Permalink
Branch: master
Find file Copy path
Fetching contributors…
Cannot retrieve contributors at this time
33 lines (26 sloc) 1.41 KB
---
title: MSF & exploit-db
permalink: /exploits.html
layout: post
header:
overlay_image: /assets/images/header_nero_sito_1200px256px.jpg
image_description: "A description of the image"
overlay_filter: rgba(0, 0, 0, 0.3)
cta_label: "@avanzo"
cta_url: "http://avanzo.github.io"
---
<h4>Here are some contributions to the MSF framework and exploit-db</h4>
<br>
<h3>[Exploits]</h3>
- <a target="_blank" href=" https://www.exploit-db.com/exploits/46331">River Past Audio Converter 7.7.16 - Local Buffer Overflow (SEH) </a> <br>
- <a target="_blank" href="https://www.exploit-db.com/exploits/46250">CloudMe Sync 1.11.2 Buffer Overflow - WoW64 - (DEP Bypass)</a> <br>
-
<a target="_blank" href="https://www.exploit-db.com/exploits/46025">AnyBurn 4.3 - Local Buffer Overflow (SEH - Unicode) </a> <br>
-
<a target="_blank" href="https://www.exploit-db.com/exploits/45565">Free MP3 CD Ripper 2.8 - '.wma' Buffer Overflow (SEH) (DEP Bypass) </a> <br>
-
<a target="_blank" href="https://www.exploit-db.com/exploits/45259">CuteFTP 5.0 - Buffer Overflow </a> <br>
<h3>[Metasploit payloads]</h3>
<a target="_blank" href="https://github.com/rapid7/metasploit-framework/blob/master/modules/payloads/singles/linux/x86/shell_reverse_tcp_ipv6.rb">Linux Command Shell, Reverse TCP Inline (IPv6)</a> <br>
<h3>[Shellcodes]</h3>
<a target="_blank" href="https://www.exploit-db.com/exploits/44723/">Linux/x86 - IPv6 TCP bind tcp shell</a> <br>