[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » platform: windows_x86-64
Victor Huerlimann
Windows 11 x64 - Reverse TCP Shellcode (564 bytes)
windows_x86-64
564.0
Joseph Kwabena Fiagbor
Terratec dmx_6fire USB - Unquoted Service Path
local
windows_x86-64
CVE-2024-31804
hyp3rlinx
Windows PowerShell - Event Log Bypass Single Quote Code Execution
local
windows_x86-64
hyp3rlinx
IBM i Access Client Solutions v1.1.2 - 1.1.4_ v1.1.4.3 - 1.1.9.4 - Remote Credential Theft
remote
windows_x86-64
CVE-2024-22318
hyp3rlinx
Microsoft Windows Defender - VBScript Detection Bypass
local
windows_x86-64
hyp3rlinx
Microsoft Windows Defender Bypass - Detection Mitigation Bypass
local
windows_x86-64
Xenofon Vassilakopoulos
Windows/x64 - Reverse TCP (192.168.201.11:4444) Shellcode (330 Bytes)
windows_x86-64
Forrest Orr
Firefox 72 IonMonkey - JIT Type Confusion
local
windows_x86-64
CVE-2019-17026
Forrest Orr
Microsoft Internet Explorer 11 and WPAD service 'Jscript.dll' - Use-After-Free
local
windows_x86-64
CVE-2020-0674
boku
Windows/x64 - Dynamic NoNull Add RDP Admin (BOKU:SP3C1ALM0V3) Shellcode (387 Bytes)
windows_x86-64
boku
Windows/x64 - Dynamic Null-Free WinExec PopCalc Shellcode (205 Bytes)
windows_x86-64
boku
Windows/x64 - WinExec Add-Admin (ROOT/I@mR00T$) Dynamic Null-Free Shellcode (210 Bytes)
windows_x86-64
boku
Windows/x64 - Dynamic MessageBoxA or MessageBoxW PEB & Import Table Method Shellcode (232 bytes)
windows_x86-64
Saswat Nayak
Windows/x64 (7) - Screen Lock Shellcode (9 bytes)
windows_x86-64
bluefrostsec
Microsoft Windows 10 (19H1 1901 x64) - 'ws2ifsl.sys' Use After Free Local Privilege Escalation (kASLR kCFG SMEP)
local
windows_x86-64
CVE-2019-1215
Axel Souchet
Mozilla FireFox (Windows 10 x64) - Full Chain Client Side Attack
local
windows_x86-64
CVE-2019-9810;CVE-2019-11708
«
1
2
3
4
5
6
7
8
9
10
»
page: 1/10 [exploits: 159]