Latest Exploits / Tools

Latest Exploits

  • Thu, 13 Dec 2018 23:47:21 +0000: Safari Proxy Object Type Confusion - Exploit Files ≈ Packet Storm
    This Metasploit module exploits a type confusion bug in the Javascript Proxy object in WebKit. The DFG JIT does not take into account that, through the use of a Proxy, it is possible to run arbitrary JS code during the execution of a CreateThis operation. This makes it possible to change the structure of e.g. an argument without causing a bailout, leading to a type confusion.
  • Thu, 13 Dec 2018 19:20:15 +0000: Windows UAC Protection Bypass - Exploit Files ≈ Packet Storm
    This Metasploit module modifies a registry key, but cleans up the key once the payload has been invoked. The module does not require the architecture of the payload to match the OS.
  • Thu, 13 Dec 2018 04:46:42 +0000: WebDAV Server Serving DLL - Exploit Files ≈ Packet Storm
    This Metasploit module simplifies the rundll32.exe Application Whitelisting Bypass technique. The module creates a webdav server that hosts a dll file. When the user types the provided rundll32 command on a system, rundll32 will load the dll remotely and execute the provided export function. The export function needs to be valid, but the default meterpreter function can be anything. The process does write the dll to C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\TfsStore\Tfs_DAV but does not load the dll from that location. This file should be removed after execution. The extension can be anything you'd like, but you don't have to use one. Two files will be written to disk. One named the requested name and one with a dll extension attached.
  • Thu, 13 Dec 2018 04:37:14 +0000: Fortify SSC 17.10 / 17.20 / 18.10 User Detail Insecure Direct Object Reference - Exploit Files ≈ Packet Storm
    Fortify Software Security Center versions 17.10, 17.20, and 18.10 suffer from an insecure direct object reference vulnerability related to extracting local and ldap users.
  • Thu, 13 Dec 2018 04:35:02 +0000: Fortify SSC 17.10 / 17.20 / 18.10 Project Insecure Direct Object Reference - Exploit Files ≈ Packet Storm
    Fortify Software Security Center versions 17.10, 17.20, and 18.10 suffer from an insecure direct object reference vulnerability related to user projects.
  • Wed, 12 Dec 2018 05:19:32 +0000: WordPress Snap Creek Duplicator Code Injection - Exploit Files ≈ Packet Storm
    When the WordPress plugin Snap Creek Duplicator restores a backup, it leaves dangerous files in the filesystem such as installer.php and installer-backup.php. These files allow anyone to call a function that overwrite the wp-config.php file AND this function does not sanitize POST parameters before inserting them inside the wp-config.php file, leading to arbitrary PHP code execution. WARNING: This exploit WILL break the wp-config.php file. If possible try to restore backups of the configuration after the exploit to make the WordPress site work again.
  • Wed, 12 Dec 2018 05:12:57 +0000: HotelDruid 2.3 SQL Injection - Exploit Files ≈ Packet Storm
    HotelDruid version 2.3 suffers from a remote SQL injection vulnerability.
  • Wed, 12 Dec 2018 05:12:12 +0000: Apache OFBiz 16.11.05 Cross Site Scripting - Exploit Files ≈ Packet Storm
    Apache OFBiz version 16.11.05 suffers from a cross site scripting vulnerability.
  • Wed, 12 Dec 2018 05:09:47 +0000: WordPress AutoSuggest 0.24 SQL Injection - Exploit Files ≈ Packet Storm
    WordPress AutoSuggest plugin version 0.24 suffers from a remote SQL injection vulnerability.
  • Wed, 12 Dec 2018 05:08:42 +0000: ThinkPHP 5.x Remote Code Execution - Exploit Files ≈ Packet Storm
    ThinkPHP versions prior to 5.0.23 and prior to 5.1.31 suffer from a remote code execution vulnerability.
  • Wed, 12 Dec 2018 05:07:23 +0000: Huawei B315s-22 Information Disclosure - Exploit Files ≈ Packet Storm
    Huawei B315s-22 suffers from an information disclosure vulnerability.
  • Wed, 12 Dec 2018 05:06:11 +0000: Adobe ColdFusion 2018 Shell Upload - Exploit Files ≈ Packet Storm
    Adobe ColdFusion 2018 suffers from a remote shell upload vulnerability.
  • Wed, 12 Dec 2018 05:04:54 +0000: TP-Link Archer C1200 Cross Site Scripting - Exploit Files ≈ Packet Storm
    TP-Link Archer C1200 suffers from a cross site scripting vulnerability.
  • Wed, 12 Dec 2018 04:59:22 +0000: PrestaShop 1.6.x / 1.7.x Remote Code Execution - Exploit Files ≈ Packet Storm
    PrestaShop versions 1.6.x and 1.7.x suffer from a remote code execution vulnerability.
  • Wed, 12 Dec 2018 04:58:38 +0000: Tourism Website Blog Code Execution / SQL Injection - Exploit Files ≈ Packet Storm
    Tourism Website version Blog suffers from code execution and remote SQL injection vulnerabilities.
  • Wed, 12 Dec 2018 04:57:54 +0000: Alumni Tracer SMS Notification Cross Site Request Forgery / SQL Injection - Exploit Files ≈ Packet Storm
    Alumni Tracer SMS version Notification suffers from cross site request forgery and remote SQL injection vulnerabilities.
  • Wed, 12 Dec 2018 04:53:53 +0000: SmartFTP Client 9.0.2623.0 Denial Of Service - Exploit Files ≈ Packet Storm
    SmartFTP Client version 9.0.2623.0 suffers from a denial of service vulnerability.
  • Wed, 12 Dec 2018 04:52:30 +0000: LanSpy 2.0.1.159 Buffer Overflow - Exploit Files ≈ Packet Storm
    LanSpy version 2.0.1.159 suffers from a local buffer overflow vulnerability.
  • Wed, 12 Dec 2018 04:50:32 +0000: PrinterOn Enterprise 4.1.4 Arbitrary File Deletion - Exploit Files ≈ Packet Storm
    PrinterOn Enterprise version 4.1.4 suffers from an arbitrary file deletion vulnerability.
  • Wed, 12 Dec 2018 04:45:05 +0000: Linux userfaultfd tmpfs File Permission Bypass - Exploit Files ≈ Packet Storm
    Linux userfaultfd bypasses tmpfs file permissions.

Latest Tools

  • Thu, 13 Dec 2018 18:33:46 +0000: Falco 0.13.0 - Security Tool Files ≈ Packet Storm
    Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.
  • Tue, 11 Dec 2018 16:26:30 +0000: Faraday 3.4 - Security Tool Files ≈ Packet Storm
    Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.
  • Fri, 07 Dec 2018 19:18:58 +0000: SQLMAP - Automatic SQL Injection Tool 1.2.12 - Security Tool Files ≈ Packet Storm
    sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.
  • Thu, 06 Dec 2018 19:04:11 +0000: Packet Fence 8.2.1 - Security Tool Files ≈ Packet Storm
    PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.
  • Tue, 04 Dec 2018 05:06:30 +0000: Hashcat Advanced Password Recovery 5.1.0 Source Code - Security Tool Files ≈ Packet Storm
    Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release.
  • Tue, 04 Dec 2018 05:06:24 +0000: Hashcat Advanced Password Recovery 5.1.0 Binary Release - Security Tool Files ≈ Packet Storm
    Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release.
  • Tue, 04 Dec 2018 05:06:18 +0000: Clam AntiVirus Toolkit 0.101.0 - Security Tool Files ≈ Packet Storm
    Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a command-line scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.
  • Sat, 01 Dec 2018 15:00:40 +0000: TestSSL 3.0rc3 - Security Tool Files ≈ Packet Storm
    testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws, and much more. It is written in (pure) bash, makes only use of standard Unix utilities, openssl and last but not least bash sockets.
  • Fri, 30 Nov 2018 15:45:56 +0000: Bro Network Security Monitor 2.6 - Security Tool Files ≈ Packet Storm
    Bro is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Bro provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Bro has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Bro's user community includes major universities, research labs, supercomputing centers, and open-science communities.
  • Thu, 29 Nov 2018 02:32:44 +0000: Wireshark Analyzer 2.6.5 - Security Tool Files ≈ Packet Storm
    Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.
  • Wed, 28 Nov 2018 18:01:38 +0000: Htcap Analysis Tool 1.1.0 - Security Tool Files ≈ Packet Storm
    Htcap is a web application analysis tool for detecting communications between javascript and the server. It crawls the target application and maps ajax calls, dynamically inserted scripts, websockets calls, dynamically loaded resources and some interesting elements. The generated report is meant to be a good starting point for a manual web application security audit. Htcap is written in python and uses phantomjs to load pages injecting a probe that analyzes javascript behaviour. Once injected, the probe, overrides native javascript methods in order to intercept communications and DOM changes. It also simulates user interaction by firing all attached events and by filling html inputs.
  • Wed, 28 Nov 2018 17:42:43 +0000: XSS Fuzzer - Security Tool Files ≈ Packet Storm
    XSS Fuzzer is a simple application written in plain HTML/JavaScript/CSS which generates XSS payloads based on user-defined vectors using multiple placeholders which are replaced with fuzzing lists. It offers the possibility to just generate the payloads as plain-text or to execute them inside an iframe. Inside iframes, it is possible to send GET or POST requests from the browser to arbitrary URLs using generated payloads.
  • Sun, 25 Nov 2018 23:07:06 +0000: Faraday 3.3 - Security Tool Files ≈ Packet Storm
    Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.
  • Wed, 21 Nov 2018 02:16:27 +0000: OpenSSL Toolkit 1.1.1a - Security Tool Files ≈ Packet Storm
    OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.
  • Thu, 15 Nov 2018 18:02:22 +0000: Apkatshu 1.0 - Security Tool Files ≈ Packet Storm
    Apkatshu is a tool for for extracting urls, emails, ip addresses, and interesting data from APK files. The user can choose either JADX or APKTOOL for de-compilation.
  • Fri, 09 Nov 2018 18:02:34 +0000: Packet Fence 8.2.0 - Security Tool Files ≈ Packet Storm
    PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.
  • Fri, 09 Nov 2018 17:59:24 +0000: Web-Based Firewall Logging Tool 1.1.1 - Security Tool Files ≈ Packet Storm
    Webfwlog is a Web-based firewall log reporting and analysis tool. It allows users to design reports to use on logged firewall data in whatever configuration they desire. Included are sample reports as a starting point. Reports can be sorted with a single click, or "drilled-down" all the way to the packet level, and saved for later use. Supported log formats are netfilter, ipfilter, ipfw, ipchains, and Windows XP. Netfilter support includes ulogd MySQL or PostgreSQL database logs using the iptables ULOG target.
  • Tue, 06 Nov 2018 23:54:03 +0000: Suricata IDPE 4.1.0 - Security Tool Files ≈ Packet Storm
    Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
  • Tue, 06 Nov 2018 23:51:47 +0000: Stegano 0.8.6 - Security Tool Files ≈ Packet Storm
    Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.
  • Tue, 06 Nov 2018 23:49:09 +0000: GNU Privacy Guard 2.2.11 - Security Tool Files ≈ Packet Storm
    GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

@Risk Exploits

ExploitDB