About 34 results
Open links in new tab
  1. Using Android local exploit 39340 (sensord) - GitHub

    Sep 27, 2016 · I was wondering how to use the exploit 39340 (in "local" folder, for the android platform). As the code is a C++ program, I do not really understand how to launch it on the emulator or device : …

  2. Commits · offensive-security/exploitdb · GitHub

    81 changes to exploits/shellcodes WordPress 2.9 - Denial of Service WordPress Core 2.9 - Denial of Service Qutecom SoftPhone 2.2.1 - Heap Overflow Crash (Denial of Service) PoC) Qutecom …

  3. exploitdb/16556.rb at master · offensive-security/exploitdb

    # Re-generate the payload returnif((p=regenerate_payload(cli)) == nil) drv=rand_text_alpha_upper(1) ext=rand_text_alpha_upper(3) sploit=rand_text_alpha_upper(498) + [target.ret].pack('V') sploit << …

  4. FEATURE REQUEST Allow to search searchsploit by CVE # #209 - GitHub

    Oct 23, 2021 · Triage notifications on the go with GitHub Mobile for iOS < https://apps.apple.com/app/apple-store/id1477376905?ct=notification-email&mt=8&pt=524675 > or …

  5. GitHub

    {"payload":{"allShortcutsEnabled":false,"fileTree":{"exploits/unix/local":{"items":[{"name":"10044.pl","path":"exploits/unix/local/10044.pl","contentType":"file"},{"name":"19068.txt","path":"exploits/unix/local/19068.txt","contentType":"file"},{"name":"19108.txt","path":"exploits/unix/local/19108.txt","contentType":"file"},{"name":"19168.sh ...

  6. Moving home · offensive-security/exploitdb@f36dd3d · GitHub

    android dos 18630.txt 23248.txt 28957.txt 31307.py 35382.txt 35637.py 35913.txt 38555.txt 38610.txt 38611.txt 38612.txt 38614.txt 39424.txt 39425.txt 39504.c 39685.txt 39686.txt 39801.c 40502.txt …

  7. Commits · offensive-security/exploitdb · GitHub

    8 changes to exploits/shellcodes TeamSpeak 3.5.6 - Insecure File Permissions Emerson PAC Machine Edition 9.80 Build 8695 - 'TrapiServer' Unquoted Service Path H3C SSL VPN - Username …

  8. GitHub

    + +""" +Moodle 2.7dev (Build: 20131129) to 3.11.5+ 2nd Order SQLi Exploit by +muffin (@mufinnnnnnn) + +How to use: + 1. Define the variables at the top of the tamper() function, example: + username = …

  9. Commits · offensive-security/exploitdb · GitHub

    7 changes to exploits/shellcodes FlashFXP 4.2.0 Build 1730 - Denial of Service (PoC) Redis - Replication Code Execution (Metasploit) IBM TM1 / Planning Analytics - Unauthenticated Remote …

  10. GitHub

    {"payload":{"allShortcutsEnabled":false,"fileTree":{"exploits/php/dos":{"items":[{"name":"10242.txt","path":"exploits/php/dos/10242.txt","contentType":"file"},{"name":"10243.txt","path":"exploits/php/dos/10243.txt","contentType":"file"},{"name":"1063.pl","path":"exploits/php/dos/1063.pl","contentType":"file"},{"name":"1064.c","path":"exploits ...