hackedteam/vector-exploit

View on GitHub
Branch: master(View all)
NameLines of codeMaintainabilityTest coverage
ht-2013-002-Word/resources/activeX/activeX1.xml
ht-2013-002-Word/resources/exploit.swf
ht-2013-002-Word/resources/media/image1000.wmf
ht-2013-002-Word/resources/shellcode
ht-2013-002-Word/resources/shellcode64
ht-2013-002-Word/resources/shellcode_demo
ht-2013-002-Word/resources/zip.exe
ht-2013-003-Powerpoint/info-fake.yaml
ht-2013-003-Powerpoint/info-good.yaml
ht-2013-003-Powerpoint/info.yaml
ht-2013-003-Powerpoint/pylzma.egg/EGG-INFO/PKG-INFO
ht-2013-003-Powerpoint/pylzma.egg/EGG-INFO/SOURCES.txt
ht-2013-003-Powerpoint/pylzma.egg/EGG-INFO/dependency_links.txt
ht-2013-003-Powerpoint/pylzma.egg/EGG-INFO/native_libs.txt
ht-2013-003-Powerpoint/pylzma.egg/EGG-INFO/not-zip-safe
ht-2013-003-Powerpoint/pylzma.egg/EGG-INFO/requires.txt
ht-2013-003-Powerpoint/pylzma.egg/EGG-INFO/top_level.txt
ht-2013-003-Powerpoint/pylzma.egg/py7zlib.pyc
ht-2013-003-Powerpoint/pylzma.egg/pylzma.pyc
ht-2013-003-Powerpoint/pylzma.egg/pylzma.pyd
ht-2013-003-Powerpoint/resources/activeX/_rels/activeX1.xml.rels
ht-2013-003-Powerpoint/resources/activeX/activeX1.binx
ht-2013-003-Powerpoint/resources/activeX/activeX1.xml
ht-2013-003-Powerpoint/resources/drawings/_rels/vmlDrawing1003.vml.rels
ht-2013-003-Powerpoint/resources/drawings/vmlDrawing1003.vml
ht-2013-003-Powerpoint/resources/exploit.swf
ht-2013-003-Powerpoint/resources/media/image1000.wmf
ht-2013-003-Powerpoint/resources/shellcode
ht-2013-003-Powerpoint/resources/shellcode64
ht-2013-003-Powerpoint/resources/zip.exe
ht-2013-004-IE/info-fake.yaml
ht-2013-004-IE/info.yaml
ht-2013-004-IE/pylzma.egg/EGG-INFO/PKG-INFO
ht-2013-004-IE/pylzma.egg/EGG-INFO/SOURCES.txt
ht-2013-004-IE/pylzma.egg/EGG-INFO/dependency_links.txt
ht-2013-004-IE/pylzma.egg/EGG-INFO/native_libs.txt
ht-2013-004-IE/pylzma.egg/EGG-INFO/not-zip-safe
ht-2013-004-IE/pylzma.egg/EGG-INFO/requires.txt
ht-2013-004-IE/pylzma.egg/EGG-INFO/top_level.txt
ht-2013-004-IE/pylzma.egg/py7zlib.pyc
ht-2013-004-IE/pylzma.egg/pylzma.pyc
ht-2013-004-IE/pylzma.egg/pylzma.pyd
ht-2013-004-IE/resources/PMIEFuck-Java.dll
ht-2013-004-IE/resources/PMIEFuck-WinWord.dll
ht-2013-004-IE/resources/Shellcode-Stage2-IE.exe
ht-2013-004-IE/resources/ajax-loader.gif
ht-2013-004-IE/resources/exploit.swf
ht-2013-004-IE/resources/html.template.txt
ht-2013-004-IE/resources/owned.docm
ht-2013-004-IE/resources/shellcode