[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 6.0
Anastasios Monachos
Windows/x86 - Add Administrator User (secuid0/m0nk) Shellcode (326 bytes)
windows_x86
326.0
Aodrulez
Linux/x86 - execve(/bin/sh) + Polymorphic + Null-Free Shellcode (46 bytes)
linux_x86
46.0
blake
Linux/x86 - Reverse (8080/TCP) Netcat Shell Shellcode (76 bytes)
linux_x86
76.0
John Leitch
Windows/x86 (XP SP3) (English) - calc.exe Shellcode (16 bytes)
windows_x86
16.0
gunslinger_
Linux/x86 - execve(/bin/sh) + Polymorphic Shellcode (116 bytes)
linux_x86
116.0
d0lc3
Windows (XP SP3) (Spanish) - URLDownloadToFileA() + CreateProcessA() + ExitProcess() Shellcode (176+ bytes) (Generator)
generator
176.0
gunslinger_
Linux/x86 - sync Shellcode (6 bytes)
linux_x86
6.0
gunslinger_
Linux/x86 - CDRom Ejecting Shellcode (46 bytes)
linux_x86
46.0
Jonathan Salwan
Linux/x86 - Disable ASLR Security Shellcode (106 bytes)
linux_x86
106.0
Jonathan Salwan
Solaris/x86 - Halt Shellcode (36 bytes)
solaris_x86
36.0
Metasploit
MySQL yaSSL (Windows) - SSL Hello Message Buffer Overflow (Metasploit)
remote
windows
3306.0
CVE-2008-0226;OSVDB-41195
Jonathan Salwan
Linux/x86 - Fork Bomb Shellcode (6 bytes) (2)
linux_x86
6.0
Magnefikko
Linux/x86 - DoS Badger Game Shellcode (6 bytes)
linux_x86
6.0
Magnefikko
Linux/x86 - chmod 0666 /etc/shadow Shellcode (36 bytes)
linux_x86
36.0
czy
Windows/x86 (XP SP2) - WinExec(write.exe) + ExitProcess Shellcode (16 bytes)
windows_x86
16.0
Stoke
Windows (XP Professional SP2) (Italian) - calc.exe Shellcode (36 bytes)
windows_x86
36.0
«
1
2
3
4
5
6
7
8
»
page: 4/8 [exploits: 121]