what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Richard Davy

Email addressrd at secureyour.it
First Active2011-05-31
Last Active2024-08-31
LibreOffice 6.03 /Apache OpenOffice 4.1.5 Malicious ODT File Generator
Posted Aug 31, 2024
Authored by Richard Davy | Site metasploit.com

Generates a Malicious ODT File which can be used with auxiliary/server/capture/smb or similar to capture hashes.

tags | exploit
advisories | CVE-2018-10583
SHA-256 | f138b89d8313385c4d39113ab4945e6a9cd3852a097aa80622dc3b61a03317de
BADPDF Malicious PDF Creator
Posted Aug 31, 2024
Authored by Richard Davy, Yaron Fruchtmann, Assaf Baharav, Ido Solomon | Site metasploit.com

This Metasploit module can either creates a blank PDF file which contains a UNC link which can be used to capture NetNTLM credentials, or if the PDFINJECT option is used it will inject the necessary code into an existing PDF document if possible.

tags | exploit
advisories | CVE-2018-4993
SHA-256 | b008d7e54ddfd9cbdcce9f6c237e1e5ab88081ef4d74a59bce1242f2ce897dc6
AnyBurn 4.8 Buffer Overflow
Posted Mar 13, 2020
Authored by Richard Davy, Gary Nield

AnyBurn version 4.8 SEH buffer overflow exploit.

tags | exploit, overflow
SHA-256 | c9837c0eaa90d56ab11b9092c6dba14a4ae3e4aec2a7d4e17e9aba9f3dac811c
LibreOffice 6.0.3 / OpenOffice 4.1.5 Information Disclosure
Posted May 3, 2018
Authored by Richard Davy

LibreOffice version 6.0.3 and OpenOffice version 4.1.5 suffers from a .odt information disclosure vulnerability.

tags | exploit, info disclosure
advisories | CVE-2018-10583
SHA-256 | 8dfaa0fc230503b0a244b16cf2420d39f87af8b19b498af30d536f1a99b040c9
Sage 50 Payroll 2012 Authentication Bypass
Posted Aug 28, 2012
Authored by Richard Davy

This is a whitepaper detailing how to perform authentication bypass against Sage 50 Payroll 2012 version 18.00.031 using Immunity Debugger.

tags | exploit, paper, bypass
SHA-256 | bf9e32ff6711bdd25f0473894bee2ccf852a964b8f3280f156abf18fd8f4ec99
Revese Engineering And Memory Patching
Posted May 31, 2011
Authored by Richard Davy

Whitepaper called Reverse Engineering and Memory Patching.

tags | paper
SHA-256 | bf5743c2cb8982634575f5c681bc4227d41f8d102007140878aee70541416b69
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close