[] NeoSense
search results for » port: 5.0
Al Baradi Joy Linux/x86 - Reverse TCP Shellcode (95 bytes)
linux_x86 95.0
Metasploit OpenSMTPD - MAIL FROM Remote Code Execution (Metasploit)
remote linux 25.0 CVE-2020-7247
Kağan Çapar Linux/x86_64 - Wget Linux Enumeration Script Shellcode (155 Bytes)
linux_x86-64 155.0
Charles Truscott Microsoft Exchange 2003 - base64-MIME Remote Code Execution
remote windows 25.0 CVE-2007-0213
strider Linux/x86 - OpenSSL Encrypt (aes256cbc) Files (test.txt) Shellcode (185 bytes)
linux_x86 185.0
strider Linux/x86 - cat .bash_history + base64 Encode + cURL (http://localhost:8080) Shellcode (125 bytes)
linux_x86 125.0
Dino Covotsos MailCarrier 2.51 - 'RCPT TO' Buffer Overflow
remote windows 25.0
Dino Covotsos MailCarrier 2.51 - 'RCPT TO' Buffer Overflow
remote windows 25.0
Joseph McDonagh Mail Carrier 2.5.1 - 'MAIL FROM' Buffer Overflow
remote windows 25.0
Joseph McDonagh Mail Carrier 2.5.1 - 'MAIL FROM' Buffer Overflow
remote windows 25.0
Daniele Votta Linux/x86 - XOR Encoder / Decoder execve(/bin/sh) Shellcode (45 bytes)
linux_x86 45.0
Kartik Durg Windows/x86 - Download File (http://192.168.0.13/ms.msi) Via msiexec + Execute Shellcode (95 bytes)
windows_x86 95.0
Daniele Votta Linux/x86 - exit(0) Shellcode (5 bytes)
linux_x86 5.0
T3jv1l Linux/x86 - Bind (1337/TCP) Ncat (/usr/bin/ncat) Shell (/bin/bash) + Null-Free Shellcode (95 bytes)
linux_x86 95.0
Metasploit Morris Worm - sendmail Debug Mode Shell Escape (Metasploit)
remote unix 25.0
Metasploit Morris Worm - sendmail Debug Mode Shell Escape (Metasploit)
remote unix 25.0
page: 1/14 [exploits: 209]