This program acts as a web server that generates an exploit to target a vulnerability in Internet Explorer. The exploit was tested using Internet Explorer 6 on Windows XP SP3. The exploit's payload spawns the reverse shell on port 4321.
ab2a1d87629817552f759eb513f5d1a6f9f28b09bbba227396d4eff7c17afd14
This program acts as a web server that generates an exploit to target a vulnerability in Internet Explorer. The exploit was tested using Internet Explorer 6 on Windows XP SP2. The exploit's payload spawns the calculator.
e0b903a2964699f53ce93c680123082a482afcb9bcc005282e71cde0493e7351
Proof of concept code that generates a PDF file to be loaded by Adobe Reader or Acrobat. It demonstrates a use-after-free vulnerability by spawning calc.exe.
da9b0a3b739effa9d24b5c103657aeb649579295386b7c9a39443550e726fec4
Microsoft Office Web Components Active-X related buffer overflow proof of concept exploit. The author tested on Internet Explorer 7.0.5730.13 on Windows XP SP3 with owc10.dll and owc11.dll installed. Written in Python.
542ad371968fa6cdc2fd6f341fe00c13099de31b236c05b304b76d3b21955c5f
Safari versions 3.2.2 and 4 BETA XML parsing remote crash exploit.
852a421bb70a29fdf052a50ad18d7cd650646ff3c342250c0b187b2d239c663b
Opera version 9.64 (7400 nested elements) XML parsing remote crash exploit.
5cb5b9f155d8943d137b3ca3dc40cdf8fd7267a79da07db420881ea0bb0d5b96
Memory corruption exploit for Microsoft Internet Explorer 7. Makes use of the vulnerability listed in MS09-002.
1290b4eb8b1d3af5301143185319a22a9425fdac2d51910794fd31d4ec7565cd