[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port:
Manuel Mancera
Linux/x64 - Reverse (192.168.1.45:4444/TCP) Shell Shellcode (84 bytes)
linux_x86-64
84.0
Robert L. Taylor
Linux/x64 - Bind (Random TCP Port) Shell (/bin/sh) Shellcode (54 bytes)
linux_x86-64
54.0
lu0xheap
Windows/x86 - Executable Directory Search + Null-Free Shellcode (130 bytes)
windows_x86
130.0
odzhancode
Linux/x64 - Egghunter (0xDEADC0DE) Shellcode (38 bytes)
linux_x86-64
38.0
lu0xheap
Linux/x86 - SELinux Permissive Mode Switcher Shellcode (45 bytes)
linux_x86
45.0
Robert L. Taylor
Linux/x64 - Reverse (127.0.0.1:4444/TCP) Shell (/bin/sh) Shellcode (65 bytes)
linux_x86-64
65.0
Ege Balci
Windows/x86 - SE_DACL_PROTECTED Protect Process Shellcode (229 bytes)
windows_x86
229.0
Ben Nott
dotCMS 3.6.1 - Blind Boolean SQL Injection
webapps
php
80.0
CVE-2017-5344
odzhancode
Linux - Bind (/TCP) Shell + Dual/Multi Mode Shellcode (156 bytes)
linux
156.0
Metasploit
Piwik 2.14.0/2.16.0/2.17.1/3.0.1 - Superuser Plugin Upload (Metasploit)
remote
php
80.0
Snir Levi
Linux/x86 - Reverse (127.0.0.1:4444/TCP) Shell (/bin/sh) + Alphanumeric + Staged Shellcode (103 bytes)
linux_x86
103.0
PierreKimSec
OpenBSD HTTPd < 6.0 - Memory Exhaustion Denial of Service
dos
openbsd
80.0
CVE-2017-5850
Tim Herres
Zoneminder 1.29/1.30 - Cross-Site Scripting / SQL Injection / Session Fixation / Cross-Site Request Forgery
webapps
php
80.0
odzhancode
Linux - Reverse (/TCP) Shell + Multi/Dual Mode Shellcode (129 bytes) (Generator)
generator
129.0
odzhancode
Linux - execve(_/bin/sh__ NULL_ 0) Multi/Dual Mode Shellcode (37 bytes)
linux
37.0
Robert L. Taylor
Linux/x64 - execve(/bin/sh) Shellcode (22 bytes)
linux_x86-64
22.0
«
...
76
77
78
79
80
81
82
83
84
85
86
...
»
page: 81/269 [exploits: 4303]