Hack Tools/Exploits


Packetstorm Last 10 Files

  1. TOR Virtual Network Tunneling Tool 0.2.8.8 - Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).
  2. Metasploit Web UI Static secret_key_base Value - This Metasploit module exploits the Web UI for Metasploit Community, Express and Pro where one of a certain set of Weekly Releases have been applied. These Weekly Releases introduced a static secret_key_base value. Knowledge of the static secret_key_base value allows for deserialization of a crafted Ruby Object, achieving code execution. This Metasploit module is based on exploits/multi/http/rails_secret_deserialization.
  3. Linux SELinux W+X AIO Protection Bypass - SELinux suffers from a protection bypass that allows for a memory mapping that is both readable and writable.
  4. Adobe Flash Video Decompression Memory Corruption - Adobe Flash suffers from a memory corruption vulnerability in video decompression.
  5. Red Hat Security Advisory 2016-1931-01 - Red Hat Security Advisory 2016-1931-01 - Red Hat JBoss Fuse, based on Apache ServiceMix, provides a small-footprint, flexible, open source enterprise service bus and integration platform. Red Hat JBoss A-MQ, based on Apache ActiveMQ, is a standards compliant messaging system that is tailored for use in mission critical applications. This patch is an update to Red Hat JBoss Fuse 6.2.1 and Red Hat JBoss A-MQ 6.2.1. It includes several bug fixes, which are documented in the readme.txt file included with the patch files. Multiple security issues have been addressed.
  6. Ubuntu Security Notice USN-3087-2 - Ubuntu Security Notice 3087-2 - USN-3087-1 fixed vulnerabilities in OpenSSL. The fix for CVE-2016-2182 was incomplete and caused a regression when parsing certificates. This update fixes the problem. Shi Lei discovered that OpenSSL incorrectly handled the OCSP Status Request extension. A remote attacker could possibly use this issue to cause memory consumption, resulting in a denial of service. Guido Vranken discovered that OpenSSL used undefined behaviour when performing pointer arithmetic. A remote attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service. This issue has only been addressed in Ubuntu 16.04 LTS in this update. CAsar Pereida, Billy Brumley, and Yuval Yarom discovered that OpenSSL did not properly use constant-time operations when performing DSA signing. A remote attacker could possibly use this issue to perform a cache-timing attack and recover private DSA keys. Quan Luo discovered that OpenSSL did not properly restrict the lifetime of queue entries in the DTLS implementation. A remote attacker could possibly use this issue to consume memory, resulting in a denial of service. Shi Lei discovered that OpenSSL incorrectly handled memory in the TS_OBJ_print_bio function. A remote attacker could possibly use this issue to cause a denial of service. It was discovered that the OpenSSL incorrectly handled the DTLS anti-replay feature. A remote attacker could possibly use this issue to cause a denial of service. Various other issues were also addressed.
  7. Zortam MP3 Media Studio 21.15 Privilege Escalation - Zortam MP3 Studio version 21.15 suffers from an insecure file permission privilege escalation vulnerability.
  8. RealEstate CMS 3.00.50 Cross Site Scripting - RealEstate CMS version 3.00.50 suffers from a cross site scripting vulnerability.
  9. Wise Care 365 4.27 / Wise Disk Cleaner 9.29 Privilege Escalation - Wise Care 365 version 4.27 and Wise Disk Cleaner version 9.29 suffer from an unquoted service path privilege escalation vulnerability.
  10. Kerberos Security Feature Bypass - Kerberos in Microsoft Windows suffers from a security feature bypass vulnerability.

Packetstorm Tools

  1. TOR Virtual Network Tunneling Tool 0.2.8.8 - Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).
  2. Faraday 2.1.0 - Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.
  3. OpenSSL Toolkit 1.0.2i - OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.
  4. Keypatch 2.0 - Keypatch is a plugin of IDA Pro for Keystone Assembler Engine.
  5. CodeWarrior 0.3 - CodeWarrior is a manual code and static analysis tool. It has many modules, one for each common language like PHP, ASP, Ruby, C/C++, Java and Javascript. Each module has rules in raw text with parameters like description, type, reference, relevance and match (regex to detect pattern). You can also create your own rules.
  6. Tinycrypt.asm Training Ransomware Virus - Tinycrypt.asm is a training ransomware virus that is fully configurable to your needs but it is designed to be very controllable. It was designed to be used with the PoShFoTo incident response toolkit.
  7. Wireshark Analyzer 2.2.0 - Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.
  8. Suricata IDPE 3.1.2 - Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
  9. Nmap Port Scanner 7.25BETA2 - Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.
  10. 360-FAAR Firewall Analysis Audit And Repair 0.5.8 - 360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.

Packetstorm Exploits

  1. Metasploit Web UI Static secret_key_base Value - This Metasploit module exploits the Web UI for Metasploit Community, Express and Pro where one of a certain set of Weekly Releases have been applied. These Weekly Releases introduced a static secret_key_base value. Knowledge of the static secret_key_base value allows for deserialization of a crafted Ruby Object, achieving code execution. This Metasploit module is based on exploits/multi/http/rails_secret_deserialization.
  2. Linux SELinux W+X AIO Protection Bypass - SELinux suffers from a protection bypass that allows for a memory mapping that is both readable and writable.
  3. Adobe Flash Video Decompression Memory Corruption - Adobe Flash suffers from a memory corruption vulnerability in video decompression.
  4. Zortam MP3 Media Studio 21.15 Privilege Escalation - Zortam MP3 Studio version 21.15 suffers from an insecure file permission privilege escalation vulnerability.
  5. RealEstate CMS 3.00.50 Cross Site Scripting - RealEstate CMS version 3.00.50 suffers from a cross site scripting vulnerability.
  6. Kerberos Security Feature Bypass - Kerberos in Microsoft Windows suffers from a security feature bypass vulnerability.
  7. Wise Care 365 4.27 / Wise Disk Cleaner 9.29 Privilege Escalation - Wise Care 365 version 4.27 and Wise Disk Cleaner version 9.29 suffer from an unquoted service path privilege escalation vulnerability.
  8. Adobe Flash Memory Freeing Crash - There is a crash when the AVC decoder in Adobe Flash attempts to free memory, likely indicating memory corruption.
  9. Microsoft Windows NtLoadKeyEx User Hive Attachment Point Privilege Elevation - The NtLoadKeyEx system call allows an unprivileged user to load registry hives outside of the \Registry\A hidden attachment point which can be used to elevate privileges.
  10. 3GP Player 4.7.0 DLL Hijacking - 3GP Player version 4.7.0 suffers from a dll hijacking vulnerability.

Securiteam Exploits

  1. Oracle Enterprise Manager Base Platform 12.1.0.5 Security Advisories Remote Code Execution Vulnerability - Oracle Enterprise Manager Base Platform is prone to a remote code-execution vulnerability.This allows a remote attacker to exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts may result in a denial-of-service condition.
  2. Oracle Mysql 5.7.12 Security Advisories Remote Code Execution Vulnerability - vulnerability in Oracle MySQL 5.7.12 and earlier allows remote authenticated users to affect integrity and availability via vectors related to Server: InnoDB.
  3. Oracle Primavera P6 Enterprise Project Portfolio Management Remote Code Execution Vulnerability - Oracle Primavera P6 Enterprise Project Portfolio Management is prone to a remote code-execution vulnerability.This allows a remote attacker to exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts may result in a denial-of-service condition.
  4. Xmlsoft Libxslt iTunes Denial Of Service Overflow Memory corruption Vulnerability - Xmlsoft Libxslt is prone to a denial of service (DoS) vulnerability.This allow a remote attacker to cause a denial of service (DoS) condition due to high consumption of system resources via certain vulnerable vectors.
  5. Adobe Acrobat 11.0.16 Execute Arbitrary Code Denial Of Service Execute Code Overflow Memory Corruption Vulnerability - Adobe Acrobat is prone to a denial of service (DoS) vulnerability.This allow a remote attacker to cause a denial of service (DoS) condition due to high consumption of system resources via certain vulnerable vectors. Adobe Acrobat is prone to a remote code-execution vulnerability.This allows a remote attacker to exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts may result in a denial-of-service condition. Adobe Acrobat is prone to a overflow vulnerability.This allows a remote attackers to execute arbitrary code via crafted packets and cause a denial of service (memory corruption). Adobe Acrobat is prone to a memory corruption vulnerability.This allows a remote attacker to run a arbitrary code in context of a logged in user. It might cause a denial of service conditions if the attack fails.