[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 5.0
Roziul Hasan Khan Shifat
Windows/x64 - Bind (2493/TCP) Shell + Password (h271508F) Shellcode (825 bytes)
windows_x86-64
825.0
sajith
Linux/x86 - Reverse (192.168.227.129:4444/TCP) Shell (/bin/sh) Shellcode (75 bytes)
linux_x86
75.0
hyp3rlinx
Symantec Endpoint Protection Manager 12.1 - Multiple Vulnerabilities
webapps
php
8445.0
CVE-2016-5304;CVE-2016-3653;CVE-2016-3652
Ajith Kp
Linux/x64 - Read /etc/passwd Shellcode (65 bytes)
linux_x86-64
65.0
Ajith Kp
Linux/x64 - execve(/bin/sh) Shellcode (25 bytes) (1)
linux_x86-64
25.0
Xeon
Linux/ARM - Reverse (10.0.0.10:1337/TCP) Shell (/bin/sh) Shellcode (95 bytes)
arm
95.0
B3mB4m
Linux/x86 - Download File + Execute Shellcode (135 bytes)
linux_x86
135.0
Sathishshan
Linux/x64 - Reverse (127.0.0.1:4444/TCP) Shell + Password (hack) + Polymorphic Shellcode (135 bytes)
linux_x86-64
135.0
B3mB4m
Linux x86/x64 - Reverse (192.168.1.29:4444/TCP) Shell Shellcode (195 bytes)
linux
195.0
Metasploit
Google Android ADB Debug Server - Remote Payload Execution (Metasploit)
remote
android
5555.0
Ajith Kp
Linux/x86 - execve(_/bin/cat__ [_/bin/cat__ _/etc/passwd_]_ NULL) Shellcode (75 bytes)
linux_x86
75.0
Shankar Damodaran
Mock SMTP Server 1.0 - Remote Crash (PoC)
dos
windows
25.0
OSVDB-126627
Mohammad Reza Espargham
Linux/x86 - exec /bin/dash Shellcode (45 bytes)
linux_x86
45.0
Mohammad Reza Espargham
Linux/x86 - execve(/bin/sh) Shellcode (35 bytes)
linux_x86
35.0
Qualys Corporation
Exim - 'GHOST' glibc gethostbyname Buffer Overflow (Metasploit)
remote
linux
25.0
CVE-2015-0235;OSVDB-117579
Metasploit
HP Data Protector 8.10 - Remote Command Execution (Metasploit)
remote
windows
5555.0
CVE-2014-2623;OSVDB-109069
«
1
2
3
4
5
6
7
8
9
10
11
...
»
page: 3/14 [exploits: 209]