what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files from Shahriyar Jalayeri

Email addressshahriyar.j at gmail.com
First Active2008-10-20
Last Active2012-08-26
Microsoft Windows Kernel Intel x64 SYSRET Proof Of Concept
Posted Aug 26, 2012
Authored by Shahriyar Jalayeri | Site repret.wordpress.com

This is proof of concept code that demonstrates the Microsoft Windows kernel (Intel/x64) SYSRET vulnerability as described in MS12-042. The shellcode disables code signing and will grant NT SYSTEM privileges to a specified application or already running process.

tags | exploit, kernel, shellcode, proof of concept
systems | windows
advisories | CVE-2012-0217
SHA-256 | 55e5a8e72dbb887b38dad0ce6c7bebe03b8466705cf04ce1a1a8c9406a8c4db3
Adobe Reader X Atom Type Confusion Vulnerability
Posted Jul 4, 2011
Authored by Shahriyar Jalayeri

Adobe Reader X Atom Type Confusion vulnerability exploit. Versions prior to 10.1 are affected.

tags | exploit
systems | linux
advisories | CVE-2011-0611
SHA-256 | 2033f50cee77bc7f1fa1709b3584c486872bb3fd662c3debbf685bbbeac65b4f
The Arashi AKA Storm
Posted Jul 3, 2011
Authored by Shahriyar Jalayeri, Shahin

This is a whitepaper called The Arashi (A.K.A Storm). It discusses ASLR/DEP bypass techniques.

tags | paper
SHA-256 | dfa912b70bb400100b503c7a03da6c98181c89c6c0691fda5e22af5afb3f5a95
MS Office 2010 Stack Overflow
Posted Jul 3, 2011
Authored by Shahriyar Jalayeri

MS Office 2010 RTF header stack overflow vulnerability exploit.

tags | exploit, overflow
systems | linux
advisories | CVE-2010-3333
SHA-256 | 588a0fa3c54b92278c6cc9362ccb9c22e758bc06d2add63b51f46ae7e2a7878a
djvu-overflow.txt
Posted Oct 30, 2008
Authored by Shahriyar Jalayeri

DjVu Active-X Control version 3.0 ImageURL property overflow exploit.

tags | exploit, overflow, activex
SHA-256 | 2d202aea26e136bc9b6a95fe616e54593e44ed8810f2d9850e0defcb7b4a62b4
powertcpftp-overflow.txt
Posted Oct 27, 2008
Authored by Shahriyar Jalayeri

PowerTCP FTP module multiple technique exploit using SEH overwrite and heapspray.

tags | exploit, overflow
SHA-256 | 9d48b43ea454d0c15cc86e7fa405f6e1abbd72ea2fdf81dcfef1a6e8563b3330
Detecting_and_Exploiting_ActiveX_Controls.pdf
Posted Oct 20, 2008
Authored by Shahriyar Jalayeri

Whitepaper entitled Detecting and Exploiting Vulnerabilities in ActiveX Controls. Written in Farsi.

tags | paper, vulnerability, activex
SHA-256 | a55486b2ef8323dff122d471481f484a8d72623c271a349cd0b318f55b96ca82
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close