.. |
CVE-2008-6508
|
…
|
|
CVE-2010-0232
|
Remove genericity, x64 and renamed stuff
|
2013-11-14 12:22:53 +10:00 |
CVE-2010-0842
|
…
|
|
CVE-2010-1240
|
Add an R in /Info for the trailer dictionary to make it readable
|
2014-11-05 22:28:37 -06:00 |
CVE-2011-2882
|
…
|
|
CVE-2011-3400
|
…
|
|
CVE-2012-0013
|
…
|
|
CVE-2012-1535
|
Add Main.swf from 593363c
|
2013-07-29 21:53:40 -05:00 |
CVE-2012-2516
|
…
|
|
CVE-2012-4681
|
…
|
|
CVE-2013-0109
|
Final changes before PR
|
2013-12-15 01:12:49 +00:00 |
CVE-2013-0634
|
Beautify and fix both ruby an AS
|
2014-04-17 23:32:29 -05:00 |
CVE-2013-2465
|
Change directory names
|
2013-08-15 22:52:42 -05:00 |
CVE-2013-3906
|
Initial commit of CVE-2013-3906
|
2013-11-19 23:10:32 -06:00 |
CVE-2013-5045
|
Use powershell instead of mshta
|
2014-06-03 09:01:56 -05:00 |
CVE-2013-5331
|
Add module for CVE-2013-5331
|
2014-04-27 10:40:46 -05:00 |
CVE-2014-0038
|
Cleanup linux/local/recvmmsg_priv_esc module
|
2018-05-24 17:56:07 +00:00 |
CVE-2014-0257
|
Do test
|
2014-06-03 09:52:01 -05:00 |
CVE-2014-0322
|
Add module for CVE-2014-0322
|
2014-04-15 17:55:24 -05:00 |
CVE-2014-0497
|
Add module for CVE-2014-0497
|
2014-05-03 20:04:46 -05:00 |
CVE-2014-0515
|
Delete debug
|
2015-06-11 17:39:36 -05:00 |
CVE-2014-0556
|
Update CVE-2014-0556
|
2015-06-04 18:23:50 -05:00 |
CVE-2014-0569
|
Unset debug flag
|
2015-06-09 11:36:09 -05:00 |
CVE-2014-4113
|
Use PDWORD_PTR and DWORD_PTR
|
2014-10-31 17:35:50 -05:00 |
CVE-2014-4114/template
|
Add ppsx template
|
2014-10-16 17:55:22 -05:00 |
CVE-2014-4404
|
Change paths, add makefile and compile
|
2014-11-30 21:06:11 -06:00 |
CVE-2014-6352/template_run_as_admin
|
Add module for CVE-2014-6352
|
2014-11-12 01:10:49 -06:00 |
CVE-2014-8440
|
Make last code cleanup
|
2015-06-09 16:01:57 -05:00 |
CVE-2015-0016
|
Update DLL
|
2015-08-26 15:15:32 -05:00 |
CVE-2015-0311
|
Add more targets
|
2015-06-04 12:11:53 -05:00 |
CVE-2015-0313
|
Allow more search space
|
2015-06-10 12:26:53 -05:00 |
CVE-2015-0318
|
This seems to work
|
2015-03-13 04:43:06 -05:00 |
CVE-2015-0336
|
Add support for Windows 8.1/Firefox
|
2015-06-03 22:46:04 -05:00 |
CVE-2015-0359
|
Disable debug
|
2015-06-10 14:07:18 -05:00 |
CVE-2015-1130
|
Add Rootpipe exploit
|
2015-04-10 11:22:00 -05:00 |
CVE-2015-1328
|
revamped
|
2016-10-15 20:57:31 -04:00 |
CVE-2015-1701
|
Update exploit binaries for ms15-051
|
2015-06-25 09:33:15 +10:00 |
CVE-2015-2426
|
Clean template code
|
2015-09-12 13:43:05 -05:00 |
CVE-2015-3090
|
Add module for CVE-2015-3090
|
2015-06-18 12:36:14 -05:00 |
CVE-2015-3105
|
Add module for CVE-2015-3105
|
2015-06-25 13:35:01 -05:00 |
CVE-2015-3113
|
Add module for CVE-2015-3113
|
2015-07-01 13:13:57 -05:00 |
CVE-2015-3673
|
Remove sleep(), clean up WritableDir usage.
|
2015-07-05 18:59:00 -05:00 |
CVE-2015-5119
|
Update swf
|
2015-07-15 18:35:41 -05:00 |
CVE-2015-5122
|
Improve adobe_flash_opaque_background_uaf
|
2015-07-16 14:56:32 -05:00 |
CVE-2015-8103
|
Add Jenkins CLI Java serialization exploit module
|
2015-12-11 14:57:10 -06:00 |
CVE-2015-8660
|
working module
|
2016-10-04 23:21:53 -04:00 |
CVE-2016-0040
|
Re-add compiled Binary
|
2018-05-03 15:50:15 -05:00 |
CVE-2016-0099
|
Fix whitespace
|
2016-07-27 12:37:14 -05:00 |
CVE-2016-4557
|
cve-2016-4557
|
2016-09-29 05:23:12 -04:00 |
CVE-2016-4655
|
add binary
|
2018-05-30 18:02:17 +08:00 |
CVE-2016-4997
|
binary drops work!
|
2016-09-24 21:31:00 -04:00 |
CVE-2016-8655
|
Add AF_PACKET chocobo_root Privilege Escalation exploit
|
2018-05-07 07:11:07 +00:00 |
CVE-2017-0358
|
move sploit.c out to data folder
|
2017-03-31 20:51:33 -04:00 |
CVE-2017-7494
|
Rename payloads with os+libc, shrink array inits
|
2017-05-27 19:50:31 -05:00 |
CVE-2017-8291
|
Quick Ghostscript module based on the public PoC
|
2017-04-28 09:56:52 -05:00 |
CVE-2017-16666
|
Add xplico remote code execution
|
2017-11-14 09:30:57 +03:00 |
CVE-2017-17562
|
Resolve a bug in reverse_tcp and segfaults across payloads
|
2017-12-29 14:18:55 -06:00 |
R7_2015_17
|
Add missing stream.raw for hp_sitescope_dns_tool
|
2016-03-15 11:06:06 -05:00 |
badodt
|
Add files via upload
|
2018-05-24 09:45:38 +01:00 |
batik_svg
|
…
|
|
capcom_sys_exec
|
Add LPE exploit module for the capcom driver flaw
|
2016-09-27 22:37:45 +10:00 |
capture/http
|
File.exists? must die
|
2016-04-21 00:47:07 -04:00 |
cve-2010-0094
|
…
|
|
cve-2010-0840/vuln
|
…
|
|
cve-2010-3563
|
…
|
|
cve-2010-3904
|
Add Reliable Datagram Sockets (RDS) Privilege Escalation
|
2018-05-03 12:51:21 +00:00 |
cve-2010-4452
|
…
|
|
cve-2011-3544
|
…
|
|
cve-2012-5076
|
…
|
|
cve-2012-5076_2
|
…
|
|
cve-2012-5088
|
…
|
|
cve-2013-0074
|
Small fix to interface
|
2013-11-22 17:02:08 -06:00 |
cve-2013-0422
|
…
|
|
cve-2013-0431
|
…
|
|
cve-2013-1300
|
Use signed binary
|
2014-05-02 14:45:14 +01:00 |
cve-2013-1488
|
…
|
|
cve-2013-1493
|
…
|
|
cve-2013-2460
|
…
|
|
cve-2013-3660
|
ppr_flatten_rec update, RDI submodule, and refactor
|
2013-11-27 20:44:18 +10:00 |
cve-2013-3881
|
Add binary compiled on vs2013
|
2014-02-10 13:52:27 -06:00 |
cve-2014-1610
|
Use msf branded djvu
|
2014-02-01 00:37:28 +00:00 |
cve-2015-1318
|
Use cross-compiled exploit
|
2018-01-13 05:44:42 +00:00 |
cve-2015-3315
|
Add ABRT raceabrt Privilege Escalation module
|
2018-01-16 14:52:33 +00:00 |
cve-2016-0051
|
refactor ms16-016 code
|
2016-07-05 20:50:43 -05:00 |
cve-2016-0189
|
add exploit for cve-2016-0189
|
2016-08-01 13:26:35 -05:00 |
cve-2016-6415
|
CVE-2016-6415 Cisco - sendpacket.raw
|
2016-09-29 22:24:55 -05:00 |
cve-2017-7308
|
Recompile pre-compiled exploit executable (stripped, no DEBUG)
|
2018-05-17 09:43:07 +00:00 |
cve-2017-8464
|
recompile binaries
|
2017-11-08 09:33:48 -06:00 |
cve-2018-1000001
|
Add glibc 'realpath()' Privilege Escalation exploit
|
2018-05-26 21:25:59 +00:00 |
docx
|
…
|
|
edb-35948
|
Call CollectGarbage
|
2015-02-09 14:44:31 -06:00 |
firefox_smil_uaf
|
initial commit of finished product
|
2017-01-20 11:01:36 -06:00 |
imagemagick
|
Add PS template
|
2016-10-13 17:40:15 -05:00 |
java_signed_applet
|
…
|
|
jre7u17
|
…
|
|
mssql
|
…
|
|
mysql
|
mysql UDF now multi
|
2017-11-03 05:26:05 -04:00 |
ntapphelpcachecontrol
|
Use RDL
|
2015-01-09 19:02:08 -06:00 |
office_word_macro
|
Update office_word_macro exploit to support template injection
|
2017-05-25 15:53:45 -05:00 |
openoffice_document_macro
|
Completed version of openoffice_document_macro
|
2017-02-08 16:29:40 -06:00 |
osx
|
Add auto-accept to osx/enum_keychain.
|
2015-09-07 21:17:49 -05:00 |
pfsense_clickjacking
|
Added local copies of the static content
|
2017-12-02 10:14:14 +01:00 |
php
|
Revert "Land #6812, remove broken OSVDB references"
|
2016-07-15 12:00:31 -05:00 |
poison_ivy_c2
|
Modifications based on suggestions by @wchen-r7
|
2016-06-08 01:17:15 +02:00 |
postgres
|
…
|
|
powershell
|
new changes
|
2015-05-19 16:18:06 +01:00 |
psnuffle
|
unknow to unknown
|
2017-08-18 11:33:48 -04:00 |
pxexploit
|
…
|
|
roothelper
|
Add Libuser roothelper Privilege Escalation exploit
|
2018-04-23 17:49:11 +00:00 |
scripthost_uac_bypass
|
Initial working scripthost bypass uac
|
2015-08-23 20:16:15 +01:00 |
splunk
|
…
|
|
tpwn
|
Move tpwn source to external/source/exploits
|
2015-08-17 18:27:47 -05:00 |
uxss
|
Add some common UXSS scripts.
|
2014-09-09 02:31:27 -05:00 |
wifi
|
…
|
|
CVE-2007-3314.dat
|
…
|
|
CVE-2008-0320.doc
|
…
|
|
CVE-2008-5353.jar
|
…
|
|
CVE-2008-5499.swf
|
…
|
|
CVE-2009-3867.jar
|
…
|
|
CVE-2009-3869.jar
|
…
|
|
CVE-2010-0480.avi
|
…
|
|
CVE-2010-0822.xls
|
…
|
|
CVE-2010-1297.swf
|
…
|
|
CVE-2010-3275.amv
|
…
|
|
CVE-2010-3654.swf
|
…
|
|
CVE-2011-0105.xlb
|
…
|
|
CVE-2011-0257.mov
|
…
|
|
CVE-2011-0609.swf
|
…
|
|
CVE-2011-0611.swf
|
…
|
|
CVE-2011-2110.swf
|
…
|
|
CVE-2012-0507.jar
|
…
|
|
CVE-2012-0754.swf
|
…
|
|
CVE-2012-0779.swf
|
…
|
|
CVE-2012-1723.jar
|
…
|
|
CVE-2013-2171.bin
|
…
|
|
CVE-2013-6282.so
|
add module binary
|
2016-12-22 03:25:10 -06:00 |
CVE-2014-0980.pui
|
Implemented Recommended Changes
|
2015-03-17 16:39:56 -04:00 |
CVE-2014-3153.so
|
add binary for futex_requeue
|
2017-01-11 13:25:30 -06:00 |
QTJavaExploit.class
|
…
|
|
cve-2010-2883.ttf
|
…
|
|
cve-2013-0758.swf
|
…
|
|
cve-2014-1761.rtf
|
MS14-017 Word RTF listoverridecount memory corruption
|
2014-04-08 14:44:20 -04:00 |
cve-2017-0199.rtf
|
Fix rtf info author
|
2017-04-14 21:16:39 -05:00 |
exec_payload.msi
|
…
|
|
google_proxystylesheet.xml
|
…
|
|
iceweasel_macosx.icns
|
…
|
|
iphone_libtiff.bin
|
…
|
|
modicon_ladder.apx
|
…
|
|
mp4player.as
|
…
|
|
mp4player.fla
|
…
|
|
mp4player.swf
|
…
|
|
msfJavaToolkit.jar
|
…
|
|
office_ole_multiple_dll_hijack.ppsx
|
Moved PPSX to data/exploits folder
|
2016-11-08 16:04:46 +01:00 |
pricedown.eot
|
…
|
|
runcalc.hlp
|
…
|
|
s4u_persistence.xml
|
…
|
|
shockwave_rcsl.dir
|
…
|
|