#!/usr/bin/python2.7 #By : Mohamed Clay import socket from time import sleep from itertools import izip, cycle import base64 import sys def rc4crypt(data, key): x = 0 box = range ( 256 ) for i in range ( 256 ): x = (x + box[i] + ord (key[i % len (ke
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/
#!/usr/bin/env python import signal from time import sleep from socket import * from sys import exit, exc_info # # Title************************PCMan FTP Server v2.0.7 Remote Root Shell Exploit - USER Command # Discovered and Reported******June 2013
### This file is part of the Metasploit Framework and may be subject to# redistribution and commercial restrictions. Please see the Metasploit# web site for more information on licensing and terms of use.# http://metasploit.com/##require 'msf/core'r
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/c
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/c
Subject:Race condition in Sprite Software's backup software, installed by OEM on LGAndroid devices.CVE ID:CVE-2013-3685Initial disclosure:https://plus.google.com/110348415484169880343/posts/Me2yea2PgwESource:https://github.com/CunningLogic/LGPwnEffe
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/
# Title: PEiD v0.95 Memory Corruption# About PEiD : PEiD is an intuitive application that relies on its user-friendly interface to detect packers, cryptors and compilers found in PE executable files. Very popular among malware researchers for detect