[] NeoSense
search results for » platform: linux
Metasploit Riverbed SteelCentral NetProfiler/NetExpress - Remote Code Execution (Metasploit)
remote linux 443.0
Kyzer Linux/x64 - Reverse (10.1.1.4/TCP) Shell + Continuously Probing Via Socket + Port-Range (391-399) + Password (la crips) + Null-Free Shellcode (172 bytes)
linux_x86-64 172.0
sajith Linux/x86 - Reverse (192.168.227.129:4444/TCP) Shell (/bin/sh) Shellcode (75 bytes)
linux_x86 75.0
Metasploit Nagios XI Chained - Remote Code Execution (Metasploit)
remote linux 80.0
Dawid Golunski GNU Wget < 1.18 - Arbitrary File Upload / Remote Code Execution
remote linux CVE-2016-4971
Kyzer Linux/x64 - Bind (4442/TCP) Ncat Shell + SSL + Multi-Channel (4444-4447/TCP) + Persistant + fork() + IPv4/6 + Password + Null-Free Shellcode (176 bytes)
linux_x86-64 176.0
Vitaly Nikolenko Linux Kernel < 4.4.0-21 (Ubuntu 16.04 x64) - 'netfilter target_offset' Local Privilege Escalation
local linux_x86-64
sajith Linux/x86 - Bind (4444/TCP) Shell (/bin/sh) Shellcode (98 bytes)
linux_x86 98.0
halfdog Exim 4 (Debian 8 / Ubuntu 16.04) - Spool Privilege Escalation
local linux
Kyzer Linux/x64 - Bind (/TCP) Netcat Shell + Null-Free Shellcode (64 bytes)
linux_x86-64 64.0
vnik Linux Kernel 4.4.0-21 (Ubuntu 16.04 x64) - Netfilter 'target_offset' Out-of-Bounds Privilege Escalation
local linux_x86-64
Roziul Hasan Khan Shifat Linux/x64 - Reverse (192.168.86.128:1472/TCP) cat /etc/passwd Shellcode (164 bytes)
linux_x86-64 164.0
Pawan Lal Linux/x86 - execve(/bin/sh) + ASLR Bruteforce Shellcode
linux_x86
Juan Sacco HNB 1.9.18-10 - Local Buffer Overflow
local linux
Juan Sacco PInfo 0.6.9-5.1 - Local Buffer Overflow
local linux
Google Security Research Linux Kernel - 'ecryptfs' '/proc/$pid/environ' Local Privilege Escalation
local linux CVE-2016-1583
page: 61/240 [exploits: 3828]