hackedteam/vector-exploit

View on GitHub
Branch: master(View all)
NameLines of codeMaintainabilityTest coverage
.gitignore
CHANGELOG
VERSION
build.rb57
A
2 hrs
ht-2012-002-FakeOSX/fakedoc.rb78
A
0 mins
ht-2012-002-FakeOSX/info.yaml
ht-2012-002-FakeOSX/resources/MacFakeDocument.zip
ht-2012-002-FakeOSX/resources/jpeg.icns
ht-2012-002-FakeOSX/resources/jpg.icns
ht-2012-002-FakeOSX/resources/pdf.icns
ht-2012-002-FakeOSX/resources/rtf.icns
ht-2012-007-Cydia/bin/ar.exe
ht-2012-007-Cydia/bin/cygiconv-2.dll
ht-2012-007-Cydia/bin/cygintl-8.dll
ht-2012-007-Cydia/bin/cygwin1.dll
ht-2012-007-Cydia/cydia.rb76
A
0 mins
ht-2012-007-Cydia/info.yaml
ht-2012-007-Cydia/resources/Packages
ht-2012-007-Cydia/resources/Release
ht-2012-007-Cydia/resources/control.tar.gz
ht-2012-007-Cydia/resources/control/control
ht-2012-007-Cydia/resources/control/postinst
ht-2012-007-Cydia/resources/control/postrm
ht-2012-007-Cydia/resources/control/preinst
ht-2012-007-Cydia/resources/control/prerm
ht-2012-007-Cydia/resources/debian-binary
ht-2013-002-Word/exploit.py231
F
1 wk
ht-2013-002-Word/info-fake.yaml
ht-2013-002-Word/info-good.yaml
ht-2013-002-Word/info.yaml
ht-2013-002-Word/pylzma.egg/EGG-INFO/PKG-INFO
ht-2013-002-Word/pylzma.egg/EGG-INFO/SOURCES.txt
ht-2013-002-Word/pylzma.egg/EGG-INFO/dependency_links.txt
ht-2013-002-Word/pylzma.egg/EGG-INFO/native_libs.txt
ht-2013-002-Word/pylzma.egg/EGG-INFO/not-zip-safe
ht-2013-002-Word/pylzma.egg/EGG-INFO/requires.txt
ht-2013-002-Word/pylzma.egg/EGG-INFO/top_level.txt
ht-2013-002-Word/pylzma.egg/py7zlib.py591
F
4 days
ht-2013-002-Word/pylzma.egg/py7zlib.pyc
ht-2013-002-Word/pylzma.egg/pylzma.py7
A
1 hr
ht-2013-002-Word/pylzma.egg/pylzma.pyc
ht-2013-002-Word/pylzma.egg/pylzma.pyd
ht-2013-002-Word/resources/activeX/_rels/activeX1.xml.rels
ht-2013-002-Word/resources/activeX/activeX1.bin
ht-2013-002-Word/resources/activeX/activeX1.xml
ht-2013-002-Word/resources/exploit.swf
ht-2013-002-Word/resources/media/image1000.wmf
ht-2013-002-Word/resources/shellcode
ht-2013-002-Word/resources/shellcode64
ht-2013-002-Word/resources/shellcode_demo