[] NeoSense
search results for » port: 5.0
Roziul Hasan Khan Shifat Windows/x64 - Bind (2493/TCP) Shell + Password (h271508F) Shellcode (825 bytes)
windows_x86-64 825.0
sajith Linux/x86 - Reverse (192.168.227.129:4444/TCP) Shell (/bin/sh) Shellcode (75 bytes)
linux_x86 75.0
hyp3rlinx Symantec Endpoint Protection Manager 12.1 - Multiple Vulnerabilities
webapps php 8445.0 CVE-2016-5304;CVE-2016-3653;CVE-2016-3652
Ajith Kp Linux/x64 - Read /etc/passwd Shellcode (65 bytes)
linux_x86-64 65.0
Ajith Kp Linux/x64 - execve(/bin/sh) Shellcode (25 bytes) (1)
linux_x86-64 25.0
Xeon Linux/ARM - Reverse (10.0.0.10:1337/TCP) Shell (/bin/sh) Shellcode (95 bytes)
arm 95.0
B3mB4m Linux/x86 - Download File + Execute Shellcode (135 bytes)
linux_x86 135.0
Sathishshan Linux/x64 - Reverse (127.0.0.1:4444/TCP) Shell + Password (hack) + Polymorphic Shellcode (135 bytes)
linux_x86-64 135.0
B3mB4m Linux x86/x64 - Reverse (192.168.1.29:4444/TCP) Shell Shellcode (195 bytes)
linux 195.0
Metasploit Google Android ADB Debug Server - Remote Payload Execution (Metasploit)
remote android 5555.0
Ajith Kp Linux/x86 - execve(_/bin/cat__ [_/bin/cat__ _/etc/passwd_]_ NULL) Shellcode (75 bytes)
linux_x86 75.0
Shankar Damodaran Mock SMTP Server 1.0 - Remote Crash (PoC)
dos windows 25.0 OSVDB-126627
Mohammad Reza Espargham Linux/x86 - exec /bin/dash Shellcode (45 bytes)
linux_x86 45.0
Mohammad Reza Espargham Linux/x86 - execve(/bin/sh) Shellcode (35 bytes)
linux_x86 35.0
Qualys Corporation Exim - 'GHOST' glibc gethostbyname Buffer Overflow (Metasploit)
remote linux 25.0 CVE-2015-0235;OSVDB-117579
Metasploit HP Data Protector 8.10 - Remote Command Execution (Metasploit)
remote windows 5555.0 CVE-2014-2623;OSVDB-109069
page: 3/14 [exploits: 209]