public marks

PUBLIC MARKS with tag exploit

2016

2015

JAVASCRIPT - jsunpack - a generic JavaScript unpacker

by decembre
The Extracted URLs lists, (2 files) for instance, indicates how many decodings or other files were created when trying to decode JavaScript. If this column shows (1 files) it means that there were no decodings and that a static scanner would be just as effective at detecting content. However, if there are more than one file, a decoding likely occurred, and jsunpack can match against additional content. A malicious URL with only (1 files) is less likely to be malicious because attackers commonly hide their content when delivering exploits or other malicious content. The Extracted URLs displays files grouped by URL, so the originally file that triggered the rule and all of the other files are all connected to another. It is more common that the attacker will try to hide content and create 2 or more decodings. Jsunpack was originally designed to handle complicated cases of decoding where there were 5 stages of decoding, although such cases are rare, generally the more decoding levels (and therefore files), the more likely the attacker is trying to hide something of value. Thanks for using jsunpack!

2014

Exploits Database by Offensive Security

by srcmax
The Exploit Database (EDB) – an ultimate archive of exploits and vulnerable software. A great resource for penetration testers, vulnerability researchers, and security addicts alike. Our aim is to collect exploits from submittals and mailing lists and concentrate them in one, easy to navigate database.

2011

Testez la sécurité de votre routeur

by Giraultises (via)
Routerpwn est un site qui rassemble quelques dizaines d'exploits de différents fabricants de routeurs. A l'aide de l'adresse IP ou Mac, vous pourrez obtenir la clé WEP, le mot de passe par défaut, désactiver le Wifi, ... Cela bien sûr pour pouvoir tester la sécurité du votre, pas celui du voisin ;-)

2010

2008

2007

Hacking Pligg 9.5 beta - Exploit - Life, Hacks, and Internet

by srcmax
Pligg Forum members have been notified about it via e-mail this morning. Most Pligg webmasters have’t signed up for the forum :(. All Pligg websites I tried were vulnerable to this exploit. There is no commercial value for me, so don’t worry, administrators have been notified that it’s time to patch.

2006

The Metasploit Project

by jmgautier & 1 other
This is the Metasploit Project. The goal is to provide useful information to people who perform penetration testing, IDS signature development, and exploit research. This site was created to fill the gaps in the information publicly available on various exploitation techniques and to create a useful resource for exploit developers. The tools and information on this site are provided for legal security research and testing purposes only.

PUBLIC TAGS related to tag exploit

**** +   .ani +   ago +   arp +   bruteforce +   css +   democrats +   digg-like +   elections +   geek +   google +   hack +   hackers +   hacking +   halle +   html +   inferno +   inferno 3 +   inferno III +   javascript +   lavigne +   leaders +   mp3 +   mtv +   music +   musique +   network +   news +   opportunities +   party +   patching +   pcap +   pdf +   pligg +   privacy +   proxies +   proxy +   python +   remote +   republican +   road rules +   security +   sécurité +   tech +   test +   tutorial +   vulnerabilities +   web +   website +   wifi +  

Active users

alamat
last mark : 24/10/2016 13:23

decembre
last mark : 09/06/2017 10:23

srcmax
last mark : 15/12/2014 10:55

Giraultises
last mark : 20/08/2011 14:22

vrossign
last mark : 22/04/2010 07:39

Fulcanelli
last mark : 18/01/2010 10:23

webs
last mark : 15/05/2008 09:29

zoofusa
last mark : 07/04/2007 09:38

bacchus101
last mark : 13/03/2007 06:32

talou
last mark : 19/10/2006 21:36

esquimo_2ooo
last mark : 16/10/2006 17:40

jmgautier
last mark : 01/09/2006 21:15

bagehot
last mark : 23/08/2006 22:27

salvatore
last mark : 06/06/2006 18:33

alexf10
last mark : 17/05/2006 13:07

hoabui
last mark : 24/04/2006 11:44

MLChen
last mark : 16/02/2006 14:30