[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 4.0
Oleg Boytsev
Linux/x86 - Bind (Random TCP Port) Shell (/bin/sh) Shellcode (44 bytes)
linux_x86
44.0
WangYihang
Linux/x86 - exceve(/bin/sh) + Encoded Shellcode (44 bytes)
linux_x86
44.0
Manuel Mancera
Linux/x64 - Reverse (192.168.1.45:4444/TCP) Shell Shellcode (84 bytes)
linux_x86-64
84.0
Robert L. Taylor
Linux/x64 - Bind (Random TCP Port) Shell (/bin/sh) Shellcode (54 bytes)
linux_x86-64
54.0
Roziul Hasan Khan Shifat
Windows/x64 - CreateRemoteThread() DLL Injection Shellcode (584 bytes)
windows_x86-64
584.0
Roziul Hasan Khan Shifat
Windows/x64 - Reverse (192.168.232.129:4444/TCP) Shell + Injection Shellcode (694 bytes)
windows_x86-64
694.0
Roziul Hasan Khan Shifat
Windows/x86 - Reverse (192.168.232.129:4444/TCP) Shell + Persistent Access Shellcode (494 bytes)
windows_x86
494.0
Kyzer
Linux/x86 - Bind (98/TCP + UDP) Netcat Shell Shellcode (44/52 bytes)
linux_x86
44.0
Kyzer
Linux/x64 - Reverse (10.1.1.4:46357/TCP) Shell + Subtle Probing + Timer + Burst + Password (la crips) + Multi-Terminal Shellcode (84/122/172 bytes)
linux_x86-64
84.0
Roziul Hasan Khan Shifat
Windows/x86 - URLDownloadToFileA(http://192.168.86.130/sample.exe) + SetFileAttributesA(pyld.exe) + WinExec() + ExitProcess() Shellcode (394 bytes)
windows_x86
394.0
Kyzer
Linux/x64 - Bind (/TCP) Netcat Shell + Null-Free Shellcode (64 bytes)
linux_x86-64
64.0
Roziul Hasan Khan Shifat
Linux/x64 - Reverse (192.168.86.128:1472/TCP) cat /etc/passwd Shellcode (164 bytes)
linux_x86-64
164.0
Jos Wetzels
DarkComet Server - Arbitrary File Download (Metasploit)
remote
windows
1604.0
Metasploit
IPFire - 'Shellshock' Bash Environment Variable Command Injection (Metasploit)
remote
cgi
444.0
CVE-2014-6271
Metasploit
IPFire - 'proxy.cgi' Remote Code Execution (Metasploit)
remote
cgi
444.0
Roziul Hasan Khan Shifat
Windows/x86 - system(systeminfo) Shellcode (224 bytes)
windows_x86
224.0
«
1
2
3
4
5
6
7
8
9
10
»
page: 3/10 [exploits: 148]