mirror of https://github.com/MISP/misp-galaxy
First batch of shadow broker leak (NSA name of exploit and tools) from
https://github.com/misterch0c/shadowbrokerpull/51/head
parent
3595d04b35
commit
6149740cd4
|
@ -10,7 +10,7 @@
|
|||
],
|
||||
"description": "threat-actor-tools is an enumeration of tools used by adversaries. The list includes malware but also common software regularly used by the adversaries.",
|
||||
"uuid": "0d821b68-9d82-4c6d-86a6-1071a9e0f79f",
|
||||
"version": 28,
|
||||
"version": 29,
|
||||
"values": [
|
||||
{
|
||||
"meta": {
|
||||
|
@ -2614,6 +2614,98 @@
|
|||
},
|
||||
"description": "HackingTeam Remote Control System (RCS) Galileo hacking platform",
|
||||
"value": "RCS Galileo"
|
||||
},
|
||||
{
|
||||
"description": "RedHat 7.0 - 7.1 Sendmail 8.11.x exploit",
|
||||
"value": "EARLYSHOVEL"
|
||||
},
|
||||
{
|
||||
"description": "root RCE via RPC XDR overflow in Solaris 6, 7, 8, 9 & 10 (possibly newer) both SPARC and x86",
|
||||
"value": "EBBISLAND (EBBSHAVE)"
|
||||
},
|
||||
{
|
||||
"description": "remote Samba 3.0.x Linux exploit",
|
||||
"value": "ECHOWRECKER"
|
||||
},
|
||||
{
|
||||
"description": "appears to be an MDaemon email server vulnerability",
|
||||
"value": "EASYBEE"
|
||||
},
|
||||
{
|
||||
"description": "an IBM Lotus Notes exploit that gets detected as Stuxnet",
|
||||
"value": "EASYPI"
|
||||
},
|
||||
{
|
||||
"description": "an exploit for IBM Lotus Domino 6.5.4 & 7.0.2",
|
||||
"value": "EWOKFRENZY"
|
||||
},
|
||||
{
|
||||
"description": "an IIS 6.0 exploit that creates a remote backdoor",
|
||||
"value": "EXPLODINGCAN"
|
||||
},
|
||||
{
|
||||
"description": "a SMB1 exploit over TCP port 445 which targets XP, 2003, Vista, 7, Windows 8, 2008, 2008 R2, and gives SYSTEM privileges (MS17-010)",
|
||||
"value": "ETERNALROMANCE"
|
||||
},
|
||||
{
|
||||
"description": "a SMB exploit (MS09-050)",
|
||||
"value": "EDUCATEDSCHOLAR"
|
||||
},
|
||||
{
|
||||
"description": "a SMB exploit for Windows XP and Server 2003 (MS10-061)",
|
||||
"value": "EMERALDTHREAD"
|
||||
},
|
||||
{
|
||||
"description": "a remote IMAP exploit for IBM Lotus Domino 6.6.4 to 8.5.2",
|
||||
"value": "EMPHASISMINE"
|
||||
},
|
||||
{
|
||||
"description": "Outlook Exchange WebAccess rules to trigger executable code on the client's side to send an email to other users",
|
||||
"value": "ENGLISHMANSDENTIST"
|
||||
},
|
||||
{
|
||||
"description": "0-day exploit (RCE) for Avaya Call Server",
|
||||
"value": "EPICHERO"
|
||||
},
|
||||
{
|
||||
"description": "SMBv1 exploit targeting Windows XP and Server 2003",
|
||||
"value": "ERRATICGOPHER"
|
||||
},
|
||||
{
|
||||
"description": "a SMBv3 remote code execution flaw for Windows 8 and Server 2012 SP0 (MS17-010)",
|
||||
"value": "ETERNALSYNERGY"
|
||||
},
|
||||
{
|
||||
"description": "SMBv2 exploit for Windows 7 SP1 (MS17-010)",
|
||||
"value": "ETERNALBLUE"
|
||||
},
|
||||
{
|
||||
"description": "a SMBv1 exploit",
|
||||
"value": "ETERNALCHAMPION"
|
||||
},
|
||||
{
|
||||
"description": "Kerberos exploit targeting 2000, 2003, 2008 and 2008 R2 domain controllers",
|
||||
"value": "ESKIMOROLL"
|
||||
},
|
||||
{
|
||||
"description": "RDP exploit and backdoor for Windows Server 2003",
|
||||
"value": "ESTEEMAUDIT"
|
||||
},
|
||||
{
|
||||
"description": "RCE exploit for the Server service in Windows Server 2008 and later (MS08-067)",
|
||||
"value": "ECLIPSEDWING"
|
||||
},
|
||||
{
|
||||
"description": "exploit for IMail 8.10 to 8.22",
|
||||
"value": "ETRE"
|
||||
},
|
||||
{
|
||||
"description": "an exploit framework, similar to MetaSploit",
|
||||
"value": "FUZZBUNCH"
|
||||
},
|
||||
{
|
||||
"description": "implant builder and C&C server that can deliver exploits for Windows 2000 and later, also not detected by any AV vendors",
|
||||
"value": "ODDJOB"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue