[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » platform: linux_x86-64
0x4ndr3
Linux/x64 - Bind (4444/TCP) Shell (/bin/sh) + Password (1234567) Shellcode (136 bytes)
linux_x86-64
136.0
Jeremy Huang
Linux Kernel < 3.16.39 (Debian 8 x64) - 'inotfiy' Local Privilege Escalation
local
linux_x86-64
CVE-2017-7533
Metasploit
Rancher Server - Docker Daemon Code Execution (Metasploit)
remote
linux_x86-64
8080.0
Touhid M.Shaikh
Linux/x64 - mkdir(evil) Shellcode (30 bytes)
linux_x86-64
30.0
Touhid M.Shaikh
Linux/x64 - Fork Bomb Shellcode (11 bytes)
linux_x86-64
11.0
Touhid M.Shaikh
Linux/x64 - Kill All Processes Shellcode (19 bytes)
linux_x86-64
19.0
Touhid M.Shaikh
Linux/x64 - Reverse (192.168.1.2:4444/TCP) Shell Shellcode (153 bytes)
linux_x86-64
153.0
m4n3dw0lf
Linux/x64 - Reverse (192.168.1.8:4444/TCP) Shell Shellcode (104 bytes)
linux_x86-64
104.0
Qualys Corporation
Linux Kernel (Debian 7.7/8.5/9.0 / Ubuntu 14.04.2/16.04.2/17.04 / Fedora 22/25 / CentOS 7.3.1611) - 'ldso_hwcap_64 Stack Clash' Local Privilege Escalation
local
linux_x86-64
CVE-2017-1000379;CVE-2017-1000366
m4n3dw0lf
Linux/x64 - execve(/bin/sh) Shellcode (24 bytes)
linux_x86-64
24.0
Touhid M.Shaikh
Linux/x64 - execve(/bin/sh) Shellcode (31 bytes) (1)
linux_x86-64
31.0
Srakai
Linux/x64 - Reverse (::1:1472/TCP) Shell + IPv6 + Null-Free Shellcode (113 bytes)
linux_x86-64
113.0
WangYihang
Linux/x64 - execve(/bin/sh) Shellcode (31 bytes) (2)
linux_x86-64
31.0
WangYihang
Linux/x64 - execve(/bin/sh) Shellcode (21 bytes)
linux_x86-64
21.0
Robert L. Taylor
Linux/x64 - Reverse Netcat Shell (127.0.0.1:1234) + Polymorphic Shellcode (106 bytes)
linux_x86-64
106.0
Robert L. Taylor
Linux/x64 - Reverse Netcat Shell (127.0.0.1:1337) Shellcode (72 bytes)
linux_x86-64
72.0
«
1
2
3
4
5
6
7
8
9
10
11
»
page: 3/11 [exploits: 164]