Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2012-3716 PoC — Apple Mac OS X 缓冲区溢出漏洞

Source
Associated Vulnerability
Title:Apple Mac OS X 缓冲区溢出漏洞 (CVE-2012-3716)
Description:CoreText in Apple Mac OS X 10.7.x before 10.7.5 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write or read) via a crafted text glyph.
Description
use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range
Readme
killosx
=======

Use Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all vulnerable Apple devices within wifi range.

Installation:
=======

Run 'make install' in the killosx directory. killosx can now be run from anywhere with 'killosx'.

Usage:
=======
    killOSX
    Usage - killosx -i wlan0  ~  Run exploit on wlan0
            killosx -h        ~  This help
File Snapshot

[4.0K] /data/pocs/ef0c5542665ec82e17766e276235f1fed57652ac ├── [2.1K] killosx.sh ├── [ 70] Makefile └── [ 382] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →