exploit

  1. C

    [FREE]OLE Doc Exploit (Embedded) 2021

    Hackers are using booby-trapped Word documents to deliver malware to unsuspecting victims. The malware takes advantage of Windows Object Linking and Embedding (OLE) capabilities, which allow users to link to documents and other objects - in this case, a malicious remote server. " This tool was...
  2. C

    [FREE]PDF Exploit 2021

    Hackers are using booby-trapped PDF documents to deliver malware to unsuspecting victims. The malware takes advantage of Windows' object linking and embedding capabilities, which allow users to link to documents and other objects - in this case, a malicious remote server. " This tool was created...
  3. Boroborou

    Куплю Информация на форуме exploit

    Привет Нужно посмотреть определенные файлы на форуме exploit. Если у вас есть аккаунт, пишите. Договоримся.
  4. GhosTM@n

    Интересно Prima FlexAir Access Control 2.3.38 - Remote Code Execution

    # Exploit Title: Prima FlexAir Access Control 2.3.38 - Remote Code Execution # Google Dork: NA # Date: 2018-09-06 # Exploit Author: LiquidWorm # Vendor Homepage: https://www.primasystems.eu/ # Software Link: https://primasystems.eu/flexair-access-control/ # Version: 2.3.38 # Tested on: NA # CVE...
  5. GhosTM@n

    Интересно Adrenalin Core HCM 5.4.0 - 'strAction' Reflected Cross-Site Scripting

    Adrenalin Core HCM 5.4.0 - 'strAction' Reflected Cross-Site Scripting # Exploit Title: Adrenalin Core HCM 5.4.0 - 'strAction' Reflected Cross-Site Scripting # Google Dork: NA # Date: 2018-09-06 # Exploit Author: Rishu Ranjan (Cy83rl0gger) # Vendor Homepage: https://www.myadrenalin.com/ #...
  6. GhosTM@n

    Интересно Adobe Acrobat Reader DC for Windows - Use of Uninitialized Pointer due to Malformed JBIG2Globals Stream

    Adobe Acrobat Reader DC for Windows - Use of Uninitialized Pointer due to Malformed JBIG2Globals Stream We have observed the following access violation exception in the latest version of Adobe Acrobat Reader DC for Windows, when opening a malformed PDF file: --- cut --- (88e4.30f4): Access...
  7. GhosTM@n

    Интересно iMessage - Decoding NSSharedKeyDictionary can read ObjC Object at Attacker Controlled Address

    iMessage - Decoding NSSharedKeyDictionary can read ObjC Object at Attacker Controlled Address During processing of incoming iMessages, attacker controlled data is deserialized using the NSUnarchiver API. One of the classes that is allowed to be decoded from the incoming data is NSDictionary...
  8. GhosTM@n

    iOS IOUSBDeviceFamily 12.4.1 - 'IOInterruptEventSource' Heap Corruption (PoC)

    # Exploit Title: iOS IOUSBDeviceFamily 12.4.1 - 'IOInterruptEventSource' Heap Corruption (PoC) # Date: 2019-10-29 # Exploit Author: Sem Voigtlander, Joshua Hill and Raz Mashat # Vendor Homepage: https://apple.com/ # Software Link: https://support.apple.com/en-hk/HT210606 # Version: iOS 13 #...
  9. GhosTM@n

    Интересно Alps HID Monitor Service 8.1.0.10 - 'ApHidMonitorService' Unquote Service Path

    # Exploit Title: Alps HID Monitor Service 8.1.0.10 - 'ApHidMonitorService' Unquote Service Path # Date: 2019-11-07 # Exploit Author: Héctor Gabriel Chimecatl Hernández # Vendor Homepage: https://www.alps.com/e/ # Software Link: https://www.alps.com/e/ # Version: 8.1.0.10 # Tested on: Windows 10...