exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files from koshi

Email addressheykoshi at gmail.com
First Active2007-09-05
Last Active2010-06-17
Microsoft Visual Studio Msmask32.ocx ActiveX Buffer Overflow.
Posted Jun 17, 2010
Authored by koshi, MC | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in Microsoft's Visual Studio 6.0. When passing a specially crafted string to the Mask parameter of the Msmask32.ocx ActiveX Control, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary, activex
advisories | CVE-2008-3704
SHA-256 | def095f5fae66e555774c80c31922aee92bbe086dec4cbf1548a0683a892e8c5
Microsoft Visual Studio Msmask32.ocx ActiveX Buffer Overflow
Posted Nov 26, 2009
Authored by koshi, MC | Site metasploit.com

This Metasploit module exploits a stack overflow in Microsoft's Visual Studio 6.0. When passing a specially crafted string to the Mask parameter of the Msmask32.ocx ActiveX Control, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary, activex
advisories | CVE-2008-3704
SHA-256 | 56b52c8f83d0a22f5e67d717396bd5fe41cbe970d924fc937c14e7521ff8ee80
MP3 Studio 1.0 Buffer Overflow
Posted Jul 28, 2009
Authored by koshi

MP3 Studio version 1.0 local buffer overflow exploit that creates a malicious .mpf file.

tags | exploit, overflow, local
SHA-256 | d1964b25a92459ffadebc2b3cd94172c9e573cf59a13c38c2591b6a92d6e99a6
eXeScope 6.50 Buffer Overflow
Posted Mar 24, 2009
Authored by koshi

eXeScope version 6.50 local buffer overflow exploit that creates a malicious .exe file.

tags | exploit, overflow, local
SHA-256 | 49883f40b03f7ea39c3671422807dfa50b1883ead4aacc1b56752b23f0009599
win32 PEB!NtGlobalFlags Shellcode
Posted Feb 24, 2009
Authored by koshi

14 bytes small win32 PEB!NtGlobalFlags shellcode.

tags | shellcode
systems | windows
SHA-256 | bd6da0384db9681081f499006fe5902116a197a8ea926b38438711cc2ca8fb4f
Getleft 1.2 Buffer Overflow
Posted Dec 30, 2008
Authored by koshi

Getleft version 1.2 proof of concept buffer overflow exploit that causes a denial of service condition.

tags | exploit, denial of service, overflow, proof of concept
SHA-256 | 5519139bcfb084e1b5afe1d514b6af3c2bb23bae05e899b6954e99cec7a4bfc2
alphanumeric-shellcode.txt
Posted Sep 3, 2008
Authored by koshi

67 byte Win32 PEB Kernel32.dll ImageBase Finger Alphanumeric shellcode.

tags | shellcode
systems | windows
SHA-256 | 7edd77337a4cddaae3c77b3778d9de498c100a2f5dbfbb94d1a1bd7484c8ec2b
imagebase-shellcode.txt
Posted Sep 3, 2008
Authored by koshi

49 byte Win32 PEB Kernel32.dll ImageBase Finger shellcode.

tags | shellcode
systems | windows
SHA-256 | 23ae18945ff456479ef4e6344f82cc9a281c5472da34397d346f64073ff308d6
acoustica-overflow.txt
Posted Aug 29, 2008
Authored by koshi

Acoustica Mixcraft versions 4.2 Build 98 and below mx4 file local buffer overflow exploit.

tags | exploit, overflow, local
SHA-256 | 43b6c437b76203c406a76bf1208c80f1560e902d45286eea3f3997178aafd87f
mvs-activex.txt
Posted Aug 27, 2008
Authored by koshi

Microsoft Visual Studio Active-X remote buffer overflow exploit that leverages Msmask32.ocx.

tags | exploit, remote, overflow, activex
SHA-256 | 807bbc098da295675fcf16e2045be01698e849fcabdc6fe4f7c158d6cb3c3e6e
intellitamper207-exec.txt
Posted Jul 23, 2008
Authored by koshi

IntelliTamper version 2.07 server header remote code execution exploit.

tags | exploit, remote, code execution
SHA-256 | b34305238b562e14d5c2bf1bc2ccb0dbfeece31ca10501ae2b18ca248200b80c
msvb-codeexec.txt
Posted Sep 5, 2007
Authored by koshi

Microsoft Visual Basic version 6.0 VBP_Open OLE local code execution exploit.

tags | exploit, local, code execution
SHA-256 | 2dde94986eb1a6eec380df5aae50265343027d4cff29eb3748ff4619878d5d70
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    53 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close