[] NeoSense
search results for » platform: windows_x86
Joseph Kwabena Fiagbor Terratec dmx_6fire USB - Unquoted Service Path
local windows_x86-64 CVE-2024-31804
hyp3rlinx Windows PowerShell - Event Log Bypass Single Quote Code Execution
local windows_x86-64
hyp3rlinx IBM i Access Client Solutions v1.1.2 - 1.1.4_ v1.1.4.3 - 1.1.9.4 - Remote Credential Theft
remote windows_x86-64 CVE-2024-22318
hyp3rlinx Microsoft Windows Defender Bypass - Detection Mitigation Bypass
local windows_x86-64
hyp3rlinx Microsoft Windows Defender - VBScript Detection Bypass
local windows_x86-64
Xavi Beltran Windows/x86 - Create Administrator User / Dynamic PEB & EDT method null-free Shellcode (373 bytes)
windows_x86 373.0
Tarek Ahmed Windows/x86 - Locate kernel32 base address / Stack Crack method NullFree Shellcode (171 bytes)
windows_x86 171.0
Techryptic Windows/x86 - Download File and Execute / Dynamic PEB & EDT method Shellcode (458 bytes)
windows_x86 458.0
Tarek Ahmed Windows/x86 - Locate kernel32 base address / Memory Sieve method Shellcode (133 bytes)
windows_x86 133.0
Daniel Ortiz Windows/x86 - Bind TCP shellcode / Dynamic PEB & EDT method null-free Shellcode (415 bytes)
windows_x86
Daniel Ortiz Windows/x86 - WinExec PopCalc PEB & Export Directory Table NullFree Dynamic Shellcode (178 bytes)
windows_x86
Daniel Ortiz Windows/x86 - MessageBoxA PEB & Export Address Table NullFree/Dynamic Shellcode (230 bytes)
windows_x86
Xenofon Vassilakopoulos Windows/x64 - Reverse TCP (192.168.201.11:4444) Shellcode (330 Bytes)
windows_x86-64
Forrest Orr Microsoft Internet Explorer 11 and WPAD service 'Jscript.dll' - Use-After-Free
local windows_x86-64 CVE-2020-0674
Forrest Orr Firefox 72 IonMonkey - JIT Type Confusion
local windows_x86-64 CVE-2019-17026
boku Windows/x64 - Dynamic Null-Free WinExec PopCalc Shellcode (205 Bytes)
windows_x86-64
page: 1/31 [exploits: 482]