Hack Tools/Exploits


Packetstorm Last 10 Files

  1. Apple MacOS HIServices Privilege Escalation - Apple MacOS suffers from a local elevation of privilege vulnerability due to a lack of bounds checking in HIServices custom CFObject serialization.
  2. Apple iOS / OS X NSKeyedArchiver Memory Corruption - Apple iOS / OS X suffer from a NSKeyedArchiver memory corruption vulnerability due to a lack of bounds checking in CAMediaTimingFunctionBuiltin.
  3. Apple iOS / MacOS NSKeyedArchiver Heap Corruption - Apple iOS / MacOS suffers from a NSKeyedArchiver heap corruption vulnerability due to a rounding error in TIKeyboardLayout initWithCoder:.
  4. Apple MacOS NSUnarchiver Heap Corruption - Apple MacOS NSUnarchiver suffers from a heap corruption vulnerability due to lack of bounds checking in [NSBuiltinCharacterSet initWithCoder:].
  5. Apple iOS / MacOS NSCharacterSet Memory Corruption - Apple iOS / MacOS suffers from a memory corruption vulnerability due to bad bounds checking in NSCharacterSet coding for NSKeyedUnarchiver.
  6. Apple iOS / MacOS Netagent Kernel Memory Disclosure - Apple iOS / MacOS suffers from a kernel memory disclosure vulnerability due to lack of bounds checking in netagent socket option handling.
  7. Apple iOS / MacOS Domain Socket Kernel Use-After-Free - Apple iOS / MacOS suffer from a kernel use-after-free vulnerability due to bad locking in unix domain socket file descriptor externalization.
  8. Trend Micro ServerProtect Disclosure / CSRF / XSS - Trend Micro ServerProtect suffers from information disclosure, manipulation, cross site request forgery, cross site scripting, and various other vulnerabilities.
  9. Ubuntu Security Notice USN-3283-2 - Ubuntu Security Notice 3283-2 - Dave McDaniel discovered that rtmpdump incorrectly handled certain malformed streams. If a user were tricked into processing a specially crafted stream, a remote attacker could cause rtmpdump to crash, resulting in a denial of service, or possibly execute arbitrary code.
  10. Red Hat Security Advisory 2017-1268-01 - Red Hat Security Advisory 2017-1268-01 - The libtirpc packages contain SunLib's implementation of transport-independent remote procedure call documentation, which includes a library required by programs in the nfs-utils and rpcbind packages. Security Fix: It was found that due to the way rpcbind uses libtirpc, a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer.

Packetstorm Tools

  1. DAVOSET 1.3.3 - DAVOSET is a tool for committing distributed denial of service attacks using execution on other sites.
  2. Nixauditor CIS Script 1.1 - Nixauditor is a script to audit linux and unix distributions based mainly on the CIS standards and universal linux hardening guidelines.
  3. AntiRansom 3.02 - AntiRansom is a tool capable of detecting and mitigating attacks of Ransomware using honeypots.
  4. Mosca Analysis Tool 0.08 - Mosca is a tool that checks code for poor security practices akin to using grep against it for static analysis.
  5. Stegano 0.8.1 - Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.
  6. Falco 0.6.1 - Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.
  7. Payload Mask 0.2 - Payload Mask is a payload editor that can mutate an initial dataset.
  8. TOR Virtual Network Tunneling Tool 0.3.0.7 - Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).
  9. Stegano 0.8 - Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.
  10. Disable Intel AMT - This is a tool written to disable Intel AMT on Windows.

Packetstorm Exploits

  1. Apple MacOS HIServices Privilege Escalation - Apple MacOS suffers from a local elevation of privilege vulnerability due to a lack of bounds checking in HIServices custom CFObject serialization.
  2. Apple iOS / OS X NSKeyedArchiver Memory Corruption - Apple iOS / OS X suffer from a NSKeyedArchiver memory corruption vulnerability due to a lack of bounds checking in CAMediaTimingFunctionBuiltin.
  3. Apple iOS / MacOS NSKeyedArchiver Heap Corruption - Apple iOS / MacOS suffers from a NSKeyedArchiver heap corruption vulnerability due to a rounding error in TIKeyboardLayout initWithCoder:.
  4. Apple MacOS NSUnarchiver Heap Corruption - Apple MacOS NSUnarchiver suffers from a heap corruption vulnerability due to lack of bounds checking in [NSBuiltinCharacterSet initWithCoder:].
  5. Apple iOS / MacOS NSCharacterSet Memory Corruption - Apple iOS / MacOS suffers from a memory corruption vulnerability due to bad bounds checking in NSCharacterSet coding for NSKeyedUnarchiver.
  6. Apple iOS / MacOS Netagent Kernel Memory Disclosure - Apple iOS / MacOS suffers from a kernel memory disclosure vulnerability due to lack of bounds checking in netagent socket option handling.
  7. Apple iOS / MacOS Domain Socket Kernel Use-After-Free - Apple iOS / MacOS suffer from a kernel use-after-free vulnerability due to bad locking in unix domain socket file descriptor externalization.
  8. Trend Micro ServerProtect Disclosure / CSRF / XSS - Trend Micro ServerProtect suffers from information disclosure, manipulation, cross site request forgery, cross site scripting, and various other vulnerabilities.
  9. Joomla VideoFlow 1.2.0 SQL Injection - Joomla VideoFlow extension version 1.2.0 suffers from a remote SQL injection vulnerability.
  10. Alex Guestbook 5.0.4 Cross Site Scripting - Alex Guestbook version 5.0.4 suffers from a cross site scripting vulnerability.

Securiteam Exploits

  1. Google Android 7 GPU Obtain Information Vulnerability - Google Android is prone to a gain information vulnerability.This allows local or remote attackers to gain privileges via a malicious program in the affected application
  2. IBM Bigfix Remote Control 9.1.2 Cross Site Scripting Vulnerability - Cross-site scripting (XSS) vulnerability in IBM BigFix Remote Control before 9.1.3 allows remote attackers to inject arbitrary web script or HTML via vectors.
  3. Linux Kernel 4.5.1 Execute Code Vulnerability - Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.
  4. Microsoft Internet Explorer 10 Explorer Denial Of Service Execute Code Overflow Memory corruption Vulnerability - Microsoft Internet Explorer is prone to a denial of service (DoS) vulnerability.This allow a remote attacker to cause a denial of service (DoS) condition due to high consumption of system resources via certain vulnerable vectors.
  5. Oracle Agile Product Lifecycle Management Framework confidentiality Remote Code Execution Vulnerability - Oracle Agile Product Lifecycle Management Framework is prone to a remote code-execution vulnerability.This allows a remote attacker to exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts may result in a denial-of-service condition.