Skip navigation.
Home

Exploits

Latest exploit kits

|

Hi,

Does anyone have the latest exploit kits like - latest Neo, unique pack, etc..and would like to share them?

.

SWF Analysis

|

Hi,

Anybody help me out for working with malicious SWF Files. Any analysis tools available for analysis... please tell me a good way for analyzing SWF Files....

Thanks,

Suriya.

SWF Exploit embedded in PDF

|

Hi

Anyone have sample of recent SWF flash exploit embedded in PDF sample?

Please upload it or send it to xanalyzer [at] yahoo [dot] com

Looking for Blackberry Malware

| | |

hey all... i am looking to see if anyone here has any samples of malware for the blackberry. I know that it is pretty much non-existent, but I figured I would ask. i would appreciate any assistance that anyone has. if you have any information or samples please email them to me.... Thanks in advance!

Facebook Phisher

|

Facebook phisher - Check it out while it's hot !

Download here (Rapidshare)

Local mirror

RAR Archive Password: "infected" (without quotes)

Cheers :)
Kish

Firepack toolkit - Source code

|

Source code of an exploit pack - Firepack

Download here

RAR Archive Password: "infected" (without quotes)

P.S: Don't know if this has been posted earlier ... ;)

Cheers :)
Kish

Microsoft DirectShow Quicktime Parsing Vulnerability PoC

|

Any PoC in relation to the vulnerability referenced in the URL's below would be greatly appreciated.

http://www.microsoft.com/technet/security/advisory/971778.mspx

http://secunia.com/advisories/35268/2/

AMS2 and SAV Server Exploit

|

It's pretty much in the zoo right now.

http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20090428_02

Does anyone have a working POC for it?

Net-Sploit

|

Net-Sploit 1.0

"develop rootkits for the .NET framework,[...]

Code reviews will not detect backdoors installed inside the Framework since the payload is not in the code itself, but rather it is inside the Framework implementation.

Writing Framework rootkits will enable the attacker to install a reverse shell inside the framework, to steal valuable information, to fixate encryption keys, disable security checks and to perform other nasty things [...]"

Download, Userguide, Source Code, etc. linked below.

iTunes Anti-debugging Circumvention

David Maynor at Erratasec has written an article about how to circumvent the debugging prevention inside of iTunes.

"..I noticed iTunes kept crashing, predictably and reliably in the same place. I decided to use gdb to see what the hubbub was all about. However I got dissed and iTunes would not allow itself to be debugged."

http://erratasec.blogspot.com/2009/04/ode-to-50cent.html

Syndicate content