Latest Exploits / Tools

Latest Exploits

  • Tue, 24 May 2016 23:33:40 +0000: Oracle ATS Arbitrary File Upload - Exploit Files ≈ Packet Storm
    This Metasploit module exploits an authentication bypass and arbitrary file upload in Oracle Application Testing Suite (OATS), version 12.4.0.2.0 and unknown earlier versions, to upload and execute a JSP shell.
  • Tue, 24 May 2016 15:52:33 +0000: Ubiquiti airOS Arbitrary File Upload - Exploit Files ≈ Packet Storm
    This Metasploit module exploits a pre-auth file upload to install a new root user to /etc/passwd and an SSH key to /etc/dropbear/authorized_keys. FYI, /etc/{passwd,dropbear/authorized_keys} will be overwritten. /etc/persistent/rc.poststart will be overwritten if PERSIST_ETC is true. This method is used by the "mf" malware infecting these devices.
  • Tue, 24 May 2016 15:46:35 +0000: PowerFolder 10.4.321 Remote Code Execution - Exploit Files ≈ Packet Storm
    PowerFolder version 10.4.321 suffers from a remote code execution vulnerability. Proof of concept exploit included.
  • Tue, 24 May 2016 15:37:56 +0000: AfterLogic WebMail Pro ASP.NET Account Takeover / XXE Injection - Exploit Files ≈ Packet Storm
    AfterLogic WebMail Pro ASP.NET versions prior to 6.2.7 suffer from an administrator account takeover via an XXE injection vulnerability.
  • Tue, 24 May 2016 15:32:58 +0000: XenAPI For XenForo 1.4.1 SQL Injection - Exploit Files ≈ Packet Storm
    XenAPI for XenForo version 1.4.1 suffers from a remote SQL injection vulnerability.
  • Tue, 24 May 2016 15:10:23 +0000: MediaLink MWN-WAPR300N Insecure Session - Exploit Files ≈ Packet Storm
    MediaLink router MWN-WAPR300N suffers from multiple session related issues such as not being able to logout and sessions do not time out. Insecure transport is another issue.
  • Tue, 24 May 2016 15:08:35 +0000: Infobae Cross Site Scripting - Exploit Files ≈ Packet Storm
    The Infobae website suffers from multiple cross site scripting vulnerabilities. The author has received no response from them.
  • Tue, 24 May 2016 01:11:11 +0000: Counterfeiting With Cisco IP Communicator - Exploit Files ≈ Packet Storm
    Whitepaper that discusses how Cisco IP Communicator only uses MAC addresses for authentication allowing you to spoof other callers.
  • Mon, 23 May 2016 15:57:30 +0000: JobScript Remote Code Execution - Exploit Files ≈ Packet Storm
    JobScript suffers from an authenticated arbitrary PHP code execution. The vulnerability is caused due to the improper verification of uploaded files in '/admin-ajax.php' script thru the 'name' and 'file' POST parameters. This can be exploited to execute arbitrary PHP code by uploading a malicious PHP script file with '.php' extension (to bypass the '.htaccess' block rule) that will be stored in '/jobmonster/wp-content/uploads/jobmonster/' directory.
  • Mon, 23 May 2016 15:50:59 +0000: Operation Technology ETAP 14.1.0 Stack Buffer Overflow - Exploit Files ≈ Packet Storm
    Multiple ETAP binaries are prone to a stack-based buffer overflow vulnerability because the application fails to handle malformed arguments. Version 14.1.0.0 is affected. An attacker can exploit these issues to execute arbitrary code within the context of the application or to trigger a denial-of-service conditions.
  • Mon, 23 May 2016 14:44:44 +0000: Linknat VOS3000/VOS2009 SQL Injection - Exploit Files ≈ Packet Storm
    Linknat VOS3000/VOS2009 suffers from a remote SQL injection vulnerability.
  • Mon, 23 May 2016 04:45:55 +0000: WEBONE CMS 6 SQL Injection - Exploit Files ≈ Packet Storm
    WEBONE CMS version 6 suffers from a remote SQL injection vulnerability.
  • Mon, 23 May 2016 04:44:44 +0000: AMSS++ 4.2 Admin Backdoor Account - Exploit Files ≈ Packet Storm
    AMSS++ version 4.2 has an admin/admin backdoor account.
  • Mon, 23 May 2016 04:44:44 +0000: Lws-Construction Management 1.0 SQL Injection - Exploit Files ≈ Packet Storm
    Lws-Construction Management version 1.0 suffers from a remote SQL injection vulnerability.
  • Mon, 23 May 2016 04:22:22 +0000: JobScript Open Redirection - Exploit Files ≈ Packet Storm
    JobScript suffers from an open redirection vulnerability.
  • Mon, 23 May 2016 03:44:44 +0000: Calliope 2.31 Authentication Bypass / SQL Injection - Exploit Files ≈ Packet Storm
    Calliope version 2.31 suffers from authentication bypass due to a remote SQL injection vulnerability.
  • Mon, 23 May 2016 03:35:55 +0000: Annuaire de Salon et Foire 1.4 Authentication Bypass / SQL Injection - Exploit Files ≈ Packet Storm
    Annuaire de Salon et Foire version 1.4 suffers from authentication bypass due to a remote SQL injection vulnerability.
  • Mon, 23 May 2016 03:34:33 +0000: Sitizy 2.0 Authentication Bypass / SQL Injection - Exploit Files ≈ Packet Storm
    Sitizy version 2.0 suffers from authentication bypass due to a remote SQL injection vulnerability.
  • Mon, 23 May 2016 03:33:33 +0000: Torop Tourisme 2.0 SQL Injection - Exploit Files ≈ Packet Storm
    Torop Tourisme version 2.0 suffers from a remote SQL injection vulnerability.
  • Sun, 22 May 2016 23:33:33 +0000: Operation Technology ETAP 14.1.0 Local Privilege Escalation - Exploit Files ≈ Packet Storm
    ETAP suffers from an elevation of privileges vulnerability which can be used by a simple authenticated user that can change the executable file with a binary of choice. The vulnerability exist due to the improper permissions, with the 'C' flag (Change) for 'Authenticated Users' group. Version 14.1.0.0 is affected.

Latest Tools

  • Tue, 24 May 2016 12:22:22 +0000: Shellsploit Framework Beta 0.3 - Security Tool Files ≈ Packet Storm
    Shellsploit lets you generate customized shellcodes, backdoors, and injectors for various operating systems. It also has obfuscation abilities.
  • Mon, 23 May 2016 16:07:20 +0000: Stegano 0.5.4 - Security Tool Files ≈ Packet Storm
    Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.
  • Mon, 23 May 2016 03:33:33 +0000: Sunxi Linux Module Backdoor - Security Tool Files ≈ Packet Storm
    This is a Linux kernel module that adds a backdoor to a system. Based on sunxi_debug.
  • Mon, 23 May 2016 00:12:12 +0000: pyJoiner Tool Using Tkinter - Security Tool Files ≈ Packet Storm
    This is a deviation of the pyJoiner tool using Tkinter.
  • Fri, 20 May 2016 20:22:22 +0000: Stegano 0.5.3 - Security Tool Files ≈ Packet Storm
    Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.
  • Thu, 19 May 2016 11:11:11 +0000: Ansvif 1.5 - Security Tool Files ≈ Packet Storm
    Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault.
  • Wed, 18 May 2016 23:33:10 +0000: Falco 0.1.0 - Security Tool Files ≈ Packet Storm
    Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.
  • Fri, 13 May 2016 02:22:22 +0000: ifchk 1.0.3 - Security Tool Files ≈ Packet Storm
    Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.
  • Thu, 12 May 2016 06:45:33 +0000: ASP Webshell For IIS 8 - Security Tool Files ≈ Packet Storm
    ASP webshell backdoor designed specifically for IIS 8.
  • Tue, 10 May 2016 17:02:22 +0000: PHP Backdoor Collection - Security Tool Files ≈ Packet Storm
    This is a collection of PHP backdoors to be used for testing purposes.
  • Fri, 06 May 2016 13:13:13 +0000: Faraday 1.0.19 - Security Tool Files ≈ Packet Storm
    Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.
  • Wed, 04 May 2016 14:55:14 +0000: Clam AntiVirus Toolkit 0.99.2 - Security Tool Files ≈ Packet Storm
    Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.
  • Tue, 03 May 2016 23:31:47 +0000: OpenSSL Toolkit 1.0.2h - Security Tool Files ≈ Packet Storm
    OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.
  • Tue, 03 May 2016 10:32:22 +0000: Mobile Security Framework MobSF 0.9.2 Beta - Security Tool Files ≈ Packet Storm
    Mobile Security Framework (MobSF) is an all-in-one open source mobile application (Android/iOS) automated pen-testing framework capable of performing static and dynamic analysis. It can be used for effective and fast security analysis of Android and iOS Applications and supports both binaries (APK & IPA) and zipped source code. MobSF can also do Web API Security testing with it's API Fuzzer that performs Information Gathering, analyze Security Headers, identify Mobile API specific vulnerabilities like XXE, SSRF, Path Traversal, IDOR, and other logical issues related to Session Management and API Rate Limiting.
  • Mon, 02 May 2016 21:23:22 +0000: Ansvif 1.4.2 - Security Tool Files ≈ Packet Storm
    Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault.
  • Mon, 02 May 2016 03:33:33 +0000: VBScan Vulnerability Scanner 0.1.6 - Security Tool Files ≈ Packet Storm
    VBScan is a black box vBulletin vulnerability scanner written in perl.
  • Sat, 30 Apr 2016 06:42:51 +0000: Packet Fence 6.0.1 - Security Tool Files ≈ Packet Storm
    PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.
  • Thu, 28 Apr 2016 13:02:22 +0000: Packet Fence 6.0.0 - Security Tool Files ≈ Packet Storm
    PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.
  • Wed, 27 Apr 2016 13:44:44 +0000: Logwatch 7.4.3 - Security Tool Files ≈ Packet Storm
    Logwatch analyzes and reports on unix system logs. It is a customizable and pluggable log monitoring system which will go through the logs for a given period of time and make a customizable report. It should work right out of the package on most systems.
  • Tue, 26 Apr 2016 12:52:22 +0000: Pcapteller 1.1 - Security Tool Files ≈ Packet Storm
    Pcapteller is a tool designed for simple traffic manipulation and replay. The tool allows you to recreate a recorded network traffic scenario that occurred in a foreign network, as it really happened in yours. Basically, the tool reads network packets from a PCAP file, and it replaces a given IP address with one that fits your needs. Afterwards, the manipulated packets are injected into the network. The tool is useful if you want to recreate scenarios where computer attacks or malware infections occurred. Using such scenarios as a base, Pcapteller will make it look like everything is really happening in your network. Pcapteller can help you improving your blue team's network security monitoring skills, or creating network decoys during red team operations.

@Risk Exploits

  • : SANSFIRE 2011 - @RISK: The Consensus Security Alert
    SANSFIRE 2011

ExploitDB