[] NeoSense
search results for » port: 8.0
dev0id BSD/x86 - Break chroot (../ 10x Loop) Shellcode (28 bytes)
bsd_x86 28.0
Andriy Brukhovetskyy Linux/x64 - Reverse (192.168.1.9:4444/TCP) Shell (/bin/sh) + Password (doomedra) Shellcode (138 bytes)
linux_x86-64 138.0
Christophe G Linux/x64 - Add User (pwned/$pass$) Using open_write_close To /etc/{passwd_shadow} Shellcode (358 bytes)
linux_x86-64 358.0
scut/teso IRIX - execve(/bin/sh) Shellcode (68 bytes)
irix 68.0
Gitsnik FreeBSD/x64 - execve(/bin/sh) Shellcode (28 bytes)
freebsd_x86-64 28.0
sch3m4 Linux/x86 - setuid(0) + execve(/bin/sh_0_0) + Null-Free Shellcode (28 bytes)
linux_x86 28.0
c0d3_z3r0 FreeBSD/x86 - execve(/bin/sh) + Encoded Shellcode (48 bytes)
freebsd_x86 48.0
GS2008 Linux/x86 - Reverse PHP (Writes To /var/www/cb.php On The Filesystem) Shell Shellcode (508 bytes)
linux_x86 508.0
Marcin Kozlowski 3proxy 0.5.3g (Windows x86) - 'logurl()' Remote Buffer Overflow
remote windows_x86 3128.0
xort Solaris/MIPS - Download File (http://10.1.1.2:80/evil-dl) + Execute (/tmp/ff) Shellcode (278 bytes)
solaris_mips 278.0
Revenge Linux/x86 - setuid(0) + execve(/bin/sh) Shellcode (28 bytes)
linux_x86 28.0
FistFuXXer Novell eDirectory 8.8 - NDS Server Remote Stack Overflow
remote windows 8028.0
izik Linux/x86 - HTTP/1.x Requests Shellcode (18+/26+ bytes) (Generator)
generator 18.0
Weiss Windows/x64 - URLDownloadToFileA(http://localhost/trojan.exe) + Execute Shellcode (218+ bytes)
windows_x86-64 218.0
phar Linux/x64 - Reverse (/TCP) Shell (/bin/bash) + Semi-Stealth Shellcode (88+ bytes) (Generator)
generator 88.0
izik Linux/x86 - execve(/bin/sh) + '.RIFF' Header Shellcode (28 bytes)
linux_x86 28.0
page: 8/10 [exploits: 153]