This repo will contain my exploit development scripts from 2010. I put here for archival purposes.
If you want to test my script, please test in the development environment. Use virtual machine and host-only network to isolate the network.
Target operating system is Windows (various from Windows XP to Windows 10), and most scripts are written in Python. Whatever your attacking machine, you will need Python for the OS.
Vulnerable softwares can be found in oldversion (http://www.oldversion.com/) or oldapps (http://www.oldapps.com/). You can also search it on exploit-db (https://www.exploit-db.com) to match my exploits.
To run the exploit, please refer to how the application works. If it's a local exploit, then you must load it within the vulnerable application. If it's a remote exploit, it means that you must run against the vulnerable application's service that run on remote target.
My scripts have been created purely for the purposes of academic research and for the development of effective defensive techniques, and is not intended to be used to attack systems except where explicitly authorized. I am not responsible or liable for misuse of the software. Use responsibly.
This project is licensed under the GPLv2 - see the LICENSE file for details
- I don't code, I explore.
- I don't really like Apple, but ironically I use their products. yuck!
- I love Winamp more than Spotify, but lazy (and illegal!) to download mp3s. So..