what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files from Frederic Raynal

Email addressfred at security-labs.org
First Active2001-08-09
Last Active2009-10-08
Origami PDF Exploit Creator 1.0.0
Posted Oct 8, 2009
Authored by Frederic Raynal, Guillaume Delugre | Site security-labs.org

origami is a Ruby framework designed to parse, analyze, edit, manipulate, forge, exploit PDF files. This is NOT a PDF rendering library. It aims at providing a scripting tool to generate and/or analyze malicious PDF files. As well, it can be used to create on-the-fly customized PDFs, or to inject (evil) code into already existing documents.

Changes: This version 1.0.0-beta1 (released while at HITB) comes up with the ability to forge documents with more graphical contents.
tags | tool, ruby
systems | unix
SHA-256 | 03d625dd6742e83e1cf1e7aada8ac8204c837386922d724032600a741c8dd32d
Origami PDF Exploit Creator
Posted Jul 9, 2009
Authored by Frederic Raynal, Guillaume Delugre | Site security-labs.org

origami is a Ruby framework designed to parse, analyze, edit, manipulate, forge, exploit PDF files. This is NOT a PDF rendering library. It aims at providing a scripting tool to generate and/or analyze malicious PDF files. As well, it can be used to create on-the-fly customized PDFs, or to inject (evil) code into already existing documents.

tags | tool, ruby
systems | unix
SHA-256 | 7405bfc439b78efdaa51fa0a0e50f65ec3a0fa667d5346b12c0813e56d269d1f
arp-sk-0.0.16.tgz
Posted Oct 14, 2006
Authored by Frederic Raynal | Site arp-sk.org

Arp-sk is an ARP packet generator for Unix designed to illustrate ARP protocol flaws and applications such as ARP cache poisoning and MAC spoofing. It gives complete control of link and network level data. See arp-sk.org for further information.

Changes: Code cleanup and more portability for *BSD
tags | spoof, protocol
systems | unix
SHA-256 | 6e1c98ff5396dd2d1c95a0d8f08f85e51cf05b1ed85ea7b5bcf73c4ca5d301dd
tcpdump-bgp-update-poc.c
Posted Jun 18, 2005
Authored by Frederic Raynal

tcpdump bgp_update_print() remote denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | 4810de4822c6a55a2bce7e84d2e9bfa8cc8e2d2d326358b2a4c20541d4da4bc4
arp-sk-0.0.15.tgz
Posted Oct 17, 2002
Authored by Frederic Raynal | Site arp-sk.org

Arp-sk is an ARP packet generator for Unix designed to illustrate ARP protocol flaws and applications such as ARP cache poisoning and MAC spoofing. It gives complete control of link and network level data. See arp-sk.org for further information.

Changes: This new version fixes 2 bugs in address lookup and should work properly under any BSD.
tags | spoof, protocol
systems | unix
SHA-256 | b7f60d991af47dd4d8ab5d1b66a5ad577cea56280802a585b722deea083f3855
arp-sk-0.0.13.tgz
Posted Aug 28, 2002
Authored by Frederic Raynal | Site arp-sk.org

Arp-sk is an ARP packet generator for Unix designed to illustrate ARP protocol flaws and applications such as ARP cache poisoning and MAC spoofing. It gives complete control of link and network level data. See arp-sk.org for further information.

Changes: This new version fixes some bugs and makes arp-sk less CPU consuming.
tags | spoof, protocol
systems | unix
SHA-256 | bd0b28f03cfe68cc4a98700d4f1ed47e8ecac6cc16fd17b73a9ebbd997ba11e6
libfmtb-0.3.tgz
Posted Jun 3, 2002
Authored by Frederic Raynal | Site minimum.inria.fr

Libfmtb v0.3 is a library with lots of functions for easily exploiting local and remote format string vulnerabilities.

tags | remote, local, vulnerability, library
SHA-256 | 75cb87287ef8777dfe7fccd084fd8a318fd10c069624afe34f229bf59951117e
remotefmt-howto.txt
Posted Apr 25, 2002
Authored by Frederic Raynal

How to Remotely Exploit Format String Bugs - A practical tutorial. Includes info on guessing the offset, guessing the address of the shellcode in the stack, using format string bugs as debuggers, examples, etc.

tags | paper, shellcode
systems | unix
SHA-256 | c323add4e7a0e2f2f14ec27d9d50002992564b1d0be3d391722da88350a25a83
fmtbuild.htm
Posted Aug 9, 2001
Authored by Frederic Raynal, Samuel Dralet

Format String Builder includes code and instructions for use of a program which aids in the creation of format string exploits. Includes fmtbuilder.c, a small program to help build the strings.

tags | paper
systems | unix
SHA-256 | 848aaf31d3d81b8a782d44737935a4b9fcbae59484032cc55cdd1d2a44e1e406
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    0 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close