Hack Remote Windows PC Using AdobeCollabSync Buffer Overflow Adobe Reader X...
This module exploits vulnerability on Adobe Reader X Sandbox. The vulnerability is due to a sandbox rule allowing a Low Integrity AcroRd32.exe process to write register values which can be used to...
View ArticleHack Windows, Linux or MAC PC using Firefox 17.0.1 + Flash Privileged Code...
This exploit gains remote code execution on Firefox 17.0.1 and all previous versions provided the user has installed Flash. No memory corruption is used. First, a Flash object is cloned into the...
View ArticleVeil - A Metasploit Payload Generator to Bypass Antivirus
Veil is a tool designed to generate metasploit payloads that bypass common anti-virus solutions.First Download viel from hereand unzip file and save in your desktopRun setup script on Kali x86...
View ArticleHow to Install Simple-Ducky Payload Generator
Ducky currently uses version 2.6 of the duck encoder. The lastest version of the Simple-Ducky supports all Debian Linux distro's (i.e. Kali-Linux, Ubuntu, Linux Mint etc). The smart installer will take...
View ArticleHack Remote PC using Sun Java Web Start Double Quote Injection
This module exploits a flaw in the Web Start component of the Sun Java Runtime Environment. Parameters initial-heap-size and max-heap-size in a JNLP file can contain a double quote which is not...
View ArticleSwaparoo: Meterpreter Script to Backdoor Windows
Swaparoo Windows backdoor method for Windows Vista/7/8. This code sneaks a backdoor command shell in place of Sticky Keys prompt or Utilman assistant at login screen.First Download Swaparoo from here...
View ArticleExploit Windows, Linux or MAC PC using Java Applet Driver Manager Privileged...
This module abuses the java.sql.DriverManager class where the toString() method is called over user supplied classes from a doPrivileged block. The vulnerability affects Java version 7u17 and earlier....
View ArticleHack Windows PC using Novell Client 4.91 SP4 nwfs.sys Local Privilege Escalation
This module exploits a flaw in the nwfs.sys driver to overwrite data in kernel space. The corruption occurs while handling ioctl requests with code 0x1438BB, where a 0x00000009 dword is written to an...
View ArticleHack Windows, Linux or MAC PC using Java Applet Provider Skeleton Insecure...
This module abuses the insecure invoke () method of the Provider Skeleton class that allows to call arbitrary static methods with user supplied arguments. The vulnerability affects Java version 7u21...
View ArticleHack Remote Windows PC using ABBS Audio Media Player .LST Buffer Overflow
This module exploits a buffer overflow in ABBS Audio Media Player. The vulnerability occurs when adding an .lst, allowing arbitrary code execution with the privileges of the user running the...
View ArticleHack Gmail Password using Hydra in kali Linux
Open your Kali Linux terminal and Type xhydra and press enterYou can also do this manually. First Open Your Kali Linux and Follow this pathKali Linux->Passwords Attacks->Online...
View ArticleHack Windows 7 PC Remotely using ERS Viewer 2013 ERS File Handling Buffer...
This module exploits a buffer overflow vulnerability found in ERS Viewer 2013. The vulnerability exists in the module ermapper_u.dll, where the function rf_report_error handles user provided data in a...
View ArticleHack Windows 7 PC Remotely using MediaCoder .M3U Buffer Overflow
This module exploits a buffer overflow in MediaCoder 0.8.22. The vulnerability occurs when adding an .m3u, allowing arbitrary code execution under the context of the user. DEP bypass via ROP is...
View ArticleExploit Remote Windows PC using Corel PDF Fusion Stack Buffer Overflow
This module exploits stack-based buffer overflow vulnerability in version 1.11 of Corel PDF Fusion. The vulnerability exists while handling a XPS file with long entry names. In order for the payload to...
View ArticleHack Remote Windows PC using Apple Quicktime 7 Invalid Atom Length Buffer...
This module exploits a stack buffer overflow in Cyber Link Power2Go version 8.x the vulnerability is triggered when opening a malformed p2g file containing an overly long string in the 'name' attribute...
View ArticleBypass Antivirus and Hack Remote Windows PC with Syringe
First Download syringe-antivirus-bypass fromHereNow untar the file tar xvf syringe.tarNow you can start it with ./syringe.shAfter we successfully generate the malicious exe File, it will stored on your...
View ArticleXSSF Cross-Site Scripting Framework in Metasploit
The Cross-Site Scripting Framework (XSSF) is a security tool designed to turn the XSS vulnerability exploitation task into a much easier work. The XSSF project aims to demonstrate the real dangers of...
View ArticleHack Remote Windows 7 PC using Chasys Draw IES Buffer Overflow
This module exploits a buffer overflow vulnerability found in Chasys Draw IES (version 4.10.01). The vulnerability exists in the module flt_BMP.dll, whileparsing BMP files, where the ReadFile function...
View Article