[] NeoSense
search results for » port: 9.0
Senzee Windows/x64 - PIC Null-Free Calc.exe Shellcode (169 Bytes)
windows 169.0
Metasploit Microsoft Windows - BlueKeep RDP Remote Windows Kernel Use After Free (Metasploit)
remote windows 3389.0 CVE-2019-0708
Metasploit Microsoft Windows - BlueKeep RDP Remote Windows Kernel Use After Free (Metasploit)
remote windows 3389.0 CVE-2019-0708
Gonçalo Ribeiro Linux/x86_64 - Bind (4444/TCP) Shell (/bin/sh) + Password (pass) Shellcode (129 bytes)
linux_x86-64 129.0
Metasploit Redis 4.x / 5.x - Unauthenticated Code Execution (Metasploit)
remote linux 6379.0
RAMELLA Sebastien Microsoft Windows Remote Desktop - 'BlueKeep' Denial of Service (Metasploit)
dos windows 3389.0 CVE-2019-0708
RAMELLA Sebastien Microsoft Windows Remote Desktop - 'BlueKeep' Denial of Service (Metasploit)
dos windows 3389.0 CVE-2019-0708
LockedByte Linux/x86 - chmod + execute(/usr/bin/wget http://192.168.1.93//x) + Hide Output Shellcode (129 bytes)
linux_x86 129.0
Xavi Beltran Linux/x86 - Multiple keys XOR Encoder / Decoder execve(/bin/sh) Shellcode (59 bytes)
generator 59.0
strider Linux/x86 - Add User (sshd/root) To /etc/passwd Shellcode (149 bytes)
linux_x86 149.0
Ken Kitahara Apple macOS - Bind (4444/TCP) Shell (/bin/sh) + IPv6 Shellcode (129 bytes)
macos 129.0
Ken Kitahara Apple macOS - Reverse (::1:4444/TCP) Shell (/bin/sh) + IPv6 Shellcode (119 bytes)
macos 119.0
Joao Batista Linux/x86 - execve(/bin/sh) + RShift-1 Encoded Shellcode (29 bytes)
linux_x86 29.0
strider Linux/x86 - execve(/bin/sh -c) + wget (http://127.0.0.1:8080/evilfile) + chmod 777 + Execute Shellcode (119 bytes)
linux_x86 119.0
Kağan Çapar Linux/x64 - Reverse (0.0.0.0:1907/TCP) Shell Shellcode (119 Bytes)
linux_x86-64 119.0
Metasploit Morris Worm - fingerd Stack Buffer Overflow (Metasploit)
remote bsd 79.0
page: 1/12 [exploits: 187]