[] NeoSense
search results for » port:
Gaussillusion Linux/x64 - Reverse (127.0.0.1:1337/TCP) Netcat (/bin/nc) Shell (/bin/sh) Shellcode (109 bytes)
linux_x86-64 109.0
Gaussillusion Linux/x64 - Bind (1337/TCP) Netcat (/bin/nc) Shell (/bin/sh) Shellcode (131 bytes)
linux_x86-64 131.0
Geyslan G. Bem Linux/x64 - Bind (Random TCP Port) Shell + Null-Free Shellcode (57 bytes)
linux_x86-64 57.0
Andriy Brukhovetskyy Linux/x64 - Bind (4444/TCP) Shell (/bin/sh) + Password (doomedra) Shellcode (175 bytes)
linux_x86-64 175.0
Andriy Brukhovetskyy Linux/x64 - Reverse (192.168.1.9:4444/TCP) Shell (/bin/sh) + Password (doomedra) Shellcode (138 bytes)
linux_x86-64 138.0
Christophe G Linux/x64 - Bind (4444/TCP) Shell (/bin/sh) + Password (Password) Shellcode (173 bytes)
linux_x86-64 173.0
Mr.Un1k0d3r Linux/x64 - Read /etc/passwd Shellcode (82 bytes)
linux_x86-64 82.0
Christophe G Linux/x64 - Add User (pwned/$pass$) Using echo cmd To /etc/{passwd_shadow} Shellcode (273 bytes)
linux_x86-64 273.0
Christophe G Linux/x64 - Add User (pwned/$pass$) Using open_write_close To /etc/{passwd_shadow} Shellcode (358 bytes)
linux_x86-64 358.0
Christophe G Linux/x64 - Bind (4444/TCP) + Stager + Egghunter (0x64616564) Shellcode (157 bytes)
linux_x86-64 157.0
Doreth.Z10 Linux/x64 - Bind (1337/TCP) Shell + Password (pAzzW0rd) + Egghunter Using sys_access() Shellcode (49 bytes)
linux_x86-64 49.0
Dad_ Linux/x64 - execve(/bin/sh) Shellcode (27 bytes)
linux_x86-64 27.0
Michel Kaempf Linux/SPARC - setreuid(0_0) + execve() Shellcode (72 bytes)
linux_sparc 72.0
anathema Linux/SPARC - setreuid(0_0) + execve(/bin/sh) Shellcode (64 bytes)
linux_sparc 64.0
Dad_ Linux/SuperH (sh4) - Bind (31337/TCP) Shell (/bin/sh) Shellcode (132 bytes)
superh_sh4 132.0
funkysh Linux/StrongARM - Bind (/TCP) Shell (/bin/sh) Shellcode (203 bytes)
arm 203.0
page: 219/269 [exploits: 4303]