First batch of shadow broker leak (NSA name of exploit and tools) from

https://github.com/misterch0c/shadowbroker
pull/51/head
Alexandre Dulaunoy 2017-04-15 19:40:54 +02:00
parent 3595d04b35
commit 6149740cd4
1 changed files with 93 additions and 1 deletions

View File

@ -10,7 +10,7 @@
],
"description": "threat-actor-tools is an enumeration of tools used by adversaries. The list includes malware but also common software regularly used by the adversaries.",
"uuid": "0d821b68-9d82-4c6d-86a6-1071a9e0f79f",
"version": 28,
"version": 29,
"values": [
{
"meta": {
@ -2614,6 +2614,98 @@
},
"description": "HackingTeam Remote Control System (RCS) Galileo hacking platform",
"value": "RCS Galileo"
},
{
"description": "RedHat 7.0 - 7.1 Sendmail 8.11.x exploit",
"value": "EARLYSHOVEL"
},
{
"description": "root RCE via RPC XDR overflow in Solaris 6, 7, 8, 9 & 10 (possibly newer) both SPARC and x86",
"value": "EBBISLAND (EBBSHAVE)"
},
{
"description": "remote Samba 3.0.x Linux exploit",
"value": "ECHOWRECKER"
},
{
"description": "appears to be an MDaemon email server vulnerability",
"value": "EASYBEE"
},
{
"description": "an IBM Lotus Notes exploit that gets detected as Stuxnet",
"value": "EASYPI"
},
{
"description": "an exploit for IBM Lotus Domino 6.5.4 & 7.0.2",
"value": "EWOKFRENZY"
},
{
"description": "an IIS 6.0 exploit that creates a remote backdoor",
"value": "EXPLODINGCAN"
},
{
"description": "a SMB1 exploit over TCP port 445 which targets XP, 2003, Vista, 7, Windows 8, 2008, 2008 R2, and gives SYSTEM privileges (MS17-010)",
"value": "ETERNALROMANCE"
},
{
"description": "a SMB exploit (MS09-050)",
"value": "EDUCATEDSCHOLAR"
},
{
"description": "a SMB exploit for Windows XP and Server 2003 (MS10-061)",
"value": "EMERALDTHREAD"
},
{
"description": "a remote IMAP exploit for IBM Lotus Domino 6.6.4 to 8.5.2",
"value": "EMPHASISMINE"
},
{
"description": "Outlook Exchange WebAccess rules to trigger executable code on the client's side to send an email to other users",
"value": "ENGLISHMANSDENTIST"
},
{
"description": "0-day exploit (RCE) for Avaya Call Server",
"value": "EPICHERO"
},
{
"description": "SMBv1 exploit targeting Windows XP and Server 2003",
"value": "ERRATICGOPHER"
},
{
"description": "a SMBv3 remote code execution flaw for Windows 8 and Server 2012 SP0 (MS17-010)",
"value": "ETERNALSYNERGY"
},
{
"description": "SMBv2 exploit for Windows 7 SP1 (MS17-010)",
"value": "ETERNALBLUE"
},
{
"description": "a SMBv1 exploit",
"value": "ETERNALCHAMPION"
},
{
"description": "Kerberos exploit targeting 2000, 2003, 2008 and 2008 R2 domain controllers",
"value": "ESKIMOROLL"
},
{
"description": "RDP exploit and backdoor for Windows Server 2003",
"value": "ESTEEMAUDIT"
},
{
"description": "RCE exploit for the Server service in Windows Server 2008 and later (MS08-067)",
"value": "ECLIPSEDWING"
},
{
"description": "exploit for IMail 8.10 to 8.22",
"value": "ETRE"
},
{
"description": "an exploit framework, similar to MetaSploit",
"value": "FUZZBUNCH"
},
{
"description": "implant builder and C&C server that can deliver exploits for Windows 2000 and later, also not detected by any AV vendors",
"value": "ODDJOB"
}
]
}