[] NeoSense
search results for » port: 32.0
bolonobolo Linux/x86 - execve(/bin/sh) + NOT + XOR-N + Random Encoded Shellcode (132 bytes)
linux_x86 132.0
Metasploit PostgreSQL 9.3 - COPY FROM PROGRAM Command Execution (Metasploit)
remote multiple 5432.0 CVE-2019-9193
Ken Kitahara Linux/ARM - execve(_/bin/sh__ [_/bin/sh_]_ NULL) Shellcode (32 Bytes)
arm 32.0
Ken Kitahara Linux/ARM - Egghunter (0x50905090) + execve('/bin/sh') Shellcode (32 bytes)
arm 32.0
Snir Levi Windows/x86 - Reverse (127.0.0.1:4444/TCP) Shell + Staged + Alphanumeric Shellcode (332 bytes)
windows_x86 332.0
rigan Linux/MIPS - reboot() Shellcode (32 bytes)
linux_mips 32.0 OSVDB-83189
gunslinger_ Linux/x86 - sethostname(PwNeD !!_ 8) Shellcode (32 bytes)
linux_x86 32.0
evil.xi4oyu Linux/x64 - Bind (4444/TCP) Shell Shellcode (132 bytes)
linux_x86-64 132.0
Stack Windows/x86 (XP SP2) (French) - cmd.exe Shellcode (32 bytes)
windows_x86 32.0
Dad_ Linux/SuperH (sh4) - Bind (31337/TCP) Shell (/bin/sh) Shellcode (132 bytes)
superh_sh4 132.0
onionring Linux/x86 - /bin/rm -rf / + Attempts To Block The Process From Being Stopped Shellcode (132 bytes)
linux_x86 132.0
BaCkSpAcE Linux/x86 - execve() + Diassembly + Obfuscation Shellcode (32 bytes)
linux_x86 32.0
hophet OSX/PPC - sync() + reboot() Shellcode (32 bytes)
osx_ppc 32.0
Gotfault Security Power Daemon 2.0.2 - 'WHATIDO' Remote Format String
remote linux 532.0 OSVDB-23123;CVE-2006-0681
izik Linux/x86 - chmod 0666 /etc/shadow + exit() Shellcode (32 bytes)
linux_x86 32.0
Charles Stevenson Linux/PPC - read() + exec Shellcode (32 bytes)
linux_ppc 32.0
page: 1/2 [exploits: 20]