OWASP Xenotix XSS Exploit Framework v3 2013
Introduction Cross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s. XSS got listed as the top 3rd Vulnerability in the OWASP 2013 Web application Vulnerabilities...
View ArticleHack Windows PC using Firebird Relational Database CNCT Group Number Buffer...
This module exploits vulnerability in Firebird SQL Server. A specially crafted packet can be sent which will overwrite a pointer allowing the attacker to control where data is read from. Shortly,...
View ArticleHow to Install Kali linux Step by Step Guide
First Download Kali linux from here Boot your pc with Kali Linux once booted, Select Graphical Install Select your language and click continue. Select your Location and click continue. Configure your...
View ArticleHack Windows PC using Java CMM Remote Code Execution
This module abuses the Color Management classes from a Java Applet to run arbitrary Java code outside of the sandbox as exploited in the wild in February and March of 2013. The vulnerability affects...
View ArticleHow to Encrypt Drive of Remote Victim PC
First Hack the Victim PC Using Metaspolit (Tutorial How to Hack Remote PC) Once you got the meterpreter session use ‘shell‘command to get command prompt of the target. Type manage-bde -status and...
View ArticleHack Remote PC using Free Float FTP Server USER Command Buffer Overflow
Freefloat FTP Server is prone to an overflow condition. It fails to properly sanitize user-supplied input resulting in a stack-based buffer overflow. With a specially crafted ‘USER’ command, a remote...
View ArticleHack Remote Windows, Linux or MAC PC using Java Applet Reflection Type...
This module abuses Java Reflection to generate a Type Confusion, due to a weak access control when setting final fields on static classes, and run code outside of the Java Sandbox. The vulnerability...
View ArticleBest of JAVA Hacking Exploit
Java Applet Reflection Type Confusion Remote Code Execution Java CMM Remote Code Execution Java Applet Method Handle Remote Code Execution Java Applet AverageRangeStatisticImpl Remote Code Execution...
View ArticleHack Windows PC using AudioCoder .M3U Buffer Overflow
This module exploits a buffer overflow in Audio Code 0.8.18. The vulnerability occurs when adding an .m3u, allowing arbitrary code execution with the privileges of the user running AudioCoder. This...
View ArticleExploit Remote Windows PC using ERS Viewer 2011 ERS File Handling Buffer...
This module exploits a buffer overflow vulnerability found in ERS Viewer 2011 (version 11.04). The vulnerability exists in the module ermapper_u.dll where the functionERM_convert_to_correct_webpath...
View ArticleRecover Deleted Data from Remote Victim PC
This module list and try to recover deleted files from NTFS file systems. Use the FILES option to guide recovery. Let it empty to enumerate deleted files in the DRIVE. Set FILES to an extension (Ex....
View ArticleHack Remote Windows PC Using AdobeCollabSync Buffer Overflow Adobe Reader X...
This module exploits vulnerability on Adobe Reader X Sandbox. The vulnerability is due to a sandbox rule allowing a Low Integrity AcroRd32.exe process to write register values which can be used to...
View ArticleHack Windows, Linux or MAC PC using Firefox 17.0.1 + Flash Privileged Code...
This exploit gains remote code execution on Firefox 17.0.1 and all previous versions provided the user has installed Flash. No memory corruption is used. First, a Flash object is cloned into the...
View ArticleVeil – A Metasploit Payload Generator to Bypass Antivirus
Veil is a tool designed to generate metasploit payloads that bypass common anti-virus solutions. First Download viel from here and unzip file and save in your desktop Run setup script on Kali x86...
View ArticleHow to Install Simple-Ducky Payload Generator
The simple-ducky is designed to quickly create reliable payloads and launch listener’s.The Simple-Ducky currently uses version 2.6 of the duck encoder. The lastest version of the Simple-Ducky supports...
View ArticleHack Remote PC using Sun Java Web Start Double Quote Injection
This module exploits a flaw in the Web Start component of the Sun Java Runtime Environment. Parameters initial-heap-size and max-heap-size in a JNLP file can contain a double quote which is not...
View ArticleSwaparoo: Meterpreter Script to Backdoor Windows
Swaparoo Windows backdoor method for Windows Vista/7/8. This code sneaks a backdoor command shell in place of Sticky Keys prompt or Utilman assistant at login screen. First Download Swaparoo from here...
View ArticleExploit Windows, Linux or MAC PC using Java Applet Driver Manager Privileged...
This module abuses the java.sql.DriverManager class where the toString() method is called over user supplied classes from a doPrivileged block. The vulnerability affects Java version 7u17 and earlier....
View ArticleHack Windows PC using Novell Client 4.91 SP4 nwfs.sys Local Privilege Escalation
This module exploits a flaw in the nwfs.sys driver to overwrite data in kernel space. The corruption occurs while handling ioctl requests with code 0x1438BB, where a 0×00000009 dword is written to an...
View ArticleHack Windows, Linux or MAC PC using Java Applet Provider Skeleton Insecure...
This module abuses the insecure invoke () method of the Provider Skeleton class that allows to call arbitrary static methods with user supplied arguments. The vulnerability affects Java version 7u21...
View Article