[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » platform: windows_x86
Joseph Kwabena Fiagbor
Terratec dmx_6fire USB - Unquoted Service Path
local
windows_x86-64
CVE-2024-31804
hyp3rlinx
Windows PowerShell - Event Log Bypass Single Quote Code Execution
local
windows_x86-64
hyp3rlinx
IBM i Access Client Solutions v1.1.2 - 1.1.4_ v1.1.4.3 - 1.1.9.4 - Remote Credential Theft
remote
windows_x86-64
CVE-2024-22318
hyp3rlinx
Microsoft Windows Defender Bypass - Detection Mitigation Bypass
local
windows_x86-64
hyp3rlinx
Microsoft Windows Defender - VBScript Detection Bypass
local
windows_x86-64
Xavi Beltran
Windows/x86 - Create Administrator User / Dynamic PEB & EDT method null-free Shellcode (373 bytes)
windows_x86
373.0
Tarek Ahmed
Windows/x86 - Locate kernel32 base address / Stack Crack method NullFree Shellcode (171 bytes)
windows_x86
171.0
Techryptic
Windows/x86 - Download File and Execute / Dynamic PEB & EDT method Shellcode (458 bytes)
windows_x86
458.0
Tarek Ahmed
Windows/x86 - Locate kernel32 base address / Memory Sieve method Shellcode (133 bytes)
windows_x86
133.0
Daniel Ortiz
Windows/x86 - Bind TCP shellcode / Dynamic PEB & EDT method null-free Shellcode (415 bytes)
windows_x86
Daniel Ortiz
Windows/x86 - WinExec PopCalc PEB & Export Directory Table NullFree Dynamic Shellcode (178 bytes)
windows_x86
Daniel Ortiz
Windows/x86 - MessageBoxA PEB & Export Address Table NullFree/Dynamic Shellcode (230 bytes)
windows_x86
Xenofon Vassilakopoulos
Windows/x64 - Reverse TCP (192.168.201.11:4444) Shellcode (330 Bytes)
windows_x86-64
Forrest Orr
Microsoft Internet Explorer 11 and WPAD service 'Jscript.dll' - Use-After-Free
local
windows_x86-64
CVE-2020-0674
Forrest Orr
Firefox 72 IonMonkey - JIT Type Confusion
local
windows_x86-64
CVE-2019-17026
boku
Windows/x64 - Dynamic Null-Free WinExec PopCalc Shellcode (205 Bytes)
windows_x86-64
«
1
2
3
4
5
6
7
8
9
10
11
...
»
page: 1/31 [exploits: 482]