Hack Tools/Exploits


Packetstorm Last 10 Files

  1. Wireshark Analyzer 2.2.8 - Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.
  2. Microsoft Internet Explorer VBScript Type Confusion - Microsoft Internet Explorer suffers from a VBScript arithmetic function type confusion vulnerability.
  3. Debian Security Advisory 3914-1 - Debian Linux Security Advisory 3914-1 - memory handling problems and cases of missing or incomplete input sanitizing may result in denial of service, memory disclosure or the execution of arbitrary code if malformed RLE, SVG, PSD, PDB, DPX, MAT, TGA, VST, CIN, DIB, MPC, EPT, JNG, DJVU, JPEG, ICO, PALM or MNG files are processed.
  4. Ubuntu Security Notice USN-3309-2 - Ubuntu Security Notice 3309-2 - Jakub Jirasek discovered that GnuTLS incorrectly handled certain assignments files. If a user were tricked into processing a specially crafted assignments file, a remote attacker could possibly execute arbitrary code.
  5. Barracuda Load Balancer Firmware 6.0.1.006 Remote Root - Barracuda Load Balancer Firmware versions 6.0.1.006 (2016-08-19) and below post-authentication remote root exploit.
  6. UFONet 0.9 - UFONet abuses OSI Layer 7-HTTP to create/manage 'zombies' and to conduct different attacks using GET/POST, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc.
  7. Cisco WebEx GPC Sanitization Bypasses / Command Execution - Various GPC Sanitization bypasses exist in Cisco WebEx that can permit from arbitrary remote command execution.
  8. Ubuntu Security Notice USN-3354-1 - Ubuntu Security Notice 3354-1 - Felix Wilhelm discovered a path traversal vulnerability in Apport when handling the ExecutablePath field in crash files. An attacker could trick a user into opening a specially crafted crash file and execute arbitrary code with the user's privileges.
  9. Ubuntu Security Notice USN-3274-2 - Ubuntu Security Notice 3274-2 - USN-3274-1 fixed a vulnerability in icu. This update provides the corresponding update for Ubuntu 12.04 ESM. A It was discovered that ICU incorrectly handled certain memory A operations when processing data. If an application using ICU processed A crafted data, a remote attacker could possibly cause it to crash or A potentially execute arbitrary code with the privileges of the user A invoking the program. Various other issues were also addressed.
  10. Microsoft Internet Explorer 11 CMarkup::DestroySplayTree Memory Corruption - Microsoft Internet Explorer suffers from a memory corruption vulnerability in CMarkup::DestroySplayTree. The bug was confirmed on IE version 11.0.9600.18617 (Update version 11.0.40) running on Windows 7 64-bit.

Packetstorm Tools

  1. Wireshark Analyzer 2.2.8 - Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.
  2. UFONet 0.9 - UFONet abuses OSI Layer 7-HTTP to create/manage 'zombies' and to conduct different attacks using GET/POST, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc.
  3. Blue Team Training Toolkit (BT3) 2.3 - Blue Team Training Toolkit (BT3) is an attempt to introduce improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusability in mind, BT3 allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. The Blue Team Training Toolkit is written in Python, and it includes the latest versions of Encripto's Maligno and Pcapteller.
  4. Suricata IDPE 3.2.3 - Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.
  5. Packet Fence 7.2.0 - PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.
  6. Lynis Auditing Tool 2.5.2 - Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.
  7. CRLF Injector - This is a python script for testing CRLF injecting issues.
  8. Mobius Forensic Toolkit 0.5.29 - Mobius Forensic Toolkit is a forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions. Cases and item categories are defined using XML files for easy integration with other tools.
  9. Samhain File Integrity Checker 4.2.2 - Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.
  10. Bettercap 1.6.1 - BetterCAP is a powerful, flexible, and portable tool created to perform various types of MITM attacks against a network, manipulate HTTP, HTTPS and TCP traffic in realtime, sniff for credentials and much more.

Packetstorm Exploits

  1. Microsoft Internet Explorer VBScript Type Confusion - Microsoft Internet Explorer suffers from a VBScript arithmetic function type confusion vulnerability.
  2. Barracuda Load Balancer Firmware 6.0.1.006 Remote Root - Barracuda Load Balancer Firmware versions 6.0.1.006 (2016-08-19) and below post-authentication remote root exploit.
  3. Cisco WebEx GPC Sanitization Bypasses / Command Execution - Various GPC Sanitization bypasses exist in Cisco WebEx that can permit from arbitrary remote command execution.
  4. Microsoft Internet Explorer 11 CMarkup::DestroySplayTree Memory Corruption - Microsoft Internet Explorer suffers from a memory corruption vulnerability in CMarkup::DestroySplayTree. The bug was confirmed on IE version 11.0.9600.18617 (Update version 11.0.40) running on Windows 7 64-bit.
  5. Microsoft Windows Kernel nsiproxy/netio Pool Memory Disclosure - The Microsoft Windows kernel suffers from a nsiproxy/netio pool memory disclosure vulnerability in the handling of IOCTL 0x120007 (NsiGetParameter).
  6. Sophos Web Appliance 4.3.0.2 Remote Command Injection - Sophos Web Appliance version 4.3.0.2 reporting JSON trafficType remote command injection exploit.
  7. Hashicorp vagrant-vmware-fusion 4.0.20 Privilege Escalation - Hashicorp vagrant-vmware-fusion versions 4.0.20 and below suffer from a local root privilege escalation vulnerability.
  8. PEGA Platform 7.2 ML0 Missing Access Control / Cross Site Scripting - PEGA Platform versions 7.2 ML0 and below suffer from missing access control and cross site scripting vulnerabilities.
  9. DotCMS 4.1.1 Shell Upload - DotCMS version 4.1.1 suffers from a remote shell upload vulnerability.
  10. Orangescrum 1.6.1 File Upload / Cross Site Scripting - Orangescrum version 1.6.1 suffers from cross site scripting and remote file upload vulnerabilities.

Securiteam Exploits

  1. Oracle Mysql 5.7.16 exploitable Remote Code Execution Vulnerability - Oracle Mysql is prone to a remote code-execution vulnerability.This allows a remote attacker to exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts may result in a denial-of-service condition
  2. Atutor 2.2.2 Execute Code Cross Site Scripting Vulnerability - Multiple Cross-Site Scripting (XSS) issues were discovered in ATutor 2.2.2. The vulnerabilities exist due to insufficient filtration of user-supplied data passed to several pages (lang_code in themes/*/admin/system_preferences/language_edit.tmpl.php). An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
  3. Cisco Webex Meetings Server 2.6.0 non-administrative Remote Code Execution Vulnerability - A vulnerability in Cisco WebEx Meetings Server could allow an authenticated, remote attacker to conduct arbitrary password changes against any non-administrative user. More Information: CSCuz03345. Known Affected Releases: 2.6. Known Fixed Releases: 2.7.1.12..
  4. Cpanel Cgiecho Execute Code Vulnerability - The cgiemail and cgiecho binaries served as an open redirect due to their handling of the success and failure parameters.
  5. D-link Di-524 Firmware 9.01 router CSRF Vulnerability - Multiple cross-site request forgery (CSRF) vulnerabilities on the D-Link DI-524 Wireless Router with firmware 9.01 allow remote attackers to (1) change the admin password, (2) reboot the device, or (3) possibly have unspecified other impact via crafted requests to CGI programs.