sh

shotgun.mic

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Building a Long Range Directional Listening Device -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Written by -Q- ==============




sh

Skype Squishes Cross-Zone Scripting Bug







sh

OpenSSH 8.0p1

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.




sh

OpenSSH 8.1p1

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.




sh

OpenSSH 8.2p1

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.




sh

Hashes Generation And Injection Tool

Hashes is a cross-platform tool that generates and injects different keys with the same hash code in order to test web applications against hash collision attacks. Written in Java. Has support for Java, PHP, ASP, and V8.




sh

ASP Webshell For IIS 8

ASP webshell backdoor designed specifically for IIS 8.






sh

Sneaky Malware Disguises Itself As An Adobe Flash Installer






sh

Adobe Patches Critical Vulnerabilities In Flash, InDesign










sh

Adobe Patch Update Squashes Critical Code Execution Bugs




sh

Adobe Fixes Critical Security Flaws In Flash, ColdFusion, Campaign




sh

The R.A.T In The Shell

This whitepaper is an analysis of the breach into the Kudankulam Nuclear Power Plant through the lens of Cyber Kill Chain, the study of remote access trojans, and the targeting of critical infrastructure.





sh

IBM Warns Of Malware On USB Drives Shipped To Customers






sh

File Sharing And Chat 1.0 Denial Of Service

File Sharing and Chat version 1.0 for iOS suffers from a denial of service vulnerability.




sh

ksh.temp-hole.txt

The Korn Shell (ksh) uses temp files in an insecure manner. Demonstration included.




sh

Apache Shiro 1.2.4 Remote Code Execution

This Metasploit module exploits a vulnerability that allows remote attackers to execute arbitrary code on vulnerable installations of Apache Shiro version 1.2.4.




sh

MPC Sharj 3.11.1 Arbitrary File Download

MPC Sharj version 3.11.1 suffers from an arbitrary file download vulnerability.




sh

RSA Boss Packs His Fishing Rod And Heads For The Hills








sh

Linux/x86 Reverse Shell NULL Free 127.0.0.1:4444 Shellcode

91 bytes small Linux/x86 reverse shell NULL free 127.0.0.1:4444 shellcode.




sh

Linux/x86 execve /bin/sh Shellcode

25 bytes small Linux/x86 execve /bin/sh shellcode.




sh

Linux/x86 execve(/bin/sh) Socket Reuse Shellcode

42 bytes small Linux/x86 execve(/bin/sh) socket reuse shellcode.




sh

Linux/x86 (NOT|ROT+8 Encoded) execve(/bin/sh) Null Free Shellcode

47 bytes small Linux/x86 (NOT|ROT+8 Encoded) execve(/bin/sh) null free shellcode.




sh

Linux/x86 Encoder / Decoder Shellcode

117 bytes small Linux/x86 encoding of random bytes + XOR/SUB/NOT/ROR and also decodes ROL/NOT/ADD/XOR execve(/bin/sh) shellcode.




sh

Linux x86_x64 sys_creat("ajit", 0755) Shellcode

53 bytes small Linux/x86_x64 sys_creat("ajit", 0755) shellcode.




sh

Linux/x86 Execve() Alphanumeric Shellcode

66 bytes small Linux/x86 Execve() alphanumeric shellcode.




sh

Linux/x86 Random Bytes Encoder + XOR/SUB/NOT/ROR execve(/bin/sh) Shellcode

114 bytes small Linux/x86 random bytes encoder and XOR/SUB/NOT/ROR execve(/bin/sh) shellcode.