[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » author: dev0id
dev0id
BSD/x86 - Bind (2222/TCP) Shell Shellcode (100 bytes)
bsd_x86
100.0
dev0id
BSD/x86 - setuid(0) + Break chroot (../ 10x Loop) + Bind (2222/TCP) Shell Shellcode (133 bytes)
bsd_x86
133.0
dev0id
BSD/x86 - setuid(0) + Break chroot (../ 10x Loop) + execute /bin/sh Shellcode (57 bytes)
bsd_x86
57.0
dev0id
Linux/x86 - Flush IPTables Rules (/sbin/iptables -F) Shellcode (58 bytes)
linux_x86
58.0
dev0id
BSD/x86 - symlink /bin/sh Shellcode (32 bytes)
bsd_x86
32.0
dev0id
BSD/x86 - symlink /bin/sh + XORing Encoded Shellcode (56 bytes)
bsd_x86
56.0
dev0id
FreeBSD/x86 - Load Kernel Module (/sbin/kldload /tmp/o.o) Shellcode (74 bytes)
freebsd_x86
74.0
dev0id
BSD/x86 - Reverse (torootteam.host.sk:2222/TCP) Shell Shellcode (93 bytes)
bsd_x86
93.0
dev0id
BSD/x86 - execve(/bin/sh) + Encoded Shellcode (49 bytes)
bsd_x86
49.0
dev0id
BSD/x86 - setuid(0) + Break chroot (../ 10x Loop) Shellcode (46 bytes)
bsd_x86
46.0
dev0id
Linux/x86 - Break chroot (../ 10x Loop) Shellcode (28 bytes)
linux_x86
28.0
«
1
2
»
page: 2/2 [exploits: 27]