hackedteam/vector-exploit

View on GitHub
Branch: master(View all)
NameLines of codeMaintainabilityTest coverage
src/Shellcode-Stage2-IE/Shellcode-Stage2-IE/Source.h
src/edn2/2013-002-Word-TLS/build
src/edn2/2013-002-Word-TLS/resources/activeX/_rels/activeX1.xml.rels
src/edn2/2013-002-Word-TLS/resources/activeX/activeX1.bin
src/edn2/2013-002-Word-TLS/resources/activeX/activeX1.xml
src/edn2/2013-002-Word-TLS/resources/empty.swf
src/edn2/2013-002-Word-TLS/resources/exploit.swf
src/edn2/2013-002-Word-TLS/resources/media/image1000.wmf
src/edn2/2013-002-Word-TLS/resources/shellcode
src/edn2/2013-002-Word-TLS/resources/shellcode64
src/edn2/2013-002-Word-TLS/resources/xp_filter.py15
C
1 day
src/edn2/2013-003-PowerPoint-TLS/build
src/edn2/2013-003-PowerPoint-TLS/resources/activeX/_rels/activeX1.xml.rels
src/edn2/2013-003-PowerPoint-TLS/resources/activeX/activeX1.binx
src/edn2/2013-003-PowerPoint-TLS/resources/activeX/activeX1.xml
src/edn2/2013-003-PowerPoint-TLS/resources/drawings/_rels/vmlDrawing1003.vml.rels
src/edn2/2013-003-PowerPoint-TLS/resources/drawings/vmlDrawing1003.vml
src/edn2/2013-003-PowerPoint-TLS/resources/empty.swf
src/edn2/2013-003-PowerPoint-TLS/resources/exploit.swf
src/edn2/2013-003-PowerPoint-TLS/resources/media/image1000.wmf
src/edn2/2013-003-PowerPoint-TLS/resources/shellcode
src/edn2/2013-003-PowerPoint-TLS/resources/shellcode64
src/edn2/2013-003-PowerPoint-TLS/resources/xp_filter.py15
C
1 day
src/edn2/2013-005-IE-TLS/build
src/edn2/2013-005-IE-TLS/resources/PMIEFuck-Java.dll
src/edn2/2013-005-IE-TLS/resources/PMIEFuck-WinWord.dll
src/edn2/2013-005-IE-TLS/resources/Shellcode-Stage2-IE.exe
src/edn2/2013-005-IE-TLS/resources/Shellcode-Stage2-IE.exe-validate-ca
src/edn2/2013-005-IE-TLS/resources/ajax-loader.gif
src/edn2/2013-005-IE-TLS/resources/empty.swf
src/edn2/2013-005-IE-TLS/resources/exploit.swf
src/edn2/2013-005-IE-TLS/resources/exploit.swf-validate-ca
src/edn2/2013-005-IE-TLS/resources/owned.docm
src/edn2/2013-005-IE-TLS/resources/shellcode
src/edn2/2013-005-IE-TLS/resources/shellcode-validate-ca
src/edn2/2013-005-IE-TLS/resources/xp_filter.py15
C
1 day
src/edn2/2014-004-AndroidBrowser/build
src/edn2/2014-004-AndroidBrowser/exploit
src/edn2/2014-004-AndroidBrowser/go.html
src/edn2/2014-004-AndroidBrowser/module.so
src/edn2/2014-004-AndroidBrowser/redir.js3
A
0 mins
src/edn2/2014-004-AndroidBrowser/script.js56
A
0 mins
src/edn2/2014-004-AndroidBrowser/slowaes.py475
F
2 mos
src/edn2/2014-004-AndroidBrowser/stage1_xml.py67
F
4 days
src/edn2/2014-004-AndroidBrowser/stage4.js5
A
0 mins
src/edn2/2014-004-AndroidBrowser/stage4_js.py26
A
0 mins
src/edn2/2014-004-AndroidBrowser/stylesheet.xsl
src/exploit_vps/genera_hash_scout/genera_hash_vps_exploit.py13
A
0 mins
src/exploit_vps/html/admin/2013-002-Word/exploit.py187
F
1 wk
src/exploit_vps/html/admin/2013-002-Word/resources/activeX/_rels/activeX1.xml.rels