Subscribe via feed.
Posts under tools

Bradley Manning Sentence a Victory, Says WikiLeaks’ Julian Assange [VIDEO] – IBTimes.co.uk

Posted by deepcore under DDOS, facebook, m$, Privacy, Security, tools, twitter, Wikileak (No Respond)

IBTimes.co.uk Bradley Manning Sentence a Victory, Says WikiLeaks ' Julian Assange [VIDEO] IBTimes.co.uk Julian Assange has praised the 35-year prison sentence handed down to US Army intelligence whistleblower Bradley Manning as a victory.

Tags: , , , ,

Key WikiLeaks Senate candidate quits due to lack of ‘democratic processes’ – ABC Online

Posted by deepcore under Apple, DDOS, facebook, m$, Privacy, tools, twitter, Wikileak (No Respond)

International Business Times AU Key WikiLeaks Senate candidate quits due to lack of 'democratic processes' ABC Online The bid by WikiLeaks Party founder Julian Assange to win seats in the Senate has taken a blow, with a key candidate quitting because of a lack of transparency and accountability in the party. Author and ethicist, Leslie Cannold, is second on the …

Tags: , , , ,

Packet Storm Advisory 2013-0819-1 – Oracle Java BytePackedRaster.verify()

The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of “dataBitOffset” boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file

Tags: , ,

Packet Storm Exploit 2013-0819-1 – Oracle Java BytePackedRaster.verify() Signed Integer Overflow

The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of “dataBitOffset” boundary checks. This exploit code demonstrates remote code execution by popping calc.exe

Tags: ,

Wikileaks Just Released A Massive ‘Insurance’ File That No One Can Open – Business Insider

Wikileaks Just Released A Massive 'Insurance' File That No One Can Open Business Insider You can download the files via torrent but since they are encrypted — and Wikileaks has not yet provided the key — you won't be able to open them. We can garner at least one thing of note from the file names alone: They probably have a very high … and more

Tags: , , ,

What Could Be In Wikileak’s Giant 349GB "Insurance" File? – Gizmodo

Posted by deepcore under Apple, facebook, m$, Privacy, Security, tools, twitter, Wikileak (No Respond)

What Could Be In Wikileak's Giant 349GB “Insurance” File? Gizmodo Wikileaks has stirred up its share of trouble in its day, but it might be up to something more.

Tags: , , ,

[papers] – Smashing the stack, an example from 2013

Posted by deepcore under exploit, m$, software, tools, twitter (No Respond)

Smashing the stack, an example from 2013

Tags: , , , ,

Manning "demande pardon" pour les fuites de WikiLeaks – Le Nouvel Observateur

Posted by deepcore under Android, Apple, DDOS, facebook, iphone, m$, tools, twitter, Wikileak (No Respond)

Le Nouvel Observateur Manning “demande pardon” pour les fuites de WikiLeaks Le Nouvel Observateur L'accusé de 25 ans a toujours reconnu avoir transmis 700.000 documents militaires et diplomatiques au site internet WikiLeaks qui les a publiés, mais il nie catégoriquement avoir voulu nuire aux Etats-Unis et dit avoir espéré provoquer un débat mondial.

Tags: , ,

Packet Storm Advisory 2013-0813-1 – Oracle Java IntegerInterleavedRaster.verify()

The IntegerInterleavedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of “dataOffsets[0]” boundary checks. This vulnerability allows for remote code execution

Tags: , , ,

Packet Storm Exploit 2013-0813-1 – Oracle Java IntegerInterleavedRaster.verify() Signed Integer Overflow

The IntegerInterleavedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of “dataOffsets[0]” boundary checks. This exploit code demonstrates remote code execution by popping calc.exe. It was obtained through the Packet Storm Bug Bounty program.

Tags: , ,