[] NeoSense
search results for » port: 6.0
Sayan Ray Linux/x86-64 - execve(_/bin/sh_) Shellcode (36 bytes)
linux_x86-64 36.0
Senzee Windows/x64 - PIC Null-Free TCP Reverse Shell Shellcode (476 Bytes)
windows 476.0
Eduardo Silva FlipRotation v1.0 decoder - Shellcode (146 bytes)
linux 146.0
boku macOS/x64 - Execve Caesar Cipher String Null-Free Shellcode
macos 286.0
Ken Kitahara Linux/ARM64 - Bind (4444/TCP) Shell (/bin/sh) + IPv6 Shellcode (176 bytes)
arm 176.0
Jonathan So Linux/x86 - execve(/bin/sh) + Reposition + INC Encoder Shellcode (66 bytes)
linux_x86 66.0
Metasploit Apache Spark - (Unauthenticated) Command Execution (Metasploit)
remote java 6066.0
Metasploit Apache Spark - (Unauthenticated) Command Execution (Metasploit)
remote java 6066.0
Kevin Kirsche Linux/x86 - Bind (1337/TCP) Shell (/bin/sh) + IPv4/6 Shellcode (146 bytes)
linux_x86 146.0
Kartik Durg Linux/x86 - Reverse (::FFFF:192.168.1.5:4444/TCP) Shell (/bin/sh) + Null-Free + IPv6 Shellcode (86 bytes)
linux_x86 86.0
Ken Kitahara Linux/ARM - Reverse (::1:4444/TCP) Shell (/bin/sh) +IPv6 Shellcode (116 Bytes)
arm 116.0
Paolo Perego Linux/x86 - Reverse (127.0.0.1:4444/TCP) Shell (/bin/sh) Shellcode (96 Bytes)
linux_x86 96.0
rtmcx Linux/ARM - Reverse (192.168.1.1:4444/TCP) Shell (/bin/sh) + Password (MyPasswd) + Null-Free Shellcode (156 bytes)
arm 156.0
Hashim Jawad Linux/x86 - execve(/bin/sh) + Polymorphic Shellcode (26 bytes)
linux_x86 26.0
0x4ndr3 Linux/x64 - Add Map (127.1.1.1 google.lk) To /etc/hosts Shellcode (96 bytes)
linux_x86-64 96.0
Hashim Jawad Linux/x86 - chmod 777 /etc/sudoers Shellcode (36 bytes)
linux_x86 36.0
page: 1/8 [exploits: 121]