RSS Feed

x86 Files

Linux/x86 Netcat Reverse Shell Shellcode
Posted Dec 6, 2016
Authored by Filippo Bersani

180 bytes small Linux/x86 Netcat with -e option disabled reverse shell shellcode.

tags | shell, x86, shellcode
systems | linux
MD5 | 183eb0f5b928208a679bd53df527d086
Ubuntu Security Notice USN-3146-2
Posted Nov 30, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3146-2 - USN-3146-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.04 LTS. This update provides the corresponding updates for the Linux Hardware Enablement kernel from Ubuntu 16.04 LTS for Ubuntu 14.04 LTS. It was discovered that the __get_user_asm_ex implementation in the Linux kernel for x86/x86_64 contained extended asm statements that were incompatible with the exception table. A local attacker could use this to gain administrative privileges. Various other issues were also addressed.

tags | advisory, x86, kernel, local, vulnerability
systems | linux, ubuntu
advisories | CVE-2016-7097, CVE-2016-7425, CVE-2016-8658, CVE-2016-9644
MD5 | 097cc04c8dec8f47a6f9e994ad83f1d2
Ubuntu Security Notice USN-3146-1
Posted Nov 30, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3146-1 - It was discovered that the __get_user_asm_ex implementation in the Linux kernel for x86/x86_64 contained extended asm statements that were incompatible with the exception table. A local attacker could use this to gain administrative privileges. Andreas Gruenbacher and Jan Kara discovered that the filesystem implementation in the Linux kernel did not clear the setgid bit during a setxattr call. A local attacker could use this to possibly elevate group privileges. Various other issues were also addressed.

tags | advisory, x86, kernel, local
systems | linux, ubuntu
advisories | CVE-2016-7097, CVE-2016-7425, CVE-2016-8658, CVE-2016-9644
MD5 | 5db8f822195c3e9c1e40863156b060b3
Microsoft Windows x86 NDISTAPI Privilege Escalation
Posted Oct 24, 2016
Authored by Tomislav Paskalev

Microsoft Windows x86 NDISTAPI privilege escalation exploit that leverages the vulnerability outlined in MS11-062.

tags | exploit, x86
systems | windows
advisories | CVE-2011-1974
MD5 | b85019aec751cadc28fe6f0f123bbf54
Windows x86 Keylogger Reverse UDP Shellcode
Posted Oct 17, 2016
Authored by Fugu

493 bytes small windows x86 keylogger reverse UDP shellcode.

tags | x86, udp, shellcode
systems | windows
MD5 | 028f317c54549d3f060349640990ffb8
Windows x86 afd.sys Privilege Escalation
Posted Oct 17, 2016
Authored by Tomislav Paskalev

Windows x86 afd.sys privilege escalation exploit that leverages the issue outlined in MS11-046.

tags | exploit, x86
systems | windows
advisories | CVE-2011-1249
MD5 | 8dac75622b1e08a1925a10dd531f5013
Red Hat Security Advisory 2016-1943-01
Posted Sep 28, 2016
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2016-1943-01 - KVM is a full virtualization solution for Linux on x86 hardware. Using KVM, one can run multiple virtual machines running unmodified Linux or Windows images. Each virtual machine has private virtualized hardware: a network card, disk, graphics adapter, etc. Security Fix: An out-of-bounds read/write access flaw was found in the way QEMU's VGA emulation with VESA BIOS Extensions support performed read/write operations using I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host's QEMU process.

tags | advisory, arbitrary, x86
systems | linux, redhat, windows
advisories | CVE-2016-3710, CVE-2016-5403
MD5 | fef60d0583f23e99671be8572185a706
Windows x86 Password Protected TCP Bind Shell
Posted Sep 13, 2016
Authored by Roziul Hasan Khan Shifat

637 bytes small Microsoft Windows x86 password protect TCP bind shell shellcode.

tags | shell, x86, tcp, shellcode
systems | windows
MD5 | 44673d888c74d09fc997b10a17a7957e
Windows x86 TCP Bind Shell Shellcode
Posted Sep 8, 2016
Authored by Roziul Hasan Khan Shifat

Microsoft Windows x86 TCP bind shell shellcode.

tags | shell, x86, tcp, shellcode
systems | windows
MD5 | 81ca9b2fe7691f52ad5a45f10902c82e
Windows x86 Persistent Reverse TCP Shell Shellcode
Posted Sep 5, 2016
Authored by Roziul Hasan Khan Shifat

494 bytes small Microsoft Windows x86 persistent reverse TCP shell shellcode.

tags | shell, x86, tcp, shellcode
systems | windows
MD5 | cba8ff21939e5ed42a7ac164c813babc
Windows x86 InitiateSystemShutdownA() Shellcode
Posted Aug 18, 2016
Authored by Roziul Hasan Khan Shifat

599 bytes small Microsoft Windows x86 InitiateSystemShutdownA() shellcode.

tags | x86, shellcode
systems | windows
MD5 | 43a1d9fbb0d7c98198c58f5a65408ad5
Linux/x86 zsh Reverse TCP Shellcode Port 9090
Posted Aug 12, 2016
Authored by thryb

80 bytes small Linux/x86 zsh reverse TCP shellcode that uses port 9090.

tags | x86, tcp, shellcode
systems | linux
MD5 | 46bd98508336e2f01719e91d6ed9e9a1
Linux/x86 zsh TCP Bind Shell Port 9090
Posted Aug 12, 2016
Authored by thryb

96 bytes small Linux/x86 zsh TCP bind shell shellcode that binds to port 9090.

tags | shell, x86, tcp, shellcode
systems | linux
MD5 | 974564dfff1d7a2ae4a509fc7bb6815d
Ubuntu Security Notice USN-3050-1
Posted Aug 10, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3050-1 - Ben Hawkes discovered that the Linux netfilter implementation did not correctly perform validation when handling IPT_SO_SET_REPLACE events. A local unprivileged attacker could use this to cause a denial of service or possibly execute arbitrary code with administrative privileges. Vitaly Kuznetsov discovered that the Linux kernel did not properly suppress hugetlbfs support in X86 paravirtualized guests. An attacker in the guest Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, x86, kernel, local
systems | linux, ubuntu
advisories | CVE-2016-3134, CVE-2016-3961, CVE-2016-4470, CVE-2016-5243
MD5 | 97776b9302eebcf79cd067307ab1a02c
Ubuntu Security Notice USN-3049-1
Posted Aug 10, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3049-1 - Ben Hawkes discovered that the Linux netfilter implementation did not correctly perform validation when handling IPT_SO_SET_REPLACE events. A local unprivileged attacker could use this to cause a denial of service or possibly execute arbitrary code with administrative privileges. Vitaly Kuznetsov discovered that the Linux kernel did not properly suppress hugetlbfs support in X86 paravirtualized guests. An attacker in the guest Various other issues were also addressed.

tags | advisory, denial of service, arbitrary, x86, kernel, local
systems | linux, ubuntu
advisories | CVE-2016-3134, CVE-2016-3961, CVE-2016-4470, CVE-2016-5243
MD5 | a2865b7b4406e8c35ce153162478e955
Windows 7/x86 localhost Port Scanner Shellcode
Posted Aug 2, 2016
Authored by Roziul Hasan Khan Shifat

556 bytes large Windows 7/x86 localhost port scanner shellcode.

tags | x86, shellcode
systems | windows, 7
MD5 | 365e00e93798bfa17b0e6db32cefec9e
Linux/x86 NetCat Bind Shell With Port Shellcode
Posted Aug 2, 2016
Authored by CripSlick

44, 52 bytes Linux/x86 NetCat bind shell with port shellcode.

tags | shell, x86, shellcode
systems | linux
MD5 | 6953240d9ce7ccf9b7047560b4c20c2b
Keystone 0.9.1
Posted Jul 27, 2016
Authored by Nguyen Anh Quynh | Site keystone-engine.org

Keystone is a lightweight multi-platform, multi-architecture assembler framework. Highlight features include multi-architecture, with support for Arm, Arm64 (AArch64/Armv8), Hexagon, Mips, PowerPC, Sparc, SystemZ, and X86 (include 16/32/64bit). It has a clean and lightweight architecture-neutral API. It's implemented in C/C++ languages, with bindings for Python, NodeJS, Ruby, Go and Rust available and also has native support for Windows and various Unix flavors.

Changes: Various updates.
tags | tool, x86, python, ruby
systems | windows, unix
MD5 | 966e0395a3733f68518a2833e64134c1
Linux x86 Reverse Shell Using Xterm Shellcode
Posted Jul 13, 2016
Authored by RTV

Linux x86 reverse shell shellcode using xterm ///usr/bin/xterm -display 127.1.1.1:10.

tags | shell, x86, shellcode
systems | linux
MD5 | f198cc87a2eb8963305ea0590f331004
Windows x86 Download / Execute Shellcode
Posted Jul 13, 2016
Authored by Roziul Hasan Khan Shifat

Windows x86 URLDownloadToFileA()+SetFileAttributesA()+WinExec()+ExitProcess() shellcode.

tags | x86, shellcode
systems | windows
MD5 | 23c2074209fa439403f761d02d387ec3
Linux/x86 TCP Reverse Shellcode
Posted Jul 8, 2016
Authored by sajith

75 bytes small Linux/x86 TCP reverse shellcode.

tags | x86, tcp, shellcode
systems | linux
MD5 | ff67d385d7d7c84ef688cc48b7052120
PaX Reference Count Overflow Mitigation Bypass
Posted Jul 8, 2016
Authored by Jann Horn, Google Security Research

PaX contains a mitigation for reference count overflows that is intended to prevent atomic_t variables from reaching 0x80000000 and, more importantly, wrapping around to zero. A documented special case on x86 is that, because "atomically increment unless current value is X" cannot be implemented without a cmpxchg loop, the code instead increments the counter, checks for an overflow and, if an overflow happened, immediately decrements the counter back.

tags | exploit, overflow, x86
systems | linux
MD5 | e880c7eff8d7b6a8064df89a254883a5
Linux/x86 TCP Bind Shell Port 4444 Shellcode
Posted Jul 4, 2016
Authored by sajith

98 bytes small Linux/x86 TCP bindshell shellcode that binds to port 4444.

tags | x86, tcp, shellcode
systems | linux
MD5 | 4a1ea50781ae2e42b0e0532389538780
Windows 7 SP1 x86 Privilege Escalation
Posted Jun 30, 2016
Authored by blomster81

Windows 7 SP1 x86 privilege escalation exploit that leverages the issue documented in MS16-014.

tags | exploit, x86
systems | windows, 7
advisories | CVE-2016-0400
MD5 | 74a7278c257d49aa95bce167963b335c
Linux x86 /bin/sh Shellcode With ASLR Bruteforce
Posted Jun 28, 2016
Authored by Pawan Lal

Linux x86 /bin/sh shellcode with ASLR bruteforce.

tags | x86, shellcode
systems | linux
MD5 | 43af17a9f8995210c6ea8bee7f04535b
Page 3 of 31
Back12345Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

January 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    16 Files
  • 4
    Jan 4th
    39 Files
  • 5
    Jan 5th
    26 Files
  • 6
    Jan 6th
    40 Files
  • 7
    Jan 7th
    2 Files
  • 8
    Jan 8th
    16 Files
  • 9
    Jan 9th
    25 Files
  • 10
    Jan 10th
    28 Files
  • 11
    Jan 11th
    44 Files
  • 12
    Jan 12th
    32 Files
  • 13
    Jan 13th
    2 Files
  • 14
    Jan 14th
    4 Files
  • 15
    Jan 15th
    31 Files
  • 16
    Jan 16th
    15 Files
  • 17
    Jan 17th
    16 Files
  • 18
    Jan 18th
    24 Files
  • 19
    Jan 19th
    7 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close