forked from mzeyong/shadowbroker
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
41a6079
commit 789e63f
Showing
1 changed file
with
27 additions
and
1 deletion.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1 1,27 @@ | ||
https://steemit.com/shadowbrokers/@theshadowbrokers/lost-in-translation | ||
https://steemit.com/shadowbrokers/@theshadowbrokers/lost-in-translation | ||
|
||
# Exploits | ||
|
||
- **EARLYSHOVEL** RedHat 7.0 - 7.1 Sendmail 8.11.x exploit | ||
- **EBBISLAND (EBBSHAVE)** root RCE via RPC XDR overflow in Solaris 6, 7, 8, 9 & 10 (possibly newer) both SPARC and x86. | ||
- **ECHOWRECKER** remote Samba 3.0.x Linux exploit. | ||
- **EASYBEE** appears to be an MDaemon email server vulnerability | ||
- **EASYPI** is an IBM Lotus Notes exploit that gets detected as Stuxnet | ||
- **EWOKFRENZY** is an exploit for IBM Lotus Domino 6.5.4 | ||
- **EXPLODINGCAN** is an IIS 6.0 exploit that creates a remote backdoor | ||
- **ETERNALROMANCE** is a SMB1 exploit over TCP port 445 which targets XP, 2003, Vista, 7, Windows 8, 2008, 2008 R2, and gives SYSTEM privileges | ||
- **EDUCATEDSCHOLAR** is a SMB exploit | ||
- **EMERALDTHREAD** is a SMB exploit for Windows XP and Server 2003 | ||
- **EMPHASISMINE** is a remote IMAP exploit for IBM Lotus | ||
- **ENGLISHMANSDENTIST** sets Outlook Exchange WebAccess rules to trigger executable code on the client's side to send an email to other users | ||
- **EPICHERO** 0-day exploit (RCE) for Avaya Call Server | ||
- **ERRATICGOPHER** is a SMBv1 exploit targeting Windows XP and Server 2003 | ||
- **ETERNALSYNERGY** is a SMBv3 remote code execution flaw for Windows 8 and Server 2012 SP0 | ||
- **ETERNALBLUE is** a SMBv2 exploit for Windows 7 SP1 | ||
- **ETERNALCHAMPION** is a SMBv1 exploit | ||
- **ESKIMOROLL** is a Kerberos exploit targeting 2000, 2003, 2008 and 2008 R2 domain controllers | ||
- **ESTEEMAUDIT** is an RDP exploit and backdoor for Windows Server 2003 | ||
- **ECLIPSEDWING** is an RCE exploit for the Server service in Windows Server 2008 and later | ||
- **ETRE** is an exploit for IMail 8.10 to 8.22 | ||
- **FUZZBUNCH** is an exploit framework, similar to MetaSploit | ||
- **ODDJOB** is an implant builder and C&C server that can deliver exploits for Windows 2000 and later, also not detected by any AV vendors |