首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Havij Pro - Crash POC
  日期:2015-08-11 14:31:56 点击:22 评论:0
#!/usr/bin/env python #Exploit Title:Havij Pro Crash POC # Tested:windows7 #Sofrware Link:http://www.itsecteam.com/ #Version:1.17 #Email:i_7e1@outlook.com #Author:M1x7e1@Safeye Team #run python poc.py #copy content to target #click Analyze ## EDB-No
Pineapple 2.3.0 Autopwn Script
  日期:2015-08-11 14:30:53 点击:24 评论:0
I have wrote PoC half a year ago, because i needed to try it on my Chinese router, and it still works on freshly purchased pineapple devices. (hello from Defcon ;) )And guys, its not a talk for the defcon, especially if you have done a botnet based
PHP SplDoublyLinkedList Use-After-Free
  日期:2015-08-10 13:53:04 点击:25 评论:0
#Use After Free Vulnerability in unserialize() with SplDoublyLinkedListTaoguang Chen [@chtg](http://github.com/chtg) - Write Date:2015.7.30 - Release Date: 2015.8.7 A use-after-free vulnerability was discovered in unserialize() with SplDoublyLinkedL
PHP SplObjectStorage Use-After-Free
  日期:2015-08-10 13:52:20 点击:45 评论:0
#Use After Free Vulnerability in unserialize() with SplObjectStorageTaoguang Chen [@chtg](http://github.com/chtg) - Write Date:2015.7.30 - Release Date: 2015.8.7 A use-after-free vulnerability was discovered in unserialize() with SplObjectStorage ob
PHP SPL ArrayObject Use-After-Free
  日期:2015-08-10 13:49:32 点击:36 评论:0
#Use After Free Vulnerability in unserialize() with SPL ArrayObjectTaoguang Chen [@chtg](http://github.com/chtg) - Write Date:2015.7.30 - Release Date: 2015.8.7 A use-after-free vulnerability was discovered in unserialize() with SPL ArrayObject obje
Tomabo MP4 Player 3.11.3 SEH Buffer Overflow
  日期:2015-08-10 13:48:43 点击:1306 评论:0
#!/usr/bin/python# Exploit Title: Tomabo MP4 Player 3.11.3 - (.m3u) SEH Buffer Overflow # Date: 03/08/2015# Exploit Author: Saeid Atabaki# E-Mail: bytecod3r at gmail.com, saeid at Nsecurity.org# Linkedin: https://www.linkedin.com/in/saeidatabaki# Ve
Linux/x86 Memory Sinkhole Proof Of Concept
  日期:2015-08-10 13:47:03 点击:46 评论:0
; memory sinkhole proof of concept; hijack ring -2 execution through the apic overlay attack. ; deployed in ring 0 ; the SMBASE register of the core under attackTARGET_SMBASE equ 0x1f5ef800 ; the location of the attack GDT.; this is determined by wh
FileZilla Client 2.2.x SEH Buffer Overflow
  日期:2015-08-10 13:46:09 点击:76 评论:0
# Exploit Title: Filezilla client 2.2.X SEH buffer overflow exploit# Date: 02/08/2015# Exploit Author: ly0n# Vendor Homepage: filezilla-project.org/# Software Link: http://www.oldapps.com/filezilla.php?app=7cdf14e88e9dfa85fb661c1c6e649e90# Version:
MS14-002 Windows NDProxy Privilege Escalation
  日期:2015-08-10 13:44:35 点击:144 评论:0
/*################################################################# Exploit Title: Windows NDProxy Privilege Escalation (MS14-002)# Date: 2015-08-03# Exploit Author: Tomislav Paskalev# Vulnerable Software:# Windows XP SP3 x86# Windows XP SP2 x86-64#
Classic FTP 2.36 - CWD Reconnection DoS
  日期:2015-08-10 13:43:00 点击:21 评论:0
#!/usr/bin/env python # # Exploit Title: Classic FTP v2.36 CWD Reconnection DOS # Date: 27/07/2015 # Exploit Author: St0rn fabien[at]anbu-pentest[dot]com # Vendor Homepage: www.nchsoftware.com # Software Link: www.nchsoftware.com/classic/cftpsetup.ex
Brasero - Crash Proof Of Concept
  日期:2015-08-10 13:42:02 点击:15 评论:0
#!/usr/bin/perl -w # Title : Kali (brasero) - Crash Proof Of Concept # website : https://www.kali.org/downloads/ # Tested : kali 1.x # # # Author : Mohammad Reza Espargham # Linkedin : https://ir.linkedin.com/in/rezasp # E-Mail : me[at]reza[dot]es ,
Acunetix Web Vulnerability Scanner 9.5 - Crash PoC
  日期:2015-08-10 13:40:40 点击:24 评论:0
#!/usr/bin/env python # Title : Acunetix Web Vulnerability Scanner 9.5 - Crash Proof Of Concept # Website : https://www.acunetix.com # Tested : win 7 / win 8.1 / win vista # # # Author : Hadi Zomorodi Monavar # Email : zomorodihadi@gmail.com # # 1 .
Heroes Of Might And Magic III .h3m Map File Buffer Overflow
  日期:2015-08-06 14:11:26 点击:65 评论:0
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'require 'zlib'class Metasploit3 Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::FI
BIND TKEY Query Denial Of Service
  日期:2015-08-06 14:10:23 点击:77 评论:0
#!/usr/bin/python# Title: BIND Remote DoS via TKEY queries# aka: DNS TKEY Query of Death# Author: Lorenzo Corsini serdat# E-Mail: serdat5[at]gmail[dot]com# Twitter: https://twitter.com/serdat5tm# References:# https://kb.isc.org/article/AA-01272# htt
Dell Netvault Backup 10.0.1.24 Denial Of Service
  日期:2015-08-06 14:09:18 点击:28 评论:0
Product: Dell Netvault BackupLink: http://software.dell.com/products/netvault-backup/Vendor: DellVulnerable Version(s): 10.0.1.24 and probably priorTested Version: Version 10.0.1.24Advisory Publication: July 30, 2015 Vendor Notification: January 9,
ISC BIND9 TKEY Remote DoS PoC
  日期:2015-08-06 13:59:59 点击:52 评论:0
# Exploit Title: PoC for BIND9 TKEY DoS # Exploit Author: elceef # Software Link: https://github.com/elceef/tkeypoc/ # Version: ISC BIND 9 # Tested on: multiple # CVE : CVE-2015-5477 #!/usr/bin/env python import socket import sys print('CVE-2015-5477
Linux Privilege Escalation Due to Nested NMIs Interrupting espfix64
  日期:2015-08-06 13:14:24 点击:85 评论:0
/* +++++ CVE-2015-3290 +++++ High impact NMI bug on x86_64 systems 3.13 and newer, embargoed. Also fixed by: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9b6e6a8334d56354853f9c255d1395c2ba570e0a The other fix (synchrono
BIND9 - TKEY PoC
  日期:2015-08-03 18:26:54 点击:206 评论:0
/* PoC for BIND9 TKEY assert Dos (CVE-2015-5477) Usage: tkill hostname What it does: - First sends a version query to see if the server is up. - Regardless of the version response, it then sends the DoS packet. - Then it waits 5 seconds for a respons
T-Mobile Internet Manager - Contact Name Crash PoC
  日期:2015-08-03 18:26:09 点击:27 评论:0
#!/usr/bin/python # coding: utf-8 #[+] Author: SATHISH ARTHAR #[+] Exploit Title: T-Mobile Internet Manager Memory Corruption PoC #[+] Date: 30-07-2015 #[+] Category: DoS/PoC #[+] Tested on: WinXp/Windows7/windows8 #[+] Vendor: https://www.t-mobile.d
KMPlayer 3.9.x - .srt Crash PoC
  日期:2015-08-03 18:25:27 点击:19 评论:0
#!/usr/bin/perl -w # Title : KMPlayer 3.9.x - Crash Proof Of Concept # Company : http://www.kmplayer.com # Tested : Windows 7 / Windows 8.1 # # # Author : Peyman Motevalli Manesh # Linkedin : https://ir.linkedin.com/in/peymanmotevalli # E-Mail : me[a
共637页/12733条记录 首页 上一页 [137] [138] [139] 140 [141] [142] [143] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved