[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 8.0
dev0id
BSD/x86 - Break chroot (../ 10x Loop) Shellcode (28 bytes)
bsd_x86
28.0
Andriy Brukhovetskyy
Linux/x64 - Reverse (192.168.1.9:4444/TCP) Shell (/bin/sh) + Password (doomedra) Shellcode (138 bytes)
linux_x86-64
138.0
Christophe G
Linux/x64 - Add User (pwned/$pass$) Using open_write_close To /etc/{passwd_shadow} Shellcode (358 bytes)
linux_x86-64
358.0
scut/teso
IRIX - execve(/bin/sh) Shellcode (68 bytes)
irix
68.0
Gitsnik
FreeBSD/x64 - execve(/bin/sh) Shellcode (28 bytes)
freebsd_x86-64
28.0
sch3m4
Linux/x86 - setuid(0) + execve(/bin/sh_0_0) + Null-Free Shellcode (28 bytes)
linux_x86
28.0
c0d3_z3r0
FreeBSD/x86 - execve(/bin/sh) + Encoded Shellcode (48 bytes)
freebsd_x86
48.0
GS2008
Linux/x86 - Reverse PHP (Writes To /var/www/cb.php On The Filesystem) Shell Shellcode (508 bytes)
linux_x86
508.0
Marcin Kozlowski
3proxy 0.5.3g (Windows x86) - 'logurl()' Remote Buffer Overflow
remote
windows_x86
3128.0
xort
Solaris/MIPS - Download File (http://10.1.1.2:80/evil-dl) + Execute (/tmp/ff) Shellcode (278 bytes)
solaris_mips
278.0
Revenge
Linux/x86 - setuid(0) + execve(/bin/sh) Shellcode (28 bytes)
linux_x86
28.0
FistFuXXer
Novell eDirectory 8.8 - NDS Server Remote Stack Overflow
remote
windows
8028.0
izik
Linux/x86 - HTTP/1.x Requests Shellcode (18+/26+ bytes) (Generator)
generator
18.0
Weiss
Windows/x64 - URLDownloadToFileA(http://localhost/trojan.exe) + Execute Shellcode (218+ bytes)
windows_x86-64
218.0
phar
Linux/x64 - Reverse (/TCP) Shell (/bin/bash) + Semi-Stealth Shellcode (88+ bytes) (Generator)
generator
88.0
izik
Linux/x86 - execve(/bin/sh) + '.RIFF' Header Shellcode (28 bytes)
linux_x86
28.0
«
1
2
3
4
5
6
7
8
9
10
»
page: 8/10 [exploits: 153]