Blog : http://eromang.zataz.com Twitter : http://twitter.com/eromang Timeline : Vulnerability patched by Oracle in 2012 October CPU Vulnerability discovered exploited in the wild by kafeine the 2012-11-09 Metasploit PoC provided by juan vazquez the 2012-11-11 PoC [More]
Blog : http://eromang.zataz.com Twitter : http://twitter.com/eromang Timeline : Vulnerability discovered and reported to vendor by Aaron Sigel Coordinated release of the vulnerability the 2011-10-12 Metasploit PoC provided the 2011-10-16 PoC provided by: Aaron Sigel sinn3r [More]
Disclaimer: This tutorial/guide for educational purpose only. Discovered by Polish security researcher Dawid Golunski of Legal Hackers, the critical vulnerability (CVE-2016-10033) allows an attacker to remotely execute arbitrary code in the context of the web [More]
Windows OLE Automation Array RCE Exploit Microsoft Internet Explorer 3 has a critic flaw in OleAut32.dll  stored in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 [More]
CVE-2016-9079 CVE-2017-5375 Published: 2018-03-16 Author: Rh0 Platform: Windows Type: Remote Requirements: Windows 10 1709 and Firefox 46.0.1 Source: https://www.exploit-db.com/exploits/44293/
This will help you to add a user account to your victims machine if he’s using either IE 6 or 7. This was developed by the security team of Sioma Labs.
It’s a PoC of Alipay pta.dll 0-day exploit. Don’t view it if you can’t read Chinese. Source Download: http://stratoplot.com/1qHf
Demonstration of Metasploit Framework with BackTrack 5 R3 ============================================= Author: ======= Mzer0 : http://www.4xsecurityteam.com Tweets by 4XSecurityTeam Disclaimer: Educational purposes only. Java Applet JMX 0day Remote Code Execution Metasploit Demo ———————————————————— Timeline : ———- Vulnerability [More]
Download : https://www.exploit-db.com/exploits/42382/ This module exploits a vulnerability in the handling of windows shortcut files ( .LNK ) that contain a dynamic icon, loaded from a malicious DLL.
0day vulnerability in chromium. This vulnerability exists on all browsers that use the Chromium engine. Vulnerability is critical allows Remote Code Execution + Sandbox Bypass + Local Privilege Escalation. My mail: james.lee.research@gmail.com
This video demonstrates micropatching of CVE-2017-11254, a use-after-free bug in Acrobat Reader DC that gets exploited by opening a malicious PDF. First, the malicious PDF is opened with 0patch Agent disabled, which means that our [More]
Ler Mais ########################################­####### Contatos: twitter/skype:sombr4hp_office facebook: Marcos Fernandez ########################################­####### Este módulo abusos as classes de gerenciamento de cor de um Applet Java para executar o código Java arbitrário fora da sandbox como explorado em estado [More]
Targets : * PHPMailer inferior to 5.2.18 * Compile PHP without PCRE. * PHP version must be inferior to 5.2.0. More infos https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html https://github.com/opsxcq/exploit-CVE-2016-10033
Discovered by Dawid Golunski https://legalhackers.com Follow https://twitter.com/dawid_golunski for updates & new vulns The video demonstrates exploitation of the following vulnerabilities: * Nagios Core before 4.2.2 Curl Command Injection / Remote Code Execution (CVE-2016-9565 / CVE-2008-4796) [More]
Manycam exploit execure remote code Metasploit