[] NeoSense
search results for » platform: windows_x86-64
Victor Huerlimann Windows 11 x64 - Reverse TCP Shellcode (564 bytes)
windows_x86-64 564.0
Joseph Kwabena Fiagbor Terratec dmx_6fire USB - Unquoted Service Path
local windows_x86-64 CVE-2024-31804
hyp3rlinx Windows PowerShell - Event Log Bypass Single Quote Code Execution
local windows_x86-64
hyp3rlinx IBM i Access Client Solutions v1.1.2 - 1.1.4_ v1.1.4.3 - 1.1.9.4 - Remote Credential Theft
remote windows_x86-64 CVE-2024-22318
hyp3rlinx Microsoft Windows Defender - VBScript Detection Bypass
local windows_x86-64
hyp3rlinx Microsoft Windows Defender Bypass - Detection Mitigation Bypass
local windows_x86-64
Xenofon Vassilakopoulos Windows/x64 - Reverse TCP (192.168.201.11:4444) Shellcode (330 Bytes)
windows_x86-64
Forrest Orr Firefox 72 IonMonkey - JIT Type Confusion
local windows_x86-64 CVE-2019-17026
Forrest Orr Microsoft Internet Explorer 11 and WPAD service 'Jscript.dll' - Use-After-Free
local windows_x86-64 CVE-2020-0674
boku Windows/x64 - Dynamic NoNull Add RDP Admin (BOKU:SP3C1ALM0V3) Shellcode (387 Bytes)
windows_x86-64
boku Windows/x64 - Dynamic Null-Free WinExec PopCalc Shellcode (205 Bytes)
windows_x86-64
boku Windows/x64 - WinExec Add-Admin (ROOT/I@mR00T$) Dynamic Null-Free Shellcode (210 Bytes)
windows_x86-64
boku Windows/x64 - Dynamic MessageBoxA or MessageBoxW PEB & Import Table Method Shellcode (232 bytes)
windows_x86-64
Saswat Nayak Windows/x64 (7) - Screen Lock Shellcode (9 bytes)
windows_x86-64
bluefrostsec Microsoft Windows 10 (19H1 1901 x64) - 'ws2ifsl.sys' Use After Free Local Privilege Escalation (kASLR kCFG SMEP)
local windows_x86-64 CVE-2019-1215
Axel Souchet Mozilla FireFox (Windows 10 x64) - Full Chain Client Side Attack
local windows_x86-64 CVE-2019-9810;CVE-2019-11708
page: 1/10 [exploits: 159]