Hack Tools/Exploits


Packetstorm Last 10 Files

  1. Atlassian Jira Authenticated Upload Code Execution - This Metasploit module can be used to execute a payload on Atlassian Jira via the Universal Plugin Manager(UPM). The module requires valid login credentials to an account that has access to the plugin manager. The payload is uploaded as a JAR archive containing a servlet using a POST request against the UPM component. The check command will test the validity of user supplied credentials and test for access to the plugin manager.
  2. Ubuntu Security Notice USN-3817-1 - Ubuntu Security Notice 3817-1 - It was discovered that Python incorrectly handled large amounts of data. A remote attacker could use this issue to cause Python to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. It was discovered that Python incorrectly handled running external commands in the shutil module. A remote attacker could use this issue to cause Python to crash, resulting in a denial of service, or possibly execute arbitrary code. Various other issues were also addressed.
  3. SwitchVPN For MacOS / Windows 2.1012.03 Man-In-The-Middle - SwitchVPN for MacOS and Windows version 2.1012.03 suffers from a man-in-the-middle vulnerability.
  4. Microsoft Security Advisory Update CVE Addition - This Microsoft bulletin summary lists a new CVE that has been added to the November advisory.
  5. Red Hat Security Advisory 2018-3601-01 - Red Hat Security Advisory 2018-3601-01 - OpenStack Block Storage manages block storage mounting and the presentation of such mounted block storage to instances. The backend physical storage can consist of local disks, or Fiber Channel, iSCSI, and NFS mounts attached to Compute nodes. Issues addressed include a failure to delete data.
  6. OCS Inventory NG ocsreports Shell Upload - OCS Inventory NG suffers from an ocsreports authenticated remote code execution vulnerability via a shell upload.
  7. Red Hat Security Advisory 2018-3600-01 - Red Hat Security Advisory 2018-3600-01 - The python-cryptography packages contain a Python Cryptographic Authority's cryptography library, which provides cryptographic primitives and recipes to Python developers. Issues addressed include a tag forgery vulnerability.
  8. Alive Parish 2.0.4 File Upload / SQL Injection - Alive Parish version 2.0.4 suffers from remote file upload and remote SQL injection vulnerabilities.
  9. Maitra Mail Tracking System 1.7.2 SQL Injection / Database File Download - Maitra Mail Tracking System version 1.7.2 suffers from remote SQL injection and database file download vulnerabilities.
  10. Microsoft Security Update Summary For November 13, 2018 - This Microsoft summary lists Microsoft security updates released for November 13, 2018.

Packetstorm Tools

  1. Packet Fence 8.2.0 - PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.
  2. Web-Based Firewall Logging Tool 1.1.1 - Webfwlog is a Web-based firewall log reporting and analysis tool. It allows users to design reports to use on logged firewall data in whatever configuration they desire. Included are sample reports as a starting point. Reports can be sorted with a single click, or "drilled-down" all the way to the packet level, and saved for later use. Supported log formats are netfilter, ipfilter, ipfw, ipchains, and Windows XP. Netfilter support includes ulogd MySQL or PostgreSQL database logs using the iptables ULOG target.
  3. Suricata IDPE 4.1.0 - Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
  4. Stegano 0.8.6 - Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.
  5. GNU Privacy Guard 2.2.11 - GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.
  6. SQLMAP - Automatic SQL Injection Tool 1.2.11 - sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.
  7. TOR Virtual Network Tunneling Tool 0.3.4.9 - Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).
  8. SSLsplit 0.5.4 - SSLsplit is a tool for man-in-the-middle attacks against SSL/TLS encrypted network connections. Connections are transparently intercepted through a network address translation engine and redirected to SSLsplit. SSLsplit terminates SSL/TLS and initiates a new SSL/TLS connection to the original destination address, while logging all data transmitted. SSLsplit is intended to be useful for network forensics and penetration testing.
  9. Hashcat Advanced Password Recovery 5.0.0 Source Code - Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release.
  10. Hashcat Advanced Password Recovery 5.0.0 Binary Release - Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release.

Packetstorm Exploits

  1. Atlassian Jira Authenticated Upload Code Execution - This Metasploit module can be used to execute a payload on Atlassian Jira via the Universal Plugin Manager(UPM). The module requires valid login credentials to an account that has access to the plugin manager. The payload is uploaded as a JAR archive containing a servlet using a POST request against the UPM component. The check command will test the validity of user supplied credentials and test for access to the plugin manager.
  2. SwitchVPN For MacOS / Windows 2.1012.03 Man-In-The-Middle - SwitchVPN for MacOS and Windows version 2.1012.03 suffers from a man-in-the-middle vulnerability.
  3. OCS Inventory NG ocsreports Shell Upload - OCS Inventory NG suffers from an ocsreports authenticated remote code execution vulnerability via a shell upload.
  4. Alive Parish 2.0.4 File Upload / SQL Injection - Alive Parish version 2.0.4 suffers from remote file upload and remote SQL injection vulnerabilities.
  5. Maitra Mail Tracking System 1.7.2 SQL Injection / Database File Download - Maitra Mail Tracking System version 1.7.2 suffers from remote SQL injection and database file download vulnerabilities.
  6. SIPve 0.0.2-R19 SQL Injection - SIPve version 0.0.2-R19 suffers from a remote SQL injection vulnerability.
  7. SwitchVPN For MacOS 2.1012.03 Privilege Escalation - SwitchVPN for MacOS version 2.1012.03 suffers from a privilege escalation vulnerability.
  8. Webiness Inventory 2.3 SQL Injection - Webiness Inventory version 2.3 suffers from a remote SQL injection vulnerability.
  9. Webiness Inventory 2.3 Cross Site Request Forgery / Shell Upload - Webiness Inventory version 2.3 suffers from cross site request forgery and remote shell upload vulnerabilities.
  10. ClipperCMS 1.3.3 Cross Site Request Forgery - ClipperCMS version 1.3.3 suffers from a cross site request forgery vulnerability.

Securiteam Exploits

  1. Zziplib 0.13.62 discovered Denial Of Service Vulnerability - The zzip_mem_entry_extra_block function in memdisk.c in zziplib 0.13.62 allows remote attackers to cause a denial of service (invalid memory read and crash) via a crafted ZIP file.
  2. Oracle Advanced Outbound Telephony component unauthorized Remote Code Execution Vulnerability - Oracle Advanced Outbound Telephony is prone to a remote code-execution vulnerability.This allows a remote attacker to exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts may result in a denial-of-service condition.
  3. Oracle Flexcube Universal Banking 11.3.0 update Remote Code Execution Vulnerability - A local user can exploit a flaw in the Oracle FLEXCUBE Universal Banking Core component to partially access and partially modify data
  4. Oracle Knowledge Management 12.1.3 critical Remote Code Execution Vulnerability - Oracle Knowledge Management is prone to a remote code-execution vulnerability.This allows a remote attacker to exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts may result in a denial-of-service condition.
  5. Oracle Marketing 12.1.1 critical Remote Code Execution Vulnerability - Oracle Marketing is prone to a remote code-execution vulnerability.This allows a remote attacker to exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts may result in a denial-of-service condition.