Hack Tools/Exploits


Packetstorm Last 10 Files

  1. Atlassian Confluence Widget Connector Macro Velocity Template Injection - Widget Connector Macro is part of Atlassian Confluence Server and Data Center that allows embed online videos, slideshows, photostreams and more directly into page. A _template parameter can be used to inject remote Java code into a Velocity template, and gain code execution. Authentication is not required to exploit this vulnerability. By default, Java payload will be used because it is cross-platform, but you can also specify which native payload you want (Linux or Windows). Confluence before version 6.6.12, from version 6.7.0 before 6.12.3, from version 6.13.0 before 6.13.3 and from version 6.14.0 before 6.14.2 are affected.
  2. Ubuntu Security Notice USN-3950-1 - Ubuntu Security Notice 3950-1 - It was discovered that ZNC incorrectly handled certain invalid encodings. An authenticated remote user could use this issue to cause ZNC to crash, resulting in a denial of service, or possibly execute arbitrary code.
  3. Netwide Assembler (NASM) 2.14rc15 Null Pointer Dereference - Netwide Assembler (NASM) version 2.14rc15 null pointer dereference proof of concept exploit.
  4. ManageEngine Applications Manager 14 SQL Injection / Remote Code Execution - This Metasploit module exploits SQL injection and command injection vulnerabilities in ManageEngine AM 14 and prior versions. An unauthenticated user can gain the authority of "system" on the server due to the SQL injection vulnerability. The exploit allows the writing of the desired file to the system using the postgresql structure. The module is written over the payload by selecting a file with the extension ".vbs" that is used for monitoring by the ManageEngine which working with "system" authority. In addition, it dumps the users and passwords from the database for us. After the harmful ".vbs" file is written, the shell session may be a bit late.
  5. Evernote 7.9 Path Traversal / Code Execution - Evernote version 4.9 suffers from a path traversal that can allow for code execution.
  6. Redacted Report On The Investigation Into Russian Interference In The 2016 Presidential Election - Released 2019/04/18 by the United States Justice Department, this is the Report On The Investigation Into Russian Interference In The 2016 Presidential Election. This is the redacted version.
  7. OpenSSH 8.0p1 - This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.
  8. Slackware Security Advisory - libpng Updates - Slackware Security Advisory - New libpng packages are available for Slackware 14.2 and -current to fix security issues.
  9. LibreOffice Macro Code Execution - This Metasploit module generates an ODT file with a mouse over event that when triggered, will execute arbitrary code.
  10. Gentoo Linux Security Advisory 201904-19 - Gentoo Linux Security Advisory 201904-19 - Multiple vulnerabilities have been found in Dovecot, the worst of which could result in root privilege escalation. Versions less than 2.3.5.1 are affected.

Packetstorm Tools

  1. OpenSSH 8.0p1 - This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.
  2. Raptor WAF 0.6 - Raptor is a web application firewall written in C that uses DFA to block SQL injection, cross site scripting, and path traversals.
  3. Mandos Encrypted File System Unattended Reboot Utility 1.8.4 - The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.
  4. Stegano 0.9.3 - Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.
  5. GNUnet P2P Framework 0.11.0 - GNUnet is a peer-to-peer framework with focus on providing security. All peer-to-peer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP (IPv4 and IPv6), TCP (IPv4 and IPv6), HTTP, or SMTP messages. GNUnet supports accounting to provide contributing nodes with better service. The primary service build on top of the framework is anonymous file sharing.
  6. Wireshark Analyzer 3.0.1 - Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.
  7. Stegano 0.9.2 - Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.
  8. Faraday 3.7.0 - Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.
  9. PHPGGC unserialize() Payload Tool - PHPGGC is a library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.
  10. SQLMAP - Automatic SQL Injection Tool 1.3.4 - sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

Packetstorm Exploits

  1. Atlassian Confluence Widget Connector Macro Velocity Template Injection - Widget Connector Macro is part of Atlassian Confluence Server and Data Center that allows embed online videos, slideshows, photostreams and more directly into page. A _template parameter can be used to inject remote Java code into a Velocity template, and gain code execution. Authentication is not required to exploit this vulnerability. By default, Java payload will be used because it is cross-platform, but you can also specify which native payload you want (Linux or Windows). Confluence before version 6.6.12, from version 6.7.0 before 6.12.3, from version 6.13.0 before 6.13.3 and from version 6.14.0 before 6.14.2 are affected.
  2. Netwide Assembler (NASM) 2.14rc15 Null Pointer Dereference - Netwide Assembler (NASM) version 2.14rc15 null pointer dereference proof of concept exploit.
  3. ManageEngine Applications Manager 14 SQL Injection / Remote Code Execution - This Metasploit module exploits SQL injection and command injection vulnerabilities in ManageEngine AM 14 and prior versions. An unauthenticated user can gain the authority of "system" on the server due to the SQL injection vulnerability. The exploit allows the writing of the desired file to the system using the postgresql structure. The module is written over the payload by selecting a file with the extension ".vbs" that is used for monitoring by the ManageEngine which working with "system" authority. In addition, it dumps the users and passwords from the database for us. After the harmful ".vbs" file is written, the shell session may be a bit late.
  4. Evernote 7.9 Path Traversal / Code Execution - Evernote version 4.9 suffers from a path traversal that can allow for code execution.
  5. LibreOffice Macro Code Execution - This Metasploit module generates an ODT file with a mouse over event that when triggered, will execute arbitrary code.
  6. Oracle Java Runtime Environment GlyphIterator::setCurrGlyphID Heap Corruption - A heap corruption was observed in Oracle Java Runtime Environment version 8u202 (latest at the time of this writing) while fuzz-testing the processing of TrueType fonts.
  7. Oracle Java Runtime Environment sc_FindExtrema4 Heap Corruption - A heap corruption was observed in Oracle Java Runtime Environment version 8u202 (latest at the time of this writing) while fuzz-testing the processing of TrueType, implemented in a proprietary t2k library.
  8. OAMbuster Multi-Threaded CVE-2018-2879 Scanner - OAMbuster is a multi-threaded exploit for CVE-2018-2879.
  9. DHCP Server 2.5.2 Denial Of Service - DHCP Server version 2.5.2 suffers from a denial of service vulnerability.
  10. ASUS HG100 Denial Of Service - ASUS HG100 suffers from a denial of service vulnerability.

Securiteam Exploits