[] NeoSense
Ken Kitahara Linux/ARM64 - Egghunter (PWN!PWN!) + execve(_/bin/sh__ NULL_ NULL) + mprotect() Shellcode (88 Bytes)
arm 88.0
Ken Kitahara Linux/ARM64 - Read /etc/passwd Shellcode (120 Bytes)
arm 120.0
Ken Kitahara Linux/ARM64 - Reverse (::1:4444/TCP) Shell (/bin/sh) + IPv6 Shellcode (140 bytes)
arm 140.0
Ken Kitahara Linux/ARM64 - Bind (4444/TCP) Shell (/bin/sh) + IPv6 Shellcode (176 bytes)
arm 176.0
Ken Kitahara Linux/ARM64 - Reverse (127.0.0.1:4444/TCP) Shell (/bin/sh) + Null-Free Shellcode (128 bytes)
arm 128.0
Ken Kitahara Linux/ARM64 - Bind (4444/TCP) Shell (/bin/sh) + Null-Free Shellcode (164 bytes)
arm 164.0
Ken Kitahara Linux/ARM64 - execve(_/bin/sh__ NULL_ NULL) Shellcode (40 Bytes)
arm 40.0
b1ack0wl Linux Mint 18.3-19.1 - 'yelp' Command Injection (Metasploit)
remote linux
Mehmet EMIROGLU CiuisCRM 1.6 - 'eventType' SQL Injection
webapps php 80.0
Mehmet EMIROGLU WorkSuite PRM 2.4 - 'password' SQL Injection
webapps php 80.0
Askar LibreNMS 1.46 - 'addhost' Remote Code Execution
webapps php 80.0 CVE-2018-20434
LockedByte Linux/x86 - chmod + execute(/usr/bin/wget http://192.168.1.93//x) + Hide Output Shellcode (129 bytes)
linux_x86 129.0
Joseph McDonagh Windows/x86 - Start iexplore.exe (http://192.168.10.10/) Shellcode (191 Bytes)
windows_x86 191.0
Joseph McDonagh Windows/x86 - Download File (http://192.168.10.10/evil.exe _c:\evil.exe_) Via bitsadmin + Execute Shellcode (210 Bytes)
windows_x86 210.0
Petr Javorik Linux/x86 - ASCII AND_ SUB_ PUSH_ POPAD Encoder Shellcode
linux_x86
Metasploit Nagios XI 5.5.6 - Magpie_debug.php Root Remote Code Execution (Metasploit)
remote linux CVE-2018-15710;CVE-2018-15708
page: 328/3006 [exploits: 48090]