[] NeoSense
search results for » port: 7.0
odzhancode Linux - execve(_/bin/sh__ NULL_ 0) Multi/Dual Mode Shellcode (37 bytes)
linux 37.0
Ajith Kp Linux/x64 - Bind (5600/TCP) Shell Shellcode (87 bytes)
linux_x86-64 87.0
Kenzo Eir D1000 Wireless Router - WAN Side Remote Command Injection (Metasploit)
remote linux_mips 7547.0
Roziul Hasan Khan Shifat Windows/x86 - Bind (/TCP) Shell + Password (damn_it!$$##@;*#) Shellcode (637 bytes)
windows_x86 637.0
Roziul Hasan Khan Shifat Windows/x86 (7) - Bind (4444/TCP) Shell Shellcode (357 bytes)
windows_x86 357.0
LiquidWorm Gemalto Sentinel License Manager 18.0.1.55505 - Directory Traversal
webapps windows 1947.0
JollyFrogs Linux/x86 - Bind (1234/TCP) Shell (/bin/sh) Shellcode (87 bytes) (Generator)
generator 87.0
Sathishshan Linux/x64 - execve() Stack + Polymorphic Shellcode (47 bytes)
linux_x86-64 47.0
Metasploit Oracle BeeHive 2 - 'voice-servlet prepareAudioToPlay()' Arbitrary File Upload (Metasploit)
remote windows 7777.0 OSVDB-130219
Metasploit Oracle BeeHive 2 - 'voice-servlet processEvaluation()' Write File (Metasploit)
remote windows 7777.0 CVE-2010-4417;OSVDB-70552
Metasploit w3tw0rk / Pitbul IRC Bot - Remote Code Execution (Metasploit)
remote multiple 6667.0 OSVDB-120384
Metasploit Western Digital Arkeia < 11.0.12 - Remote Code Execution (Metasploit)
remote multiple 617.0 CVE-2015-7709;OSVDB-124434
Bill Borskey Linux/x64 - execve() + Encoded Shellcode (57 bytes)
linux_x86-64 57.0
Mohammad Reza Espargham Linux/x86 - chmod /etc/gshadow Shellcode (37 bytes)
linux_x86 37.0
TUNISIAN CYBER Windows/x86 (XP SP3) - Restart Shellcode (57 bytes)
windows_x86 57.0
Mohammad Reza Ramezani Linux/x86 - Create 'my.txt' In Working Directory Shellcode (37 bytes)
linux_x86 37.0
page: 2/8 [exploits: 116]