[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » author: Roziul Hasan Khan Shifat
Roziul Hasan Khan Shifat
Linux/x64 - Reverse (192.168.86.128:1472/TCP) cat /etc/passwd Shellcode (164 bytes)
linux_x86-64
164.0
Roziul Hasan Khan Shifat
Windows/x86 - ShellExecuteA(NULL_NULL__cmd.exe__NULL_NULL_1) Shellcode (250 bytes)
windows_x86
250.0
Roziul Hasan Khan Shifat
Windows/x86 - system(systeminfo) Shellcode (224 bytes)
windows_x86
224.0
Roziul Hasan Khan Shifat
Windows/x86 - WinExec(_cmd.exe__0) Shellcode (184 bytes)
windows_x86
184.0
Roziul Hasan Khan Shifat
Linux/x64 - execve() + XOR Encoded Shellcode (84 bytes)
linux_x86-64
84.0
Roziul Hasan Khan Shifat
Linux/x64 - Download File (http://192.168.30.129/pri.sh) + Execute Used To Steal Information Shellcode (399 bytes)
linux_x86-64
399.0
Roziul Hasan Khan Shifat
Linux/x64 - Reverse (192.168.209.131:1472/TCP) Shell (/bin/sh) + IPv6 Shellcode (203 bytes)
linux_x86-64
203.0
Roziul Hasan Khan Shifat
Linux/x64 - Bind (1472/TCP) Shell (/bin/sh) + IPv6 Shellcode (199 bytes)
linux_x86-64
199.0
Roziul Hasan Khan Shifat
Linux/x86 - Bind (1472/TCP) Shell (/bin/sh) + IPv6 Shellcode (1250 bytes)
linux_x86
1250.0
Roziul Hasan Khan Shifat
Linux/x86 - Reverse (::ffff:192.168.64.129:1472/TCP) Shell (/bin/sh) + IPv6 Shellcode (159 bytes)
linux_x86
159.0
«
1
2
»
page: 2/2 [exploits: 26]