• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

hijacking

  1. M

    C/C++ uac bypass using dll hijacking

    Download:Hidden content
  2. dEEpEst

    SharpRDPHijack: RDP Session Hijacking [Guide]

    Hidden content
  3. itsMe

    Spartacus: DLL Hijacking Discovery Tool

    Spartacus is utilising the SysInternals Process Monitor and is parsing raw PML log files. You can leave ProcMon running for hours and discover 2nd and 3rd level (ie an app that loads another DLL that loads yet another DLL when you use a specific feature of the parent app) DLL Hijacking...
  4. itsMe

    COM-Hunter - COM Hijacking VOODOO

    COM Hijacking VOODOO COM-hunter is a COM Hijacking persistnce tool written in C#. This tool was inspired during the RTO course of @zeropointsecltd Features     Finds out entry valid CLSIDs in the victim's machine.     Finds out valid CLSIDs via Task Scheduler in the victim's machine.    ...
  5. itsMe

    EvilDLL v1.0 - Malicious DLL (Reverse Shell) Generator For DLL Hijacking

    EvilDLL v1.0 Malicious DLL (Win Reverse Shell) generator for DLL Hijacking Hidden content
  6. dEEpEst

    [CVE-2019-14899] Inferring and hijacking VPN-tunneled TCP connections.

    Hidden content
  7. 1

    Exploits Microsoft File Checksum Verifier 2.05 DLL Hijacking

    Microsoft File Checksum Verifier version 2.05 suffers from a dll hijacking vulnerability. View the full article
  8. 1

    Exploits Huawei eSpace 1.1.11.103 DLL Hijacking

    Huawei eSpace version 1.1.11.103 suffers from a DLL Hijacking issue. The vulnerability is caused due to the application loading libraries (mfc71enu.dll, mfc71loc.dll, tcapi.dll and airpcap.dll) in an insecure manner. This can be exploited to load arbitrary libraries by tricking a user into...
  9. 1

    Exploits VMware Workstation DLL Hijacking

    VMware Workstation versions prior to 15.1.0 suffer from a dll hijacking vulnerability. View the full article
  10. B

    First Android Clipboard Hijacking Crypto Malware Found On Google Play Store

    First Android Clipboard Hijacking Crypto Malware Found On Google Play Store       February 11, 2019Swati Khandelwal A security researcher has discovered yet another cryptocurrency-stealing...
  11. 1

    Exploits Polkit Temporary Authentication Hijacking

    Polkit suffers from a temporary auth hijacking vulnerability via PID reuse and a non-atomic fork. View the full article
  12. 1

    Exploits BMC Network Automation 8.7.00.000 Session Hijacking

    The BMC Network Automation allows authenticated users to hijack established remote sessions of other users, version v8.7.00.000 b383 u038 was confirmed to be vulnerable. View the full article
  13. 1

    Exploits Exiftool 8.3.2.0 DLL Hijacking

    Exiftool version 8.3.2.0 suffers from a dll hijacking vulnerability. View the full article
  14. 1

    Exploits Intel Rapid Storage Technology User Interface And Driver 15.9.0.1015 DLL Hijacking

    Intel Rapid Storage Technology User Interface and Driver version 15.9.0.1015 suffers from a dll hijacking vulnerability. View the full article
  15. 1

    Exploits D-LINK Central WifiManager (CWM 100) 1.03 r0098 DLL Hijacking

    D-Link Central WiFiManager CWM-100 version 1.03 r0098 devices will load a trojan horse "quserex.dll" and will create a new thread running with SYSTEM integrity. View the full article
  16. 1

    Exploits Dropbox 54.5.90 DLL Hijacking

    Dropbox version 54.5.90 suffers from a DLL hijacking vulnerability. View the full article
  17. 1

    Exploits Microsoft DirectX SDK (June 2010) Xact3.exe DLL Hijacking

    The Microsoft DirectX SDK "Xact3.exe" cross-platform tool allows for arbitrary code execution via a trojan horse file "xbdm.dll" in the current working directory, upon opening a ".xap" project file from the same location. View the full article
Back
Top