[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » author: xort
xort
Barracuda Firmware 5.0.0.012 - (Authenticated) Remote Command Execution (Metasploit)
remote
linux
8000.0
OSVDB-120514
xort
Solaris/MIPS - Download File (http://10.1.1.2:80/evil-dl) + Execute (/tmp/ff) Shellcode (278 bytes)
solaris_mips
278.0
xort
Solaris/MIPS - Reverse (10.0.0.3:44434/TCP) Shell + XNOR Encoded Traffic Shellcode (600 bytes) (Generator)
generator
600.0
xort
Linux/x86 - Reverse (127.0.0.1:80/TCP) Shell + XOR Encoded Shellcode (371 bytes)
linux_x86
371.0
xort
Linux/x86 - Socket-Proxy (31337:11.22.33.44:80) Shellcode (372 bytes)
linux_x86
372.0
xort
Linux/x86 - Reverse (/TCP) Shell Shellcode (90 bytes) (Generator)
generator
90.0
xort
Snort 2.4.2 - Back Orifice Pre-Preprocessor Remote (3)
remote
windows
OSVDB-20034;CVE-2005-3252
xort
Linux/x86 - Hide-Wait-Change (Hide from PS + Wait for /tmp/foo + chmod 0455) Shellcode (187+ bytes) (2)
linux_x86
187.0
xort
Linux/x86 - Hide-Wait-Change (Hide from PS + Wait for /tmp/foo + chmod 0455) Shellcode (187+ bytes) (1)
linux_x86
187.0
xort
Linux/x86 - Self-Modifying Magic Byte /bin/sh Shellcode (76 bytes)
linux_x86
76.0
xort
Linux/x86 - Self-Modifying Radical Shellcode (70 bytes)
linux_x86
70.0
xort
Linux/x86 - Alphanumeric Encoded + IMUL Method Shellcode (88 bytes)
linux_x86
88.0
xort
Linux/x86 - Alphanumeric Encoded Shellcode (64 bytes)
linux_x86
64.0
«
1
2
»
page: 2/2 [exploits: 29]