[] NeoSense
search results for » port: 4.0
Oleg Boytsev Linux/x86 - Bind (Random TCP Port) Shell (/bin/sh) Shellcode (44 bytes)
linux_x86 44.0
WangYihang Linux/x86 - exceve(/bin/sh) + Encoded Shellcode (44 bytes)
linux_x86 44.0
Manuel Mancera Linux/x64 - Reverse (192.168.1.45:4444/TCP) Shell Shellcode (84 bytes)
linux_x86-64 84.0
Robert L. Taylor Linux/x64 - Bind (Random TCP Port) Shell (/bin/sh) Shellcode (54 bytes)
linux_x86-64 54.0
Roziul Hasan Khan Shifat Windows/x64 - CreateRemoteThread() DLL Injection Shellcode (584 bytes)
windows_x86-64 584.0
Roziul Hasan Khan Shifat Windows/x64 - Reverse (192.168.232.129:4444/TCP) Shell + Injection Shellcode (694 bytes)
windows_x86-64 694.0
Roziul Hasan Khan Shifat Windows/x86 - Reverse (192.168.232.129:4444/TCP) Shell + Persistent Access Shellcode (494 bytes)
windows_x86 494.0
Kyzer Linux/x86 - Bind (98/TCP + UDP) Netcat Shell Shellcode (44/52 bytes)
linux_x86 44.0
Kyzer Linux/x64 - Reverse (10.1.1.4:46357/TCP) Shell + Subtle Probing + Timer + Burst + Password (la crips) + Multi-Terminal Shellcode (84/122/172 bytes)
linux_x86-64 84.0
Roziul Hasan Khan Shifat Windows/x86 - URLDownloadToFileA(http://192.168.86.130/sample.exe) + SetFileAttributesA(pyld.exe) + WinExec() + ExitProcess() Shellcode (394 bytes)
windows_x86 394.0
Kyzer Linux/x64 - Bind (/TCP) Netcat Shell + Null-Free Shellcode (64 bytes)
linux_x86-64 64.0
Roziul Hasan Khan Shifat Linux/x64 - Reverse (192.168.86.128:1472/TCP) cat /etc/passwd Shellcode (164 bytes)
linux_x86-64 164.0
Jos Wetzels DarkComet Server - Arbitrary File Download (Metasploit)
remote windows 1604.0
Metasploit IPFire - 'Shellshock' Bash Environment Variable Command Injection (Metasploit)
remote cgi 444.0 CVE-2014-6271
Metasploit IPFire - 'proxy.cgi' Remote Code Execution (Metasploit)
remote cgi 444.0
Roziul Hasan Khan Shifat Windows/x86 - system(systeminfo) Shellcode (224 bytes)
windows_x86 224.0
page: 3/10 [exploits: 148]