All Hot News World. Public world blog, journal online reviewed.

x86 File, PacketStorm Security

RSS feed: x86 File, PacketStorm Security
Wed, 06 Feb 2019 00:56:53 GMT
x86 Files ≈ Packet Storm
Packet Storm - Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers [ + ]
Sat, 02 Feb 2019 00:00:02 GMT
Linux/x86 Random Insertion Encoder / Decoder Shellcode Generator
Linux/x86 random insertion encoder and decoder shellcode generator. [ + ]
Thu, 31 Jan 2019 17:01:02 GMT
Linux/x86 Read /etc/passwd Shellcode
58 bytes small Linux/x86 read /etc/passwd shellcode. [ + ]
Wed, 30 Jan 2019 13:33:33 GMT
AnyBurn x86 4.3 Denial Of Service
AnyBurn x86 version 4.3 suffers from a denial of service vulnerability. [ + ]
Tue, 29 Jan 2019 18:22:22 GMT
Microsoft Windows/x86 msiexec.exe Download And Execute Shellcode
95 bytes small Microsoft Windows x86 msiexec.exe download and execute shellcode. [ + ]
Tue, 29 Jan 2019 18:22:22 GMT
Linux/x86 Read /etc/passwd Shellcode
58 bytes small Linux/x86 read /etc/passwd shellcode. [ + ]
Tue, 29 Jan 2019 00:51:19 GMT
Linux/x86 execve(/bin/sh) + RShift-1 Encoded Shellcode
29 bytes small Linux/x86 execve(/bin/sh) + RShift-1 encoded shellcode. [ + ]
Sat, 26 Jan 2019 14:22:22 GMT
Linux/x86 execve() bc Shellcode
53 bytes small Linux/x86 execve() shellcode that runs bc (terminal calculator). [ + ]
Tue, 22 Jan 2019 17:18:00 GMT
Linux/x86 exit(0) Shellcode
5 bytes small Linux/x86 exit(0) shellcode. [ + ]
Thu, 17 Jan 2019 22:51:08 GMT
Microsoft Windows VCF Arbitrary Code Execution
Microsoft Windows VCF or Contact file URL manipulation arbitrary code execution proof of concept exploit. Tested on Windows 7 SP1, 8.1, 10 v.1809 with full patches up to January 2019. Both x86 and x64 architectures were tested. [ + ]
Fri, 11 Jan 2019 04:44:44 GMT
Linux/x86 TCP/4444 Bindshell Shellcode
100 bytes small Linux/x86 TCP/4444 bindshell shellcode. [ + ]
Fri, 11 Jan 2019 02:22:22 GMT
Windows/x86 Download With TFTP And Execute Shellcode
Windows/x86 download with TFTP and execute shellcode generator. [ + ]
Thu, 10 Jan 2019 21:23:27 GMT
Linux/x86 wget chmod Shellcode
119 bytes small Linux/x86 wget chmod execute over execve /bin/sh -c shellcode. [ + ]
Mon, 24 Dec 2018 10:21:21 GMT
Hodorsec Linux Binary Encryption Utility
This archive contains a Linux x86/x64 payload AES-128 CBC encrypter and payload decrypter/runner. [ + ]
Wed, 12 Dec 2018 04:56:48 GMT
Linux/x86 Kill All Processes Shellcode
14 bytes small Linux/x86 kill all processes shellcode. [ + ]
Wed, 05 Dec 2018 01:22:22 GMT
Linux/x86 execve(/usr/bin/ncat -lvp 1337 -e /bin/bash) Shellcode
95 bytes small Linux/x86 execve(/usr/bin/ncat -lvp 1337 -e /bin/bash) null-free shellcode. [ + ]
Tue, 13 Nov 2018 10:11:11 GMT
Linux/x86 /usr/bin/head -n99 cat etc/passwd Shellcode
61 bytes small Linux/x86 /usr/bin/head -n99 cat etc/passwd shellcode. [ + ]
Wed, 24 Oct 2018 10:11:11 GMT
Linux/x86 Bind (99999/TCP) NetCat Traditional (/bin/nc) Shell (/bin/bash) Shellcode
58 bytes small Linux/x86 bind (99999/TCP) netcat traditional (/bin/nc) shell (/bin/bash) shellcode. [ + ]
Fri, 19 Oct 2018 23:33:18 GMT
Linux/x86 execve(/bin/cat /etc/ssh/sshd_config) Shellcode
44 bytes small Linux/x86 execve(/bin/cat /etc/ssh/sshd_config) shellcode. [ + ]
Thu, 18 Oct 2018 15:17:38 GMT
Microsoft Windows SetImeInfoEx Win32k NULL Pointer Dereference
This Metasploit module exploits an elevation of privilege vulnerability that exists in Windows 7 and 2008 R2 when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploits this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This Metasploit module is tested against windows 7 x86, windows 7 x64 and windows server 2008 R2 standard x64. [ + ]
Mon, 15 Oct 2018 17:02:02 GMT
Linux Semi-Arbitrary Task Stack Read On ARM64 / x86
Linux suffers from a semi-arbitrary task stack read on ARM64 (and x86) via /proc/$pid/stack. [ + ]
Mon, 08 Oct 2018 16:17:23 GMT
Solaris RSH Stack Clash Privilege Escalation
This Metasploit module exploits a vulnerability in RSH on unpatched Solaris systems which allows users to gain root privileges. The stack guard page on unpatched Solaris systems is of insufficient size to prevent collisions between the stack and heap memory, aka Stack Clash. This Metasploit module uploads and executes Qualys' Solaris_rsh.c exploit, which exploits a vulnerability in RSH to bypass the stack guard page to write to the stack and create a SUID root shell. This Metasploit module has offsets for Solaris versions 11.1 (x86) and Solaris 11.3 (x86). Exploitation will usually complete within a few minutes using the default number of worker threads (10). Occasionally, exploitation will fail. If the target system is vulnerable, usually re-running the exploit will be successful. This Metasploit module has been tested successfully on Solaris 11.1 (x86) and Solaris 11.3 (x86). [ + ]
Mon, 08 Oct 2018 02:22:22 GMT
ifwatchd Privilege Escalation
This Metasploit module attempts to gain root privileges on QNX 6.4.x and 6.5.x systems by exploiting the ifwatchd suid executable. ifwatchd allows users to specify scripts to execute using the '-A' command line argument; however, it does not drop privileges when executing user-supplied scripts, resulting in execution of arbitrary commands as root. This Metasploit module has been tested successfully on QNX Neutrino 6.5.0 (x86) and 6.5.0 SP1 (x86). [ + ]
Thu, 04 Oct 2018 20:22:22 GMT
Linux/x86 execve(/bin/sh) + MMX/ROT13/XOR Shellcode
104 bytes small Linux/x86 execve(/bin/sh) + MMX/ROT13/XOR shellcode (encoder/decoder). [ + ]
Tue, 25 Sep 2018 01:18:19 GMT
Linux/x86 execve(/bin/sh) + NOT +SHIFT-N+ XOR-N Encoded Shellcode
50 bytes small Linux/x86 execve(/bin/sh) + NOT +SHIFT-N+ XOR-N encoded shellcode. [ + ]

Solaris EXTREMEPARR dtappgather Privilege Escalation
This Metasploit module exploits a directory traversal vulnerability in the dtappgather executable included with Common Desktop Environment (CDE) on unpatched Solaris systems prior to Solaris 10u11 which allows users to gain root privileges. dtappgather allows users to create a user-owned directory at any location on the filesystem using the DTUSERSESSION environment variable. This Metasploit module creates a directory in /usr/lib/locale, writes a shared object to the directory, and runs the specified SUID binary with the shared object loaded using the LC_TIME environment variable. This Metasploit module has been tested successfully on: Solaris 9u7 (09/04) (x86); Solaris 10u1 (01/06) (x86); Solaris 10u2 (06/06) (x86); Solaris 10u4 (08/07) (x86); Solaris 10u8 (10/09) (x86); Solaris 10u9 (09/10) (x86). [ + ]
PacketStorm Security

2013 Copyright Mobile version 2015 | PeterLife & company
Skimlinks helps publishers monetize editorial content through automated affiliate links for products. Affiliate programm.
Link at is mandatory if site materials are using fully or particulary.
Were treated to the site administrator, a cup of coffee *