Anda di halaman 1dari 8

Vulnerability analysis, Security Papers, Exploit Tu... https://www.exploit-db.com/papers/?order_by=da...

Papers
Archived security papers and articles in various languages.

1,224 total entries


<< prev 1 2 3 4 5 6 7 8 9 10 11 12 next >>

Date Language
Title (?order_by=title&
(?order_by=date& D (?order_by=language& (
order=asc&pg=3)
order=asc&pg=3) order=asc&pg=3)

[Portuguese] Ataques
Avancados contra CPL Portuguese
(https://www.exploit- (
2015-11-17 (Control Panel Applets) (https://www.exploit-
db.com/docs/38743.pdf)
(https://www.exploit- db.com/papers/?l=9)
db.com/docs/38743.pdf)

Win32_bind Shellcode
English
(https://www.exploit- Review (
2015-11-06 (https://www.exploit-
db.com/docs/38647.pdf) (https://www.exploit-
db.com/papers/?l=1)
db.com/docs/38647.pdf)

[Portuguese] Using Printer


Layout as a Vector for Portugues
(https://www.exploit- (
2015-10-25 Malicious Code Insertion (https://www.exploit-
db.com/docs/38530.pdf)
(https://www.exploit- db.com/papers/?l=12)
db.com/docs/38530.pdf)

New Methods in
English
(https://www.exploit- Automated XSS Detection (
2015-10-15 (https://www.exploit-
db.com/docs/38468.pdf) (https://www.exploit-
db.com/papers/?l=1)
db.com/docs/38468.pdf)

1 of 8 08/03/2017 04:34 AM
Vulnerability analysis, Security Papers, Exploit Tu... https://www.exploit-db.com/papers/?order_by=da...

Date Language
Title (?order_by=title&
(?order_by=date& D (?order_by=language& (
order=asc&pg=3)
order=asc&pg=3) order=asc&pg=3)

Writing Cisco IOS Rootkits English


(https://www.exploit- (
2015-10-15 (https://www.exploit- (https://www.exploit-
db.com/docs/38466.pdf)
db.com/docs/38466.pdf) db.com/papers/?l=1)

[Persian] How Yalu Works Persian


(https://www.exploit- (
2015-10-05 (https://www.exploit- (https://www.exploit-
db.com/docs/38398.pdf)
db.com/docs/38398.pdf) db.com/papers/?l=5)

[Hebrew] Digital Whisper


Hebrew
(https://www.exploit- Security Magazine #65 (
2015-10-02 (https://www.exploit-
db.com/docs/38378.pdf) (https://www.exploit-
db.com/papers/?l=19)
db.com/docs/38378.pdf)

Content-Based Blind
Injection Using By Double English
(https://www.exploit- (
2015-09-23 Substring (https://www.exploit-
db.com/download/38293)
(https://www.exploit- db.com/papers/?l=1)
db.com/papers/38293/)

[Persian] Jailbreak Payloads


Persian
(https://www.exploit- From Star to TaiG (
2015-09-22 (https://www.exploit-
db.com/docs/38257.pdf) (https://www.exploit-
db.com/papers/?l=5)
db.com/docs/38257.pdf)

Abusing Windows Opener


English
(https://www.exploit- To Bypass CSRF Protection (
2015-09-15 (https://www.exploit-
db.com/docs/38193.pdf) (https://www.exploit-
db.com/papers/?l=1)
db.com/docs/38193.pdf)

Microsoft .NET MVC -


ReDoS (Denial of Service) English
(https://www.exploit- (
2015-09-15 Vulnerability (MS15-101) (https://www.exploit-
db.com/docs/38149.pdf)
(https://www.exploit- db.com/papers/?l=1)
db.com/docs/38149.pdf)

2 of 8 08/03/2017 04:34 AM
Vulnerability analysis, Security Papers, Exploit Tu... https://www.exploit-db.com/papers/?order_by=da...

Date Language
Title (?order_by=title&
(?order_by=date& D (?order_by=language& (
order=asc&pg=3)
order=asc&pg=3) order=asc&pg=3)

PoC || GTFO 0x09


(https://www.exploit- English
(https://www.exploit- (
2015-09-14 db.com (https://www.exploit-
db.com
/docs/pocorgtfo09.pdf) db.com/papers/?l=1)
/docs/pocorgtfo09.pdf)

Evading All Web-Application


English
(https://www.exploit- Firewalls XSS Filters (
2015-09-09 (https://www.exploit-
db.com/docs/38117.pdf) (https://www.exploit-
db.com/papers/?l=1)
db.com/docs/38117.pdf)

Shoot
zend_executor_globals to
English
(https://www.exploit- bypass php (
2015-09-08 (https://www.exploit-
db.com/docs/38104.pdf) disable_functions
db.com/papers/?l=1)
(https://www.exploit-
db.com/docs/38104.pdf)

Compromising ISP Issued


802.11 Wireless Cable English
(https://www.exploit- (
2015-09-06 Modem Networks for Prot (https://www.exploit-
db.com/docs/38082.pdf)
(https://www.exploit- db.com/papers/?l=1)
db.com/docs/38082.pdf)

[Hebrew] Digital Whisper


Hebrew
(https://www.exploit- Security Magazine #63 (
2015-09-06 (https://www.exploit-
db.com/docs/38083.pdf) (https://www.exploit-
db.com/papers/?l=19)
db.com/docs/38083.pdf)

[Hebrew] Digital Whisper


Hebrew
(https://www.exploit- Security Magazine #64 (
2015-09-06 (https://www.exploit-
db.com/docs/38084.pdf) (https://www.exploit-
db.com/papers/?l=19)
db.com/docs/38084.pdf)

3 of 8 08/03/2017 04:34 AM
Vulnerability analysis, Security Papers, Exploit Tu... https://www.exploit-db.com/papers/?order_by=da...

Date Language
Title (?order_by=title&
(?order_by=date& D (?order_by=language& (
order=asc&pg=3)
order=asc&pg=3) order=asc&pg=3)

[Persian] Pyrit Cluster with


Persian
(https://www.exploit- Kali Linux (
2015-09-02 (https://www.exploit-
db.com/docs/38070.pdf) (https://www.exploit-
db.com/papers/?l=5)
db.com/docs/38070.pdf)

[Persian] Cracking
Persian
(https://www.exploit- WPA/WPA2 with Rainbow (
2015-09-02 (https://www.exploit-
db.com/docs/38069.pdf) Table (https://www.exploit-
db.com/papers/?l=5)
db.com/docs/38069.pdf)

How to HeapSpray and


English
(https://www.exploit- Exploit Memory Corruption (
2015-08-31 (https://www.exploit-
db.com/docs/38033.pdf) in IIS6 (https://www.exploit-
db.com/papers/?l=1)
db.com/docs/38033.pdf)

MySQL Error Based SQL


English
(https://www.exploit- Injection Using EXP (
2015-08-24 (https://www.exploit-
db.com/docs/37953.pdf) (https://www.exploit-
db.com/papers/?l=1)
db.com/docs/37953.pdf)

BIGINT Overow Error


English
(https://www.exploit- Based SQL Injection (
2015-08-07 (https://www.exploit-
db.com/docs/37733.pdf) (https://www.exploit-
db.com/papers/?l=1)
db.com/docs/37733.pdf)

Shared Object (.so)


English
(https://www.exploit- Injection on *nix Systems (
2015-07-14 (https://www.exploit-
db.com/download/37606) (https://www.exploit-
db.com/papers/?l=1)
db.com/papers/37606/)

[Hebrew] Digital Whisper


Hebrew
(https://www.exploit- Security Magazine #62 (
2015-07-02 (https://www.exploit-
db.com/docs/37465.pdf) (https://www.exploit-
db.com/papers/?l=19)
db.com/docs/37465.pdf)

4 of 8 08/03/2017 04:34 AM
Vulnerability analysis, Security Papers, Exploit Tu... https://www.exploit-db.com/papers/?order_by=da...

Date Language
Title (?order_by=title&
(?order_by=date& D (?order_by=language& (
order=asc&pg=3)
order=asc&pg=3) order=asc&pg=3)

PoC || GTFO 0x08


(https://www.exploit- English
(https://www.exploit- (
2015-06-20 db.com (https://www.exploit-
db.com
/docs/pocorgtfo08.pdf) db.com/papers/?l=1)
/docs/pocorgtfo08.pdf)

Privilege Escalation via


Client Management English
(https://www.exploit- (
2015-06-12 Software - Part II (https://www.exploit-
db.com/docs/37273.pdf)
(https://www.exploit- db.com/papers/?l=1)
db.com/docs/37273.pdf)

Escaping VMware
English
(https://www.exploit- Workstation through COM1 (
2015-06-12 (https://www.exploit-
db.com/docs/37276.pdf) (https://www.exploit-
db.com/papers/?l=1)
db.com/docs/37276.pdf)

[Hebrew] Digital Whisper


Hebrew
(https://www.exploit- Security Magazine #61 (
2015-05-01 (https://www.exploit-
db.com/docs/36879.pdf) (https://www.exploit-
db.com/papers/?l=19)
db.com/docs/36879.pdf)

Privilege Escalation via


Client Management English
(https://www.exploit- (
2015-04-30 Software (https://www.exploit-
db.com/docs/36872.pdf)
(https://www.exploit- db.com/papers/?l=1)
db.com/docs/36872.pdf)

Developing MIPS Exploits to


English
(https://www.exploit- Hack Routers (
2015-04-21 (https://www.exploit-
db.com/docs/36806.pdf) (https://www.exploit-
db.com/papers/?l=1)
db.com/docs/36806.pdf)

5 of 8 08/03/2017 04:34 AM
Vulnerability analysis, Security Papers, Exploit Tu... https://www.exploit-db.com/papers/?order_by=da...

Date Language
Title (?order_by=title&
(?order_by=date& D (?order_by=language& (
order=asc&pg=3)
order=asc&pg=3) order=asc&pg=3)

[Hebrew] Digital Whisper


(https://www.exploit- Security Magazine #60 Hebrew
(
2015-04-03 db.com (https://www.exploit- (https://www.exploit-
/docs/DigitalWhisper60.pdf) db.com db.com/papers/?l=19)
/docs/DigitalWhisper60.pdf)

PoC || GTFO 0x07


(https://www.exploit- English
(https://www.exploit- (
2015-03-19 db.com (https://www.exploit-
db.com
/docs/pocorgtfo07.pdf) db.com/papers/?l=1)
/docs/pocorgtfo07.pdf)

[Hebrew] Digital Whisper


Hebrew
(https://www.exploit- Security Magazine #59 (
2015-03-09 (https://www.exploit-
db.com/docs/36312.pdf) (https://www.exploit-
db.com/papers/?l=19)
db.com/docs/36312.pdf)

[Turkish] Penetration and


Security Testing on Turkish
(https://www.exploit- (
2015-03-04 Microsoft SQL Server (https://www.exploit-
db.com/docs/36261.pdf)
(https://www.exploit- db.com/papers/?l=7)
db.com/docs/36261.pdf)

[Hebrew] Digital Whisper


Hebrew
(https://www.exploit- Security Magazine #58 (
2015-02-13 (https://www.exploit-
db.com/docs/36069.pdf) (https://www.exploit-
db.com/papers/?l=19)
db.com/docs/36069.pdf)

Exploit-Sources (Part One) English


(https://www.exploit- (
2015-02-09 (https://www.exploit- (https://www.exploit-
db.com/download/36030)
db.com/papers/36030/) db.com/papers/?l=1)

Ghost Vulnerability
English
(https://www.exploit- CVE-2015-0235 White Paper (
2015-01-30 (https://www.exploit-
db.com/docs/35952.pdf) (https://www.exploit-
db.com/papers/?l=1)
db.com/docs/35952.pdf)

6 of 8 08/03/2017 04:34 AM
Vulnerability analysis, Security Papers, Exploit Tu... https://www.exploit-db.com/papers/?order_by=da...

Date Language
Title (?order_by=title&
(?order_by=date& D (?order_by=language& (
order=asc&pg=3)
order=asc&pg=3) order=asc&pg=3)

Analysis of CVE-2014-4113
(Windows Privilege English
(https://www.exploit- (
2015-01-29 Escalation Vulnerability) (https://www.exploit-
db.com/docs/35937.pdf)
(https://www.exploit- db.com/papers/?l=1)
db.com/docs/35937.pdf)

[Hebrew] Digital Whisper


Hebrew
(https://www.exploit- Security Magazine #57 (
2015-01-01 (https://www.exploit-
db.com/docs/35669.pdf) (https://www.exploit-
db.com/papers/?l=19)
db.com/docs/35669.pdf)

Anatomy of Exploit - World


English
(https://www.exploit- of Shellcode (
2014-12-29 (https://www.exploit-
db.com/download/35646) (https://www.exploit-
db.com/papers/?l=1)
db.com/papers/35646/)

Backdooring with netcat


English
(https://www.exploit- shellcode (
2014-12-15 (https://www.exploit-
db.com/download/35538) (https://www.exploit-
db.com/papers/?l=1)
db.com/papers/35538/)

[Albanian] Socket Learning Albanian


(https://www.exploit- (
2014-12-15 (https://www.exploit- (https://www.exploit-
db.com/docs/35544.docx)
db.com/docs/35544.docx) db.com/papers/?l=10)

[Turkish] Codesys SEH


Turkish
(https://www.exploit- Exploit Tutorial Paper (
2014-12-15 (https://www.exploit-
db.com/docs/35546.pdf) (https://www.exploit-
db.com/papers/?l=7)
db.com/docs/35546.pdf)

[Hebrew] Digital Whisper


Hebrew
(https://www.exploit- Security Magazine #56 (
2014-12-05 (https://www.exploit-
db.com/docs/35471.pdf) (https://www.exploit-
db.com/papers/?l=19)
db.com/docs/35471.pdf)

7 of 8 08/03/2017 04:34 AM
Vulnerability analysis, Security Papers, Exploit Tu... https://www.exploit-db.com/papers/?order_by=da...

Date Language
Title (?order_by=title&
(?order_by=date& D (?order_by=language& (
order=asc&pg=3)
order=asc&pg=3) order=asc&pg=3)

[Turkish] How to Bypass


SafeSEH and Stack Cookie Turkish
(https://www.exploit- (
2014-12-03 Protection (https://www.exploit-
db.com/docs/35458.pdf)
(https://www.exploit- db.com/papers/?l=7)
db.com/docs/35458.pdf)

NMAP - Port-Scanning: A
Practical Approach English
(https://www.exploit- (
2014-12-02 Modied for better (https://www.exploit-
db.com/download/35425)
(https://www.exploit- db.com/papers/?l=1)
db.com/papers/35425/)

[Turkish] Embedded Device


Security & Zollard Botnet Turkish
(https://www.exploit- (
2014-11-25 Analysis (https://www.exploit-
db.com/docs/35368.pdf)
(https://www.exploit- db.com/papers/?l=7)
db.com/docs/35368.pdf)

Deep Dive into ROP


English
(https://www.exploit- Payload Analysis (
2014-11-24 (https://www.exploit-
db.com/docs/35355.pdf) (https://www.exploit-
db.com/papers/?l=1)
db.com/docs/35355.pdf)

PoC || GTFO 0x06


(https://www.exploit- English
(https://www.exploit- (
2014-11-23 db.com (https://www.exploit-
db.com
/docs/pocorgtfo06.pdf) db.com/papers/?l=1)
/docs/pocorgtfo06.pdf)

[Hebrew] Digital Whisper


Hebrew
(https://www.exploit- Security Magazine #55 (
2014-11-06 (https://www.exploit-
db.com/docs/35176.pdf) (https://www.exploit-
db.com/papers/?l=19)
db.com/docs/35176.pdf)

8 of 8 08/03/2017 04:34 AM